Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe

Overview

General Information

Sample name:SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
Analysis ID:1544040
MD5:de33be5614d00e60edcc7f0188826233
SHA1:c4d3b63dbae6226ad2c71d22f8afc729c38af2ec
SHA256:fc57a1e56ec50da6e17a351bb29d6598d5f8ddb043e28331e474e0d8efac73a5
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Initial sample is a PE file and has a suspicious name
Contains functionality to check if a debugger is running (IsDebuggerPresent)
HTTP GET or POST without a user agent
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6cf36d8135001e1e08ebb1e21 HTTP/1.1Content-Type: application/jsonHost: report.pdfxd.comContent-Length: 171Connection: Keep-AliveCache-Control: no-cacheData Raw: 7b 22 61 63 74 69 6f 6e 22 3a 22 69 6e 73 74 61 6c 6c 22 2c 22 64 65 76 69 63 65 5f 69 64 22 3a 22 39 65 35 35 37 64 63 32 66 38 66 63 37 37 31 36 39 63 32 33 66 66 32 66 33 37 38 32 30 31 63 38 22 2c 22 6f 73 22 3a 22 31 36 33 38 34 32 22 2c 22 70 72 6f 64 75 63 74 22 3a 22 69 6d 61 67 65 73 68 6f 77 22 2c 22 71 64 22 3a 22 48 6f 6d 65 22 2c 22 72 61 6e 64 6f 6d 22 3a 22 37 31 34 31 38 32 38 22 2c 22 73 74 61 74 75 73 22 3a 22 73 74 61 72 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 2e 32 2e 33 2e 38 22 7d Data Ascii: {"action":"install","device_id":"9e557dc2f8fc77169c23ff2f378201c8","os":"163842","product":"imageshow","qd":"Home","random":"7141828","status":"start","version":"1.2.3.8"}
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: report.pdfxd.com
Source: unknownHTTP traffic detected: POST /v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6cf36d8135001e1e08ebb1e21 HTTP/1.1Content-Type: application/jsonHost: report.pdfxd.comContent-Length: 171Connection: Keep-AliveCache-Control: no-cacheData Raw: 7b 22 61 63 74 69 6f 6e 22 3a 22 69 6e 73 74 61 6c 6c 22 2c 22 64 65 76 69 63 65 5f 69 64 22 3a 22 39 65 35 35 37 64 63 32 66 38 66 63 37 37 31 36 39 63 32 33 66 66 32 66 33 37 38 32 30 31 63 38 22 2c 22 6f 73 22 3a 22 31 36 33 38 34 32 22 2c 22 70 72 6f 64 75 63 74 22 3a 22 69 6d 61 67 65 73 68 6f 77 22 2c 22 71 64 22 3a 22 48 6f 6d 65 22 2c 22 72 61 6e 64 6f 6d 22 3a 22 37 31 34 31 38 32 38 22 2c 22 73 74 61 74 75 73 22 3a 22 73 74 61 72 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 2e 32 2e 33 2e 38 22 7d Data Ascii: {"action":"install","device_id":"9e557dc2f8fc77169c23ff2f378201c8","os":"163842","product":"imageshow","qd":"Home","random":"7141828","status":"start","version":"1.2.3.8"}
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: http://api.pdfxd.com/pdf-service/v1/reportSwa94oarrFLiR6DxVTXxgsP5In8oeidPtimestamp%I64dsend_date%s?
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.pdfxd.com/v1/log
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.pdfxd.com/v1/log?product=imageshow
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.pdfxd.com/v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6c
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://report.pdfxd.com/v1/logs
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/auth/code
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/forgetpwd/step/first?
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/forgetpwd/step/second?
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: https://apis.pdfxd.com/account/v1/api/forgetpwd/step/submit?
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/passport/logout
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/registert
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/user/bind
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/user/bind/list
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/user/info/
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v3/mobile/login
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v3/passport/login/bind%
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v3/passport/loginRPCRT4
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/app/cloud
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/cloud/v1/api/upgradep#
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/cloud/active
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/dump/uploadB
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/support
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/third/anonymous
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/third/phone/sms/codep#
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/third/qq/login/connect5
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/third/wx/qrcode/login#
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/third/wx/qrcode/login/noticel
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: https://dev.pdfxd.com/account/v1/api/forgetpwd/step/submit?
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: https://dev.pdfxd.com/third/wx/qrcode/login/noticehttps://dev.pdfxd.com/third/wx/qrcode/loginhttps:/
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passport.pdfxd.com/bind_phone_pic
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passport.pdfxd.com/coupon_pic
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passport.pdfxd.com/login_pic
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passport.pdfxd.com/pay_pic
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passport.pdfxd.com/pic-interests
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: https://pic.pdfxd.com/protocol.html

