Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan.dll

Overview

General Information

Sample Name:Scan.dll
Analysis ID:612084
MD5:997e64e4d24d881dd5905f7271976fff
SHA1:fd2aadd2aa4089f4cb471b28fc9a17bf13eda4e3
SHA256:2f09f817d6663b7ca96959e0ef136751099f53047535a99b4eb0cd6347a422d5
Infos:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Sigma detected: Suspicious Call by Ordinal
Uses 32bit PE files
Sample file is different than original file name gathered from version info
One or more processes crash
Tries to load missing DLLs
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample crashes during execution, try analyze it on another analysis machine
  • System is w10x64
  • loaddll32.exe (PID: 6180 cmdline: loaddll32.exe "C:\Users\user\Desktop\Scan.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 2912 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5520 cmdline: rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 4852 cmdline: regsvr32.exe /s C:\Users\user\Desktop\Scan.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
    • rundll32.exe (PID: 4916 cmdline: rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6616 cmdline: rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6136 cmdline: rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 2356 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 680 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2912, ParentProcessName: cmd.exe, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1, ProcessId: 5520, ProcessName: rundll32.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: Scan.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
Source: Scan.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: scan.pdb source: rundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dll
Source: rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.aiim.org/pdfa/ns/extension/
Source: Scan.dllString found in binary or memory: http://www.aiim.org/pdfa/ns/id/
Source: rundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.aiim.org/pdfa/ns/id/partconformanceAIDS_LearnMoreScan_EventGTS_PDFA1sRGBIEC
Source: rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.aiim.org/pdfa/ns/property#
Source: rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.aiim.org/pdfa/ns/schema#
Source: rundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.color.org
Source: rundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllString found in binary or memory: http://www.color.orgOutputIntentsSOutputConditionOutputConditionIdentifierRegistryNameFilterNDestOut
Source: Scan.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
Source: Scan.dllBinary or memory string: OriginalFilenameScan.apiD vs Scan.dll
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 680
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF7CDD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFD79D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFADDA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA8D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA18E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA04C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFB4C40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFB0040
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF32BE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF3EFC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF9EBB0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA47A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA7F90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF9CB80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFAFB50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFAB330
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFAD700
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF7FEE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF9DED0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF9BA80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF9D670
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA4A60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFA2230
Source: Scan.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Scan.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 680
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6136
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER6047.tmpJump to behavior
Source: classification engineClassification label: sus25.winDLL@14/4@0/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF96D00 CoCreateInstance,StringFromGUID2,WideCharToMultiByte,strcpy_s,strcat_s,strcat_s,strcat_s,RegOpenKeyExA,RegQueryInfoKeyA,RegCloseKey,strcpy_s,strcat_s,strcat_s,strcat_s,RegOpenKeyExA,RegCloseKey,RegCloseKey,RegQueryInfoKeyA,RegCloseKey,RegCloseKey,RegCloseKey,free,free,
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Scan.dllStatic file information: File size 1282659 > 1048576
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Scan.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Scan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: scan.pdb source: rundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dll
Source: Scan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Scan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Scan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Scan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Scan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.9 %
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFE1CA2 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFE1CA2 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFE145D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DF4AA67 cpuid
