Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IRPF2024-0940959038w904598304w985036.msi

Overview

General Information

Sample name:IRPF2024-0940959038w904598304w985036.msi
Analysis ID:1513060
MD5:55e1b6a518bc3e243d8d856ee17430aa
SHA1:f83dc91c91f89d6a321892d54b4de229041b07d1
SHA256:baf5979f4c227be5b3f1bf4f03e5902e8b7fcc2dad38068f363a0096cb12a536
Tags:msi
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates multiple autostart registry keys
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
Launches processes in debugging mode, may be used to hinder debugging
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 6860 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\IRPF2024-0940959038w904598304w985036.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 4892 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 2244 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 5B841E4EC1525DEC8E125CA4E79284A2 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • Flexpcis.exe (PID: 5976 cmdline: "C:\Users\user\Contacts\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
  • Flexpcis.exe (PID: 1008 cmdline: "C:\Users\user\Contacts\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
    • WerFault.exe (PID: 6068 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6024 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • Flexpcis.exe (PID: 672 cmdline: "C:\Users\user\Contacts\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
    • WerFault.exe (PID: 1080 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 724 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6440 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • Flexpcis.exe (PID: 5648 cmdline: "C:\Users\user\Contacts\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
    • WerFault.exe (PID: 6736 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 3912 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • Flexpcis.exe (PID: 5908 cmdline: "C:\Users\user\Contacts\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
    • WerFault.exe (PID: 2704 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5516 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 1004 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Contacts\Flexpcis.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 4892, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Novo Valor
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-18T12:32:28.265873+020028033043Unknown Traffic192.168.2.64971550.116.112.13880TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\Contacts\Drivespan.dllVirustotal: Detection: 32%Perma Link
Source: IRPF2024-0940959038w904598304w985036.msiVirustotal: Detection: 7%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Flexpcis.exe, 00000004.00000000.2175400389.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000006.00000000.2285448613.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000009.00000000.2372725998.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000009.00000002.2826466455.000000000011F000.00000002.00000001.01000000.00000003.sdmp
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_001175CA FindFirstFileExW,6_2_001175CA
Source: global trafficHTTP traffic detected: GET /dddd/inspecionando.php HTTP/1.1Host: www.rodovalhoadvogados.com.brCache-Control: no-cache
Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49715 -> 50.116.112.138:80
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /dddd/inspecionando.php HTTP/1.1Host: www.rodovalhoadvogados.com.brCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: www.rodovalhoadvogados.com.br
Source: Flexpcis.exe, 00000006.00000003.2578838717.0000000003000000.00000004.00001000.00020000.00000000.sdmp, Flexpcis.exe, 00000006.00000002.2793239128.000000006458C000.00000020.00000001.01000000.00000004.sdmp, Flexpcis.exe, 00000009.00000003.2717965588.00000000035B0000.00000004.00001000.00020000.00000000.sdmp, Flexpcis.exe, 00000009.00000002.2833202804.000000006458C000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.indyproject.org/

System Summary

barindex
Source: Drivespan.dll.2.drStatic PE information: section name: .}w/
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3c0868.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1078.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI10C7.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1135.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1194.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{8AE8C42A-5150-4814-B7AC-A22D49C22F14}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI129E.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3c086b.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3c086b.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIFFA.tmpJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_0011CD156_2_0011CD15
Source: Joe Sandbox ViewDropped File: C:\Users\user\Contacts\Flexpcis.exe 7E4132835419E4C415D048B64A5FC2813B8D2FF72BB5586D857DCDF6A90A45F2
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI1078.tmp 118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628
Source: Drivespan.dll.2.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: Drivespan.dll.2.drStatic PE information: Number of sections : 16 > 10
Source: classification engineClassification label: mal76.evad.winMSI@18/59@1/1
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,6_2_00111510
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CML12F7.tmpJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess672
Source: C:\Users\user\Contacts\Flexpcis.exeMutant created: \Sessions\1\BaseNamedObjects\gg24UGs6BG
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5648
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1008
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5908
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF608BC4025E100561.TMPJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCommand line argument: -Restart6_2_001117A0
Source: C:\Users\user\Contacts\Flexpcis.exeCommand line argument: drivespan.dll6_2_001117A0
Source: C:\Users\user\Contacts\Flexpcis.exeCommand line argument: drivespan.dll6_2_001117A0
Source: C:\Users\user\Contacts\Flexpcis.exeCommand line argument: run6_2_001117A0
Source: C:\Users\user\Contacts\Flexpcis.exeCommand line argument: #v6_2_001117A0
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: IRPF2024-0940959038w904598304w985036.msiVirustotal: Detection: 7%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\IRPF2024-0940959038w904598304w985036.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5B841E4EC1525DEC8E125CA4E79284A2
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"
Source: unknownProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"
Source: unknownProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"
Source: unknownProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628
Source: unknownProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 724
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 628
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 624
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 1004
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628
Source: C:\Users\user\Contacts\Flexpcis.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5B841E4EC1525DEC8E125CA4E79284A2Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"Jump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.applicationmodel.store.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.applicationmodel.store.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.applicationmodel.store.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.applicationmodel.store.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: windows.applicationmodel.store.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: webservices.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: IRPF2024-0940959038w904598304w985036.msiStatic file information: File size 41998336 > 1048576
Source: Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Flexpcis.exe, 00000004.00000000.2175400389.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000006.00000000.2285448613.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000009.00000000.2372725998.000000000011F000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000009.00000002.2826466455.000000000011F000.00000002.00000001.01000000.00000003.sdmp
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111000 LdrInitializeThunk,SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,6_2_00111000
Source: initial sampleStatic PE information: section where entry point is pointing to: .}w/
Source: Drivespan.dll.2.drStatic PE information: section name: .didata
Source: Drivespan.dll.2.drStatic PE information: section name: .aJ4
Source: Drivespan.dll.2.drStatic PE information: section name: .7VB
Source: Drivespan.dll.2.drStatic PE information: section name: .debug
Source: Drivespan.dll.2.drStatic PE information: section name: ./VW
Source: Drivespan.dll.2.drStatic PE information: section name: .eW.
Source: Drivespan.dll.2.drStatic PE information: section name: .}w/
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00113016 push ecx; ret 6_2_00113029
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1194.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\Contacts\Drivespan.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\Contacts\Flexpcis.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1135.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1078.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI10C7.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1194.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1135.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1078.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI10C7.tmpJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\msiexec.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Novo ValorJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Flexpcis.exeJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Novo ValorJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Novo ValorJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Flexpcis.exeJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Flexpcis.exeJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 2570005 value: E9 8B 2F E1 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 77382F90 value: E9 7A D0 1E 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 2690005 value: E9 2B BA CB 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 7734BA30 value: E9 DA 45 34 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 26A0008 value: E9 8B 8E CF 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 77398E90 value: E9 80 71 30 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 26C0005 value: E9 8B 4D 27 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 76934D90 value: E9 7A B2 D8 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 26D0005 value: E9 EB EB 27 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 7694EBF0 value: E9 1A 14 D8 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 26E0005 value: E9 8B 8A 24 73 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 75928A90 value: E9 7A 75 DB 8C Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 26F0005 value: E9 2B 02 26 73 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5976 base: 75950230 value: E9 DA FD D9 8C Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: ED0005 value: E9 8B 2F 4B 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 77382F90 value: E9 7A D0 B4 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: EE0005 value: E9 2B BA 46 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 7734BA30 value: E9 DA 45 B9 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: EF0008 value: E9 8B 8E 4A 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 77398E90 value: E9 80 71 B5 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 1320005 value: E9 8B 4D 61 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 76934D90 value: E9 7A B2 9E 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 1330005 value: E9 EB EB 61 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 7694EBF0 value: E9 1A 14 9E 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 2F30005 value: E9 8B 8A 9F 72 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 75928A90 value: E9 7A 75 60 8D Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 2F40005 value: E9 2B 02 A1 72 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 1008 base: 75950230 value: E9 DA FD 5E 8D Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 14D0005 value: E9 8B 2F EB 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 77382F90 value: E9 7A D0 14 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 15F0005 value: E9 2B BA D5 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 7734BA30 value: E9 DA 45 2A 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 1600008 value: E9 8B 8E D9 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 77398E90 value: E9 80 71 26 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 1620005 value: E9 8B 4D 31 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 76934D90 value: E9 7A B2 CE 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 1630005 value: E9 EB EB 31 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 7694EBF0 value: E9 1A 14 CE 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 1640005 value: E9 8B 8A 2E 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 75928A90 value: E9 7A 75 D1 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 1650005 value: E9 2B 02 30 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 672 base: 75950230 value: E9 DA FD CF 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 520005 value: E9 8B 2F E6 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 77382F90 value: E9 7A D0 19 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 530005 value: E9 2B BA E1 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 7734BA30 value: E9 DA 45 1E 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 540008 value: E9 8B 8E E5 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 77398E90 value: E9 80 71 1A 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 6C0005 value: E9 8B 4D 27 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 76934D90 value: E9 7A B2 D8 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 6D0005 value: E9 EB EB 27 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 7694EBF0 value: E9 1A 14 D8 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 6E0005 value: E9 8B 8A 24 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 75928A90 value: E9 7A 75 DB 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 8D0005 value: E9 2B 02 08 75 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5648 base: 75950230 value: E9 DA FD F7 8A Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 5A0005 value: E9 8B 2F DE 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 77382F90 value: E9 7A D0 21 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 6D0005 value: E9 2B BA C7 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 7734BA30 value: E9 DA 45 38 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 6E0008 value: E9 8B 8E CB 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 77398E90 value: E9 80 71 34 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 700005 value: E9 8B 4D 23 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 76934D90 value: E9 7A B2 DC 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 710005 value: E9 EB EB 23 76 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 7694EBF0 value: E9 1A 14 DC 89 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: AB0005 value: E9 8B 8A E7 74 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 75928A90 value: E9 7A 75 18 8B Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 2620005 value: E9 2B 02 33 73 Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeMemory written: PID: 5908 base: 75950230 value: E9 DA FD CC 8C Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A513CF4
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C870B5A
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4D3123
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4C919F
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A2C91B3
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8ADCC2
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C223C19
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C737130
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C2077D4
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A21540D
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C851945
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C712EA2
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C818836
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A291EDE
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C578217
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C713F92
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A49F506
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C2122CD
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C875B11
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4F952E
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C810BA2
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C87BCC9
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A202318
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A451E42
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C1E4B24
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C20E356
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A36CF98
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C747FE0
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C597817
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C591B3D
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C1E63E1
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A5060BA
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8556C2
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8C7728
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A43A6D8
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C825152
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4F05F6
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4CEE1A
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8216A2
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C1EA1E6
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C58B9E9
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C59A056
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A42A367
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A43B8C9
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C83CEE4
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A2148E8
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C2366E3
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4E9A7A
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8D4DC8
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6B7795B7
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6A4E3C0B
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C1E9BA8
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8A0DFE
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C8C570F
Source: C:\Users\user\Contacts\Flexpcis.exeAPI/Special instruction interceptor: Address: 6C71CEF2
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,6_2_00111510
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1194.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1135.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIFFA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1078.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI10C7.tmpJump to dropped file
Source: C:\Users\user\Contacts\Flexpcis.exeAPI coverage: 5.3 %
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_001175CA FindFirstFileExW,6_2_001175CA
Source: Flexpcis.exe, 00000009.00000002.2834178120.00000000677DD000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet
Source: Flexpcis.exe, 00000009.00000002.2834178120.00000000677DD000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux
Source: Flexpcis.exe, 00000006.00000003.2681373979.0000000000F3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111000 LdrInitializeThunk,SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,6_2_00111000