System Summary

barindex
Source: initial sampleStatic PE information: Filename: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Resource name: RT_RCDATA type: 7-zip archive data, version 0.4
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeFile created: C:\Users\user\AppData\Roaming\XDImageShowDataJump to behavior
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeString found in binary or memory: </InstallEnd>
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic file information: File size 43003376 > 1048576
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x27eea00
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeCode function: 0_2_00F520DC push ecx; ret 0_2_00F520EF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeFile opened: PhysicalDrive0Jump to behavior
Source: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EC5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeCode function: 0_2_00F567F3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F567F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeCode function: 0_2_00F567F3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F567F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeCode function: 0_2_00F5192D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F5192D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exeCode function: 0_2_00F524C8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F524C8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe13%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
report.pdfxd.com
123.56.218.178
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://report.pdfxd.com/v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6cf36d8135001e1e08ebb1e21false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://apis.pdfxd.com/account/v3/passport/loginRPCRT4SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://report.pdfxd.com/v1/logsSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://dev.pdfxd.com/third/wx/qrcode/login/noticehttps://dev.pdfxd.com/third/wx/qrcode/loginhttps:/SecuriteInfo.com.Riskware.Pdfxd.1445.707.exefalse
            unknown
            https://passport.pdfxd.com/coupon_picSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://apis.pdfxd.com/account/v1/api/auth/codeSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://apis.pdfxd.com/account/v1/api/user/bind/listSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://passport.pdfxd.com/bind_phone_picSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://apis.pdfxd.com/account/v1/api/forgetpwd/step/second?SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://apis.pdfxd.com/third/wx/qrcode/login#SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E40000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://apis.pdfxd.com/account/v1/api/passport/logoutSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://apis.pdfxd.com/third/anonymousSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://passport.pdfxd.com/pay_picSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://apis.pdfxd.com/customer/dump/uploadBSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://report.pdfxd.com/v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6cSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EC5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://apis.pdfxd.com/account/v1/api/registertSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://apis.pdfxd.com/app/cloudSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://apis.pdfxd.com/account/v3/mobile/loginSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://passport.pdfxd.com/pic-interestsSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://passport.pdfxd.com/login_picSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://dev.pdfxd.com/account/v1/api/forgetpwd/step/submit?SecuriteInfo.com.Riskware.Pdfxd.1445.707.exefalse
                                              unknown
                                              https://apis.pdfxd.com/account/v1/api/user/bindSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://apis.pdfxd.com/third/qq/login/connect5SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://report.pdfxd.com/v1/log?product=imageshowSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003EC5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://apis.pdfxd.com/account/v1/api/forgetpwd/step/submit?SecuriteInfo.com.Riskware.Pdfxd.1445.707.exefalse
                                                      unknown
                                                      https://apis.pdfxd.com/third/wx/qrcode/login/noticelSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://apis.pdfxd.com/cloud/v1/api/upgradep#SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://api.pdfxd.com/pdf-service/v1/reportSwa94oarrFLiR6DxVTXxgsP5In8oeidPtimestamp%I64dsend_date%s?SecuriteInfo.com.Riskware.Pdfxd.1445.707.exefalse
                                                            unknown
                                                            https://apis.pdfxd.com/account/v3/passport/login/bind%SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://apis.pdfxd.com/customer/supportSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://apis.pdfxd.com/customer/cloud/activeSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://report.pdfxd.com/v1/logSecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://apis.pdfxd.com/third/phone/sms/codep#SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://apis.pdfxd.com/account/v1/api/forgetpwd/step/first?SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://pic.pdfxd.com/protocol.htmlSecuriteInfo.com.Riskware.Pdfxd.1445.707.exefalse
                                                                          unknown
                                                                          https://apis.pdfxd.com/account/v1/api/user/info/SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe, 00000000.00000002.3396318509.0000000003E47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            123.56.218.178
                                                                            report.pdfxd.comChina
                                                                            37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                            Analysis ID:1544040
                                                                            Start date and time:2024-10-28 18:36:12 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 4m 38s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:5
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
                                                                            Detection:MAL
                                                                            Classification:mal52.winEXE@1/0@1/1
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HCA Information:Failed
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • VT rate limit hit for: SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
                                                                            No simulations
                                                                            No context
                                                                            No context
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdserver.exeGet hashmaliciousGhostRatBrowse
                                                                            • 121.196.49.217
                                                                            server.exeGet hashmaliciousGhostRatBrowse
                                                                            • 121.196.49.217
                                                                            la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                                            • 8.188.166.164
                                                                            la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                            • 39.106.134.67
                                                                            nabmips.elfGet hashmaliciousUnknownBrowse
                                                                            • 8.169.152.46
                                                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                            • 42.120.57.84
                                                                            splmpsl.elfGet hashmaliciousUnknownBrowse
                                                                            • 39.98.53.190
                                                                            nabarm7.elfGet hashmaliciousUnknownBrowse
                                                                            • 8.139.253.84
                                                                            splarm7.elfGet hashmaliciousUnknownBrowse
                                                                            • 123.57.234.16
                                                                            splarm5.elfGet hashmaliciousUnknownBrowse
                                                                            • 8.159.149.218
                                                                            No context
                                                                            No context
                                                                            No created / dropped files found
                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):7.995877630321369
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
                                                                            File size:43'003'376 bytes
                                                                            MD5:de33be5614d00e60edcc7f0188826233
                                                                            SHA1:c4d3b63dbae6226ad2c71d22f8afc729c38af2ec
                                                                            SHA256:fc57a1e56ec50da6e17a351bb29d6598d5f8ddb043e28331e474e0d8efac73a5
                                                                            SHA512:9e1df0cb90054d732c6cd9083eba7561e491cd55fb715fe01336f35ae9af1b2d3c74f7ba0c6e39b8ddf2b38c7832e5533eeba26bab9f630d61d41832c694c8a9
                                                                            SSDEEP:786432:zgmnUmofP4fKDo72GORr/X2fnW4GmDDAU2dzg1vTfG1RmwXf/8DlrWnX:rnUtwfKDo7REMnW9U2dM1vT4zf/8DxWX
                                                                            TLSH:74973373299E4034E95100729678DF7ED0AF63290B2F8DC797C00B690967BC16A7AE5F
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........vo...<...<...<...=...<...=...<.c.=...<.c.=...<.c.=...<...=...<...=...<...=...<...<...<.d.=V..<.d.=...<.d.<...<...<...<.d.=...
                                                                            Icon Hash:619a14960b292109
                                                                            Entrypoint:0x4a1d9c
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:true
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x66E2E9FB [Thu Sep 12 13:17:47 2024 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:0
                                                                            File Version Major:6
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:0a7217542690edbbd6c792caac85a70c
                                                                            Signature Valid:true
                                                                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                            Signature Validation Error:The operation completed successfully
                                                                            Error Number:0
                                                                            Not Before, Not After
                                                                            • 04/03/2024 01:00:00 27/08/2025 01:59:59
                                                                            Subject Chain
                                                                            • CN="Chengdu Aishang Office Technology Co., Ltd.", OU=R&D department, O="Chengdu Aishang Office Technology Co., Ltd.", L=\u6210\u90fd\u5e02, S=\u56db\u5ddd\u7701, C=CN, SERIALNUMBER=91510100MA7EUJ0408, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.1=\u56db\u5ddd\u5929\u5e9c\u65b0\u533a, OID.1.3.6.1.4.1.311.60.2.1.2=\u56db\u5ddd\u7701, OID.1.3.6.1.4.1.311.60.2.1.3=CN
                                                                            Version:3
                                                                            Thumbprint MD5:B1DB425DAFF1EE9F34BFCDCD9CB68DF4
                                                                            Thumbprint SHA-1:D9185C2F47829D062DDCE1C387F13D96A40EBF37
                                                                            Thumbprint SHA-256:A58F9C0E4DF0109F1443CE86FF4795F924BB4FA6D8141DB24CD37B04AAF98204
                                                                            Serial:073AD6CAE07689A7F4334C3698FBF405
                                                                            Instruction
                                                                            call 00007F1EB08D04D9h
                                                                            jmp 00007F1EB08CFBDFh
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            pop ebp
                                                                            jmp 00007F1EB08CF459h