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6DFE1E2B GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Regsvr32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Virtualization/Sandbox Evasion
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 612084 Sample: Scan.dll Startdate: 20/04/2022 Architecture: WINDOWS Score: 25 21 Sigma detected: Suspicious Call by Ordinal 2->21 7 loaddll32.exe 12 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 regsvr32.exe 12 7->13         started        15 2 other processes 7->15 process5 17 rundll32.exe 9->17         started        19 WerFault.exe 23 9 11->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.color.orgOutputIntentsSOutputConditionOutputConditionIdentifierRegistryNameFilterNDestOut0%Avira URL Cloudsafe
http://www.color.org0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.aiim.org/pdfa/ns/property#rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
    high
    http://www.aiim.org/pdfa/ns/extension/rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
      high
      http://www.aiim.org/pdfa/ns/id/partconformanceAIDS_LearnMoreScan_EventGTS_PDFA1sRGBIECrundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
        high
        http://www.color.orgOutputIntentsSOutputConditionOutputConditionIdentifierRegistryNameFilterNDestOutrundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
        • Avira URL Cloud: safe
        unknown
        http://www.aiim.org/pdfa/ns/id/Scan.dllfalse
          high
          http://www.color.orgrundll32.exe, 00000007.00000000.372133858.000000006DFE8000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
          • URL Reputation: safe
          unknown
          http://www.aiim.org/pdfa/ns/schema#rundll32.exe, 00000007.00000000.372301661.000000006E05B000.00000002.00000001.01000000.00000003.sdmp, Scan.dllfalse
            high
            No contacted IP infos
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:612084
            Start date and time: 20/04/202215:03:232022-04-20 15:03:23 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 3s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:Scan.dll
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:26
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:SUS
            Classification:sus25.winDLL@14/4@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 100% (good quality ratio 82.7%)
            • Quality average: 62.2%
            • Quality standard deviation: 37.1%
            HCA Information:
            • Successful, ratio: 80%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .dll
            • Adjust boot time
            • Enable AMSI
            • Sleeps bigger than 120000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 20.42.73.29
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.9274815221163117
            Encrypted:false
            SSDEEP:192:jvEfiv0oXVHBUZMX4jed+3n/u7srS274ItWc:7EfiRXFBUZMX4jeS/u7srX4ItWc
            MD5:77B2468461629231907F828F0D24D40F
            SHA1:3BEBFBB9C9417F81F7C90220267A6B096505DE8E
            SHA-256:26685C4506AB85D229774025EA2BB35F0B52A38E77AC4D0FA65D8BD3AE29E71A
            SHA-512:F8B0043AC95679415E0AD71712497D42F42A4126717EE6664B9AD65DE73FAFE3409EF566EBAE0684A7E6F31D61E730611B8A825976E666A7F74898F8234761D9
            Malicious:false
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.4.9.6.5.8.8.6.7.9.6.5.7.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.4.9.6.5.8.9.3.3.4.3.3.8.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.7.7.8.f.f.b.9.-.6.3.6.e.-.4.b.a.f.-.8.4.b.c.-.5.c.b.e.1.2.0.0.8.c.0.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.c.b.6.8.0.c.-.4.a.7.3.-.4.e.f.a.-.a.2.f.5.-.1.7.6.2.b.5.3.d.0.e.b.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.f.8.-.0.0.0.1.-.0.0.1.8.-.5.3.7.a.-.4.a.a.3.0.2.5.5.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Wed Apr 20 22:04:47 2022, 0x1205a4 type
            Category:dropped
            Size (bytes):51226
            Entropy (8bit):2.010910473628768
            Encrypted:false
            SSDEEP:192:tM+64SW972lwBO5Skbp8PiIsEziph0nSbxU1QzhDiGaAZaXU/MG4rOWJbpns:7Ky05LbKPXs2iph0nSbSQVObAtWOMJ
            MD5:685B2B4D8E1EFCAEBFB4C9F7233D66D4
            SHA1:4648F6B3F65CCD718803E5E2AD45DB0EF8FED813
            SHA-256:F3BAA968656EAB289A4B868D323D2AF2BCAD50C1F32E8921108DAAFF629C55B7
            SHA-512:AED669365DE9D9C444AB19961346C1AD4D8B8C8EFF86972246684271B1C52F52FD6643E9F285FF57B55B7C433E1C4C9A12FB75E6836C2EF08799DAE114E99C79
            Malicious:false
            Preview:MDMP....... .........`b....................................$...x1..........T.......8...........T............................................................................................................U...........B......(.......GenuineIntelW...........T...........z.`b.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
            Category:dropped
            Size (bytes):8276
            Entropy (8bit):3.6922283824903093
            Encrypted:false
            SSDEEP:192:Rrl7r3GLNiX56Lel76YFr6F5pGgmfTFSwCprq89b50Fsf0+Tm:RrlsNip6Le56Y560gmfTFSb50efe
            MD5:91861666C1EB1967AFAF2A0F09A293BB
            SHA1:0B4C5E865120F67E6494615683C75752FB0ABDA0
            SHA-256:D3308241D477CF8185C81F4D8C4BC1E20753B9A308B35CBEE16AEE15D2EF08C4
            SHA-512:035FA71B0E88BE311C2ADD982F64E3CAA4A5F3A84326F2976DAAA311544AA68522CD92B4141D38DFD4D9E7BA3577B3D392684042CCC051445BAD267FAC11796F
            Malicious:false
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.3.6.<./.P.i.d.>.......