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_001155D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_001155D7
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,6_2_00111510
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00111000 LdrInitializeThunk,SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,6_2_00111000
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00116268 mov eax, dword ptr fs:[00000030h]6_2_00116268
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00119302 GetProcessHeap,6_2_00119302
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\Contacts\Flexpcis.exe "C:\Users\user\Contacts\Flexpcis.exe"Jump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00112821 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00112821
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_001155D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_001155D7
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00112DC9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00112DC9
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00112F17 SetUnhandledExceptionFilter,6_2_00112F17
Source: Flexpcis.exe, 00000006.00000002.2816061489.0000000066DDD000.00000002.00000001.01000000.00000004.sdmp, Flexpcis.exe, 00000009.00000002.2834178120.0000000066DDD000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: @Winapi@Windows@DOF_PROGMAN
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_0011305C cpuid 6_2_0011305C
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Contacts\Flexpcis.exeCode function: 6_2_00112CB2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00112CB2
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
2
Command and Scripting Interpreter
11
Registry Run Keys / Startup Folder
2
Process Injection
21
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
11
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory1
Query Registry
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
Security Account Manager241
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Process Injection
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials11
Peripheral Device Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem123
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1513060 Sample: IRPF2024-0940959038w9045983... Startdate: 18/09/2024 Architecture: WINDOWS Score: 76 47 www.rodovalhoadvogados.com.br 2->47 49 rodovalhoadvogados.com.br 2->49 57 Multi AV Scanner detection for dropped file 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 PE file contains section with special chars 2->61 63 AI detected suspicious sample 2->63 7 msiexec.exe 87 41 2->7         started        11 Flexpcis.exe 2->11         started        13 Flexpcis.exe 2->13         started        15 3 other processes 2->15 signatures3 process4 file5 37 C:\Windows\Installer\MSIFFA.tmp, PE32 7->37 dropped 39 C:\Windows\Installer\MSI1194.tmp, PE32 7->39 dropped 41 C:\Windows\Installer\MSI1135.tmp, PE32 7->41 dropped 43 4 other malicious files 7->43 dropped 65 Creates multiple autostart registry keys 7->65 17 Flexpcis.exe 1 15 7->17         started        21 msiexec.exe 7->21         started        67 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->67 23 WerFault.exe 21 11->23         started        25 WerFault.exe 11->25         started        27 WerFault.exe 21 13->27         started        29 WerFault.exe 3 21 13->29         started        31 WerFault.exe 15->31         started        33 WerFault.exe 15->33         started        35 2 other processes 15->35 signatures6 process7 dnsIp8 45 rodovalhoadvogados.com.br 50.116.112.138, 49715, 80 UNIFIEDLAYER-AS-1US United States 17->45 51 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->51 53 Creates multiple autostart registry keys 17->53 55 Switches to a custom stack to bypass stack traces 17->55 signatures9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IRPF2024-0940959038w904598304w985036.msi8%VirustotalBrowse
IRPF2024-0940959038w904598304w985036.msi8%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\Contacts\Drivespan.dll33%VirustotalBrowse
C:\Users\user\Contacts\Flexpcis.exe0%ReversingLabs
C:\Users\user\Contacts\Flexpcis.exe0%VirustotalBrowse
C:\Windows\Installer\MSI1078.tmp0%ReversingLabs
C:\Windows\Installer\MSI1078.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI10C7.tmp0%ReversingLabs
C:\Windows\Installer\MSI10C7.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI1135.tmp0%ReversingLabs
C:\Windows\Installer\MSI1135.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI1194.tmp0%ReversingLabs
C:\Windows\Installer\MSI1194.tmp0%VirustotalBrowse
C:\Windows\Installer\MSIFFA.tmp0%ReversingLabs
C:\Windows\Installer\MSIFFA.tmp0%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
www.rodovalhoadvogados.com.br2%VirustotalBrowse
rodovalhoadvogados.com.br2%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.indyproject.org/0%URL Reputationsafe
http://www.rodovalhoadvogados.com.br/dddd/inspecionando.php0%Avira URL Cloudsafe
http://www.rodovalhoadvogados.com.br/dddd/inspecionando.php2%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
rodovalhoadvogados.com.br
50.116.112.138
truefalseunknown
www.rodovalhoadvogados.com.br
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
http://www.rodovalhoadvogados.com.br/dddd/inspecionando.phpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.indyproject.org/Flexpcis.exe, 00000006.00000003.2578838717.0000000003000000.00000004.00001000.00020000.00000000.sdmp, Flexpcis.exe, 00000006.00000002.2793239128.000000006458C000.00000020.00000001.01000000.00000004.sdmp, Flexpcis.exe, 00000009.00000003.2717965588.00000000035B0000.00000004.00001000.00020000.00000000.sdmp, Flexpcis.exe, 00000009.00000002.2833202804.000000006458C000.00000020.00000001.01000000.00000004.sdmpfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
50.116.112.138
rodovalhoadvogados.com.brUnited States
46606UNIFIEDLAYER-AS-1USfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1513060
Start date and time:2024-09-18 12:31:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 9m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:33
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:IRPF2024-0940959038w904598304w985036.msi
Detection:MAL
Classification:mal76.evad.winMSI@18/59@1/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 26
Cookbook Comments:
  • Found application associated with file extension: .msi
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.189.173.21, 20.42.65.92, 13.89.179.12
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, tile-service.weather.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
06:32:24API Interceptor1x Sleep call for process: Flexpcis.exe modified
06:32:57API Interceptor8x Sleep call for process: WerFault.exe modified
12:32:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Novo Valor C:\Users\user\Contacts\Flexpcis.exe
12:32:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Novo Valor C:\Users\user\Contacts\Flexpcis.exe
12:32:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Flexpcis.exe C:\Users\user\Contacts\Flexpcis.exe
12:32:43AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Flexpcis.exe C:\Users\user\Contacts\Flexpcis.exe
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
50.116.112.138https://www.google.de/amp/s/socorrocargas.com%2fwp-admin%2fcss%2fcolors%2fblue%2fuyp4llyf%2fYWtlc3NsZXJAaW50ZXJhY3Rpb25zLmNvbQ==Get hashmaliciousUnknownBrowse
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    UNIFIEDLAYER-AS-1USawb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousGuLoaderBrowse
    • 192.185.217.247
    EIirQiZnX9.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
    • 192.185.13.234
    https://www.seggprotegido.com.br/core/fonts/css/Get hashmaliciousUnknownBrowse
    • 162.214.199.240
    Hamilton Heating Air RFP Proposal 204FFP10.docxGet hashmaliciousUnknownBrowse
    • 108.167.132.147
    Hamilton Heating Air RFP Proposal 204FFP10.docxGet hashmaliciousUnknownBrowse
    • 108.167.132.147
    VAT Approval_Jul-Aug 2024 Salesforce LTD.emlGet hashmaliciousUnknownBrowse
    • 192.185.185.200
    QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 198.57.247.184
    QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 198.57.247.184
    Davislaw_Document_3Pages_Fine.pdf.htmlGet hashmaliciousHTMLPhisherBrowse
    • 69.49.245.172
    Documenti di spedizione 0003948855990055.bat.exeGet hashmaliciousAgentTeslaBrowse
    • 192.185.13.234
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\Contacts\Flexpcis.exeNFeNFCe.msiGet hashmaliciousUnknownBrowse
      Fct63e39.msiGet hashmaliciousUnknownBrowse
        C:\Windows\Installer\MSI1078.tmpdanf082024xml.msiGet hashmaliciousUnknownBrowse
          https://rfindustria.com.br/wp-content/uploads/Nota_2024brs.zipGet hashmaliciousUnknownBrowse
            XML202407brs.msiGet hashmaliciousUnknownBrowse
              fin.746.msiGet hashmaliciousUnknownBrowse
                Setup.msiGet hashmaliciousUnknownBrowse
                  NF_e_07_2024_XML__.msiGet hashmaliciousUnknownBrowse
                    Dramatisation.msiGet hashmaliciousMatanbuchusBrowse
                      NF_e_22_05_36543547357358BR.msiGet hashmaliciousUnknownBrowse
                        HomeDesk.msiGet hashmaliciousUnknownBrowse
                          NFs_468.msiGet hashmaliciousVMdetectBrowse
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:modified
                            Size (bytes):11646
                            Entropy (8bit):5.5289030362271285
                            Encrypted:false
                            SSDEEP:96:VYRBoAK8A1oi6IyRC1BnQrnFLRUnBb5qYUkUTEETCYThq0NUkUTEETCGjkdhyvpr:VYk9B1oiHSABY3QEOEcQEOkJE//pVS
                            MD5:4CDF3D3C1C6C66CB6FED4F1ADF84C0C5
                            SHA1:36F77E4E1A901118B2D51685265DDB5785B31EF2
                            SHA-256:08604F44E23BEE486FA548E65EC40CC2442ACEFA314A71209E311E21F0E24204
                            SHA-512:1457FAB807B1B4EDED428ACDC30467D1957673A1CD9105FA9BB3CACAA16F88ABBABF6C6065CCB6F05FAF3D833CB90985D60E15482D4F35CF89ADB5E6D39C7254
                            Malicious:false
                            Preview:...@IXOS.@.....@.42Y.@.....@.....@.....@.....@.....@......&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14} .Microsoft-Edge-Web-View2-Runtime(.IRPF2024-0940959038w904598304w985036.msi.@.....@.....@.....@........&.{182C5263-9A4F-4811-9832-23486A29A112}.....@.....@.....@.....@.......@.....@.....@.......@.... .Microsoft-Edge-Web-View2-Runtime......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]....ProcessComponents%.Atualizando o registro de componentes..&.{D85BA408-01F5-4AFD-AD63-1EA8CE77B976}&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14}.@......&.{B5D76D82-8DC1-4B7E-8DC8-49EA79186188}&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14}.@......&.{BC4FEDCD-3E0E-4107-9E61-FB50233A89F0}&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14}.@......&.{484CC30A-1C9E-4E93-BFCE-F924EF61B954}&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14}.@......&.{C36507B6-9328-4E18-9954-CF8127F08E40}&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14}.@......&.{2DF34131-CE60-4311-A01A-81420BB1044D}&.{8AE8C4
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0434207362542725
                            Encrypted:false
                            SSDEEP:192:wJGpkkpvKGf0e9lXjHBuZrFa2dzuiFVZ24IO8T:/koiGMe9lXj4zuiFVY4IO8T
                            MD5:B9C0B85C5478E24F7C4E0A8336A18CBC
                            SHA1:C14BF840DCD06C0EF6F8F2848944EA501A02594A
                            SHA-256:A863A928BA011A41D87B41354E13CF3FB7561D33D2571F3FFBEC3928CADBCADA
                            SHA-512:779531D08C4A4F790B96CBC4FECFB43404EB5FCB2808CCD877C7BA950E07C324E27E22B6143DA8DA0A2DE6AE76C9AB4A16DDB2B0B6E9EE48EE6E1AC62BEA8C29
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.7.9.5.6.3.3.4.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.8.1.8.2.9.0.5.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.4.5.a.f.0.9.-.0.b.9.6.-.4.6.5.7.-.9.3.7.e.-.3.7.1.6.b.5.d.9.c.b.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.b.0.a.5.2.2.6.-.4.5.5.2.-.4.8.9.c.-.9.7.8.9.-.d.5.2.3.7.d.f.d.1.4.6.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.f.0.-.0.0.0.1.-.0.0.1.5.-.0.d.7.0.-.a.0.0.9.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0435057707797224
                            Encrypted:false
                            SSDEEP:192:gMwfphGf0e9lXjHBuZrFa2dzuiFEZ24IO8T:bwBhGMe9lXj4zuiFEY4IO8T
                            MD5:59CC69217B26AF8DC3840357DC516ABF
                            SHA1:92B457317F3C26FAE5198E27A7C3A66EA5FB748A
                            SHA-256:124C594540939C39232F6B61713A56082AAE6197595E7DE8F7478F02907ABE3D
                            SHA-512:DB99F75CB4B0D1C8D779A881CF27847A7301C7516ABEE9425F9AD5207193FCD07B415181C86662AC119152960413191AE0246EBF580F063B27EB49C2E135A6AF
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.9.8.7.3.1.8.3.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.9.9.5.1.3.1.3.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.5.d.c.0.4.6.-.0.d.b.7.-.4.a.6.d.-.a.9.8.0.-.f.7.4.9.5.a.3.7.2.1.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.a.f.3.8.6.4.-.4.a.9.2.-.4.8.f.1.-.8.e.7.1.-.7.3.4.f.8.3.6.8.8.a.c.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.1.4.-.0.0.0.1.-.0.0.1.5.-.3.1.e.7.-.b.d.1.d.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0432694951173203
                            Encrypted:false
                            SSDEEP:192:3ex/Bp0/Gf0e9lXjHBuZrFa2dzuiFWZ24IO8T:3cv0GMe9lXj4zuiFWY4IO8T
                            MD5:496DD89DF9206A97258E6BE934EAB5B9
                            SHA1:F0108D9A47C7987D84CDD305E88844D741E05171
                            SHA-256:D901A6395B0D05DC8366BE9ECC1C856DC69D8038389A55CB6DB9F3A3DDBFAE0F
                            SHA-512:14E9A6FBA4CF22614928B0D0F03E11294159075F1EBF0B2AEC34CABD94F4F5EC2A06CAA2F9D77465B5A81BFE13FF91B0084F3C55CF887A1644A378F8F8223D63
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.3.6.0.7.3.2.7.3.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.3.6.1.1.7.0.2.1.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.7.8.9.1.5.f.5.-.a.a.9.3.-.4.f.a.d.-.8.2.f.d.-.8.8.4.0.6.5.e.1.8.2.d.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.7.2.3.0.d.d.-.1.e.b.6.-.4.d.9.4.-.9.c.4.5.-.8.6.e.4.d.6.7.5.b.4.e.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.1.0.-.0.0.0.1.-.0.0.1.5.-.1.7.f.a.-.9.2.1.4.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0430448476876315
                            Encrypted:false
                            SSDEEP:192:cpNpcdGf0e9lXjHBuZrFa2dzuiFVZ24IO8T:+rOGMe9lXj4zuiFVY4IO8T
                            MD5:301469500A71D0898E3E3EA3BDE5626D
                            SHA1:4C621869E07F1DE4992B5482361D116645EC6628
                            SHA-256:0EAE3D4E607AB2CEFCC07CA090BC2ECBFA2D8A83F43E73543B1677EBCE62F2B8
                            SHA-512:57ECCA8B05B16895194C3101C12690B78ADE38BB9D72268F2E4AAB40761EB64676EDC2A41F2C4BA1AB66A5BFED4EF99BB4A0CE2E94D2DAC6E5EB9617FC9FCDE3
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.8.9.4.9.4.0.7.9.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.9.1.1.6.5.9.1.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.c.e.f.d.c.1.-.d.6.b.f.-.4.0.a.e.-.a.7.d.0.-.5.0.c.f.7.1.a.2.7.7.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.d.b.1.4.7.2.-.b.8.d.5.-.4.a.1.c.-.a.e.3.0.-.7.9.5.7.e.9.c.e.0.c.b.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.a.0.-.0.0.0.1.-.0.0.1.5.-.3.4.7.d.-.d.3.0.e.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0437457163568764
                            Encrypted:false
                            SSDEEP:192:iUBpu/GJ0m8k1WjHBuZrFa2dzuiFWZ24IO8T:lvuGqm8k1Wj4zuiFWY4IO8T
                            MD5:7453D9EBC4ACBE5EC97FF0E8151B1558
                            SHA1:2D108DD96CC81B4CCEA435B5DB547E5CC275FECA
                            SHA-256:D543BF8250A48ADC0D058F802D3126DDAF9F6A7895C3BC69E6A411DAF5F4563C
                            SHA-512:3409BFCB138A292F58EECA1E6DFB00AD758BE7D6EA317D0D382DE88E2C963C58AD55506F71A332C6A56FBB567890E3E64257B22D28AEC82C452A75AAF250A7EF
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.3.5.8.5.5.3.1.3.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.3.5.9.4.9.0.6.2.4.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.4.9.5.a.9.7.-.f.f.6.8.-.4.d.3.1.-.8.9.e.a.-.6.6.6.3.7.6.9.3.f.0.2.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.9.1.1.a.9.9.5.-.7.3.b.c.-.4.1.7.f.-.8.9.a.c.-.b.5.3.e.2.d.f.9.0.6.b.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.1.0.-.0.0.0.1.-.0.0.1.5.-.1.7.f.a.-.9.2.1.4.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0435866658089477
                            Encrypted:false
                            SSDEEP:192:guYPkp7KGJ0m8k1WjHBuZrFa2dzuiFVZ24IO8T:gPPo2Gqm8k1Wj4zuiFVY4IO8T
                            MD5:8985BD42C1DC26284994EB732AFEF21E
                            SHA1:C8AD648B3BED31716E885D1D9B5565175FA5AF48
                            SHA-256:80701700900BF1C105A1D8E68C7424518F9B9E8CC52D98013866FFAF324CC21A
                            SHA-512:C18CAA16229910DEAD2868DE9C714254CEDFE8D276FDB1DAC093B4A69B83D3137A6335713777904E86CCFFCD2209828EBF0BB6177A6C0FB8517CF9AD5FB258A3
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.7.0.0.4.3.3.2.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.7.2.3.5.5.7.7.5.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.2.a.f.d.6.e.-.3.d.1.0.-.4.1.9.b.-.9.8.4.2.-.c.e.f.2.a.2.4.1.4.1.4.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.0.b.b.1.b.d.5.-.4.3.c.2.-.4.b.e.8.-.b.2.d.d.-.b.7.f.c.7.8.a.d.8.1.2.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.f.0.-.0.0.0.1.-.0.0.1.5.-.0.d.7.0.-.a.0.0.9.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0437700758068336
                            Encrypted:false
                            SSDEEP:192:HIx8wfp+GJ0m8k1WjHBuZrFa2dzuiFVZ24IO8T:Hc8wB+Gqm8k1Wj4zuiFVY4IO8T
                            MD5:5F90D6AAA90F3887EBAC4880DF36D7A4
                            SHA1:0D32D0A695E7C4F049D4B607554094D79232765C
                            SHA-256:6FF9F650B42F81DADFA9FEA3349972E9889D6A49B9CA7248F95A467A9A3EAA6B
                            SHA-512:D9211A5011ABB06BE1B4F848E8364986B073DF1A69CACB99DC521B3D3C2FB95507539A7A0FE859DFF9F1C707F8389D7A7A28CE98995A60830980CD0858D4100B
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.9.6.4.6.6.8.3.5.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.9.7.2.3.2.5.0.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.4.8.2.5.b.4.6.-.7.4.0.9.-.4.5.9.a.-.9.7.7.2.-.5.4.2.b.3.3.c.c.2.0.5.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.0.f.c.0.8.7.2.-.8.d.8.a.-.4.d.b.d.-.9.2.9.7.-.5.3.e.1.6.6.5.d.8.f.1.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.1.4.-.0.0.0.1.-.0.0.1.5.-.3.1.e.7.-.b.d.1.d.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0434664434430376
                            Encrypted:false
                            SSDEEP:192:aPNpYdGJ0m8k1WjHBuZrFa2dzuiFVZ24IO8T:yrqGqm8k1Wj4zuiFVY4IO8T
                            MD5:5828F406EC2F7F098AC13605CCFF8151
                            SHA1:A6662C285F0BE9FAFD5952C0455D665587014B79
                            SHA-256:1302AD46AAAAE77EA50D788EA009D6003AC95F402AAEFB742A1AD77D6E9DD99C
                            SHA-512:D4A18AA375147107E4E1FC968E34A07B1E645C0D7465E0DA849B513C0670C3103E8E8F9FB80804CB4E737290E4E6CECBA23BCA69906D187A12DC46E1EEC351C4
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.2.9.1.8.3.0.7.4.6.7.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.2.9.1.8.5.5.5.9.0.3.5.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.1.6.9.7.1.a.-.d.a.9.9.-.4.f.4.1.-.8.2.b.c.-.2.f.6.d.1.0.2.7.9.b.b.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.4.b.c.a.5.4.c.-.8.f.c.3.-.4.c.2.d.-.b.1.b.e.-.2.2.9.e.d.a.1.0.c.e.d.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.l.e.x.p.c.i.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.f.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.a.0.-.0.0.0.1.-.0.0.1.5.-.3.4.7.d.-.d.3.0.e.b.6.0.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.a.b.7.9.5.a.c.3.d.e.3.6.7.c.2.f.1.b.7.b.6.f.0.c.e.2.7.e.2.2.0.0.0.0.0.9.0.4.!.0.0.0.0.9.a.4.2.b.3.8.7.b.a.b.d.e.a.7.1.9.d.5.4.c.1.e.1.1.b.a.a.e.9.f.d.b.9.8.9.7.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:33:16 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):42678