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            and dword ptr [00508440h], 00000000h
                                                                            sub esp, 28h
                                                                            or dword ptr [00504118h], 01h
                                                                            push 0000000Ah
                                                                            call dword ptr [004DC238h]
                                                                            test eax, eax
                                                                            je 00007F1EB08D006Bh
                                                                            push ebx
                                                                            push esi
                                                                            push edi
                                                                            xor eax, eax
                                                                            lea edi, dword ptr [ebp-28h]
                                                                            xor ecx, ecx
                                                                            push ebx
                                                                            cpuid
                                                                            mov esi, ebx
                                                                            pop ebx
                                                                            nop
                                                                            mov dword ptr [edi], eax
                                                                            mov dword ptr [edi+04h], esi
                                                                            mov dword ptr [edi+08h], ecx
                                                                            xor ecx, ecx
                                                                            mov dword ptr [edi+0Ch], edx
                                                                            mov eax, dword ptr [ebp-28h]
                                                                            mov edi, dword ptr [ebp-24h]
                                                                            mov dword ptr [ebp-04h], eax
                                                                            xor edi, 756E6547h
                                                                            mov eax, dword ptr [ebp-1Ch]
                                                                            xor eax, 49656E69h
                                                                            mov dword ptr [ebp-18h], eax
                                                                            mov eax, dword ptr [ebp-20h]
                                                                            xor eax, 6C65746Eh
                                                                            mov dword ptr [ebp-14h], eax
                                                                            xor eax, eax
                                                                            inc eax
                                                                            push ebx
                                                                            cpuid
                                                                            mov esi, ebx
                                                                            pop ebx
                                                                            nop
                                                                            lea ebx, dword ptr [ebp-28h]
                                                                            mov dword ptr [ebx], eax
                                                                            mov eax, dword ptr [ebp-18h]
                                                                            or eax, dword ptr [ebp-14h]
                                                                            or eax, edi
                                                                            mov dword ptr [ebx+04h], esi
                                                                            mov dword ptr [ebx+08h], ecx
                                                                            mov dword ptr [ebx+0Ch], edx
                                                                            jne 00007F1EB08CFD9Bh
                                                                            mov eax, dword ptr [ebp-28h]
                                                                            and eax, 0FFF3FF0h
                                                                            cmp eax, 000106C0h
                                                                            je 00007F1EB08CFD85h
                                                                            cmp eax, 00020660h
                                                                            je 00007F1EB08CFD7Eh
                                                                            cmp eax, 00020670h
                                                                            je 00007F1EB08CFD77h
                                                                            cmp eax, 00030650h
                                                                            je 00007F1EB08CFD70h
                                                                            cmp eax, 00030660h
                                                                            je 00007F1EB08CFD69h
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x100d6c0x168.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x11d0000x27ee868.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x29004000x29f0.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x290c0000xb208.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xf09a00x1c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0xf09c00x18.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf08e00x40.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0xdc0000x69c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000xdaf5c0xdb000ee4ffa6b421416cb870b4dd7c2555747False0.4587993186358447DOS executable (COM)6.498008455044036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0xdc0000x272d40x27400d0e77bd1dac89316a0665d9a06b26adfFalse0.3346312699044586data4.759283366681058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x1040000x180200x3e00a96155ca2312d5ea5ef1db479d615469False0.19430443548387097data4.566885531106728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rsrc0x11d0000x27ee8680x27eea00b19da25060bf75d761a2364b0a9c73b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x290c0000xb2080xb400109541f3149bcdc7ef96ce8b5e55bbceFalse0.573828125data6.5666903730688855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            PNG0x11d7980x2b1PNG image data, 210 x 143, 8-bit/color RGBA, non-interlacedChineseChina0.7706821480406386
                                                                            PNG0x11da4c0x834PNG image data, 800 x 40, 8-bit colormap, non-interlacedChineseChina1.0052380952380953
                                                                            PNG0x11e2800xcaPNG image data, 16 x 6, 8-bit/color RGBA, non-interlacedChineseChina1.004950495049505
                                                                            PNG0x11e34c0x167PNG image data, 72 x 24, 8-bit gray+alpha, non-interlacedChineseChina1.0306406685236769
                                                                            PNG0x11e4b40xd4PNG image data, 16 x 6, 8-bit/color RGBA, non-interlacedChineseChina1.009433962264151
                                                                            PNG0x11e5880xa2PNG image data, 20 x 20, 4-bit colormap, non-interlacedChineseChina0.9629629629629629
                                                                            PNG0x11e62c0x6e4PNG image data, 80 x 80, 8-bit colormap, non-interlacedChineseChina1.006235827664399
                                                                            PNG0x11ed100x1fb8PNG image data, 600 x 400, 4-bit colormap, non-interlacedChineseChina0.9926108374384236
                                                                            PNG0x120cc80xb50PNG image data, 200 x 29, 8-bit colormap, non-interlacedChineseChina0.9986187845303868
                                                                            PNG0x1218180x3cfPNG image data, 96 x 12, 8-bit colormap, non-interlacedChineseChina0.9364102564102564
                                                                            PNG0x121be80x134PNG image data, 36 x 12, 8-bit colormap, non-interlacedChineseChina0.961038961038961
                                                                            PNG0x121d1c0x12dPNG image data, 36 x 12, 8-bit colormap, non-interlacedChineseChina0.9833887043189369
                                                                            PNG0x121e4c0x190PNG image data, 240 x 24, 8-bit colormap, non-interlacedChineseChina1.0
                                                                            RT_ICON0x121fdc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.3421985815602837
                                                                            RT_ICON0x1224440x988Device independent bitmap graphic, 24 x 48 x 32, image size 0ChineseChina0.25778688524590165
                                                                            RT_ICON0x122dcc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.18878986866791744
                                                                            RT_ICON0x123e740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.1370331950207469
                                                                            RT_ICON0x12641c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.10899858290033065
                                                                            RT_ICON0x12a6440x2dd6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9944605420146583
                                                                            RT_ICON0x12d41c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.3421985815602837
                                                                            RT_ICON0x12d8840x988Device independent bitmap graphic, 24 x 48 x 32, image size 0ChineseChina0.25778688524590165
                                                                            RT_ICON0x12e20c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.18878986866791744
                                                                            RT_ICON0x12f2b40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.1370331950207469
                                                                            RT_ICON0x13185c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.10899858290033065
                                                                            RT_ICON0x135a840x2dd6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9944605420146583
                                                                            RT_MENU0x13885c0x50dataChineseChina0.8375
                                                                            RT_DIALOG0x1388ac0x114dataChineseChina0.6159420289855072
                                                                            RT_STRING0x1389c00x34dataChineseChina0.6346153846153846
                                                                            RT_ACCELERATOR0x1389f40x10dataChineseChina1.25
                                                                            RT_RCDATA0x138a040x4efXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsChineseChina0.40380047505938244
                                                                            RT_RCDATA0x138ef40x27d21eb7-zip archive data, version 0.4ChineseChina1.0003108978271484
                                                                            RT_GROUP_ICON0x290b0e00x5adataChineseChina0.7777777777777778
                                                                            RT_GROUP_ICON0x290b13c0x5adataChineseChina0.8111111111111111
                                                                            RT_VERSION0x290b1980x2a0dataChineseChina0.5461309523809523
                                                                            RT_MANIFEST0x290b4380x42eXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1010), with CRLF line terminatorsEnglishUnited States0.5037383177570094
                                                                            DLLImport