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4638
            Entropy (8bit):4.459099232012371
            Encrypted:false
            SSDEEP:48:cvIwSD8zs2JgtWI9SEWgc8sqYjd8fm8M4JCdsIEFJ+q8/nXC4SrSDd:uITfMFdgrsqYOJK86yDWDd
            MD5:EF2D6487C0E44992FE0A0827C62CB076
            SHA1:7AD46F19B16CDB5AF23F6ADBF72A8B53B34EACBA
            SHA-256:BFF215ECDED5398EA0AE28DE7FF3C0608C32DB274262881C3A8F6B3773A044C7
            SHA-512:66649566880A22285565CAB1E0D649847E812BA0F3DA13B48623DB688A0BB02CED4F4318B184B234EF8234D742B72F40B589283D037402081E01BAD37CACB38F
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1480755" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.978679045996824
            TrID:
            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
            • Generic Win/DOS Executable (2004/3) 0.20%
            • DOS Executable Generic (2002/1) 0.20%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Scan.dll
            File size:1282659
            MD5:997e64e4d24d881dd5905f7271976fff
            SHA1:fd2aadd2aa4089f4cb471b28fc9a17bf13eda4e3
            SHA256:2f09f817d6663b7ca96959e0ef136751099f53047535a99b4eb0cd6347a422d5
            SHA512:74f7dd59160564f01c8d6182b1aa75f5a52ac46b81bbd6c7655e0bd3cc9f2de206dd35bffdefb296074285b7a5bf3a07ff404132a523c6767cc7be6b01e8859d
            SSDEEP:24576:JKwEn0T01c19yckPIcRzAPaC3DHzgBAyjK+1FyjpOU:rEn0T01eKIKzAPaCgWSK+1FSL
            TLSH:B3557B11FA55C42AE6E05970EA3DA7EF45797D300B2140EBF3C43A99A934BE31A32753
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@1..!_..!_..!_..Y...!_.*L[..!_.*L\..!_.*LZ..!_.*L^..!_..!_..!_..I[..!_..I^..!_..!^.. _.cOZ..!_.cO_..!_.cO...!_.cO]..!_.Rich.!_
            Icon Hash:92b1b39b9e9e9ad9
            Entrypoint:0x2f91a9c0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x2f900000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x6251F67F [Sat Apr 9 21:11:27 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:089ca559e81ce694a096450dedbe28a2
            Instruction
            push ebp
            mov ebp, esp
            cmp dword ptr [ebp+0Ch], 01h
            jne 00007FE0E0C351E7h
            call 00007FE0E0C351FAh
            push dword ptr [ebp+10h]
            push dword ptr [ebp+0Ch]
            push dword ptr [ebp+08h]
            call 00007FE0E0CCC2BFh
            add esp, 0Ch
            pop ebp
            retn 000Ch
            mov ecx, dword ptr [2FA123E4h]
            push esi
            push edi
            mov edi, BB40E64Eh
            mov esi, FFFF0000h
            cmp ecx, edi
            je 00007FE0E0C351E6h
            test esi, ecx
            jne 00007FE0E0C35208h
            call 00007FE0E0CCC60Eh
            mov ecx, eax
            cmp ecx, edi
            jne 00007FE0E0C351E9h
            mov ecx, BB40E64Fh
            jmp 00007FE0E0C351F0h
            test esi, ecx
            jne 00007FE0E0C351ECh
            or eax, 00004711h
            shl eax, 10h
            or ecx, eax
            mov dword ptr [2FA123E4h], ecx
            not ecx
            pop edi
            mov dword ptr [2FA123E0h], ecx
            pop esi
            ret
            push ebp
            mov ebp, esp
            cmp dword ptr [ebp+08h], 00000000h
            jne 00007FE0E0C351E9h
            mov byte ptr [2FA2A304h], 00000001h
            call 00007FE0E0C35209h
            call 00007FE0E0C353DDh
            test al, al
            jne 00007FE0E0C351E6h
            xor al, al
            pop ebp
            ret
            call 00007FE0E0C353D0h
            test al, al
            jne 00007FE0E0C351ECh
            push 00000000h
            call 00007FE0E0C353C5h
            pop ecx
            jmp 00007FE0E0C351CBh
            mov al, 01h
            pop ebp
            ret
            push ebp
            mov ebp, esp
            and dword ptr [2FA2A670h], 00000000h
            sub esp, 24h
            or dword ptr [2FA123F0h], 01h
            push 0000000Ah
            call 00007FE0E0C3539Ah
            test eax, eax
            je 00007FE0E0C3538Fh