                            Entropy (8bit):2.42003571774741
                            Encrypted:false
                            SSDEEP:192:m4qvuoQvePOxO36VTiFxjyAQb7JYnDe0Z7dhYkBOwkKssOP/nC6XKmVf:qWtveG0KVeFxjyAQnKe0Z7HBdkHaKVf
                            MD5:53388F2EAAF917799FF47D10D1C7DCD4
                            SHA1:710D6225BFC1DD95C88B6D902E9B047178D72B18
                            SHA-256:56A9416269C67A7D1E4BE45C69674ED4D9DD5EBAA9C2A2BCAA6EB02D5EE65D6D
                            SHA-512:4A6B6AFECECF73BA878259F6D5479A182186E9C5EC4AFA4368F7A3E6522DFA6508BEDCEDC8C0D39FA8F8C65EC79804CBFA8ABF6EE53062F0A697CB6B720E0F3F
                            Malicious:false
                            Preview:MDMP..a..... .......l..f............4...........T...<............/..........T.......8...........T...........p"..F............ ..........|"..............................................................................eJ.......#......GenuineIntel............T...........T..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8332
                            Entropy (8bit):3.6992376863950933
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJp1J6wfCA6Y2DnSUSegmfqRWpr+89bIesf94m:R6lXJpL6ICA6YqSUSegmfqREIdfH
                            MD5:BF202347B27CAC103A04F864443D3BD9
                            SHA1:11B1E360FCAF183ABEDF0E4DE9BDB63758921882
                            SHA-256:5F5E8BE203BA48632B9D8511544FF873D37FD34FA8857D4DD680CA52596317EE
                            SHA-512:C2673C6D830A2B1D8634C658C979CEC33D5A3B92D9717382EB5971A35D822A5CA352C08E3117C9C9E80B6B46D370BE81C5110A9E16661BC565F2739429E574D0
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.0.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.450052278007118
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs20Jg77aI9xM/7WpW8VYjuYm8M4JlGN0GFQBLl+q8KWaUeUM/312X14d:uIjfHI7PM/K7VaJl/Bp5lUM92F4d
                            MD5:7DAE8C70A462C001D88444EE24F04DFE
                            SHA1:B64752EB1945529B14D17FB4DBC768E3C6077DAA
                            SHA-256:3F42004060CE869319587FFF37A50A1FB0F9BAD03B42CAED1714C23A6B647AC4
                            SHA-512:ACFD4A50ADE3E2D1767FB746C4967C6206A1133D78E921EA2AE490F0C5F612D470F0DBF054859C476BF332A8D7575BCCAB14F786A897A9E092D1B5CDF438F10F
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505535" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:33:19 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):43950
                            Entropy (8bit):2.463486387188757
                            Encrypted:false
                            SSDEEP:192:ZoqvuoQveZbVOxO36VTUpWT8G/YnDO0Z7dhYkBO0OxGHjVBH4kNzftp3o:RWtveZ00KVIpWT+O0Z7HB5JBzFFo
                            MD5:91E06D228A79B77877B867A37A7DA91F
                            SHA1:2792668454CF13598EC93DD29B7691A4B433850B
                            SHA-256:53D978C43AF37346F3A2B1AB875DFA3B3D2EAA13A0087E9BA6739454311CE4E7
                            SHA-512:EFBAE8A37D4D8B868FFA2F76269232EAE73FFEAFEC5C00CE6617384EEA18A43F91BF2BF094F0AD6A0CFF72E53E515BCB80A5F4DED9FD56386204A14FA89C2113
                            Malicious:false
                            Preview:MDMP..a..... .......o..f............4...........T...<............/..........T.......8...........T........... "............... ..........|"..............................................................................eJ.......#......GenuineIntel............T...........T..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8332
                            Entropy (8bit):3.6985632931918406
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJp156WxK46Y2DqSU1Zgmf4lpDr89bvesfyFm:R6lXJpb68K46YXSU1Zgmf48vdfJ
                            MD5:39D1710BA67DE3E44300642A84AC04EA
                            SHA1:FF0CA133C33E1674D1D3E6805809B23FDD9AFD4F
                            SHA-256:D41853104843FB8B554D7A017A967D7B21949562B05ACF85535EFCCF1A089115
                            SHA-512:7478BE4A997D0F25E1EB63E06A3DC1CF536405F61F2C2C6EC440D1BBD5C103DC81F4EA401120D5374C843586095C8C2CD95CEAE67DE3820DE5AC7AB2515FF573
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.0.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.451965979312779
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs2FJg77aI9xM/7WpW8VYjGPYm8M4JlGN0/aFCm+q8KWaKOjUM/312X1G:uIjf6I7PM/K7V3SJlbG55jUM92F4d
                            MD5:2A3C4104E8B0DA6E8546F939C78DB9F9
                            SHA1:28581831C00908C18EEA5095E90244CF8DD78944
                            SHA-256:20EFDA7E9B1B53D85EC41CC1DBBC69618618E44C3F94DF4A5AEBFA554C700B51
                            SHA-512:347A4CD33970554EBE2EF6EE3B31083A3AA08ADD1B3E486DB2225D169280C208AA34C9AFEC81640AC39DA451DCB7C124C6D69E1CE94DAE9DE6199BE3AAB1455C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505536" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:35:59 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):40862
                            Entropy (8bit):2.499516489329535
                            Encrypted:false
                            SSDEEP:384:wWpveM10KVvVrAQZx1ZtGR4kff4ni/IG8:bRV10KVvvZxYW0hQG8
                            MD5:D7DED52A6E4FA50FD32B89781028BCB5
                            SHA1:60B4F783A5E12807D2348D1F87E1CA88DE5F6C03
                            SHA-256:5B87DE4C8F4B89F9168F7766A2615FFC0EACE20773ACCB4DE10EC24DAB314355
                            SHA-512:D51773EA1DD788437D60D7CD4416EC6413CDD3761C81B3014EEA58DDAF8D72D6B74E870583C342BEEC6AB5008C0FD8ED0D7F4D089458C5DE2C719DD9FD41C39F
                            Malicious:false
                            Preview:MDMP..a..... ..........f............4...........T...<............/..........T.......8...........T...........p"...}........... ..........|"..............................................................................eJ.......#......GenuineIntel............T...........E..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.6967298622257583
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJo46V8x6Y2DASUlfgmfqRWpr989bt/sf7Pm:R6lXJ36V8x6YdSUlfgmfqRZtkfa
                            MD5:9CB9A274959AE5C17D544EEF11532E63
                            SHA1:FDA499D7E09AE8D7E5C1AFD185D397D4934E4F8B
                            SHA-256:82059B1D2013B3D44B96C89E16761C366D075FBBB6DF533041D2095018CFDE95
                            SHA-512:994EE153E934029ED4C28FB3DD7D0FE044097C6D11B5A1652FFEFA3B6E6433152189758B3731A232135BFD7A64EF08B33F14CD465C5F6EACD8475D834FE6D3D4
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.4.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.449199010341961
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs2vJg77aI9xM/7WpW8VYjuYm8M4JlGN0GFs+q8KWaUmyUM/312X1Ud:uIjfAI7PM/K7VuJlP5lyUM92FUd
                            MD5:8AAE269294FB51589F1E0D60FA25F1C6
                            SHA1:54B22791BCC9417AC3ED3B057CC9487E6145F3AA
                            SHA-256:0092558086035E60E879BE8F28129D27A1C40DF1E9C9C5DF0776A0C158A5C937
                            SHA-512:E0DACC6290C497D96F1B8F297BE4FC0413662DAAB063B33E20BF6BFD5A4021AFAFE0D878DD17F890D30F9368CA9B863B4645CBCA3FC4C3FED3C79EB2E32022ED
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505538" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:36:00 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):42134
                            Entropy (8bit):2.541544481295443
                            Encrypted:false
                            SSDEEP:192:Nrqvu0QveDOxO36VTnCO2WlEx1ZJDGR44lzNT0k9tyylkJ:0Wpve60KVsWlEx1ZtGR4kzNDmck
                            MD5:44B4B62A6AC3134FB1E4A156C4BDA591
                            SHA1:DDEFE7135FEFC1759C89522BF262546261A46AFC
                            SHA-256:F5CC371890636CDBFAC1F92F0925F8AFC7BEE5D0553CB519E3B2D187125D24CB
                            SHA-512:8F4FFF4BD4CAD0648239ABAE2C95C4F232CAF293001FA0E18F66FDDEA1F1BBA807D2700A0478B6375B54529BF2ACA0A095E2759F859E871714647449BBFF4BBA
                            Malicious:false
                            Preview:MDMP..a..... ..........f............4...........T...<............/..........T.......8...........T........... "..v............ ..........|"..............................................................................eJ.......#......GenuineIntel............T...........E..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8338
                            Entropy (8bit):3.696079060612583
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJos6oMB6Y2DjSU4JYgmf4lpDT89ba/sfE+m:R6lXJz6oMB6YuSU4JYgmf40akf0
                            MD5:6F0D3685FAFE63C2D8A4460A701CBD96
                            SHA1:FAAC0A4AE13EB27C6F8C817996ADBE0B9F716BFA
                            SHA-256:C9CF5280700D2501B82E72E079AD4ABD65D47B5F8EAD0AE2E10DEB6ED462B53E
                            SHA-512:AC7F631263F44735626EF26D774611FD8EEA1768393BE16A8FA3F70D283944C4D1892CFF5F7F869A05D06BC3FD4A8EEECA74C75FCD2D7447515836157DD36E32
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.4.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.45134752519171
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs2vJg77aI9xM/7WpW8VYjrYm8M4JlGN0/aFeL+q8KWaKODyUM/312X1a:uIjfAI7PM/K7VvJlbt55DyUM92FUd
                            MD5:148D5A141ECE8C1DD3E5E28C2CF451DD
                            SHA1:F931151F026760B850749AE6BF1A0FCF3DF9167B
                            SHA-256:72CE288584C959BB777625DB8677A68116F11C5BB6C22758E321DCB17D66192C
                            SHA-512:7990D9C318EFCFC42B6DA4516D4F592DC009F8B0426F824473B2FEA8CFA456B85882112586AB55D3F7C437D2D28CA8AA700984E49CC0035BCB4A055005DC093C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505538" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:32:50 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):42678
                            Entropy (8bit):2.422041826173391
                            Encrypted:false
                            SSDEEP:384:5lWQveK0KVoGQi8lJIlKXZVEMOAQ/uDve1KZ:5UO70KVoGhMOuMi
                            MD5:D1B68FF4E27FBB2752C9F19413892B18
                            SHA1:F7F355935AD4B32B81E312CC73E87DFABC569131
                            SHA-256:826EC730E643220692C5854AFFA6CFD42425D722501D67E101662036D621BDA6
                            SHA-512:9527D0E2508982BBA284A0C1BB09E164F5D1F41FD5898B6649CA910A5DF294D05357B9B069990D20937651566E113DF43AFD3F77E9786F7DF21260B977F55869
                            Malicious:false
                            Preview:MDMP..a..... .......R..f............4...........T...<............/..........T.......8...........T...........p"..F............ ..........|"..............................................................................eJ.......#......GenuineIntel............T...........2..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8336
                            Entropy (8bit):3.6964693759924145
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJMf56husgo6Y2DjSUH6hgmfqRWprC89bLUsfr5m:R6lXJMB6ULo6Y+SUH6hgmfqRQLHf4
                            MD5:3BF35C7AE6FC736760FDCAC695128A06
                            SHA1:ED73C2DE9DD15B096EC136C44AF214038FD742F7
                            SHA-256:6CF4AD68FFCED3BCAB04D532EAC0DB01A0578D235170881F15EE6EA0B407B92C
                            SHA-512:AA71A59BDAEA1774AF826FA8870878F3FE6B1D9D32CE566441EF16375870BDCD80369C87C5E7308E6F7CF2F62B8DE71EA05CC3860C4AD063F88B682051B0D264
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.0.0.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.44688119961079
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs20Jg77aI9xM/7WpW8VYjeYm8M4JlGN0GFY+q8KWaUTEUM/312X1bd:uIjfHI7PM/K7VeJlf54EUM92Fbd
                            MD5:1781602D3A6E8D2363B92546F2E0C114
                            SHA1:F130DEF17517DFCCE13DB1A292F2FF81AC5C9DBF
                            SHA-256:763AD46020394B21CADB2F9093F493C88EE20EC3532897EBF438FF53B5C2B886
                            SHA-512:63850DD1B96E7672773391BBC96C7918086351F7C938B48B15813A76C82D0890AF85E552C32E188D36E4D90CF1E7E31D34720009AB8C4F0432441A76BDC70CA4
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505535" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:33:09 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):42596
                            Entropy (8bit):2.5615366832978688
                            Encrypted:false
                            SSDEEP:192:/iqvuuQvezGdOxO36VTxBXdKZU7ZLg6EQa13hz9UptBEmH:xW7vezGQ0KVtBNKZU7ZL9E3HmtSmH
                            MD5:570E3E7A3DE9FEE2BCEED9EB874E3F2F
                            SHA1:CF0A60A7B5AF3E0C8DB3AC6F7F586C3E7F0EDE19
                            SHA-256:575852187DEA344CB30FEA56752F89C05321188AAA35C42D3D8F595F5ECC2D67
                            SHA-512:8F4529ACB364DBDD6D03AA53CA7E7FD192CACDAA3DFFF2AACB53C740F01D845BB0A79D8252DC747BDC24F8F3D12A9864131730144D41C0A77BAA7E90796945A1
                            Malicious:false
                            Preview:MDMP..a..... .......e..f............4...........T...<............/..........T.......8...........T............!............... ..........|"..............................................................................eJ.......#......GenuineIntel............T...........;..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:33:00 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):43950
                            Entropy (8bit):2.4657807595327528
                            Encrypted:false
                            SSDEEP:192:21qqvunQve7E3OxO36VTAy83l5IlKXZVEMsINoUCPl86RcGDknt276vMe:qRWQveAe0KVMT3l5IlKXZVEMFHg6nZke
                            MD5:174E6E63A5A719414522B8694A6563F3
                            SHA1:0C715A51792619981AA2E192CB09C53BC10B053C
                            SHA-256:1D453F583F1063BEA17C6FD2ADB4290F6C1FF8B811169F7C12CB14694B4AEA5C
                            SHA-512:C1F4968ADAE309EAF0D161B0523E2D6C26847CDD0C654628A64ADD05DC8FBE293ACD364AF74415F465B0A71A91452D1FD062ECB7A6C576799FCE31ABC208936E
                            Malicious:false
                            Preview:MDMP..a..... .......\..f............4...........T...<............/..........T.......8...........T........... "............... ..........|"..............................................................................eJ.......#......GenuineIntel............T...........2..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8334
                            Entropy (8bit):3.6984711181632295
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJMfU6cH2ge6Y2D7SUu6Rgmf4lpDw89bPUsfflm:R6lXJMc6sNe6Y2SUu6Rgmf49PHfw
                            MD5:05A7B57275BAC01CDFF3A2E8B819B7CD
                            SHA1:2E5994065A36FC7451130C8D9A5E3CD77D8D9B0C
                            SHA-256:1B8DE1DFE248342B43809ED1EBEED605BF564559272D1DC0C79D576ADBAA0D4B
                            SHA-512:8E1A3AA9FB7443551A079FCEA5916E64AFCFCB6406230749EC88B3C39BB2108946994A8EB982A2D2C16EBF0FB0C0D3E46C6BF5D23015A796CF2CF9BF9D8E1207
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.0.0.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.451517424712948
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs20Jg77aI9xM/7WpW8VYj7Ym8M4JlGN0/aF8+q8KWaKOiEUM/312X1bd:uIjfHI7PM/K7VDJlbH55iEUM92Fbd
                            MD5:0E268E4E66107B8FB6D31AA841B4F6DE
                            SHA1:4F5A3DF637239763F8A54EB9110B1E5C88368B3D
                            SHA-256:BC4EF89A096ED904DC292C05022E81D379556A92C6642718EC41F0FC60FB089E
                            SHA-512:CFFC6A89DCF20810869E5030613B6F5008A5DF525836F18BF346C32C5EC38E97D483FDF2C4073FCAE6176AAAE220B4691C0424A9535E3019084E9CD4AB0E17B6
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505535" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed Sep 18 10:33:03 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):41304
                            Entropy (8bit):2.5185124044955223
                            Encrypted:false
                            SSDEEP:384:hW7veCa70KVrveIKZs7ZL9YAQisX/0YPrQv:ob/a0KVrrvANv0v
                            MD5:1CDC461906579DA1D25F446311C1F6CE
                            SHA1:1BFBCCBC817302A7FF54DA981299F4A7512C0691
                            SHA-256:C68FE4D5529699D9AA43F084CD825882F0990725AC7A5CE68A6579B537171BBE
                            SHA-512:ECBCD6A0C74ABB1308027D947868A69932C15E93437AA1FD6CE9A840829E730D82DDB3C328B4BEA33852C7361E49C5561C8CD77A0C4EA42432B8DF1F27003C3B
                            Malicious:false
                            Preview:MDMP..a..... ......._..f............4...........T...<............/..........T.......8...........T........... "..8............ ..........|"..............................................................................eJ.......#......GenuineIntel............T...........;..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8328
                            Entropy (8bit):3.6975312828566493
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJs66l8Nec6Y2DiSUq8VgmfqRWprz89bUZsfu8m:R6lXJZ6cec6YfSUq2gmfqR3Uyfc
                            MD5:19D989E1D8389BB46F55A0EFDDA1AF62
                            SHA1:9D4AD1E6FC89197C22C9E3262833D0B3F9C408B9
                            SHA-256:1F0FB0B9B7C1B7940C654532BAF1DED2106610CE801175A2486FAB7BE498E585
                            SHA-512:7870792FDA5E0186F0C546972FC94BC7673C023CFD83F7060A2281D91714213BA4C7F8BE6E9CBB0C169134EA3FC97F0411CFE2C930FB2E04801D95A4DE1937E1
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.2.<./.P.i.d.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.446811118575354
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs20Jg77aI9xM/7WpW8VYjqYm8M4JlGN0GFI+q8KWaUPVUM/312X1Od:uIjfHI7PM/K7VOJl/5MVUM92FOd
                            MD5:710A105E23268543E341C7C27F8CDDE4
                            SHA1:9EE2AA588CF848A507BAC6B950634A45BBD0BBE3
                            SHA-256:C27EF771A717AC4F8BB0A4663FBDF24D1591BE98512D7C4D126AB8D350043CD0
                            SHA-512:6A5A264678580EE51DD345B1C319488DEA4FBCE9C98F8B4D2FC2FE89067F40CC1EC32D3BB7162D0904442DB98DD05FADF4CDEC536C0591FE2213E6914A19FD8A
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505535" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8328
                            Entropy (8bit):3.6968568528588643
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJsv6l0XgW6Y2D4vSUD8egmf4lpDa89b+Zsf9Km:R6lXJM66gW6YPvSUDNgmf4T+yfR
                            MD5:339637AEB69ED7A90A0B3BCB350B3197
                            SHA1:608960533A7BB59D38FB74DCAC12EB0ADB2E3C9D
                            SHA-256:16FABBF54352734811FBF361533C0A5B6CBFDA387335CF24CD6EDB6CADDAFA28
                            SHA-512:C0E8E77B86E178B97A93563903571B80164D48186604841420F1D27D0741F2394F93FFE3E80802461CB066EED4D03812F4A5E2C4DEDBFBC557C7CB844DEB1FAE
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.2.<./.P.i.d.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4636
                            Entropy (8bit):4.449176099981711
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs20Jg77aI9xM/7WpW8VYj7Ym8M4JlGN0/aFb+q8KWaKOCVUM/312X1Od:uIjfHI7PM/K7VzJlbk55CVUM92FOd
                            MD5:231D14965155BA97D9C7C6DA386E4624
                            SHA1:BCB4E59943DBCF5F203A85A52867FE09C1F6D445
                            SHA-256:C7DBF18B0CFC5F4DD5513E6FB58D423F978235A48CC68D3B08B55A08E78B4FEC
                            SHA-512:9A6AEB176AC59C5E7275E9A592478EAD09F3F499FE846EECA813686BD97328D7C61942F7DABF9EEA38253970B8134DF58BB6F028C04CEB86D45AAF9C43B76CE4
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="505535" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Users\user\Contacts\Flexpcis.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):32
                            Entropy (8bit):4.226409765557392
                            Encrypted:false
                            SSDEEP:3:1Eypy62gpZ:1XpydOZ
                            MD5:C04AF24293BB4A166A030312DB058FDD
                            SHA1:572F86124B0BA912154ABCA2E5E0D035721DAAF1
                            SHA-256:5AD826FC409D425903A533B7DC22EFC20E65BEC695B388F566354750CE72F68D
                            SHA-512:29BB251046F1D9B3D814A009F1CFCB6096FC82A1327C6377A1D6728777B34E8B3F39B5E37A7374633830773F995A2B42B6199B501A71CED62026CD5355C48CCC
                            Malicious:false
                            Preview:[Generate Pasta]..XPOSpgXHzHda..