                                                                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                            KERNEL32.dlllstrcmpA, GetThreadLocale, SetThreadLocale, InitializeCriticalSectionAndSpinCount, GetSystemInfo, SetEndOfFile, GetFileSizeEx, MoveFileExW, SetFileAttributesW, GetFileAttributesExW, ResetEvent, SetEvent, PostQueuedCompletionStatus, GetExitCodeThread, CreateEventW, CreateIoCompletionPort, GetQueuedCompletionStatus, DecodePointer, WriteConsoleW, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, FlushFileBuffers, GetTimeZoneInformation, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetConsoleOutputCP, SetStdHandle, WaitForSingleObject, SetFilePointerEx, GetFileType, GetStdHandle, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, QueryPerformanceFrequency, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlUnwind, GetSystemTimeAsFileTime, QueryPerformanceCounter, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, GetStringTypeW, LoadLibraryExA, VirtualFree, VirtualAlloc, IsProcessorFeaturePresent, FlushInstructionCache, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, EncodePointer, IsDebuggerPresent, EnumSystemLocalesW, GetLastError, HeapDestroy, lstrlenA, GetSystemTime, HeapAlloc, HeapReAlloc, GetNativeSystemInfo, GetFileSize, HeapFree, HeapSize, GetProcessHeap, InitializeCriticalSectionEx, DeleteCriticalSection, FindResourceExW, LoadResource, LockResource, SizeofResource, FindResourceW, RaiseException, SetLastError, EnterCriticalSection, LeaveCriticalSection, GetCurrentThreadId, GetModuleFileNameW, CreateFileA, SystemTimeToFileTime, GetWindowsDirectoryW, FileTimeToSystemTime, DeviceIoControl, GetCurrentProcess, K32GetModuleFileNameExW, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, ReadFile, GetStartupInfoW, CreatePipe, TerminateProcess, GetExitCodeProcess, CreateProcessW, MoveFileW, RemoveDirectoryW, FindClose, FindNextFileW, FindFirstFileW, LocalAlloc, LocalFree, OutputDebugStringW, SetFilePointer, GetPrivateProfileStringW, GetPrivateProfileIntW, CopyFileW, lstrlenW, CreateThread, ReadConsoleW, TerminateThread, InitializeCriticalSection, GetVersionExW, GetModuleHandleW, DeleteFileW, WriteFile, LoadLibraryW, GetTickCount, MulDiv, GetCurrentProcessId, OpenProcess, FreeResource, GlobalFree, GlobalAlloc, Sleep, VerSetConditionMask, VerifyVersionInfoW, WideCharToMultiByte, MultiByteToWideChar, WritePrivateProfileStringW, lstrcmpiW, LoadLibraryExW, GetProcAddress, FreeLibrary, CloseHandle, CreateFileW, CreateDirectoryW, GetVersion, GetConsoleMode
                                                                            USER32.dllGetShellWindow, IsClipboardFormatAvailable, RegisterClipboardFormatW, GetSysColor, SetCaretPos, CreateCaret, GetCaretBlinkTime, wsprintfW, SetWindowPos, MoveWindow, ShowWindow, PostQuitMessage, LoadCursorW, KillTimer, SetTimer, DestroyWindow, IsWindow, CreateWindowExW, GetClassInfoExW, RegisterClassExW, SetWindowLongW, GetWindowLongW, GetDlgItem, UnregisterClassW, CallWindowProcW, IsRectEmpty, DefWindowProcW, SendMessageW, GetWindowTextLengthW, SetWindowTextW, CharLowerBuffW, UpdateWindow, UpdateLayeredWindow, SetActiveWindow, BringWindowToTop, AttachThreadInput, GetWindowThreadProcessId, GetClientRect, GetWindowRect, MapWindowPoints, GetParent, LoadIconW, MonitorFromWindow, GetMonitorInfoW, MessageBoxW, GetMessageW, TranslateMessage, DispatchMessageW, PeekMessageW, CharNextW, SetRectEmpty, EqualRect, SetCursor, ClientToScreen, GetCursorPos, PtInRect, ScreenToClient, GetDoubleClickTime, CopyRect, IntersectRect, PostMessageW, SystemParametersInfoW, BeginPaint, EndPaint, IsIconic, InvalidateRect, TrackMouseEvent, SetFocus, GetFocus, SetCapture, ReleaseCapture, SetWindowRgn, IsWindowVisible, EnableWindow, GetForegroundWindow, GetWindowTextW, SetForegroundWindow, IsZoomed, MonitorFromRect, OffsetRect, SetLayeredWindowAttributes, DrawTextW, GetCursor, GetIconInfo, GetDC, ReleaseDC, FillRect, GetWindow, LoadImageW
                                                                            GDI32.dllCreatePen, RestoreDC, ExtSelectClipRgn, CreateRectRgnIndirect, SaveDC, GetDeviceCaps, GetStockObject, SetBkColor, GetBitmapBits, StretchBlt, SetStretchBltMode, SetPixel, Rectangle, CreateSolidBrush, GetObjectW, SetTextColor, SetBkMode, CreateRectRgn, CombineRgn, CreateRoundRectRgn, DeleteDC, BitBlt, SelectObject, CreateCompatibleDC, DeleteObject, CreateFontIndirectW, SetBitmapBits, GetTextColor, GetCurrentObject, SetTextCharacterExtra, GetViewportOrgEx, CreateDIBSection
                                                                            ADVAPI32.dllRegQueryInfoKeyW, FreeSid, CheckTokenMembership, AllocateAndInitializeSid, ConvertSidToStringSidW, LookupAccountNameW, GetUserNameW, DeleteService, ControlService, SetSecurityDescriptorDacl, RegSetKeySecurity, InitializeSecurityDescriptor, RegEnumKeyW, CloseServiceHandle, ChangeServiceConfigW, QueryServiceConfigW, QueryServiceStatus, StartServiceW, OpenServiceW, OpenSCManagerW, CreateProcessWithTokenW, DuplicateTokenEx, OpenProcessToken, RegQueryValueExW, RegSetValueExW, RegOpenKeyExW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey
                                                                            SHELL32.dllSHGetPathFromIDListW, SHGetSpecialFolderLocation, SHBrowseForFolderW, ShellExecuteW, SHCreateDirectoryExW, ShellExecuteExW, SHChangeNotify, SHGetSpecialFolderPathW, SHGetMalloc
                                                                            ole32.dllCoInitializeSecurity, OleRun, RegisterDragDrop, StgCreateDocfileOnILockBytes, CreateILockBytesOnHGlobal, CreateStreamOnHGlobal, CoInitialize, CoTaskMemRealloc, CoTaskMemAlloc, CoCreateInstance, CoTaskMemFree, CoUninitialize
                                                                            OLEAUT32.dllSysAllocString, VarBstrCmp, VarUI4FromStr, VariantCopy, VariantClear, LoadRegTypeLib, LoadTypeLib, SysFreeString, SysStringLen, VariantInit, GetErrorInfo
                                                                            SHLWAPI.dllPathIsDirectoryW, PathSearchAndQualifyW, PathRemoveBackslashW, SHDeleteValueW, SHGetValueW, StrCmpIW, PathCombineW, PathAppendW, PathRemoveFileSpecW, PathRemoveExtensionW, PathFindFileNameW, PathFileExistsW
                                                                            COMCTL32.dllDrawShadowText, InitCommonControlsEx
                                                                            MSIMG32.dllAlphaBlend
                                                                            WININET.dllInternetCloseHandle, HttpSendRequestW, HttpOpenRequestW, InternetReadFile, HttpQueryInfoW, InternetCrackUrlW, InternetConnectW, InternetSetOptionW, InternetOpenW
                                                                            gdiplus.dllGdipCreateBitmapFromHICON, GdipCreateBitmapFromHBITMAP, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipCreateBitmapFromFile, GdipBitmapLockBits, GdipGetImageHeight, GdipGetImageWidth, GdipCloneImage, GdipDrawImageRectI, GdipGetImagePixelFormat, GdipDeleteGraphics, GdipGetImageGraphicsContext, GdipCreateFromHDC, GdipDisposeImage, GdipAlloc, GdipFree, GdipDeleteBrush, GdipCloneBrush, GdipCreateSolidFill, GdipSetTextRenderingHint, GdipDrawString, GdipCreateFontFamilyFromName, GdipDeleteFontFamily, GdipCreateFont, GdipDeleteFont, GdiplusStartup, GdipSetInterpolationMode
                                                                            Secur32.dllGetUserNameExW
                                                                            CRYPT32.dllCryptBinaryToStringW, CryptStringToBinaryW
                                                                            NETAPI32.dllNetbios
                                                                            IPHLPAPI.DLLGetAdaptersInfo, GetIpAddrTable
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            ChineseChina
                                                                            EnglishUnited States
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 28, 2024 18:37:08.763045073 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:08.803069115 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:08.803478003 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:08.822451115 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:08.864703894 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:10.115009069 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:10.115087032 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:10.115602016 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:10.115658045 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:10.348500013 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:10.348583937 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:37:25.172838926 CET8049706123.56.218.178192.168.2.6
                                                                            Oct 28, 2024 18:37:25.172957897 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:38:58.496223927 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:38:58.808022976 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:38:59.417403936 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:39:00.620520115 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:39:03.026798010 CET4970680192.168.2.6123.56.218.178
                                                                            Oct 28, 2024 18:39:07.839284897 CET4970680192.168.2.6123.56.218.178
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 28, 2024 18:37:08.610331059 CET6445353192.168.2.61.1.1.1
                                                                            Oct 28, 2024 18:37:08.663336039 CET53644531.1.1.1192.168.2.6
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Oct 28, 2024 18:37:08.610331059 CET192.168.2.61.1.1.10x8aacStandard query (0)report.pdfxd.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Oct 28, 2024 18:37:08.663336039 CET1.1.1.1192.168.2.60x8aacNo error (0)report.pdfxd.com123.56.218.178A (IP address)IN (0x0001)false
                                                                            • report.pdfxd.com
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.649706123.56.218.178803160C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 28, 2024 18:37:08.822451115 CET415OUTPOST /v1/log?product=imageshow&version=1.2.3.8&timestamp=1730137026&sign=8c9ca8f6cf36d8135001e1e08ebb1e21 HTTP/1.1
                                                                            Content-Type: application/json
                                                                            Host: report.pdfxd.com
                                                                            Content-Length: 171
                                                                            Connection: Keep-Alive
                                                                            Cache-Control: no-cache
                                                                            Data Raw: 7b 22 61 63 74 69 6f 6e 22 3a 22 69 6e 73 74 61 6c 6c 22 2c 22 64 65 76 69 63 65 5f 69 64 22 3a 22 39 65 35 35 37 64 63 32 66 38 66 63 37 37 31 36 39 63 32 33 66 66 32 66 33 37 38 32 30 31 63 38 22 2c 22 6f 73 22 3a 22 31 36 33 38 34 32 22 2c 22 70 72 6f 64 75 63 74 22 3a 22 69 6d 61 67 65 73 68 6f 77 22 2c 22 71 64 22 3a 22 48 6f 6d 65 22 2c 22 72 61 6e 64 6f 6d 22 3a 22 37 31 34 31 38 32 38 22 2c 22 73 74 61 74 75 73 22 3a 22 73 74 61 72 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 2e 32 2e 33 2e 38 22 7d
                                                                            Data Ascii: {"action":"install","device_id":"9e557dc2f8fc77169c23ff2f378201c8","os":"163842","product":"imageshow","qd":"Home","random":"7141828","status":"start","version":"1.2.3.8"}
                                                                            Oct 28, 2024 18:37:10.115009069 CET180INHTTP/1.1 200 OK
                                                                            Date: Mon, 28 Oct 2024 17:37:09 GMT
                                                                            Content-Type: application/json; charset=utf-8
                                                                            Content-Length: 33
                                                                            Connection: keep-alive
                                                                            Data Raw: 7b 22 63 6f 64 65 22 3a 30 2c 22 6d 65 73 73 61 67 65 22 3a 22 22 2c 22 64 61 74 61 22 3a 22 22 7d
                                                                            Data Ascii: {"code":0,"message":"","data":""}
                                                                            Oct 28, 2024 18:37:10.115602016 CET180INHTTP/1.1 200 OK
                                                                            Date: Mon, 28 Oct 2024 17:37:09 GMT
                                                                            Content-Type: application/json; charset=utf-8
                                                                            Content-Length: 33
                                                                            Connection: keep-alive
                                                                            Data Raw: 7b 22 63 6f 64 65 22 3a 30 2c 22 6d 65 73 73 61 67 65 22 3a 22 22 2c 22 64 61 74 61 22 3a 22 22 7d
                                                                            Data Ascii: {"code":0,"message":"","data":""}
                                                                            Oct 28, 2024 18:37:10.348500013 CET180INHTTP/1.1 200 OK
                                                                            Date: Mon, 28 Oct 2024 17:37:09 GMT
                                                                            Content-Type: application/json; charset=utf-8
                                                                            Content-Length: 33
                                                                            Connection: keep-alive
                                                                            Data Raw: 7b 22 63 6f 64 65 22 3a 30 2c 22 6d 65 73 73 61 67 65 22 3a 22 22 2c 22 64 61 74 61 22 3a 22 22 7d
                                                                            Data Ascii: {"code":0,"message":"","data":""}