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0xdf8300x80.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0xdf8b00x1a4.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x12b0000x1bce0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1470000xaab4.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xd41100x54.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xd420c0x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xd41680x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xb80000x4f8.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xb6ff60xb7000False0.446019573941data6.55578943265IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0xb80000x29db20x29e00False0.253078358209data6.3401647093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xe20000x486c80x31400False0.781854774746data7.43382146663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x12b0000x1bce00x1be00False0.33248668722data6.22052692507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1470000xaab40xac00False0.733148619186data6.74199501615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            EVEF0x1310680xc5cASCII text, with CRLF line terminatorsEnglishUnited States
            EVEF0x12f6080x82bASCII text, with CRLF line terminatorsEnglishUnited States
            EVEF0x131cc80x4bbASCII text, with CRLF line terminatorsEnglishUnited States
            EVEF0x1328d80xa4ASCII text, with CRLF line terminatorsEnglishUnited States
            EXTSCHEMA_XMP0x12c9400x948ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12e1600x385ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12f2580x3aaASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12fe380xcdASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12ff080x3a7ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1338c00xfe4ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1302b00x3a3ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1306580x5a6ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12e4e80xd6dASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x130c000x467ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x12df280x232ASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1321880x5edASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1327780x15dASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1329800xf3dASCII text, with CRLF line terminatorsEnglishUnited States
            EXVW0x1348a80xd70ASCII text, with CRLF line terminatorsEnglishUnited States
            PNGI0x145cd80xe46PNG image data, 18 x 17, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1417c80xdbbPNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1425880xc9ePNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1432280x357PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1435800x408PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1439880x5daPNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x143f680x4e5PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x144bc80x110fPNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x140a900x643PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1410d80x367PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1414400x386PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
            PNGI0x1444500x773PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
            REGISTRY0x12d2880x222ASCII text, with CRLF line terminatorsEnglishUnited States
            TYPELIB0x12d4b00x708dataEnglishUnited States
            ZDCT0x1356180xe5dataEnglishUnited States
            ZDCT0x1357000xb38adataEnglishUnited States
            RT_ICON0x12bd400x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4294964223, next used block 4043309055EnglishUnited States
            RT_ICON0x12c0400x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2147516416, next used block 126386176EnglishUnited States
            RT_ICON0x12c3400x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2566914048, next used block 2576980377EnglishUnited States
            RT_ICON0x12c6400x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 8452095, next used block 4043308807EnglishUnited States