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):40893952
                            Entropy (8bit):7.994388187390278
                            Encrypted:true
                            SSDEEP:786432:IK77DrSzdarnCa3k7aNLG2e2am1WbBRx+cFhNWT22wn9gw:IwDrW4zCaUQLGhXmcVRBhNWTtwn
                            MD5:A84EA0B3230101C7AAEE1D4DE79F615F
                            SHA1:ADF02B601C87A9CF2277C1D996767700AA5876F7
                            SHA-256:A4392E381DBEB93EA88CB227615C5CBEE1ECFEE3E78FFC39F95FD0C958DEF744
                            SHA-512:5D0F1C07270D44620604A6A19ACC5ADC5CD2E694D71F83DAD4548FD20B9F962BDE45C4AF0D6ADD1D7C250F0115B15C5CA3809FDF97591CCCD56E3F48F9172EA0
                            Malicious:true
                            Antivirus:
                            • Antivirus: Virustotal, Detection: 33%, Browse
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......f...........!.....$O...^.......N......@O...@.......................................@...........................!.....\.M.T.......X......................P.............................................................5......................text.....N......................... ..`.itext..t=....O..................... ..`.data........@O.....................@....bss..........P..........................idata...?...`S.....................@....didata.0.....S.....................@....edata........S.....................@..@.rdata..E.....S.....................@..@.aJ4.........S.....................@..@.7VB.....:....Z.....................@..@.debug....K...d.....................@..@./VW......d......................... ..`.eW.................................@....}w/......o.......o................. ..`.rsrc...X.............o.............@..@.reloc..P............o.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):138520
                            Entropy (8bit):5.97678172694547
                            Encrypted:false
                            SSDEEP:3072:h1tkoMvK2ZjKlrH5ySykwTzwk5aOz1b3aDczMns53:h1tkpZyCj1mDcIu3
                            MD5:E04F15D35A1807C4D74D2538D5FE28C9
                            SHA1:9A42B387BABDEA719D54C1E11BAAE9FDB9897F71
                            SHA-256:7E4132835419E4C415D048B64A5FC2813B8D2FF72BB5586D857DCDF6A90A45F2
                            SHA-512:0FA81E472CC65AC3E0DC6427D72002905C577B61C98CBB2859829EF5A139B1AC81FA09D680614C4EA94D599919E67C62F28475AF813400106DDDABE57180AAE9
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: NFeNFCe.msi, Detection: malicious, Browse
                            • Filename: Fct63e39.msi, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`u.h$.f;$.f;$.f;...;-.f;...;].f;...;<.f;.Je:6.f;.Jc:..f;.Jb:6.f;..;-.f;$.g;y.f;.Jo:&.f;.J.;%.f;$..;%.f;.Jd:%.f;Rich$.f;........PE..L....&.].........."..................(............@..........................@......Q.....@.................................DI..d.......8................3...0......@;..p............................;..@...............4............................text.../........................... ..`.rdata..L`.......b..................@..@.data........`.......8..............@....gfids...............B..............@..@.rsrc...8............D..............@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {182C5263-9A4F-4811-9832-23486A29A112}, Number of Words: 10, Subject: Microsoft-Edge-Web-View2-Runtime, Author: Microsoft, Name of Creating Application: Microsoft-Edge-Web-View2-Runtime, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft-Edge-Web-View2-Runtime., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Sep 17 18:28:10 2024, Last Saved Time/Date: Tue Sep 17 18:28:10 2024, Last Printed: Tue Sep 17 18:28:10 2024, Number of Pages: 450
                            Category:dropped
                            Size (bytes):41998336
                            Entropy (8bit):7.988801588430793
                            Encrypted:false
                            SSDEEP:786432:b4ztbf6AoshmMYKXPrhcY32uoS59BVT8KoYcIxuhs7lekMqT0:b4pbSTS7YK/WY3tJ5jhrVxuhsZek
                            MD5:55E1B6A518BC3E243D8D856EE17430AA
                            SHA1:F83DC91C91F89D6A321892D54B4DE229041B07D1
                            SHA-256:BAF5979F4C227BE5B3F1BF4F03E5902E8B7FCC2DAD38068F363A0096CB12A536
                            SHA-512:CAFAA29EAD2294CFDD2B63912B6DCABD3853FA2D691065B3F398D689F06931DF3AD72F9F4A2C7EBBB9E53B7B77B318489FF6B9785129FDBAC576BC835BF5FCDC
                            Malicious:false
                            Preview:......................>.......................................................G.......c.......p...........................................................................................................................................................................................................................................................................................................................................................................................................................................=...............#...4........................................................................................... ...!..."...,...$...%...&...'...(...)...*...+...1...-......./...0...5...2...3...>...@...6...7...8...9...:...;...<.......#...?...F...A...B...C...D...E...............I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {182C5263-9A4F-4811-9832-23486A29A112}, Number of Words: 10, Subject: Microsoft-Edge-Web-View2-Runtime, Author: Microsoft, Name of Creating Application: Microsoft-Edge-Web-View2-Runtime, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft-Edge-Web-View2-Runtime., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Sep 17 18:28:10 2024, Last Saved Time/Date: Tue Sep 17 18:28:10 2024, Last Printed: Tue Sep 17 18:28:10 2024, Number of Pages: 450
                            Category:dropped
                            Size (bytes):41998336
                            Entropy (8bit):7.988801588430793
                            Encrypted:false
                            SSDEEP:786432:b4ztbf6AoshmMYKXPrhcY32uoS59BVT8KoYcIxuhs7lekMqT0:b4pbSTS7YK/WY3tJ5jhrVxuhsZek
                            MD5:55E1B6A518BC3E243D8D856EE17430AA
                            SHA1:F83DC91C91F89D6A321892D54B4DE229041B07D1
                            SHA-256:BAF5979F4C227BE5B3F1BF4F03E5902E8B7FCC2DAD38068F363A0096CB12A536
                            SHA-512:CAFAA29EAD2294CFDD2B63912B6DCABD3853FA2D691065B3F398D689F06931DF3AD72F9F4A2C7EBBB9E53B7B77B318489FF6B9785129FDBAC576BC835BF5FCDC
                            Malicious:false
                            Preview:......................>.......................................................G.......c.......p...........................................................................................................................................................................................................................................................................................................................................................................................................................................=...............#...4........................................................................................... ...!..."...,...$...%...&...'...(...)...*...+...1...-......./...0...5...2...3...>...@...6...7...8...9...:...;...<.......#...?...F...A...B...C...D...E...............I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):756688
                            Entropy (8bit):6.616698594957689
                            Encrypted:false
                            SSDEEP:12288:UCw0mKFlJ/FFhmNKxhjszLF9lph0lhSMXlez0yw5v2cX+f/8O:U70fnJ/PhmNKnYzLFhh0lhSMXlM0yw50
                            MD5:EE45C6DFFAF86ED2A76D8F969C390C08
                            SHA1:FF5B2942FFA7D28ED3F72208E8E76391B2991B5A
                            SHA-256:118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
                            SHA-512:A92BC7AFF5DA3DC33263EA3D43CF617D47A2A6C589118F7EE3C5F293D63171778A7A37815EC23CB426558546CF0A1E694C67C7CBC36CCA92677DE566D1D71664
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: danf082024xml.msi, Detection: malicious, Browse
                            • Filename: , Detection: malicious, Browse
                            • Filename: XML202407brs.msi, Detection: malicious, Browse
                            • Filename: fin.746.msi, Detection: malicious, Browse
                            • Filename: Setup.msi, Detection: malicious, Browse
                            • Filename: NF_e_07_2024_XML__.msi, Detection: malicious, Browse
                            • Filename: Dramatisation.msi, Detection: malicious, Browse
                            • Filename: NF_e_22_05_36543547357358BR.msi, Detection: malicious, Browse
                            • Filename: HomeDesk.msi, Detection: malicious, Browse
                            • Filename: NFs_468.msi, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.1.@lb.@lb.@lb@2oc.@lb@2ic8@lbQ.hc.@lbQ.oc.@lbQ.ic.@lb@2hc.@lb@2jc.@lb@2mc.@lb.@mbVAlb`.ec.@lb`.lc.@lb`.b.@lb.@.b.@lb`.nc.@lbRich.@lb................PE..L...Q)1f.........."!...'............@................................................g....@A........................`...........,....................N...=.......x..p...p...............................@...............x............................text............................... ..`.rdata..............................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):756688
                            Entropy (8bit):6.616698594957689
                            Encrypted:false
                            SSDEEP:12288:UCw0mKFlJ/FFhmNKxhjszLF9lph0lhSMXlez0yw5v2cX+f/8O:U70fnJ/PhmNKnYzLFhh0lhSMXlM0yw50
                            MD5:EE45C6DFFAF86ED2A76D8F969C390C08
                            SHA1:FF5B2942FFA7D28ED3F72208E8E76391B2991B5A
                            SHA-256:118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
                            SHA-512:A92BC7AFF5DA3DC33263EA3D43CF617D47A2A6C589118F7EE3C5F293D63171778A7A37815EC23CB426558546CF0A1E694C67C7CBC36CCA92677DE566D1D71664
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.1.@lb.@lb.@lb@2oc.@lb@2ic8@lbQ.hc.@lbQ.oc.@lbQ.ic.@lb@2hc.@lb@2jc.@lb@2mc.@lb.@mbVAlb`.ec.@lb`.lc.@lb`.b.@lb.@.b.@lb`.nc.@lbRich.@lb................PE..L...Q)1f.........."!...'............@................................................g....@A........................`...........,....................N...=.......x..p...p...............................@...............x............................text............................... ..`.rdata..............................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):756688
                            Entropy (8bit):6.616698594957689
                            Encrypted:false
                            SSDEEP:12288:UCw0mKFlJ/FFhmNKxhjszLF9lph0lhSMXlez0yw5v2cX+f/8O:U70fnJ/PhmNKnYzLFhh0lhSMXlM0yw50
                            MD5:EE45C6DFFAF86ED2A76D8F969C390C08
                            SHA1:FF5B2942FFA7D28ED3F72208E8E76391B2991B5A
                            SHA-256:118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
                            SHA-512:A92BC7AFF5DA3DC33263EA3D43CF617D47A2A6C589118F7EE3C5F293D63171778A7A37815EC23CB426558546CF0A1E694C67C7CBC36CCA92677DE566D1D71664
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.1.@lb.@lb.@lb@2oc.@lb@2ic8@lbQ.hc.@lbQ.oc.@lbQ.ic.@lb@2hc.@lb@2jc.@lb@2mc.@lb.@mbVAlb`.ec.@lb`.lc.@lb`.b.@lb.@.b.@lb`.nc.@lbRich.@lb................PE..L...Q)1f.........."!...'............@................................................g....@A........................`...........,....................N...=.......x..p...p...............................@...............x............................text............................... ..`.rdata..............................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):756688
                            Entropy (8bit):6.616698594957689
                            Encrypted:false
                            SSDEEP:12288:UCw0mKFlJ/FFhmNKxhjszLF9lph0lhSMXlez0yw5v2cX+f/8O:U70fnJ/PhmNKnYzLFhh0lhSMXlM0yw50
                            MD5:EE45C6DFFAF86ED2A76D8F969C390C08
                            SHA1:FF5B2942FFA7D28ED3F72208E8E76391B2991B5A
                            SHA-256:118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
                            SHA-512:A92BC7AFF5DA3DC33263EA3D43CF617D47A2A6C589118F7EE3C5F293D63171778A7A37815EC23CB426558546CF0A1E694C67C7CBC36CCA92677DE566D1D71664
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.1.@lb.@lb.@lb@2oc.@lb@2ic8@lbQ.hc.@lbQ.oc.@lbQ.ic.@lb@2hc.@lb@2jc.@lb@2mc.@lb.@mbVAlb`.ec.@lb`.lc.@lb`.b.@lb.@.b.@lb`.nc.@lbRich.@lb................PE..L...Q)1f.........."!...'............@................................................g....@A........................`...........,....................N...=.......x..p...p...............................@...............x............................text............................... ..`.rdata..............................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3835
                            Entropy (8bit):5.511858369461452
                            Encrypted:false
                            SSDEEP:96:kYRBoAkLi16R2smJ87N/i6iy1CQEFLIVBc+hIUQfZzF08e:kYk89w9iaWQ
                            MD5:09D020362DA9A1D20AF7B8B9CAD7B9A3
                            SHA1:6F560CED003EC5D5F0F388C60EFF692F0CD9A460
                            SHA-256:E37D5A33E8BDBE98190F6C85A947FF77F71EBD752B764564493D4409244F2F8F
                            SHA-512:61E7597111F8C71A7A69136DC6007CB3483A6AEF51548E4A9EC8E0076B1AB48B1F87122BD5FC3EA04D2A93B449D3AF74B82F9DB5815D961947FEFA223863D8F2
                            Malicious:false
                            Preview:...@IXOS.@.....@.42Y.@.....@.....@.....@.....@.....@......&.{8AE8C42A-5150-4814-B7AC-A22D49C22F14} .Microsoft-Edge-Web-View2-Runtime(.IRPF2024-0940959038w904598304w985036.msi.@.....@.....@.....@........&.{182C5263-9A4F-4811-9832-23486A29A112}.....@.....@.....@.....@.......@.....@.....@.......@.... .Microsoft-Edge-Web-View2-Runtime......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{D85BA408-01F5-4AFD-AD63-1EA8CE77B976}..C:\Users\user\Contacts\.@.......@.....@.....@......&.{B5D76D82-8DC1-4B7E-8DC8-49EA79186188}?.01:\Software\Microsoft\Microsoft-Edge-Web-View2-Runtime\Version.@.......@.....@.....@......&.{BC4FEDCD-3E0E-4107-9E61-FB50233A89F0}..01:\Software\Microsoft\.@.......@.....@.....@......&.{484CC30A-1C9E-4E93-BFCE-F924EF61B954}..01:\Software\Microsoft\Windows\.@.......@.....@.....@......&.{C36507B6-9328-4E18-9954-CF