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Target ID:0
                                                                            Start time:13:37:06
                                                                            Start date:28/10/2024
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Pdfxd.1445.707.exe"
                                                                            Imagebase:0xeb0000
                                                                            File size:43'003'376 bytes
                                                                            MD5 hash:DE33BE5614D00E60EDCC7F0188826233
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:false

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:6.9%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:1.6%
                                                                              Total number of Nodes:434
                                                                              Total number of Limit Nodes:8
                                                                              execution_graph 1598 f51d9c 1601 f52515 1598->1601 1600 f51da1 1600->1600 1602 f5252b 1601->1602 1604 f52534 1602->1604 1605 f524c8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1602->1605 1604->1600 1605->1604 1053 f6ae5a 1054 f6ae66 ___free_lconv_mon 1053->1054 1055 f6ae6d GetLastError ExitThread 1054->1055 1056 f6ae7a 1054->1056 1067 f6f4a7 GetLastError 1056->1067 1058 f6ae7f 1117 f75b9e 1058->1117 1061 f6ae96 1124 f6b039 1061->1124 1068 f6f4c3 1067->1068 1069 f6f4bd 1067->1069 1073 f6f4c7 SetLastError 1068->1073 1130 f73ecf 1068->1130 1142 f73e90 1069->1142 1077 f6f557 1073->1077 1078 f6f55c 1073->1078 1077->1058 1158 f6c549 1078->1158 1079 f6f4fc 1082 f73ecf ___free_lconv_mon 2 API calls 1079->1082 1080 f6f50d 1083 f73ecf ___free_lconv_mon 2 API calls 1080->1083 1085 f6f50a 1082->1085 1086 f6f519 1083->1086 1147 f6f792 1085->1147 1089 f6f534 1086->1089 1090 f6f51d 1086->1090 1087 f6f573 1088 f73ecf ___free_lconv_mon 2 API calls 1087->1088 1096 f6f579 1087->1096 1094 f6f58d 1088->1094 1153 f6f2d5 1089->1153 1095 f73ecf ___free_lconv_mon 2 API calls 1090->1095 1091 f73e90 ___free_lconv_mon 2 API calls 1091->1087 1094->1096 1100 f70c3c ___free_lconv_mon 10 API calls 1094->1100 1095->1085 1098 f6f57e 1096->1098 1101 f6c549 33 API calls 1096->1101 1098->1058 1099 f6f792 ___free_lconv_mon 10 API calls 1099->1073 1102 f6f59d 1100->1102 1103 f6f5f7 1101->1103 1104 f6f5a5 1102->1104 1105 f6f5ba 1102->1105 1107 f73ecf ___free_lconv_mon 2 API calls 1104->1107 1106 f73ecf ___free_lconv_mon 2 API calls 1105->1106 1108 f6f5c6 1106->1108 1109 f6f5b1 1107->1109 1110 f6f5ca 1108->1110 1111 f6f5d9 1108->1111 1114 f6f792 ___free_lconv_mon 10 API calls 1109->1114 1112 f73ecf ___free_lconv_mon 2 API calls 1110->1112 1113 f6f2d5 ___free_lconv_mon 10 API calls 1111->1113 1112->1109 1115 f6f5e4 1113->1115 1114->1096 1116 f6f792 ___free_lconv_mon 10 API calls 1115->1116 1116->1098 1118 f6ae8a 1117->1118 1119 f75bae 1117->1119 1118->1061 1121 f74178 1118->1121 1119->1118 1560 f73d02 1119->1560 1122 f73c3d ___free_lconv_mon GetProcAddress 1121->1122 1123 f74194 1122->1123 1123->1061 1563 f6af0f 1124->1563 1169 f73c3d 1130->1169 1133 f6f4df 1133->1073 1135 f70c3c 1133->1135 1134 f73f09 TlsSetValue 1140 f70c49 ___free_lconv_mon 1135->1140 1136 f70c89 1177 f56aed 1136->1177 1137 f70c74 RtlAllocateHeap 1139 f6f4f4 1137->1139 1137->1140 1139->1079 1139->1080 1140->1136 1140->1137 1174 f6c756 1140->1174 1143 f73c3d ___free_lconv_mon GetProcAddress 1142->1143 1144 f73eac 1143->1144 1145 f73ec7 TlsGetValue 1144->1145 1146 f73eb5 1144->1146 1146->1068 1148 f6f79d RtlFreeHeap 1147->1148 1149 f6f7c7 1147->1149 1148->1149 1150 f6f7b2 GetLastError 1148->1150 1149->1073 1151 f6f7bf ___free_lconv_mon 1150->1151 1152 f56aed ___free_lconv_mon 8 API calls 1151->1152 1152->1149 1214 f6f169 1153->1214 1356 f76921 1158->1356 1162 f6c582 1392 f6cc03 1162->1392 1163 f6c563 IsProcessorFeaturePresent 1165 f6c56f 1163->1165 1164 f6c559 1164->1162 1164->1163 1386 f567f3 1165->1386 1170 f73c6d 1169->1170 1172 f73c69 1169->1172 1171 f73c87 GetProcAddress 1170->1171 1170->1172 1171->1172 1173 f73c97 ___free_lconv_mon 1171->1173 1172->1133 1172->1134 1173->1172 1180 f6c782 1174->1180 1191 f6f5f8 GetLastError 1177->1191 1179 f56af2 1179->1139 1181 f6c78e ___free_lconv_mon 1180->1181 1186 f6b27e EnterCriticalSection 1181->1186 1183 f6c799 ___free_lconv_mon 1187 f6c7d0 1183->1187 1186->1183 1190 f6b2c6 LeaveCriticalSection 1187->1190 1189 f6c761 1189->1140 1190->1189 1192 f6f60e 1191->1192 1193 f6f614 1191->1193 1195 f73e90 ___free_lconv_mon 2 API calls 1192->1195 1194 f73ecf ___free_lconv_mon 2 API calls 1193->1194 1197 f6f618 SetLastError 1193->1197 1196 f6f630 1194->1196 1195->1193 1196->1197 1199 f70c3c ___free_lconv_mon 8 API calls 1196->1199 1197->1179 1200 f6f645 1199->1200 1201 f6f65e 1200->1201 1202 f6f64d 1200->1202 1204 f73ecf ___free_lconv_mon 2 API calls 1201->1204 1203 f73ecf ___free_lconv_mon 2 API calls 1202->1203 1208 f6f65b 1203->1208 1205 f6f66a 1204->1205 1206 f6f685 1205->1206 1207 f6f66e 1205->1207 1211 f6f2d5 ___free_lconv_mon 8 API calls 1206->1211 1209 f73ecf ___free_lconv_mon 2 API calls 1207->1209 1210 f6f792 ___free_lconv_mon 8 API calls 1208->1210 1209->1208 1210->1197 1212 f6f690 1211->1212 1213 f6f792 ___free_lconv_mon 8 API calls 1212->1213 1213->1197 1215 f6f175 ___free_lconv_mon 1214->1215 1228 f6b27e EnterCriticalSection 1215->1228 1217 f6f17f 1229 f6f1af 1217->1229 1220 f6f27b 1221 f6f287 ___free_lconv_mon 1220->1221 1233 f6b27e EnterCriticalSection 1221->1233 1223 f6f291 1234 f6f45c 1223->1234 1225 f6f2a9 1238 f6f2c9 1225->1238 1228->1217 1232 f6b2c6 LeaveCriticalSection 1229->1232 1231 f6f19d 1231->1220 1232->1231 1233->1223 1235 f6f492 ___free_lconv_mon 1234->1235 1236 f6f46b ___free_lconv_mon 1234->1236 1235->1225 1236->1235 1241 f78ad5 1236->1241 1355 f6b2c6 LeaveCriticalSection 1238->1355 1240 f6f2b7 1240->1099 1243 f78b55 1241->1243 1244 f78aeb 1241->1244 1245 f6f792 ___free_lconv_mon 10 API calls 1243->1245 1268 f78ba3 1243->1268 1244->1243 1249 f6f792 ___free_lconv_mon 10 API calls 1244->1249 1250 f78b1e 1244->1250 1246 f78b77 1245->1246 1247 f6f792 ___free_lconv_mon 10 API calls 1246->1247 1251 f78b8a 1247->1251 1248 f6f792 ___free_lconv_mon 10 API calls 1252 f78b4a 1248->1252 1254 f78b13 1249->1254 1255 f6f792 ___free_lconv_mon 10 API calls 1250->1255 1267 f78b40 1250->1267 1256 f6f792 ___free_lconv_mon 10 API calls 1251->1256 1257 f6f792 ___free_lconv_mon 10 API calls 1252->1257 1253 f78c11 1258 f6f792 ___free_lconv_mon 10 API calls 1253->1258 1269 f77f1a 1254->1269 1260 f78b35 1255->1260 1261 f78b98 1256->1261 1257->1243 1264 f78c17 1258->1264 1297 f78379 1260->1297 1266 f6f792 ___free_lconv_mon 10 API calls 1261->1266 1262 f78bb1 1262->1253 1263 f6f792 10 API calls ___free_lconv_mon 1262->1263 1263->1262 1264->1235 1266->1268 1267->1248 1309 f78c46 1268->1309 1270 f77f2b 1269->1270 1296 f78014 1269->1296 1271 f77f3c 1270->1271 1273 f6f792 ___free_lconv_mon 10 API calls 1270->1273 1272 f77f4e 1271->1272 1274 f6f792 ___free_lconv_mon 10 API calls 1271->1274 1275 f77f60 1272->1275 1276 f6f792 ___free_lconv_mon 10 API calls 1272->1276 1273->1271 1274->1272 1277 f77f72 1275->1277 1278 f6f792 ___free_lconv_mon 10 API calls 1275->1278 1276->1275 1279 f77f84 1277->1279 1281 f6f792 ___free_lconv_mon 10 API calls 1277->1281 1278->1277 1280 f77f96 1279->1280 1282 f6f792 ___free_lconv_mon 10 API calls 1279->1282 1283 f77fa8 1280->1283 1284 f6f792 ___free_lconv_mon 10 API calls 1280->1284 1281->1279 1282->1280 1285 f6f792 ___free_lconv_mon 10 API calls 1283->1285 1286 f77fba 1283->1286 1284->1283 1285->1286 1287 f77fcc 1286->1287 1289 f6f792 ___free_lconv_mon 10 API calls 1286->1289 1288 f77fde 1287->1288 1290 f6f792 ___free_lconv_mon 10 API calls 1287->1290 1291 f77ff0 1288->1291 1292 f6f792 ___free_lconv_mon 10 API calls 1288->1292 1289->1287 1290->1288 1293 f78002 1291->1293 1294 f6f792 ___free_lconv_mon 10 API calls 1291->1294 1292->1291 1295 f6f792 ___free_lconv_mon 10 API calls 1293->1295 1293->1296 1294->1293 1295->1296 1296->1250 1298 f78386 1297->1298 1308 f783de 1297->1308 1299 f78396 1298->1299 1300 f6f792 ___free_lconv_mon 10 API calls 1298->1300 1301 f783a8 1299->1301 1302 