            RT_RCDATA0x146b200x80dataEnglishUnited States
            RT_RCDATA0x146ba00x40dataEnglishUnited States
            RT_RCDATA0x146be00x80dataEnglishUnited States
            RT_RCDATA0x146c600x80dataEnglishUnited States
            RT_GROUP_ICON0x12c9280x14dataEnglishUnited States
            RT_GROUP_ICON0x12c0280x14dataEnglishUnited States
            RT_GROUP_ICON0x12c6280x14dataEnglishUnited States
            RT_GROUP_ICON0x12c3280x14dataEnglishUnited States
            RT_VERSION0x12dbb80x36cdataEnglishUnited States
            DLLImport
            USER32.dllSetActiveWindow, SendMessageA, FindWindowA, CharNextW, CharNextA, SetForegroundWindow, UnregisterClassA, GetPropW, GetFocus, GetWindowRect, TranslateMessage, DispatchMessageA, PeekMessageA, ShowWindow, MoveWindow, SetFocus, MsgWaitForMultipleObjects, PostThreadMessageA, ValidateRgn, ValidateRect, EndPaint, BeginPaint, DestroyWindow, CreateWindowExA, RegisterClassA, DefWindowProcA, GetMessageA, SetPropW
            GDI32.dllCreateDIBSection, SelectObject, DeleteObject, EnumFontsA, DeleteDC, CreateCompatibleDC
            ADVAPI32.dllRegQueryValueExW, RegSetValueExA, RegQueryInfoKeyW, RegQueryInfoKeyA, RegOpenKeyExA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegQueryValueExA, RegCreateKeyA, RegOpenKeyExW, RegCloseKey
            KERNEL32.dllCreateFileA, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, LoadLibraryA, WaitForSingleObject, SleepConditionVariableCS, InitializeCriticalSection, WakeAllConditionVariable, CloseHandle, WaitForSingleObjectEx, InitOnceExecuteOnce, QueryPerformanceCounter, IsDBCSLeadByte, WideCharToMultiByte, MultiByteToWideChar, lstrcmpiA, LoadLibraryExA, FreeLibrary, LeaveCriticalSection, GetWindowsDirectoryA, GlobalSize, GetDiskFreeSpaceExW, GetTempFileNameW, SetEvent, ResetEvent, ReleaseMutex, CreateMutexA, CreateEventA, CreateThread, OpenEventA, CreateEventW, UnhandledExceptionFilter, OutputDebugStringW, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, InitializeConditionVariable, GetLongPathNameA, IsValidLocale, DeleteFileW, GetTempPathW, GetLongPathNameW, LoadResource, LockResource, SizeofResource, FindResourceA, Sleep, lstrcatA, GetModuleFileNameA, OutputDebugStringA, FreeResource, GetACP, lstrcpyA, lstrlenA, GetTickCount, DisableThreadLibraryCalls, FindAtomW, DecodePointer, RaiseException, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, LoadLibraryW, EnterCriticalSection
            SHELL32.dllShellExecuteExA
            ole32.dllCLSIDFromProgID, CoRegisterClassObject, CoRevokeClassObject, CoResumeClassObjects, CoCreateInstanceEx, StringFromGUID2, CoTaskMemAlloc, CoTaskMemRealloc, CoTaskMemFree, CoCreateInstance
            OLEAUT32.dllUnRegisterTypeLib, RegisterTypeLib, LoadRegTypeLib, LoadTypeLib, VarUI4FromStr, SysStringLen, SysAllocString, SysFreeString
            MSVCP140.dll?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAPAD0PAH001@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ?setprecision@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBGHH@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ??Bid@locale@std@@QAEIXZ, ??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@H@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?_Xlength_error@std@@YAXPBD@Z, ?_Xout_of_range@std@@YAXPBD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@N@Z, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, _Thrd_join, _Thrd_hardware_concurrency, _Thrd_id, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ?uncaught_exception@std@@YA_NXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
            VCRUNTIME140.dll_purecall, __std_terminate, __std_exception_copy, __std_exception_destroy, _CxxThrowException, __CxxFrameHandler3, memset, _except_handler4_common, memmove, memcpy, __std_type_info_destroy_list, __current_exception_context, memchr, strchr, strrchr, strstr, __RTDynamicCast, __current_exception
            api-ms-win-crt-runtime-l1-1-0.dll_beginthreadex, abort, terminate, _invalid_parameter_noinfo_noreturn, _errno, _initterm_e, _invalid_parameter_noinfo, _resetstkoflw, _initterm, _seh_filter_dll, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _execute_onexit_table, _crt_atexit, _cexit, _set_invalid_parameter_handler