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):756688
                            Entropy (8bit):6.616698594957689
                            Encrypted:false
                            SSDEEP:12288:UCw0mKFlJ/FFhmNKxhjszLF9lph0lhSMXlez0yw5v2cX+f/8O:U70fnJ/PhmNKnYzLFhh0lhSMXlM0yw50
                            MD5:EE45C6DFFAF86ED2A76D8F969C390C08
                            SHA1:FF5B2942FFA7D28ED3F72208E8E76391B2991B5A
                            SHA-256:118A551EEF23BF842ED470316AA1A50BF17B6D656652879802D4ACC0184608CA
                            SHA-512:A92BC7AFF5DA3DC33263EA3D43CF617D47A2A6C589118F7EE3C5F293D63171778A7A37815EC23CB426558546CF0A1E694C67C7CBC36CCA92677DE566D1D71664
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.1.@lb.@lb.@lb@2oc.@lb@2ic8@lbQ.hc.@lbQ.oc.@lbQ.ic.@lb@2hc.@lb@2jc.@lb@2mc.@lb.@mbVAlb`.ec.@lb`.lc.@lb`.b.@lb.@.b.@lb`.nc.@lbRich.@lb................PE..L...Q)1f.........."!...'............@................................................g....@A........................`...........,....................N...=.......x..p...p...............................@...............x............................text............................... ..`.rdata..............................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.1791049698547857
                            Encrypted:false
                            SSDEEP:12:JSbX72FjKAGiLIlHVRpTh/7777777777777777777777777vDHFkPON8l0i8Q:JgQI5XLXF
                            MD5:EAA4944F4FE1707F6219B67807A5B1A6
                            SHA1:1E2F21AC5F24F9B1655029D818E5EDB4147829C9
                            SHA-256:1C6E1AFBCD578230CFD41EF6CE5607634D4151BAA18719855CAA0DC377354149
                            SHA-512:EA8E64F2E6BE428718F57A34BABFE9966DACC9B902E8613AAD575A3E876BAA8163FCC360BBAC1E25055AAC7ADBB83DEBFEB88274BE11B4390BE5C9B8D6105011
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.5141807958742566
                            Encrypted:false
                            SSDEEP:48:o8PhruRc06WX4eFT57iAEXkISAkKAEbCyjMHJkISAkAToZ:3hr1uFTdizXkIJkRwC0MpkIJkrZ
                            MD5:BA07F0B5F54FB688B1A85392A0558B01
                            SHA1:3DD6B98EA980999CE163072D9D4E4AC69299F7E4
                            SHA-256:A4EE36A7E613E5F0272EF589C12FBFC52B5712C1DBC804E8BEED3F7C49992B09
                            SHA-512:AEA47CA1B6A1CBAD1B7CE25D1A5DA8CEACD3A4B6F94513068052F0BC92C91113F72184C0D043689E55F6DABB9FA0654DD9AA779F9EC2115B8994227534C64AD0
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):360001
                            Entropy (8bit):5.363000044597883
                            Encrypted:false
                            SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauU:zTtbmkExhMJCIpE9
                            MD5:BC10EA1CC84F57281ED562301328B7E5
                            SHA1:8762E02044F1785649A4E3D12AF5449523266A6E
                            SHA-256:F77D4A61EA4C593D2C657DBEAD20A32EFB639B5CCE41E5F2CEDB48AD3A77AEC9
                            SHA-512:D4A5E73F67B4422A2B089558B0E607B851C4ACD1A0D3B00E735BB88F8E081B52FCB745C8F75A8829D60B6795438BC6C74B31AF397856197C864103C2DA2AC9BE
                            Malicious:false
                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.2167897095820628
                            Encrypted:false
                            SSDEEP:48:OQzuxthPIFX4fT5biAEXkISAkKAEbCyjMHJkISAkAToZ:nzOI8TtizXkIJkRwC0MpkIJkrZ
                            MD5:CFCE3F6B0CE43024C62578F3EDE7B714
                            SHA1:111B4B97E72578F23F3C5173A7370789B76773AF
                            SHA-256:459D9CD453910DCAE8B17ABBA46D217B45147EF887C594EF3D99FE61A4189515
                            SHA-512:515A192D4446B9347AFC6E4A9137E8C5894572CDA68BCC4707E2184EA300368DE96303D0733C0424BAECACD8589FB15401103468828840344B22C0732352D302
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):73728
                            Entropy (8bit):0.11832641331826951
                            Encrypted:false
                            SSDEEP:24:twBIEbz+TxVgkIipVVgkSVgkIipVVgkKAEVkyjCyjMHVgwGqV2+kPeRvQ:jEmTUkISAkjkISAkKAEbCyjMHKZAv
                            MD5:C3CA8F58D4DBFCB26772E9B27DAD0FDD
                            SHA1:0777696421F464A251963FFD03C027A2EEF567B6
                            SHA-256:3BC467469293F7FD01AB645E74645479F83E61E7224970F7FE01A7806DB797AD
                            SHA-512:16665E04D20CC59CC2FF4CE3D7AD84626D67016A13C741C92C71FA6E91CCCF20919785E5725D1BF9589C6DEA25B96EDF97641CC736AA5193D58539BA288BC476
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):0.08235243325159758
                            Encrypted:false
                            SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOlrAXSyYldHYEoVky6l8:2F0i8n0itFzDHFkPON8
                            MD5:4C8757C1D7C15C67D8F746CDD7315158
                            SHA1:82FBA3C8CD117DDBEDDD06CAA592B76BE1692269
                            SHA-256:BC07CE5591A7573A3489F80A75A24DE183697498483D174D7A13537CCE770BCC
                            SHA-512:2C40B0FCC186093AA40EF0FC1E9F732F43EC75943635649566A118A79D2EEFB3C6CC40691C2445870A722938E118F242F5C47A2C81D9D69CB31A6F6AE6A7EF1F
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.2167897095820628
                            Encrypted:false
                            SSDEEP:48:OQzuxthPIFX4fT5biAEXkISAkKAEbCyjMHJkISAkAToZ:nzOI8TtizXkIJkRwC0MpkIJkrZ
                            MD5:CFCE3F6B0CE43024C62578F3EDE7B714
                            SHA1:111B4B97E72578F23F3C5173A7370789B76773AF
                            SHA-256:459D9CD453910DCAE8B17ABBA46D217B45147EF887C594EF3D99FE61A4189515
                            SHA-512:515A192D4446B9347AFC6E4A9137E8C5894572CDA68BCC4707E2184EA300368DE96303D0733C0424BAECACD8589FB15401103468828840344B22C0732352D302
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.5141807958742566
                            Encrypted:false
                            SSDEEP:48:o8PhruRc06WX4eFT57iAEXkISAkKAEbCyjMHJkISAkAToZ:3hr1uFTdizXkIJkRwC0MpkIJkrZ
                            MD5:BA07F0B5F54FB688B1A85392A0558B01
                            SHA1:3DD6B98EA980999CE163072D9D4E4AC69299F7E4
                            SHA-256:A4EE36A7E613E5F0272EF589C12FBFC52B5712C1DBC804E8BEED3F7C49992B09
                            SHA-512:AEA47CA1B6A1CBAD1B7CE25D1A5DA8CEACD3A4B6F94513068052F0BC92C91113F72184C0D043689E55F6DABB9FA0654DD9AA779F9EC2115B8994227534C64AD0
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.2167897095820628
                            Encrypted:false
                            SSDEEP:48:OQzuxthPIFX4fT5biAEXkISAkKAEbCyjMHJkISAkAToZ:nzOI8TtizXkIJkRwC0MpkIJkrZ
                            MD5:CFCE3F6B0CE43024C62578F3EDE7B714
                            SHA1:111B4B97E72578F23F3C5173A7370789B76773AF
                            SHA-256:459D9CD453910DCAE8B17ABBA46D217B45147EF887C594EF3D99FE61A4189515
                            SHA-512:515A192D4446B9347AFC6E4A9137E8C5894572CDA68BCC4707E2184EA300368DE96303D0733C0424BAECACD8589FB15401103468828840344B22C0732352D302
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.5141807958742566
                            Encrypted:false
                            SSDEEP:48:o8PhruRc06WX4eFT57iAEXkISAkKAEbCyjMHJkISAkAToZ:3hr1uFTdizXkIJkRwC0MpkIJkrZ
                            MD5:BA07F0B5F54FB688B1A85392A0558B01
                            SHA1:3DD6B98EA980999CE163072D9D4E4AC69299F7E4
                            SHA-256:A4EE36A7E613E5F0272EF589C12FBFC52B5712C1DBC804E8BEED3F7C49992B09
                            SHA-512:AEA47CA1B6A1CBAD1B7CE25D1A5DA8CEACD3A4B6F94513068052F0BC92C91113F72184C0D043689E55F6DABB9FA0654DD9AA779F9EC2115B8994227534C64AD0
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {182C5263-9A4F-4811-9832-23486A29A112}, Number of Words: 10, Subject: Microsoft-Edge-Web-View2-Runtime, Author: Microsoft, Name of Creating Application: Microsoft-Edge-Web-View2-Runtime, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft-Edge-Web-View2-Runtime., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Sep 17 18:28:10 2024, Last Saved Time/Date: Tue Sep 17 18:28:10 2024, Last Printed: Tue Sep 17 18:28:10 2024, Number of Pages: 450
                            Entropy (8bit):7.988801588430793
                            TrID:
                            • Windows SDK Setup Transform Script (63028/2) 47.91%
                            • Microsoft Windows Installer (60509/1) 46.00%
                            • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                            File name:IRPF2024-0940959038w904598304w985036.msi
                            File size:41'998'336 bytes
                            MD5:55e1b6a518bc3e243d8d856ee17430aa
                            SHA1:f83dc91c91f89d6a321892d54b4de229041b07d1
                            SHA256:baf5979f4c227be5b3f1bf4f03e5902e8b7fcc2dad38068f363a0096cb12a536
                            SHA512:cafaa29ead2294cfdd2b63912b6dcabd3853fa2d691065b3f398d689f06931df3ad72f9f4a2c7ebbb9e53b7b77b318489ff6b9785129fdbac576bc835bf5fcdc
                            SSDEEP:786432:b4ztbf6AoshmMYKXPrhcY32uoS59BVT8KoYcIxuhs7lekMqT0:b4pbSTS7YK/WY3tJ5jhrVxuhsZek
                            TLSH:F397332675C7C221D19C007BF964FE5E4176AE23433101E7B2F9B8BA94B5CC2A678B53
                            File Content Preview:........................>.......................................................G.......c.......p..............................................................................................................................................................
                            Icon Hash:2d2e3797b32b2b99
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-09-18T12:32:28.265873+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.64971550.116.112.13880TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 18, 2024 12:32:27.551683903 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:32:27.556698084 CEST804971550.116.112.138192.168.2.6
                            Sep 18, 2024 12:32:27.556780100 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:32:27.556982040 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:32:27.561822891 CEST804971550.116.112.138192.168.2.6
                            Sep 18, 2024 12:32:28.265796900 CEST804971550.116.112.138192.168.2.6
                            Sep 18, 2024 12:32:28.265872955 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:32:33.266946077 CEST804971550.116.112.138192.168.2.6
                            Sep 18, 2024 12:32:33.267091990 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:17.156080008 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:17.476052999 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:18.163523912 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:19.366631985 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:21.772963047 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:26.663595915 CEST4971580192.168.2.650.116.112.138
                            Sep 18, 2024 12:34:36.366652966 CEST4971580192.168.2.650.116.112.138
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 18, 2024 12:32:27.182374954 CEST5762253192.168.2.61.1.1.1
                            Sep 18, 2024 12:32:27.502116919 CEST53576221.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 18, 2024 12:32:27.182374954 CEST192.168.2.61.1.1.10xc00aStandard query (0)www.rodovalhoadvogados.com.brA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 18, 2024 12:32:27.502116919 CEST1.1.1.1192.168.2.60xc00aNo error (0)www.rodovalhoadvogados.com.brrodovalhoadvogados.com.brCNAME (Canonical name)IN (0x0001)false
                            Sep 18, 2024 12:32:27.502116919 CEST1.1.1.1192.168.2.60xc00aNo error (0)rodovalhoadvogados.com.br50.116.112.138A (IP address)IN (0x0001)false
                            • www.rodovalhoadvogados.com.br
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.64971550.116.112.138805976C:\Users\user\Contacts\Flexpcis.exe
                            TimestampBytes transferredDirectionData
                            Sep 18, 2024 12:32:27.556982040 CEST102OUTGET /dddd/inspecionando.php HTTP/1.1
                            Host: www.rodovalhoadvogados.com.br
                            Cache-Control: no-cache
                            Sep 18, 2024 12:32:28.265796900 CEST169INHTTP/1.1 200 OK
                            Date: Wed, 18 Sep 2024 10:32:27 GMT
                            Server: Apache
                            Upgrade: h2,h2c
                            Connection: Upgrade
                            Content-Length: 0
                            Content-Type: text/html; charset=UTF-8


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:06:32:02
                            Start date:18/09/2024
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\IRPF2024-0940959038w904598304w985036.msi"
                            Imagebase:0x7ff698f90000
                            File size:69'632 bytes
                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:06:32:02
                            Start date:18/09/2024
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\msiexec.exe /V
                            Imagebase:0x7ff698f90000
                            File size:69'632 bytes
                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:3
                            Start time:06:32:04
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 5B841E4EC1525DEC8E125CA4E79284A2
                            Imagebase:0x880000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:06:32:07
                            Start date:18/09/2024
                            Path:C:\Users\user\Contacts\Flexpcis.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Contacts\Flexpcis.exe"
                            Imagebase:0x110000
                            File size:138'520 bytes
                            MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Antivirus matches:
                            • Detection: 0%, ReversingLabs
                            • Detection: 0%, Virustotal, Browse
                            Reputation:low
                            Has exited:false

                            Target ID:6
                            Start time:06:32:18
                            Start date:18/09/2024
                            Path:C:\Users\user\Contacts\Flexpcis.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Contacts\Flexpcis.exe"
                            Imagebase:0x110000