f6f792 ___free_lconv_mon 10 API calls 1299->1302 1300->1299 1303 f783ba 1301->1303 1304 f6f792 ___free_lconv_mon 10 API calls 1301->1304 1302->1301 1305 f6f792 ___free_lconv_mon 10 API calls 1303->1305 1307 f783cc 1303->1307 1304->1303 1305->1307 1306 f6f792 ___free_lconv_mon 10 API calls 1306->1308 1307->1306 1307->1308 1308->1267 1310 f78c72 1309->1310 1311 f78c53 1309->1311 1310->1262 1311->1310 1315 f788a0 1311->1315 1314 f6f792 ___free_lconv_mon 10 API calls 1314->1310 1316 f7897e 1315->1316 1317 f788b1 1315->1317 1316->1314 1351 f785ff 1317->1351 1320 f785ff ___free_lconv_mon 10 API calls 1321 f788c4 1320->1321 1322 f785ff ___free_lconv_mon 10 API calls 1321->1322 1323 f788cf 1322->1323 1324 f785ff ___free_lconv_mon 10 API calls 1323->1324 1325 f788da 1324->1325 1326 f785ff ___free_lconv_mon 10 API calls 1325->1326 1327 f788e8 1326->1327 1328 f6f792 ___free_lconv_mon 10 API calls 1327->1328 1329 f788f3 1328->1329 1330 f6f792 ___free_lconv_mon 10 API calls 1329->1330 1331 f788fe 1330->1331 1332 f6f792 ___free_lconv_mon 10 API calls 1331->1332 1333 f78909 1332->1333 1334 f785ff ___free_lconv_mon 10 API calls 1333->1334 1335 f78917 1334->1335 1336 f785ff ___free_lconv_mon 10 API calls 1335->1336 1337 f78925 1336->1337 1338 f785ff ___free_lconv_mon 10 API calls 1337->1338 1339 f78936 1338->1339 1340 f785ff ___free_lconv_mon 10 API calls 1339->1340 1341 f78944 1340->1341 1342 f785ff ___free_lconv_mon 10 API calls 1341->1342 1343 f78952 1342->1343 1344 f6f792 ___free_lconv_mon 10 API calls 1343->1344 1345 f7895d 1344->1345 1346 f6f792 ___free_lconv_mon 10 API calls 1345->1346 1347 f78968 1346->1347 1348 f6f792 ___free_lconv_mon 10 API calls 1347->1348 1349 f78973 1348->1349 1350 f6f792 ___free_lconv_mon 10 API calls 1349->1350 1350->1316 1354 f78611 1351->1354 1352 f78620 1352->1320 1353 f6f792 ___free_lconv_mon 10 API calls 1353->1354 1354->1352 1354->1353 1355->1240 1395 f7684f 1356->1395 1359 f76966 1360 f76972 ___free_lconv_mon 1359->1360 1361 f6f5f8 ___free_lconv_mon 10 API calls 1360->1361 1362 f769c2 1360->1362 1363 f769d4 1360->1363 1368 f769a3 1360->1368 1361->1368 1364 f56aed ___free_lconv_mon 10 API calls 1362->1364 1365 f76a0a ___free_lconv_mon 1363->1365 1409 f6b27e EnterCriticalSection 1363->1409 1366 f769c7 1364->1366 1371 f76a47 1365->1371 1372 f76b44 1365->1372 1382 f76a75 1365->1382 1406 f569ef 1366->1406 1368->1362 1368->1363 1385 f769ac 1368->1385 1377 f6f4a7 35 API calls 1371->1377 1371->1382 1374 f76b4f 1372->1374 1414 f6b2c6 LeaveCriticalSection 1372->1414 1376 f6cc03 17 API calls 1374->1376 1378 f76b57 1376->1378 1380 f76a6a 1377->1380 1378->1164 1379 f6f4a7 35 API calls 1383 f76aca 1379->1383 1381 f6f4a7 35 API calls 1380->1381 1381->1382 1410 f76af0 1382->1410 1384 f6f4a7 35 API calls 1383->1384 1383->1385 1384->1385 1385->1164 1387 f5680f 1386->1387 1388 f5683b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1387->1388 1391 f5690c 1388->1391 1390 f5692a 1390->1162 1479 f51820 1391->1479 1487 f6ca73 1392->1487 1396 f7685b ___free_lconv_mon 1395->1396 1401 f6b27e EnterCriticalSection 1396->1401 1398 f76869 1402 f768ab 1398->1402 1401->1398 1405 f6b2c6 LeaveCriticalSection 1402->1405 1404 f6c54e 1404->1164 1404->1359 1405->1404 1415 f5693b 1406->1415 1409->1365 1411 f76af4 1410->1411 1412 f76abc 1410->1412 1478 f6b2c6 LeaveCriticalSection 1411->1478 1412->1379 1412->1383 1412->1385 1414->1374 1416 f5694d 1415->1416 1421 f56972 1416->1421 1418 f56965 1432 f5672b 1418->1432 1422 f56982 1421->1422 1423 f56989 1421->1423 1438 f56790 GetLastError 1422->1438 1428 f56997 1423->1428 1442 f56767 1423->1442 1426 f569be 1426->1428 1445 f56a1c IsProcessorFeaturePresent 1426->1445 1428->1418 1429 f569ee 1430 f5693b 35 API calls 1429->1430 1431 f569fb 1430->1431 1431->1418 1433 f56737 1432->1433 1436 f5674e 1433->1436 1471 f567d6 1433->1471 1435 f56761 1435->1385 1436->1435 1437 f567d6 35 API calls 1436->1437 1437->1435 1439 f567a9 1438->1439 1449 f6f6a9 1439->1449 1443 f56772 GetLastError SetLastError 1442->1443 1444 f5678b 1442->1444 1443->1426 1444->1426 1446 f56a28 1445->1446 1447 f567f3 8 API calls 1446->1447 1448 f56a3d GetCurrentProcess TerminateProcess 1447->1448 1448->1429 1450 f6f6c2 1449->1450 1451 f6f6bc 1449->1451 1453 f73ecf ___free_lconv_mon 2 API calls 1450->1453 1470 f567c1 SetLastError 1450->1470 1452 f73e90 ___free_lconv_mon 2 API calls 1451->1452 1452->1450 1454 f6f6dc 1453->1454 1455 f70c3c ___free_lconv_mon 10 API calls 1454->1455 1454->1470 1456 f6f6ec 1455->1456 1457 f6f6f4 1456->1457 1458 f6f709 1456->1458 1460 f73ecf ___free_lconv_mon 2 API calls 1457->1460 1459 f73ecf ___free_lconv_mon 2 API calls 1458->1459 1461 f6f715 1459->1461 1467 f6f700 1460->1467 1462 f6f728 1461->1462 1463 f6f719 1461->1463 1466 f6f2d5 ___free_lconv_mon 10 API calls 1462->1466 1465 f73ecf ___free_lconv_mon 2 API calls 1463->1465 1464 f6f792 ___free_lconv_mon 10 API calls 1464->1470 1465->1467 1468 f6f733 1466->1468 1467->1464 1469 f6f792 ___free_lconv_mon 10 API calls 1468->1469 1469->1470 1470->1423 1472 f567e0 1471->1472 1473 f567e9 1471->1473 1474 f56790 12 API calls 1472->1474 1473->1436 1475 f567e5 1474->1475 1475->1473 1476 f6c549 35 API calls 1475->1476 1477 f567f2 1476->1477 1478->1412 1480 f51829 IsProcessorFeaturePresent 1479->1480 1481 f51828 1479->1481 1483 f5196a 1480->1483 1481->1390 1486 f5192d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1483->1486 1485 f51a4d 1485->1390 1486->1485 1488 f6caa0 1487->1488 1497 f6cab1 1487->1497 1498 f5241c GetModuleHandleW 1488->1498 1493 f6c58c 1493->1087 1493->1091 1505 f6c91f 1497->1505 1499 f52428 1498->1499 1499->1497 1500 f6cb54 GetModuleHandleExW 1499->1500 1501 f6cb93 GetProcAddress 1500->1501 1502 f6cba7 1500->1502 1501->1502 1503 f6cbc3 1502->1503 1504 f6cbba FreeLibrary 1502->1504 1503->1497 1504->1503 1506 f6c92b ___free_lconv_mon 1505->1506 1520 f6b27e EnterCriticalSection 1506->1520 1508 f6c935 1521 f6c98b 1508->1521 1510 f6c942 1525 f6c960 1510->1525 1513 f6cb0a 1550 f6cb3b 1513->1550 1515 f6cb14 1516 f6cb28 1515->1516 1517 f6cb18 GetCurrentProcess TerminateProcess 1515->1517 1518 f6cb54 3 API calls 1516->1518 1517->1516 1519 f6cb30 ExitProcess 1518->1519 1520->1508 1523 f6c997 ___free_lconv_mon 1521->1523 1522 f6c9fb 1522->1510 1523->1522 1528 f6d50e 1523->1528 1549 f6b2c6 LeaveCriticalSection 1525->1549 1527 f6c94e 1527->1493 1527->1513 1529 f6d51a __EH_prolog3 1528->1529 1532 f6d266 1529->1532 1531 f6d541 1531->1522 1533 f6d272 ___free_lconv_mon 1532->1533 1540 f6b27e EnterCriticalSection 1533->1540 1535 f6d280 1541 f6d41e 1535->1541 1540->1535 1542 f6d43d 1541->1542 1543 f6d28d 1541->1543 1542->1543 1544 f6f792 ___free_lconv_mon 10 API calls 1542->1544 1545 f6d2b5 1543->1545 1544->1543 1548 f6b2c6 LeaveCriticalSection 1545->1548 1547 f6d29e 1547->1531 1548->1547 1549->1527 1553 f75bd8 1550->1553 1552 f6cb40 1552->1515 1554 f75be7 1553->1554 1555 f75bf4 1554->1555 1557 f73cc2 1554->1557 1555->1552 1558 f73c3d ___free_lconv_mon GetProcAddress 1557->1558 1559 f73cde 1558->1559 1559->1555 1561 f73c3d ___free_lconv_mon GetProcAddress 1560->1561 1562 f73d1e 1561->1562 1562->1118 1564 f6f5f8 ___free_lconv_mon 10 API calls 1563->1564 1567 f6af1a 1564->1567 1565 f6af5c ExitThread 1566 f6af33 1569 f6af46 1566->1569 1570 f6af3f CloseHandle 1566->1570 1567->1565 1567->1566 1572 f741b3 1567->1572 1569->1565 1571 f6af52 FreeLibraryAndExitThread 1569->1571 1570->1569 1571->1565 1573 f73c3d ___free_lconv_mon GetProcAddress 1572->1573 1574 f741cc 1573->1574 1574->1566 1575 f6f5f8 GetLastError 1576 f6f60e 1575->1576 1577 f6f614 1575->1577 1579 f73e90 ___free_lconv_mon 2 API calls 1576->1579 1578 f73ecf ___free_lconv_mon 2 API calls 1577->1578 1581 f6f618 SetLastError 1577->1581 1580 f6f630 1578->1580 1579->1577 1580->1581 1583 f70c3c ___free_lconv_mon 8 API calls 1580->1583 1584 f6f645 1583->1584 1585 f6f65e 1584->1585 1586 f6f64d 1584->1586 1588 f73ecf ___free_lconv_mon 2 API calls 1585->1588 1587 f73ecf ___free_lconv_mon 2 API calls 1586->1587 1592 f6f65b 1587->1592 1589 f6f66a 1588->1589 1590 f6f685 1589->1590 1591 f6f66e 1589->1591 1595 f6f2d5 ___free_lconv_mon 8 API calls 1590->1595 1593 f73ecf ___free_lconv_mon 2 API calls 1591->1593 1594 f6f792 ___free_lconv_mon 8 API calls 1592->1594 1593->1592 1594->1581 1596 f6f690 1595->1596 1597 f6f792 ___free_lconv_mon 8 API calls 1596->1597 1597->1581