            api-ms-win-crt-string-l1-1-0.dllwcsncpy_s, _strnicmp, wcscpy_s, strtok, isalnum, strpbrk, strlen, tolower, isdigit, strcat_s, isalpha, strncmp, strcpy_s, _stricmp, wcscat_s
            api-ms-win-crt-stdio-l1-1-0.dllungetc, fwrite, putc, setvbuf, _fseeki64, fread, fsetpos, fgetpos, fflush, _get_stream_buffer_pointers, _wfopen_s, __stdio_common_vfprintf, fopen, fclose, fgetc, __stdio_common_vsprintf, fputc, _write, _open, _close, __stdio_common_vsprintf_s, __stdio_common_vfscanf
            api-ms-win-crt-math-l1-1-0.dllfloor, ceil, _libm_sse2_cos_precise, _libm_sse2_sin_precise, lround, _libm_sse2_log10_precise, _libm_sse2_sqrt_precise, _libm_sse2_pow_precise
            api-ms-win-crt-convert-l1-1-0.dllmbstowcs, wcstombs_s, atof, wcstombs, atoi, _itoa
            api-ms-win-crt-time-l1-1-0.dllclock
            api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _recalloc, _callnewh
            api-ms-win-crt-multibyte-l1-1-0.dll_mbsstr, _mbsnbcpy_s
            api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
            api-ms-win-crt-environment-l1-1-0.dllgetenv
            api-ms-win-crt-utility-l1-1-0.dllrand
            NameOrdinalAddress
            DllRegisterServer60x2f96aa30
            DllUnregisterServer70x2f96aae0
            PlugInMain50x2f91af80
            DescriptionData
            LegalCopyrightCopyright 1984-2021 Adobe Systems Incorporated and its licensors. All rights reserved.
            FileVersion17.12.30229.10229
            CompanyNameAdobe Systems Incorporated
            ProductNameAdobe Acrobat
            ProductVersion17.12.30229.10229
            FileDescriptionAdobe Acrobat Scan Plug-in
            OriginalFilenameScan.api
            Translation0x0409 0x04e4
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found

            Click to jump to process

            Target ID:0
            Start time:15:04:34
            Start date:20/04/2022
            Path:C:\Windows\System32\loaddll32.exe
            Wow64 process (32bit):true
            Commandline:loaddll32.exe "C:\Users\user\Desktop\Scan.dll"
            Imagebase:0xe20000
            File size:116736 bytes
            MD5 hash:7DEB5DB86C0AC789123DEC286286B938
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:1
            Start time:15:04:34
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
            Imagebase:0xdd0000
            File size:232960 bytes
            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:15:04:35
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\regsvr32.exe
            Wow64 process (32bit):true
            Commandline:regsvr32.exe /s C:\Users\user\Desktop\Scan.dll
            Imagebase:0x10000
            File size:20992 bytes
            MD5 hash:426E7499F6A7346F0410DEAD0805586B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:3
            Start time:15:04:35
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe "C:\Users\user\Desktop\Scan.dll",#1
            Imagebase:0x10e0000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:4
            Start time:15:04:35
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\Scan.dll,DllRegisterServer
            Imagebase:0x10e0000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:5
            Start time:15:04:39
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\Scan.dll,DllUnregisterServer
            Imagebase:0x10e0000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:7
            Start time:15:04:42
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\Scan.dll,PlugInMain
            Imagebase:0x10e0000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:10
            Start time:15:04:45
            Start date:20/04/2022
            Path:C:\Windows\SysWOW64\WerFault.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 680
            Imagebase:0xf10000
            File size:434592 bytes
            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            No disassembly