                            File size:138'520 bytes
                            MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:06:32:27
                            Start date:18/09/2024
                            Path:C:\Users\user\Contacts\Flexpcis.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Contacts\Flexpcis.exe"
                            Imagebase:0x110000
                            File size:138'520 bytes
                            MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Reputation:low
                            Has exited:true

                            Target ID:11
                            Start time:06:32:37
                            Start date:18/09/2024
                            Path:C:\Users\user\Contacts\Flexpcis.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Contacts\Flexpcis.exe"
                            Imagebase:0x110000
                            File size:138'520 bytes
                            MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Reputation:low
                            Has exited:true

                            Target ID:14
                            Start time:06:32:49
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:15
                            Start time:06:32:52
                            Start date:18/09/2024
                            Path:C:\Users\user\Contacts\Flexpcis.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Contacts\Flexpcis.exe"
                            Imagebase:0x110000
                            File size:138'520 bytes
                            MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Reputation:low
                            Has exited:true

                            Target ID:17
                            Start time:06:32:58
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 628
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:21
                            Start time:06:33:02
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 724
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:23
                            Start time:06:33:09
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 628
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:25
                            Start time:06:33:16
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 624
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:27
                            Start time:06:33:18
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 1004
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:30
                            Start time:06:35:58
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:06:36:00
                            Start date:18/09/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 628
                            Imagebase:0x30000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.1%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:5.9%
                              Total number of Nodes:1987
                              Total number of Limit Nodes:24
                              execution_graph 7315 11e012 7316 1125a8 CatchGuardHandler 5 API calls 7315->7316 7317 11e026 7316->7317 7318 1125a8 CatchGuardHandler 5 API calls 7317->7318 7319 11e030 7318->7319 8323 113495 8324 114ad2 _CallSETranslator 45 API calls 8323->8324 8325 11349d 8324->8325 8326 113e48 ___FrameUnwindToState 45 API calls 8325->8326 8327 11350d 8326->8327 8328 11353c CallCatchBlock 45 API calls 8327->8328 8329 11352e CallCatchBlock 8328->8329 7323 119314 7324 11933a 7323->7324 7327 119336 7323->7327 7324->7327 7328 118a48 30 API calls 7324->7328 7325 1125a8 CatchGuardHandler 5 API calls 7326 11939c 7325->7326 7327->7325 7328->7324 7329 112817 7332 112cb2 7329->7332 7331 11281c 7331->7331 7333 112ce2 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7332->7333 7334 112cd5 7332->7334 7335 112cd9 7333->7335 7334->7333 7334->7335 7335->7331 7336 118116 GetCommandLineA GetCommandLineW 7337 119d16 7338 119d23 7337->7338 7339 116bdb pre_c_initialization 19 API calls 7338->7339 7340 119d3d 7339->7340 7341 116b10 _free 19 API calls 7340->7341 7342 119d49 7341->7342 7343 116bdb pre_c_initialization 19 API calls 7342->7343 7347 119d6f 7342->7347 7344 119d63 7343->7344 7346 116b10 _free 19 API calls 7344->7346 7345 11842b 10 API calls 7345->7347 7346->7347 7347->7345 7348 119d7b 7347->7348 7349 116f18 7350 116f23 7349->7350 7351 116f33 7349->7351 7355 116f39 7350->7355 7354 116b10 _free 19 API calls 7354->7351 7356 116f52 7355->7356 7357 116f4c 7355->7357 7359 116b10 _free 19 API calls 7356->7359 7358 116b10 _free 19 API calls 7357->7358 7358->7356 7360 116f5e 7359->7360 7361 116b10 _free 19 API calls 7360->7361 7362 116f69 7361->7362 7363 116b10 _free 19 API calls 7362->7363 7364 116f74 7363->7364 7365 116b10 _free 19 API calls 7364->7365 7366 116f7f 7365->7366 7367 116b10 _free 19 API calls 7366->7367 7368 116f8a 7367->7368 7369 116b10 _free 19 API calls 7368->7369 7370 116f95 7369->7370 7371 116b10 _free 19 API calls 7370->7371 7372 116fa0 7371->7372 7373 116b10 _free 19 API calls 7372->7373 7374 116fab 7373->7374 7375 116b10 _free 19 API calls 7374->7375 7376 116fb9 7375->7376 7381 116dff 7376->7381 7387 116d0b 7381->7387 7383 116e23 7384 116e4f 7383->7384 7400 116d6c 7384->7400 7386 116e73 7386->7354 7388 116d17 CallCatchBlock 7387->7388 7395 1171be RtlEnterCriticalSection 7388->7395 7390 116d4b 7396 116d60 7390->7396 7392 116d58 CallCatchBlock 7392->7383 7393 116d21 7393->7390 7394 116b10 _free 19 API calls 7393->7394 7394->7390 7395->7393 7399 117206 RtlLeaveCriticalSection 7396->7399 7398 116d6a 7398->7392 7399->7398 7401 116d78 CallCatchBlock 7400->7401 7408 1171be RtlEnterCriticalSection 7401->7408 7403 116d82 7409 116fe3 7403->7409 7405 116d95 7413 116dab 7405->7413 7407 116da3 CallCatchBlock 7407->7386 7408->7403 7410 117019 __fassign 7409->7410 7411 116ff2 __fassign 7409->7411 7410->7405 7411->7410 7416 118f76 7411->7416 7530 117206 RtlLeaveCriticalSection 7413->7530 7415 116db5 7415->7407 7417 118ff6 7416->7417 7421 118f8c 7416->7421 7418 119044 7417->7418 7420 116b10 _free 19 API calls 7417->7420 7484 1190e9 7418->7484 7422 119018 7420->7422 7421->7417 7423 118fbf 7421->7423 7426 116b10 _free 19 API calls 7421->7426 7424 116b10 _free 19 API calls 7422->7424 7425 118fe1 7423->7425 7431 116b10 _free 19 API calls 7423->7431 7427 11902b 7424->7427 7428 116b10 _free 19 API calls 7425->7428 7429 118fb4 7426->7429 7430 116b10 _free 19 API calls 7427->7430 7432 118feb 7428->7432 7444 118af0 7429->7444 7436 119039 7430->7436 7437 118fd6 7431->7437 7438 116b10 _free 19 API calls 7432->7438 7433 1190b2 7434 116b10 _free 19 API calls 7433->7434 7439 1190b8 7434->7439 7441 116b10 _free 19 API calls 7436->7441 7472 118bee 7437->7472 7438->7417 7439->7410 7440 119052 7440->7433 7443 116b10 19 API calls _free 7440->7443 7441->7418 7443->7440 7445 118b01 7444->7445 7471 118bea 7444->7471 7446 118b12 7445->7446 7448 116b10 _free 19 API calls 7445->7448 7447 118b24 7446->7447 7449 116b10 _free 19 API calls 7446->7449 7450 118b36 7447->7450 7451 116b10 _free 19 API calls 7447->7451 7448->7446 7449->7447 7452 118b48 7450->7452 7453 116b10 _free 19 API calls 7450->7453 7451->7450 7454 118b5a 7452->7454 7456 116b10 _free 19 API calls 7452->7456 7453->7452 7455 118b6c 7454->7455 7457 116b10 _free 19 API calls 7454->7457 7458 118b7e 7455->7458 7459 116b10 _free 19 API calls 7455->7459 7456->7454 7457->7455 7460 118b90 7458->7460 7461 116b10 _free 19 API calls 7458->7461 7459->7458 7462 118ba2 7460->7462 7464 116b10 _free 19 API calls 7460->7464 7461->7460 7463 118bb4 7462->7463 7465 116b10 _free 19 API calls 7462->7465 7466 118bc6 7463->7466 7467 116b10 _free 19 API calls 7463->7467 7464->7462 7465->7463 7468 118bd8 7466->7468 7469 116b10 _free 19 API calls 7466->7469 7467->7466 7470 116b10 _free 19 API calls 7468->7470 7468->7471 7469->7468 7470->7471 7471->7423 7473 118bfb 7472->7473 7483 118c53 7472->7483 7474 116b10 _free 19 API calls 7473->7474 7477 118c0b 7473->7477 7474->7477 7475 118c1d 7476 118c2f 7475->7476 7479 116b10 _free 19 API calls 7475->7479 7480 118c41 7476->7480 7481 116b10 _free 19 API calls 7476->7481 7477->7475 7478 116b10 _free 19 API calls 7477->7478 7478->7475 7479->7476 7482 116b10 _free 19 API calls 7480->7482 7480->7483 7481->7480 7482->7483 7483->7425 7485 119114 7484->7485 7486 1190f6 7484->7486 7485->7440 7486->7485 7490 118c93 7486->7490 7489 116b10 _free 19 API calls 7489->7485 7491 118d71 7490->7491 7492 118ca4 7490->7492 7491->7489 7526 118c57 7492->7526 7495 118c57 __fassign 19 API calls 7496 118cb7 7495->7496 7497 118c57 __fassign 19 API calls 7496->7497 7498 118cc2 7497->7498 7499 118c57 __fassign 19 API calls 7498->7499 7500 118ccd 7499->7500 7501 118c57 __fassign 19 API calls 7500->7501 7502 118cdb 7501->7502 7503 116b10 _free 19 API calls 7502->7503 7504 118ce6 7503->7504 7505 116b10 _free 19 API calls 7504->7505 7506 118cf1 7505->7506 7507 116b10 _free 19 API calls 7506->7507 7508 118cfc 7507->7508 7509 118c57 __fassign 19 API calls 7508->7509 7510 118d0a 7509->7510 7511 118c57 __fassign 19 API calls 7510->7511 7512 118d18 7511->7512 7513 118c57 __fassign 19 API calls 7512->7513 7514 118d29 7513->7514 7515 118c57 __fassign 19 API calls 7514->7515 7516 118d37 7515->7516 7517 118c57 __fassign 19 API calls 7516->7517 7518 118d45 7517->7518 7519 116b10 _free 19 API calls 7518->7519 7520 118d50 7519->7520 7521 116b10 _free 19 API calls 7520->7521 7522 118d5b 7521->7522 7523 116b10 _free 19 API calls 7522->7523 7524 118d66 7523->7524 7525 116b10 _free 19 API calls 7524->7525 7525->7491 7527 118c8e 7526->7527 7528 118c7e 7526->7528 7527->7495 7528->7527 7529 116b10 _free 19 API calls 7528->7529 7529->7528 7530->7415 8330 11269d 8335 112f17 SetUnhandledExceptionFilter 8330->8335 8332 1126a2 pre_c_initialization 8336 1164ea 8332->8336 8334 1126ad 8335->8332 8337 116510 8336->8337 8338 1164f6 8336->8338 8337->8334 8338->8337 8339 1173d2 _free 19 API calls 8338->8339 8340 116500 8339->8340 8341 1157a1 pre_c_initialization 25 API calls 8340->8341 8342 11650b 8341->8342 8342->8334 7531 111f1c 7534 111f25 7531->7534 7532 111c00 25 API calls 7533 111f5a 7532->7533 7534->7532 7534->7533 8343 118a9e 8344 118aa3 8343->8344 8345 118ac6 8344->8345 8347 1186ce 8344->8347 8348 1186fd 8347->8348 8349 1186db 8347->8349 8348->8344 8350 1186f7 8349->8350 8351 1186e9 RtlDeleteCriticalSection 8349->8351 8352 116b10 _free 19 API calls 8350->8352 8351->8350 8351->8351 8352->8348 8353 117281 8357 117292 8353->8357 8354 117296 8355 11729b 8354->8355 8356 1173d2 _free 19 API calls 8354->8356 8358 1172c6 8356->8358 8357->8354 8357->8355 8360 1172d7 8357->8360 8359 1157a1 pre_c_initialization 25 API calls 8358->8359 8359->8355 8360->8355 8361 1173d2 _free 19 API calls 8360->8361 8361->8358 8362 115080 8363 115092 8362->8363 8365 1150a0 @_EH4_CallFilterFunc@8 8362->8365 8364 1125a8 CatchGuardHandler 5 API calls 8363->8364 8364->8365 8366 11e080 8367 1125a8 CatchGuardHandler 5 API calls 8366->8367 8368 11e091 8367->8368 8369 116980 8370 1169a3 8369->8370 8371 11698f 8369->8371 8372 116b10 _free 19 API calls 8370->8372 8371->8370 8374 116b10 _free 19 API calls 8371->8374 8373 1169b5 8372->8373 8375 116b10 _free 19 API calls 8373->8375 8374->8370 8376 1169c8 8375->8376 8377 116b10 _free 19 API calls 8376->8377 8378 1169d9 8377->8378 8379 116b10 _free 19 API calls 8378->8379 8380 1169ea 8379->8380 7535 119302 GetProcessHeap 7536 115e05 7545 118169 GetEnvironmentStringsW 7536->7545 7539 115e1d 7541 116b10 _free 19 API calls 7539->7541 7542 115e52 7541->7542 7543 115e28 7544 116b10 _free 19 API calls 7543->7544 7544->7539 7546 115e17 7545->7546 7547 11817d 7545->7547 7546->7539 7552 115e58 7546->7552 7569 116b4a 7547->7569 7549 118191 7550 116b10 _free 19 API calls 7549->7550 7551 1181ab FreeEnvironmentStringsW 7550->7551 7551->7546 7553 115e76 7552->7553 7554 116bdb pre_c_initialization 19 API calls 7553->7554 7557 115eb0 7554->7557 7555 116b10 _free 19 API calls 7558 115f3b 7555->7558 7556 115f21 7556->7555 7557->7556 7559 116bdb pre_c_initialization 19 API calls 7557->7559 7560 115f23 7557->7560 7564 115f45 7557->7564 7567 116b10 _free 19 API calls 7557->7567 7576 11721d 7557->7576 7558->7543 7559->7557 7585 115f52 7560->7585 7566 1157ce pre_c_initialization 11 API calls 7564->7566 7565 116b10 _free 19 API calls 7565->7556 7568 115f51 7566->7568 7567->7557 7570 116b88 7569->7570 7575 116b58 pre_c_initialization 7569->7575 7571 1173d2 _free 19 API calls 7570->7571 7573 116b86 7571->7573 7572 116b73 RtlAllocateHeap 7572->7573 7572->7575 7573->7549 7574 115815 new 7 API calls 7574->7575 7575->7570 7575->7572 7575->7574 7577 11722a 7576->7577 7578 117238 7576->7578 7577->7578 7583 117251 7577->7583 7579 1173d2 _free 19 API calls 7578->7579 7580 117242 7579->7580 7581 1157a1 pre_c_initialization 25 API calls 7580->7581 7582 11724c 7581->7582 7582->7557 7583->7582 7584 1173d2 _free 19 API calls 7583->7584 7584->7580 7586 115f29 7585->7586 7590 115f5f 7585->7590 7586->7565 7587 115f76 7588 116b10 _free 19 API calls 7587->7588 7588->7586 7589 116b10 _free 19 API calls 7589->7590 7590->7587 7590->7589 8381 11348b 8384 113672 8381->8384 8383 113493 8385 1136b8 8384->8385 8386 113682 8384->8386 8385->8383 8386->8385 8387 114ad2 _CallSETranslator 45 API calls 8386->8387 8388 1136ae 8387->8388 8388->8383 7591 114f0d 7592 1125a8 CatchGuardHandler 5 API calls 7591->7592 7593 114f21 7592->7593 7594 114f2c 7593->7594 7600 113f10 7593->7600 7596 114f64 7597 114f7b 7596->7597 7609 114df3 RtlUnwind 7596->7609 7610 114c6c 7597->7610 7601 113f1e __except_handler4 7600->7601 7614 114ad2 7601->7614 7604 113f63 7608 113f83 7604->7608 7628 113e48 7604->7628 7605 113f88 7605->7608 7635 1136bc 7605->7635 7608->7596 7609->7597 7611 114c8e 7610->7611 7613 114c7c 7610->7613 7612 114ad2 _CallSETranslator 45 API calls 7611->7612 7612->7613 7613->7594 7682 114ae0 7614->7682 7616 114ad7 7617 113f24 7616->7617 7618 1194d9 _abort 2 API calls 7616->7618 7617->7604 7617->7605 7617->7608 7619 116b9d 7618->7619 7620 116ba8 7619->7620 7621 119534 _abort 36 API calls 7619->7621 7622 116bd0 7620->7622 7623 116bb2 IsProcessorFeaturePresent 7620->7623 7621->7620 7625 116384 _abort 26 API calls 7622->7625 7624 116bbd 7623->7624 7626 1155d7 _abort 8 API calls 7624->7626 7627 116bda 7625->7627 7626->7622 7629 113e54 CallCatchBlock 7628->7629 7630 114ad2 _CallSETranslator 45 API calls 7629->7630 7632 113e74 __CallSettingFrame@12 7630->7632 7634 113eed CallCatchBlock 7632->7634 7703 116a7a 7632->7703 7709 113efc 7632->7709 7634->7608 7637 1136dc 7635->7637 7636 116a7a _unexpected 36 API calls 7640 1137dc FindHandler 