                                                                              Callgraph

                                                                              • Executed
                                                                              • Not Executed
                                                                              • Opacity -> Relevance
                                                                              • Disassembly available
                                                                              callgraph 0 Function_00F78C77 1 Function_00F6F074 2 Function_00F6CA73 25 Function_00F6CB54 2->25 74 Function_00F6C91F 2->74 75 Function_00F5241C 2->75 86 Function_00F6CB0A 2->86 3 Function_00F567F3 39 Function_00F524C0 3->39 55 Function_00F53420 3->55 56 Function_00F51820 3->56 4 Function_00F76AF0 36 Function_00F6B2C6 4->36 5 Function_00F56972 16 Function_00F56767 5->16 52 Function_00F5693B 5->52 70 Function_00F56790 5->70 76 Function_00F56A1C 5->76 6 Function_00F6B27E 7 Function_00F785FF 69 Function_00F6F792 7->69 8 Function_00F520FF 9 Function_00F6F27B 9->6 31 Function_00F6F45C 9->31 43 Function_00F6F2C9 9->43 81 Function_00F52280 9->81 10 Function_00F6F5F8 26 Function_00F6F2D5 10->26 41 Function_00F73ECF 10->41 49 Function_00F70C3C 10->49 10->69 71 Function_00F73E90 10->71 11 Function_00F78379 11->69 12 Function_00F768F9 13 Function_00F74178 48 Function_00F73C3D 13->48 14 Function_00F6D266 14->6 46 Function_00F6D2B5 14->46 72 Function_00F6D41E 14->72 14->81 15 Function_00F76966 15->4 15->6 15->10 15->12 19 Function_00F56AED 15->19 20 Function_00F569EF 15->20 15->36 45 Function_00F768B7 15->45 54 Function_00F6F4A7 15->54 62 Function_00F6C72C 15->62 15->81 82 Function_00F6CC03 15->82 17 Function_00F6C960 17->36 18 Function_00F566E3 19->10 20->52 21 Function_00F6C96C 22 Function_00F6F169 22->6 61 Function_00F6F1AF 22->61 22->81 23 Function_00F6C756 80 Function_00F6C782 23->80 24 Function_00F78AD5 24->11 37 Function_00F78C46 24->37 24->69 79 Function_00F77F1A 24->79 26->9 26->22 27 Function_00F567D6 44 Function_00F6C549 27->44 27->70 28 Function_00F56A50 29 Function_00F6C7D0 29->36 30 Function_00F520DC 31->24 33 Function_00F78A58 31->33 58 Function_00F78CA0 31->58 32 Function_00F6AE5A 32->13 35 Function_00F6C7D9 32->35 53 Function_00F6B039 32->53 32->54 77 Function_00F75B9E 32->77 32->81 78 Function_00F78C1D 33->78 34 Function_00F75BD8 38 Function_00F73CC2 34->38 65 Function_00F76D28 34->65 35->10 59 Function_00F788A0 37->59 37->69 38->48 40 Function_00F7684F 40->6 63 Function_00F768AB 40->63 40->81 41->48 42 Function_00F524C8 43->36 44->3 44->15 57 Function_00F76921 44->57 44->82 46->36 47 Function_00F741B3 47->48 48->21 49->1 49->19 49->23 50 Function_00F6D7BB 51 Function_00F6CB3B 51->34 68 Function_00F76D16 51->68 52->5 52->18 64 Function_00F5672B 52->64 85 Function_00F6AF0F 53->85 54->26 54->41 54->44 54->49 54->69 54->71 60 Function_00F5192D 56->60 57->40 58->0 59->7 59->69 61->36 63->36 64->27 66 Function_00F6F6A9 66->26 66->41 66->49 66->69 66->71 67 Function_00F52515 67->42 69->19 69->28 70->66 71->48 72->69 73 Function_00F51D9C 73->67 74->6 74->17 74->81 87 Function_00F6C98B 74->87 76->3 77->65 83 Function_00F73D02 77->83 79->69 80->6 80->29 80->62 80->81 82->2 83->48 84 Function_00F6D50E 84->8 84->14 84->30 85->10 85->47 86->25 86->51 87->50 87->62 87->81 87->84

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetLastError.KERNEL32(00FB05B0,0000000C), ref: 00F6AE6D
                                                                              • ExitThread.KERNEL32 ref: 00F6AE74
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorExitLastThread
                                                                              • String ID:
                                                                              • API String ID: 1611280651-0
                                                                              • Opcode ID: 2c15efd94393d444211ab74282f1139f71439370ea090ef3d9f50319a0a6c3fc
                                                                              • Instruction ID: cc092a0b0713268ec0dc17ebcef1eae7888527f89ec008667912de8bd08a56ce
                                                                              • Opcode Fuzzy Hash: 2c15efd94393d444211ab74282f1139f71439370ea090ef3d9f50319a0a6c3fc
                                                                              • Instruction Fuzzy Hash: 32F0A470940204AFDB01AFB0DC4AABE3B74EF54710F104249F00597652DB79A940EFA2