7636->7640 7638 1139a8 7637->7638 7642 1137c5 7637->7642 7643 114ad2 _CallSETranslator 45 API calls 7637->7643 7681 1137cb FindHandler 7637->7681 7639 1139ca 7638->7639 7638->7681 7734 113a24 7638->7734 7641 114ad2 _CallSETranslator 45 API calls 7639->7641 7646 114848 __CxxThrowException@8 RaiseException 7640->7646 7641->7681 7642->7638 7645 113824 7642->7645 7642->7681 7647 113741 7643->7647 7654 113932 FindHandler 7645->7654 7719 114d49 7645->7719 7649 113998 7646->7649 7648 1139d8 7647->7648 7650 114ad2 _CallSETranslator 45 API calls 7647->7650 7648->7608 7751 114df3 RtlUnwind 7649->7751 7653 113750 7650->7653 7656 114ad2 _CallSETranslator 45 API calls 7653->7656 7654->7639 7659 113b3f IsInExceptionSpec 36 API calls 7654->7659 7654->7681 7655 113a0c 7657 113e48 ___FrameUnwindToState 45 API calls 7655->7657 7664 113758 7656->7664 7658 113a18 7657->7658 7752 1135bd 7658->7752 7662 11397b 7659->7662 7661 114ad2 _CallSETranslator 45 API calls 7665 1137a2 7661->7665 7662->7639 7666 113981 7662->7666 7663 113a23 7664->7661 7664->7681 7665->7642 7668 114ad2 _CallSETranslator 45 API calls 7665->7668 7667 114ad2 _CallSETranslator 45 API calls 7666->7667 7669 113986 7667->7669 7671 1137ad 7668->7671 7672 114ad2 _CallSETranslator 45 API calls 7669->7672 7670 113840 ___TypeMatch 7670->7654 7724 1135f7 7670->7724 7673 114ad2 _CallSETranslator 45 API calls 7671->7673 7674 11398b 7672->7674 7677 1137b8 7673->7677 7675 114ad2 _CallSETranslator 45 API calls 7674->7675 7678 113990 7675->7678 7714 113b3f 7677->7714 7680 114ad2 _CallSETranslator 45 API calls 7678->7680 7680->7649 7681->7636 7681->7640 7681->7648 7683 114ae9 7682->7683 7684 114aec GetLastError 7682->7684 7683->7616 7698 11534e 7684->7698 7686 114b20 7688 114b66 SetLastError 7686->7688 7687 114b01 7687->7686 7687->7688 7689 115388 ___vcrt_FlsSetValue 5 API calls 7687->7689 7688->7616 7690 114b1a 7689->7690 7690->7686 7691 116bdb pre_c_initialization 19 API calls 7690->7691 7692 114b2e 7691->7692 7693 114b42 7692->7693 7694 115388 ___vcrt_FlsSetValue 5 API calls 7692->7694 7695 115388 ___vcrt_FlsSetValue 5 API calls 7693->7695 7696 114b56 7693->7696 7694->7693 7695->7696 7697 116b10 _free 19 API calls 7696->7697 7697->7686 7699 1151b9 try_get_function 4 API calls 7698->7699 7700 115368 7699->7700 7701 11537f TlsGetValue 7700->7701 7702 115374 7700->7702 7701->7702 7702->7687 7704 116a86 _abort 7703->7704 7705 11702e pre_c_initialization 36 API calls 7704->7705 7706 116a8b 7705->7706 7707 116b98 _abort 36 API calls 7706->7707 7708 116ab5 7707->7708 7710 114ad2 _CallSETranslator 45 API calls 7709->7710 7711 113f01 7710->7711 7712 114ad2 _CallSETranslator 45 API calls 7711->7712 7713 113f0c 7711->7713 7712->7713 7713->7632 7715 113bd5 7714->7715 7718 113b53 ___TypeMatch 7714->7718 7716 116a7a _unexpected 36 API calls 7715->7716 7717 113bda 7716->7717 7718->7642 7721 114d65 7719->7721 7720 116a7a _unexpected 36 API calls 7723 114dc0 7720->7723 7721->7720 7722 114daf 7721->7722 7722->7670 7725 113604 7724->7725 7726 113613 7724->7726 7772 113c46 7725->7772 7776 114df3 RtlUnwind 7726->7776 7729 11362a 7730 113e48 ___FrameUnwindToState 45 API calls 7729->7730 7731 11363c 7730->7731 7777 113401 7731->7777 7733 113660 CallUnexpected 7733->7670 7735 113a39 7734->7735 7745 113b32 7734->7745 7736 114ad2 _CallSETranslator 45 API calls 7735->7736 7737 113a40 7736->7737 7738 113a49 RtlEncodePointer 7737->7738 7748 113a83 7737->7748 7741 114ad2 _CallSETranslator 45 API calls 7738->7741 7739 113b39 7742 116a7a _unexpected 36 API calls 7739->7742 7740 113a98 7743 114d49 _GetRangeOfTrysToCheck 36 API calls 7740->7743 7746 113a58 7741->7746 7744 113b3e 7742->7744 7749 113aac 7743->7749 7745->7639 7747 114c6c _CallSETranslator 45 API calls 7746->7747 7746->7748 7747->7748 7748->7739 7748->7740 7748->7745 7749->7745 7750 1135f7 FindHandlerForForeignException 46 API calls 7749->7750 7750->7749 7751->7655 7753 1135c9 __EH_prolog3_catch 7752->7753 7754 114ad2 _CallSETranslator 45 API calls 7753->7754 7755 1135ce 7754->7755 7756 1135f1 7755->7756 7823 114a9a 7755->7823 7757 116a7a _unexpected 36 API calls 7756->7757 7759 1135f6 7757->7759 7762 113613 7759->7762 7764 113c46 ___BuildCatchObject 36 API calls 7759->7764 7761 114ad2 _CallSETranslator 45 API calls 7763 1135e2 7761->7763 7830 114df3 RtlUnwind 7762->7830 7765 114848 __CxxThrowException@8 RaiseException 7763->7765 7764->7762 7765->7756 7767 11362a 7768 113e48 ___FrameUnwindToState 45 API calls 7767->7768 7769 11363c 7768->7769 7770 113401 CallCatchBlock 45 API calls 7769->7770 7771 113660 CallUnexpected 7770->7771 7771->7663 7773 113c52 CallCatchBlock 7772->7773 7791 113cd5 7773->7791 7775 113c7a ___BuildCatchObject CallCatchBlock ___AdjustPointer 7775->7726 7776->7729 7778 11340d CallCatchBlock 7777->7778 7795 114e79 7778->7795 7781 114ad2 _CallSETranslator 45 API calls 7782 113439 7781->7782 7783 114ad2 _CallSETranslator 45 API calls 7782->7783 7784 113444 7783->7784 7785 114ad2 _CallSETranslator 45 API calls 7784->7785 7786 11344f 7785->7786 7787 114ad2 _CallSETranslator 45 API calls 7786->7787 7788 113457 _CallCatchBlock2 7787->7788 7800 11353c 7788->7800 7790 11352e CallCatchBlock 7790->7733 7793 113ce1 CallCatchBlock 7791->7793 7792 113d58 ___BuildCatchObject CallCatchBlock ___AdjustPointer 7792->7775 7793->7792 7794 116a7a _unexpected 36 API calls 7793->7794 7794->7793 7796 114ad2 _CallSETranslator 45 API calls 7795->7796 7797 114e8a 7796->7797 7798 114ad2 _CallSETranslator 45 API calls 7797->7798 7799 11342f 7798->7799 7799->7781 7809 114e9d 7800->7809 7803 114ad2 _CallSETranslator 45 API calls 7804 113550 7803->7804 7805 114ad2 _CallSETranslator 45 API calls 7804->7805 7806 11355b 7805->7806 7808 11359f FindHandler 7806->7808 7820 114ee7 7806->7820 7808->7790 7810 114ad2 _CallSETranslator 45 API calls 7809->7810 7811 114ea6 7810->7811 7812 114ebe 7811->7812 7813 114eae 7811->7813 7815 114ad2 _CallSETranslator 45 API calls 7812->7815 7814 114ad2 _CallSETranslator 45 API calls 7813->7814 7816 11354a 7814->7816 7817 114ec3 7815->7817 7816->7803 7817->7816 7818 116a7a _unexpected 36 API calls 7817->7818 7819 114ee6 7818->7819 7821 114ad2 _CallSETranslator 45 API calls 7820->7821 7822 114eef 7821->7822 7822->7808 7824 114ad2 _CallSETranslator 45 API calls 7823->7824 7825 114aa0 7824->7825 7826 116a7a _unexpected 36 API calls 7825->7826 7827 114ab5 7826->7827 7828 1135dd 7827->7828 7829 116b10 _free 19 API calls 7827->7829 7828->7761 7829->7828 7830->7767 7831 116430 7832 11643c CallCatchBlock 7831->7832 7833 116473 CallCatchBlock 7832->7833 7839 1171be RtlEnterCriticalSection 7832->7839 7835 116450 7840 11923a 7835->7840 7839->7835 7841 119248 __fassign 7840->7841 7843 116460 7840->7843 7842 118f76 __fassign 19 API calls 7841->7842 7841->7843 7842->7843 7844 116479 7843->7844 7847 117206 RtlLeaveCriticalSection 7844->7847 7846 116480 7846->7833 7847->7846 7848 11a330 7851 117de4 7848->7851 7852 117ded 7851->7852 7853 117df6 7851->7853 7852->7853 7855 117ce3 7852->7855 7856 11702e pre_c_initialization 36 API calls 7855->7856 7857 117cf0 7856->7857 7875 117e02 7857->7875 7859 117cf8 7884 117a77 7859->7884 7862 117d0f 7862->7853 7863 116b4a __onexit 20 API calls 7864 117d20 7863->7864 7865 117d52 7864->7865 7891 117ea4 7864->7891 7867 116b10 _free 19 API calls 7865->7867 7867->7862 7869 117d4d 7870 1173d2 _free 19 API calls 7869->7870 7870->7865 7871 117d96 7871->7865 7901 11794d 7871->7901 7872 117d6a 7872->7871 7873 116b10 _free 19 API calls 7872->7873 7873->7871 7876 117e0e CallCatchBlock 7875->7876 7877 11702e pre_c_initialization 36 API calls 7876->7877 7882 117e18 7877->7882 7879 117e9c CallCatchBlock 7879->7859 7881 116b98 _abort 36 API calls 7881->7882 7882->7879 7882->7881 7883 116b10 _free 19 API calls 7882->7883 7904 1171be RtlEnterCriticalSection 7882->7904 7905 117e93 7882->7905 7883->7882 7909 116c38 7884->7909 7887 117a98 GetOEMCP 7890 117ac1 7887->7890 7888 117aaa 7889 117aaf GetACP 7888->7889 7888->7890 7889->7890 7890->7862 7890->7863 7892 117a77 38 API calls 7891->7892 7893 117ec3 7892->7893 7896 117f14 IsValidCodePage 7893->7896 7898 117eca 7893->7898 7900 117f39 ___scrt_fastfail 7893->7900 7894 1125a8 CatchGuardHandler 5 API calls 7895 117d45 7894->7895 7895->7869 7895->7872 7897 117f26 GetCPInfo 7896->7897 7896->7898 7897->7898 7897->7900 7898->7894 7942 117b4f GetCPInfo 7900->7942 8015 11790a 7901->8015 7903 117971 7903->7865 7904->7882 7908 117206 RtlLeaveCriticalSection 7905->7908 7907 117e9a 7907->7882 7908->7907 7910 116c55 7909->7910 7911 116c4b 7909->7911 7910->7911 7912 11702e pre_c_initialization 36 API calls 7910->7912 7911->7887 7911->7888 7913 116c76 7912->7913 7917 119c96 7913->7917 7918 116c8f 7917->7918 7919 119ca9 7917->7919 7921 119cc3 7918->7921 7919->7918 7925 1191c3 7919->7925 7922 119cd6 7921->7922 7923 119ceb 7921->7923 7922->7923 7924 117e02 __fassign 36 API calls 7922->7924 7923->7911 7924->7923 7926 1191cf CallCatchBlock 7925->7926 7927 11702e pre_c_initialization 36 API calls 7926->7927 7928 1191d8 7927->7928 7932 119226 CallCatchBlock 7928->7932 7937 1171be RtlEnterCriticalSection 7928->7937 7930 1191f6 7931 11923a __fassign 19 API calls 7930->7931 7933 11920a 7931->7933 7932->7918 7938 119229 7933->7938 7936 116b98 _abort 36 API calls 7936->7932 7937->7930 7941 117206 RtlLeaveCriticalSection 7938->7941 7940 11921d 7940->7932 7940->7936 7941->7940 7948 117b89 7942->7948 7951 117c33 7942->7951 7945 1125a8 CatchGuardHandler 5 API calls 7947 117cdf 7945->7947 7947->7898 7952 118dbc 7948->7952 7950 11a55c 41 API calls 7950->7951 7951->7945 7953 116c38 __fassign 36 API calls 7952->7953 7954 118ddc MultiByteToWideChar 7953->7954 7956 118eb2 7954->7956 7957 118e1a 7954->7957 7958 1125a8 CatchGuardHandler 5 API calls 7956->7958 7961 116b4a __onexit 20 API calls 7957->7961 7962 118e3b __alloca_probe_16 ___scrt_fastfail 7957->7962 7959 117bea 7958->7959 7966 11a55c 7959->7966 7960 118eac 7971 118ed9 7960->7971 7961->7962 7962->7960 7964 118e80 MultiByteToWideChar 7962->7964 7964->7960 7965 118e9c GetStringTypeW 7964->7965 7965->7960 7967 116c38 __fassign 36 API calls 7966->7967 7968 11a56f 7967->7968 7975 11a33f 7968->7975 7972 118ee5 7971->7972 7974 118ef6 7971->7974 7973 116b10 _free 19 API calls 7972->7973 7972->7974 7973->7974 7974->7956 7977 11a35a 7975->7977 7976 11a380 MultiByteToWideChar 7978 11a3aa 7976->7978 7989 11a534 7976->7989 7977->7976 7979 11a3cb __alloca_probe_16 7978->7979 7984 116b4a __onexit 20 API calls 7978->7984 7982 11a414 MultiByteToWideChar 7979->7982 7983 11a480 7979->7983 7980 1125a8 CatchGuardHandler 5 API calls 7981 117c0b 7980->7981 7981->7950 7982->7983 7985 11a42d 7982->7985 7987 118ed9 __freea 19 API calls 7983->7987 7984->7979 8002 11848d 7985->8002 7987->7989 7989->7980 7990 11a457 7990->7983 7994 11848d 10 API calls 7990->7994 7991 11a48f 7992 116b4a __onexit 20 API calls 7991->7992 7996 11a4b0 __alloca_probe_16 7991->7996 7992->7996 7993 11a525 7995 118ed9 __freea 19 API calls 7993->7995 7994->7983 7995->7983 7996->7993 7997 11848d 10 API calls 7996->7997 7998 11a504 7997->7998 7998->7993 7999 11a513 WideCharToMultiByte 7998->7999 7999->7993 8000 11a553 7999->8000 8001 118ed9 __freea 19 API calls 8000->8001 8001->7983 8003 1181b9 pre_c_initialization 4 API calls 8002->8003 8004 1184b4 8003->8004 8006 1184bd 8004->8006 8010 118515 8004->8010 8008 1125a8 CatchGuardHandler 5 API calls 8006->8008 8009 11850f 8008->8009 8009->7983 8009->7990 8009->7991 8011 1181b9 pre_c_initialization 4 API calls 8010->8011 8012 11853c 8011->8012 8013 1125a8 CatchGuardHandler 5 API calls 8012->8013 8014 1184fd LCMapStringW 8013->8014 8014->8006 8016 117916 CallCatchBlock 8015->8016 8023 1171be RtlEnterCriticalSection 8016->8023 8018 117920 8024 117975 8018->8024 8022 117939 CallCatchBlock 8022->7903 8023->8018 8036 118095 8024->8036 8026 1179c3 8027 118095 25 API calls 8026->8027 8028 1179df 8027->8028 8029 118095 25 API calls 8028->8029 8030 1179fd 8029->8030 8031 116b10 _free 19 API calls 8030->8031 8032 11792d 8030->8032 8031->8032 8033 117941 8032->8033 8050 117206 RtlLeaveCriticalSection 8033->8050 8035 11794b 8035->8022 8037 1180a6 8036->8037 8040 1180a2 8036->8040 8038 1180ad 8037->8038 8042 1180c0 ___scrt_fastfail 8037->8042 8039 1173d2 _free 19 API calls 8038->8039 8041 1180b2 8039->8041 8040->8026 8043 1157a1 pre_c_initialization 25 API calls 8041->8043 8042->8040 8044 1180f7 8042->8044 8045 1180ee 8042->8045 8043->8040 8044->8040 8048 1173d2 _free 19 API calls 8044->8048 8046 1173d2 _free 19 API calls 8045->8046 8047 1180f3 8046->8047 8049 1157a1 pre_c_initialization 25 API calls 8047->8049 8048->8047 8049->8040 8050->8035 8051 116932 8054 115ffa 8051->8054 8063 115f81 8054->8063 8057 115f81 5 API calls 8058 116018 8057->8058 8059 115f52 19 API calls 8058->8059 8060 116023 8059->8060 8061 115f52 19 API calls 8060->8061 8062 11602e 8061->8062 8064 115f9a 8063->8064 8065 1125a8 CatchGuardHandler 5 API calls 8064->8065 8066 115fbb 8065->8066 8066->8057 8067 117137 8075 1182d0 8067->8075 8070 11714b 8071 1170b2 __dosmaperr 19 API calls 8072 117153 8071->8072 8073 117160 8072->8073 8082 117163 8072->8082 8076 1181b9 pre_c_initialization 4 API calls 8075->8076 8077 1182f7 8076->8077 8078 11830f TlsAlloc 8077->8078 8079 118300 8077->8079 8078->8079 8080 1125a8 CatchGuardHandler 5 API calls 8079->8080 8081 117141 8080->8081 8081->8070 8081->8071 8083 117173 8082->8083 8084 11716d 8082->8084 8083->8070 8086 118326 8084->8086 8087 1181b9 pre_c_initialization 4 API calls 8086->8087 8088 11834d 8087->8088 8089 118365 TlsFree 8088->8089 8090 118359 8088->8090 8089->8090 8091 1125a8 CatchGuardHandler 5 API calls 8090->8091 8092 118376 8091->8092 8092->8083 8093 113239 8096 1129aa 8093->8096 8097 1147c6 ___std_exception_copy 26 API calls 8096->8097 8098 1129cd 8097->8098 8392 1154a0 RtlUnwind 8099 112f23 8100 112f58 8099->8100 8103 112f33 8099->8103 8101 116a7a _unexpected 36 API calls 8102 112f63 8101->8102 8103->8100 8103->8101 8393 1133a3 8394 116a7a _unexpected 36 API calls 8393->8394 8395 1133ab CallCatchBlock 8393->8395 8394->8395 8396 116aa6 8397 116aa9 8396->8397 8398 116b98 _abort 36 API calls 8397->8398 8399 116ab5 8398->8399 8400 111fa6 8401 111fb1 8400->8401 8402 111fba 8400->8402 8403 111c00 25 API calls 8401->8403 8404 114848 __CxxThrowException@8 RaiseException 8402->8404 8403->8402 8405 111fdc 8404->8405 8406 114fac 8407 113f10 ___InternalCxxFrameHandler 48 API calls 8406->8407 8408 114fd2 8407->8408 6543 1126af 6544 1126bb CallCatchBlock 6543->6544 6568 112ac3 6544->6568 6546 1126c2 6548 1126eb 6546->6548 6602 112dc9 IsProcessorFeaturePresent 6546->6602 6554 11272a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 