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 19 f6f792-f6f79b 20 f6f79d-f6f7b0 RtlFreeHeap 19->20 21 f6f7ca-f6f7cb 19->21 20->21 22 f6f7b2-f6f7c9 GetLastError call f56a50 call f56aed 20->22 22->21
                                                                              APIs
                                                                              • RtlFreeHeap.NTDLL(00000000,00000000,?,00F78618,?,00000000,?,?,00F788B9,?,00000007,?,?,00F78C6C,?,?), ref: 00F6F7A8
                                                                              • GetLastError.KERNEL32(?,?,00F78618,?,00000000,?,?,00F788B9,?,00000007,?,?,00F78C6C,?,?), ref: 00F6F7B3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 485612231-0
                                                                              • Opcode ID: 8307a1fbea2b4439a2bfc265e3148764cf642e622548de548fc3f2eef6bb8c8a
                                                                              • Instruction ID: df864b9862e5acbc9e9e938203904b17c558fbbe166c3e70b9fd77aabc663a03
                                                                              • Opcode Fuzzy Hash: 8307a1fbea2b4439a2bfc265e3148764cf642e622548de548fc3f2eef6bb8c8a
                                                                              • Instruction Fuzzy Hash: 1FE08631500208ABEB112FF0AC49B953B68AB41753F044021FA19E6070CA388844E7D4

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetLastError.KERNEL32(?,?,00F6AE7F,00FB05B0,0000000C), ref: 00F6F4AB
                                                                              • SetLastError.KERNEL32(00000000), ref: 00F6F54D
                                                                                • Part of subcall function 00F70C3C: RtlAllocateHeap.NTDLL(00000008,?,?,?,00F6F4F4,00000001,00000364,?,00000006,000000FF,?,00F6AE7F,00FB05B0,0000000C), ref: 00F70C7D
                                                                                • Part of subcall function 00F6F792: RtlFreeHeap.NTDLL(00000000,00000000,?,00F78618,?,00000000,?,?,00F788B9,?,00000007,?,?,00F78C6C,?,?), ref: 00F6F7A8
                                                                                • Part of subcall function 00F6F792: GetLastError.KERNEL32(?,?,00F78618,?,00000000,?,?,00F788B9,?,00000007,?,?,00F78C6C,?,?), ref: 00F6F7B3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$Heap$AllocateFree
                                                                              • String ID:
                                                                              • API String ID: 2037364846-0
                                                                              • Opcode ID: 16447014ff5c2281e1b78437bb6fbb75fc5588d0645defaba969bd88c63067d2
                                                                              • Instruction ID: 7293c341cb1f101c7f98dcedf3c760efc8b0b63e223b2c1a75d1dbe05b42bddd
                                                                              • Opcode Fuzzy Hash: 16447014ff5c2281e1b78437bb6fbb75fc5588d0645defaba969bd88c63067d2
                                                                              • Instruction Fuzzy Hash: 8B31EB326052157BDA513B747CC6E6F364C8F40370B158331F516951F2EE688D0EB7A2

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 96 f6f5f8-f6f60c GetLastError 97 f6f60e-f6f616 call f73e90 96->97 98 f6f628-f6f632 call f73ecf 96->98 103 f6f623 97->103 104 f6f618-f6f621 97->104 105 f6f634-f6f636 98->105 106 f6f638-f6f640 call f70c3c 98->106 103->98 107 f6f69d-f6f6a8 SetLastError 104->107 105->107 109 f6f645-f6f64b 106->109 110 f6f65e-f6f66c call f73ecf 109->110 111 f6f64d-f6f65c call f73ecf 109->111 116 f6f685-f6f69a call f6f2d5 call f6f792 110->116 117 f6f66e-f6f67c call f73ecf 110->117 118 f6f67d-f6f683 call f6f792 111->118 125 f6f69c 116->125 117->118 118->125 125->107
                                                                              APIs
                                                                              • GetLastError.KERNEL32(00000000,?,00F56AF2,00F70C8E,?,?,00F6F4F4,00000001,00000364,?,00000006,000000FF,?,00F6AE7F,00FB05B0,0000000C), ref: 00F6F5FC
                                                                              • SetLastError.KERNEL32(00000000), ref: 00F6F69E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast
                                                                              • String ID:
                                                                              • API String ID: 1452528299-0
                                                                              • Opcode ID: 5c9404721502bdce66687cc346b4127a385e59d5d2850fb16db13a6abfecd3f8
                                                                              • Instruction ID: d4aa4c2f1f52806855b8204b5013019be511b748b70fa7447e697463f4d343cf
                                                                              • Opcode Fuzzy Hash: 5c9404721502bdce66687cc346b4127a385e59d5d2850fb16db13a6abfecd3f8
                                                                              • Instruction Fuzzy Hash: B811CE326052166FDA813AB4FCC6E6F364CCF403B4B104335F018910B2EA6A8C0EB662

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 128 f70c3c-f70c47 129 f70c55-f70c5b 128->129 130 f70c49-f70c53 128->130 132 f70c74-f70c85 RtlAllocateHeap 129->132 133 f70c5d-f70c5e 129->133 130->129 131 f70c89-f70c94 call f56aed 130->131 137 f70c96-f70c98 131->137 135 f70c87 132->135 136 f70c60-f70c67 call f6f074 132->136 133->132 135->137 136->131 141 f70c69-f70c72 call f6c756 136->141 141->131 141->132
                                                                              APIs
                                                                              • RtlAllocateHeap.NTDLL(00000008,?,?,?,00F6F4F4,00000001,00000364,?,00000006,000000FF,?,00F6AE7F,00FB05B0,0000000C), ref: 00F70C7D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1279760036-0
                                                                              • Opcode ID: a620391d2f3e1c03d185b951ca462ae186f3619acf5d67aa4e5cc9ca2adb1515
                                                                              • Instruction ID: 481b85321585907bef3803e868424477f5940bdc18362c21010b19a3a37c09d4
                                                                              • Opcode Fuzzy Hash: a620391d2f3e1c03d185b951ca462ae186f3619acf5d67aa4e5cc9ca2adb1515
                                                                              • Instruction Fuzzy Hash: E2F09036904125EAAB222A219C45B6A3748AF40770B18C352B80CEA190CE30E800B7E6

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00F568EB
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00F568F5
                                                                              • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00F56902
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                              • String ID:
                                                                              • API String ID: 3906539128-0
                                                                              • Opcode ID: f6859dedae42249f3ab7bf3b505bb9ae02a7cc61fd8541a2c14653a3a7f551f8
                                                                              • Instruction ID: f5d228ee9a320ea13a832f45005122a854b2111251a8b37d76e59bf50ffbe2c3
                                                                              • Opcode Fuzzy Hash: f6859dedae42249f3ab7bf3b505bb9ae02a7cc61fd8541a2c14653a3a7f551f8
                                                                              • Instruction Fuzzy Hash: 4A31D37490121C9BCB21DF68DC8979DBBB8BF08311F5042EAE91CA7291E7349B859F54

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 144 f6cb54-f6cb91 GetModuleHandleExW 145 f6cbb4-f6cbb8 144->145 146 f6cb93-f6cba5 GetProcAddress 144->146 148 f6cbc3-f6cbd0 145->148 149 f6cbba-f6cbbd FreeLibrary 145->149 146->145 147 f6cba7-f6cbb2 146->147 147->145 149->148
                                                                              APIs
                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,03F8D1CB,?,?,00000000,00F80F80,000000FF,?,00F6CB30,00000002,?,00F6CB04,00F6C58C), ref: 00F6CB89
                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F6CB9B
                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,00F80F80,000000FF,?,00F6CB30,00000002,?,00F6CB04,00F6C58C), ref: 00F6CBBD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.3391103235.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                              • Associated: 00000000.00000002.3391051473.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391205772.0000000000F8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391272111.0000000000FB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391312278.0000000000FB5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FB7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391330165.0000000000FC9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000000FCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000019CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.00000000023CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.3391380298.0000000002DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_eb0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                              • API String ID: 4061214504-1276376045
                                                                              • Opcode ID: 92e414bbb41086ba2095589ed373ad7c1c4f51f7c1adc883b372fd62cd00c3c2
                                                                              • Instruction ID: faff456fd38d6c87f74217a768dc3309e669217ba7bbfafcf54f91f5636e4f34
                                                                              • Opcode Fuzzy Hash: 92e414bbb41086ba2095589ed373ad7c1c4f51f7c1adc883b372fd62cd00c3c2
                                                                              • Instruction Fuzzy Hash: 3E016231A40659AFDB119B50DC09FFEBBB8FB44B24F004625F911A2690DB749904EBE0