6548->6554 6606 1160d8 6548->6606 6552 11270a CallCatchBlock 6558 11278a 6554->6558 6614 11639a 6554->6614 6555 112790 6583 1117a0 InitCommonControlsEx 6555->6583 6579 112ee4 6558->6579 6562 1127b6 6564 1127bf 6562->6564 6625 116375 6562->6625 6628 112c3a 6564->6628 6569 112acc 6568->6569 6634 11305c IsProcessorFeaturePresent 6569->6634 6573 112add 6578 112ae1 6573->6578 6645 1169f7 6573->6645 6576 112af8 6576->6546 6578->6546 6905 114940 6579->6905 6582 112f0a 6582->6555 6584 1117f0 6583->6584 6584->6584 6907 111a90 6584->6907 6586 11181a 6587 11183e 6586->6587 6967 111c00 6586->6967 6589 111842 6587->6589 6590 111847 6587->6590 6972 111510 GetModuleFileNameW 6589->6972 6919 111000 6590->6919 6594 11186b 6596 11189e 6594->6596 6597 11187d LoadLibraryW 6594->6597 6595 11188e GetProcAddress 6595->6596 6598 1118c3 6596->6598 6599 111c00 25 API calls 6596->6599 6597->6595 6597->6596 6600 1125a8 CatchGuardHandler 5 API calls 6598->6600 6599->6598 6601 1118d2 6600->6601 6620 1162a9 GetModuleHandleW 6601->6620 6603 112ddf ___scrt_fastfail 6602->6603 6604 112e87 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6603->6604 6605 112ed1 6604->6605 6605->6546 6607 1160ef 6606->6607 6608 1125a8 CatchGuardHandler 5 API calls 6607->6608 6609 112704 6608->6609 6609->6552 6610 11607c 6609->6610 6611 1160ab 6610->6611 6612 1125a8 CatchGuardHandler 5 API calls 6611->6612 6613 1160d4 6612->6613 6613->6554 6615 1163c2 pre_c_initialization _abort 6614->6615 6615->6558 7146 11702e GetLastError 6615->7146 6619 116a8b 7166 116b98 6619->7166 6621 1127ac 6620->6621 6621->6562 6622 1163d2 6621->6622 6623 11614f _abort 26 API calls 6622->6623 6624 1163e3 6623->6624 6624->6562 6626 11614f _abort 26 API calls 6625->6626 6627 116380 6626->6627 6627->6564 6629 112c46 6628->6629 6633 1127c7 6629->6633 7308 116a09 6629->7308 6632 1148df ___vcrt_uninitialize 6 API calls 6632->6633 6633->6552 6635 112ad8 6634->6635 6636 1148b6 6635->6636 6637 1148bb ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 6636->6637 6654 11514e 6637->6654 6640 1148c9 6640->6573 6642 1148d1 6643 1148dc 6642->6643 6668 11518a 6642->6668 6643->6573 6707 11931d 6645->6707 6648 1148df 6649 1148e8 6648->6649 6653 1148f2 ___vcrt_uninitialize_winapi_thunks 6648->6653 6650 114ba5 ___vcrt_uninitialize_ptd 5 API calls 6649->6650 6651 1148ed 6650->6651 6652 11518a ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6651->6652 6652->6653 6653->6578 6655 115157 6654->6655 6657 115180 6655->6657 6659 1148c5 6655->6659 6672 1153c5 6655->6672 6658 11518a ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6657->6658 6658->6659 6659->6640 6660 114b72 6659->6660 6688 1152da 6660->6688 6662 114b7c 6663 114b87 6662->6663 6693 115388 6662->6693 6663->6642 6665 114b95 6666 114ba2 6665->6666 6698 114ba5 6665->6698 6666->6642 6669 1151b4 6668->6669 6670 115195 6668->6670 6669->6640 6671 11519f RtlDeleteCriticalSection 6670->6671 6671->6669 6671->6671 6677 1151b9 6672->6677 6674 1153df 6675 1153fc InitializeCriticalSectionAndSpinCount 6674->6675 6676 1153e8 6674->6676 6675->6676 6676->6655 6680 1151e9 6677->6680 6682 1151ed __crt_fast_encode_pointer 6677->6682 6678 11520d 6681 115219 GetProcAddress 6678->6681 6678->6682 6680->6678 6680->6682 6683 115259 6680->6683 6681->6682 6682->6674 6684 115281 LoadLibraryExW 6683->6684 6685 115276 6683->6685 6684->6685 6686 11529d GetLastError 6684->6686 6685->6680 6686->6685 6687 1152a8 LoadLibraryExW 6686->6687 6687->6685 6689 1151b9 try_get_function 4 API calls 6688->6689 6690 1152f4 6689->6690 6691 11530c TlsAlloc 6690->6691 6692 1152fd 6690->6692 6692->6662 6694 1151b9 try_get_function 4 API calls 6693->6694 6695 1153a2 6694->6695 6696 1153bc TlsSetValue 6695->6696 6697 1153b1 6695->6697 6696->6697 6697->6665 6699 114bb5 6698->6699 6700 114baf 6698->6700 6699->6663 6702 115314 6700->6702 6703 1151b9 try_get_function 4 API calls 6702->6703 6704 11532e 6703->6704 6705 115345 TlsFree 6704->6705 6706 11533a 6704->6706 6705->6706 6706->6699 6708 11933a 6707->6708 6711 119336 6707->6711 6708->6711 6713 118a48 6708->6713 6710 112aea 6710->6576 6710->6648 6725 1125a8 6711->6725 6714 118a54 CallCatchBlock 6713->6714 6732 1171be RtlEnterCriticalSection 6714->6732 6716 118a5b 6733 118703 6716->6733 6718 118a6a 6719 118a79 6718->6719 6746 1188dc GetStartupInfoW 6718->6746 6757 118a95 6719->6757 6722 118a8a CallCatchBlock 6722->6708 6726 1125b1 6725->6726 6727 1125b3 IsProcessorFeaturePresent 6725->6727 6726->6710 6729 11285d 6727->6729 6904 112821 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6729->6904 6731 112940 6731->6710 6732->6716 6734 11870f CallCatchBlock 6733->6734 6735 118733 6734->6735 6736 11871c 6734->6736 6760 1171be RtlEnterCriticalSection 6735->6760 6768 1173d2 6736->6768 6742 11872b CallCatchBlock 6742->6718 6744 11876b 6774 118792 6744->6774 6745 11873f 6745->6744 6761 118654 6745->6761 6747 1188f9 6746->6747 6749 11898b 6746->6749 6748 118703 26 API calls 6747->6748 6747->6749 6751 118922 6748->6751 6752 118992 6749->6752 6750 118950 GetFileType 6750->6751 6751->6749 6751->6750 6755 118999 6752->6755 6753 1189dc GetStdHandle 6753->6755 6754 118a44 6754->6719 6755->6753 6755->6754 6756 1189ef GetFileType 6755->6756 6756->6755 6903 117206 RtlLeaveCriticalSection 6757->6903 6759 118a9c 6759->6722 6760->6745 6777 116bdb 6761->6777 6763 118666 6767 118673 6763->6767 6784 11842b 6763->6784 6766 1186c5 6766->6745 6791 116b10 6767->6791 6823 1170b2 GetLastError 6768->6823 6771 1157a1 6881 115726 6771->6881 6773 1157ad 6773->6742 6902 117206 RtlLeaveCriticalSection 6774->6902 6776 118799 6776->6742 6782 116be8 pre_c_initialization 6777->6782 6778 116c28 6781 1173d2 _free 18 API calls 6778->6781 6779 116c13 RtlAllocateHeap 6780 116c26 6779->6780 6779->6782 6780->6763 6781->6780 6782->6778 6782->6779 6797 115815 6782->6797 6812 1181b9 6784->6812 6786 118452 6787 118470 InitializeCriticalSectionAndSpinCount 6786->6787 6790 11845b 6786->6790 6787->6790 6788 1125a8 CatchGuardHandler 5 API calls 6789 118487 6788->6789 6789->6763 6790->6788 6792 116b1b HeapFree 6791->6792 6796 116b44 _free 6791->6796 6793 116b30 6792->6793 6792->6796 6794 1173d2 _free 17 API calls 6793->6794 6795 116b36 GetLastError 6794->6795 6795->6796 6796->6766 6802 115859 6797->6802 6799 1125a8 CatchGuardHandler 5 API calls 6800 115855 6799->6800 6800->6782 6801 11582b 6801->6799 6803 115865 CallCatchBlock 6802->6803 6808 1171be RtlEnterCriticalSection 6803->6808 6805 115870 6809 1158a2 6805->6809 6807 115897 CallCatchBlock 6807->6801 6808->6805 6810 117206 _abort RtlLeaveCriticalSection 6809->6810 6811 1158a9 6810->6811 6811->6807 6815 1181e5 6812->6815 6817 1181e9 __crt_fast_encode_pointer 6812->6817 6813 118209 6816 118215 GetProcAddress 6813->6816 6813->6817 6815->6813 6815->6817 6818 118255 6815->6818 6816->6817 6817->6786 6819 118276 LoadLibraryExW 6818->6819 6820 11826b 6818->6820 6819->6820 6821 118293 GetLastError 6819->6821 6820->6815 6821->6820 6822 11829e LoadLibraryExW 6821->6822 6822->6820 6824 1170d1 6823->6824 6825 1170cb 6823->6825 6827 116bdb pre_c_initialization 16 API calls 6824->6827 6829 117128 SetLastError 6824->6829 6842 11837c 6825->6842 6828 1170e3 6827->6828 6830 1170eb 6828->6830 6849 1183d2 6828->6849 6831 117131 6829->6831 6833 116b10 _free 16 API calls 6830->6833 6831->6771 6835 1170f1 6833->6835 6837 11711f SetLastError 6835->6837 6836 117107 6856 116e9f 6836->6856 6837->6831 6840 116b10 _free 16 API calls 6841 117118 6840->6841 6841->6829 6841->6837 6843 1181b9 pre_c_initialization 4 API calls 6842->6843 6844 1183a3 6843->6844 6845 1183bb TlsGetValue 6844->6845 6846 1183af 6844->6846 6845->6846 6847 1125a8 CatchGuardHandler 5 API calls 6846->6847 6848 1183cc 6847->6848 6848->6824 6850 1181b9 pre_c_initialization 4 API calls 6849->6850 6851 1183f9 6850->6851 6852 118414 TlsSetValue 6851->6852 6853 118408 6851->6853 6852->6853 6854 1125a8 CatchGuardHandler 5 API calls 6853->6854 6855 117100 6854->6855 6855->6830 6855->6836 6861 116e77 6856->6861 6867 116db7 6861->6867 6863 116e9b 6864 116e27 6863->6864 6873 116cbb 6864->6873 6866 116e4b 6866->6840 6868 116dc3 CallCatchBlock 6867->6868 6869 1171be _abort RtlEnterCriticalSection 6868->6869 6870 116dcd 6869->6870 6871 116df3 pre_c_initialization RtlLeaveCriticalSection 6870->6871 6872 116deb CallCatchBlock 6871->6872 6872->6863 6874 116cc7 CallCatchBlock 6873->6874 6875 1171be _abort RtlEnterCriticalSection 6874->6875 6876 116cd1 6875->6876 6877 116fe3 pre_c_initialization 19 API calls 6876->6877 6878 116ce9 6877->6878 6879 116cff pre_c_initialization RtlLeaveCriticalSection 6878->6879 6880 116cf7 CallCatchBlock 6879->6880 6880->6866 6882 1170b2 __dosmaperr 19 API calls 6881->6882 6883 11573c 6882->6883 6884 11579b 6883->6884 6888 11574a 6883->6888 6892 1157ce IsProcessorFeaturePresent 6884->6892 6886 1157a0 6887 115726 pre_c_initialization 25 API calls 6886->6887 6889 1157ad 6887->6889 6890 1125a8 CatchGuardHandler 5 API calls 6888->6890 6889->6773 6891 115771 6890->6891 6891->6773 6893 1157d9 6892->6893 6896 1155d7 6893->6896 6897 1155f3 _abort ___scrt_fastfail 6896->6897 6898 11561f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6897->6898 6901 1156f0 _abort 6898->6901 6899 1125a8 CatchGuardHandler 5 API calls 6900 11570e GetCurrentProcess TerminateProcess 6899->6900 6900->6886 6901->6899 6902->6776 6903->6759 6904->6731 6906 112ef7 GetStartupInfoW 6905->6906 6906->6582 6908 111ae6 6907->6908 6909 111a9e 6907->6909 6910 111af6 6908->6910 6911 111b7e 6908->6911 6909->6908 6916 111ac5 6909->6916 6915 111b06 6910->6915 7009 111e40 6910->7009 7022 1132fa 6911->7022 6915->6586 6994 111d20 6916->6994 6918 111ae0 6918->6586 6920 111a90 27 API calls 6919->6920 6921 11106f ___scrt_fastfail 6920->6921 6922 111089 SHGetFolderPathW 6921->6922 6923 1111cf 6922->6923 6924 1110a9 6922->6924 6926 1114f1 6923->6926 6930 111c00 25 API calls 6923->6930 6925 111a90 27 API calls 6924->6925 6928 111102 6925->6928 6927 1125a8 CatchGuardHandler 5 API calls 6926->6927 6931 11150b LoadLibraryW 6927->6931 7086 1120f0 6928->7086 6930->6926 6931->6594 6931->6595 6933 111143 6934 111188 PathFileExistsW 6933->6934 6936 111c00 25 API calls 6933->6936 6937 111202 6934->6937 6941 1111a9 6934->6941 6935 111c00 25 API calls 6935->6933 6936->6934 6938 1120f0 27 API calls 6937->6938 6939 111218 6938->6939 7094 112200 6939->7094 6941->6923 6943 111c00 25 API calls 6941->6943 6943->6923 6944 111256 MoveFileExW 6945 111288 PathFileExistsW 6944->6945 6946 1112a7 LoadLibraryW 6945->6946 6951 11141c 6945->6951 6947 1112df GetProcAddress 6946->6947 6949 1112eb LoadLibraryW 6946->6949 6947->6949 6952 11137d GetProcAddress 6949->6952 6958 111389 6949->6958 6950 111442 6954 111477 6950->6954 6955 111c00 25 API calls 6950->6955 6951->6950 6953 111c00 25 API calls 6951->6953 6952->6958 6953->6950 6956 1114ac 6954->6956 6957 111c00 25 API calls 6954->6957 6955->6954 6956->6923 6957->6956 7102 111920 6958->7102 6961 111920 25 API calls 6962 1113f9 6961->6962 6963 111920 25 API calls 6962->6963 6964 111404 6963->6964 6965 111920 25 API calls 6964->6965 6966 11140f 6965->6966 6966->6926 6968 111c40 6967->6968 6971 111c10 6967->6971 7138 1157b1 6968->7138 6971->6587 6973 111578 6972->6973 6973->6973 6974 111a90 27 API calls 6973->6974 6975 1115a7 6974->6975 7143 1118e0 6975->7143 6978 11160f 6979 111650 GetCurrentProcessId 6978->6979 6981 111c00 25 API calls 6978->6981 6991 111670 6979->6991 6980 111c00 25 API calls 6980->6978 6981->6979 6982 111754 Sleep 6983 111777 6982->6983 6984 11176a 6982->6984 6987 1125a8 CatchGuardHandler 5 API calls 6983->6987 6986 111c00 25 API calls 6984->6986 6985 111694 Process32FirstW 6988 11173a CloseHandle 6985->6988 6989 1116ad Process32NextW 6985->6989 6986->6983 6990 11178f 6987->6990 6988->6982 6988->6991 6989->6988 6989->6991 6990->6590 6991->6982 6991->6985 6991->6988 6992 111717 Process32NextW 6991->6992 6993 111728 Sleep 6991->6993 6992->6991 6993->6988 6995 111d39 6994->6995 6996 111e1c 6994->6996 6997 111d7a 6995->6997 6999 111e26 6995->6999 7000 111d53 6995->7000 7032 11331a 6996->7032 7001 111e30 6997->7001 7002 111d86 6997->7002 7003 11331a 27 API calls 6999->7003 7027 111fe0 7000->7027 7004 1132fa 27 API calls 7001->7004 7007 111e40 27 API calls 7002->7007 7008 111d96 7002->7008 7003->7001 7005 111e3a 7004->7005 7007->7008 7008->6918 7010 111e80 7009->7010 7011 111ec9 7010->7011 7020 111eb9 7010->7020 7068 1132dd 7010->7068 7013 111ef2 7011->7013 7014 111ed2 7011->7014 7016 1125b9 new 21 API calls 7013->7016 7015 111ede 7014->7015 7017 1132dd Concurrency::cancel_current_task RaiseException 7014->7017 7072 1125b9 7015->7072 7016->7020 7017->7015 7018 111c00 25 API calls 7021 111f5a 7018->7021 7020->7018 7020->7021 7021->6915 7083 113254 7022->7083 7025 114848 __CxxThrowException@8 RaiseException 7026 113319 7025->7026 7028 11207d 7027->7028 7031 111ff5 ___BuildCatchObject 7027->7031 7029 11331a 27 API calls 7028->7029 7030 112087 7029->7030 7031->6997 7037 1132ab 7032->7037 7036 113339 7043 113202 7037->7043 7040 114848 7042 114868 7040->7042 7041 11489a RaiseException 7041->7036 7042->7041 7046 1147c6 7043->7046 7045 11322e 7045->7040 7047 114800 ___std_exception_copy 7046->7047 7048 1147d3 7046->7048 7047->7045 7048->7047 7052 1158ab 7048->7052 7057 116b4a pre_c_initialization 7052->7057 7053 116b88 7054 1173d2 _free 19 API calls 7053->7054 7056 1147f0 7054->7056 7055 116b73 RtlAllocateHeap 7055->7056 7055->7057 7056->7047 7059 116ab6 7056->7059 7057->7053 7057->7055 7058 115815 new 7 API calls 7057->7058 7058->7057 7060 116ac3 7059->7060 7061 116ad1 7059->7061 7060->7061 7066 116ae8 7060->7066 7062 1173d2 _free 19 API calls 7061->7062 7063 116ad9 7062->7063 7064 1157a1 pre_c_initialization 25 API calls 7063->7064 7065 116ae3 7064->7065 7065->7047 7066->7065 7067 1173d2 _free 19 API calls 7066->7067 7067->7063 7069 1132eb Concurrency::cancel_current_task 7068->7069 7070 114848 __CxxThrowException@8 RaiseException 7069->7070 7071 1132f9 7070->7071 7075 1125be 7072->7075 7073 1158ab ___std_exception_copy 20 API calls 7073->7075 7074 1125ea 7074->7020 7075->7073 7075->7074 7076 115815 new 7 API calls 7075->7076 7078 1132dd Concurrency::cancel_current_task RaiseException 7075->7078 7079 112a03 7075->7079 7076->7075 7078->7075 7080 112a11 Concurrency::cancel_current_task 7079->7080 7081 114848 __CxxThrowException@8 RaiseException 7080->7081 7082 112a1f 7081->7082 7082->7075 7084 113202 std::exception::exception 26 API calls 7083->7084 7085 113266 7084->7085 7085->7025 7088 11214b 7086->7088 7087 112198 7106 1124a0 7087->7106 7088->7087 7134 111c60 7088->7134 7092 1121bf 7119 112370 7092->7119 7093 11111c 7093->6933 7093->6935 7097 112258 7094->7097 7095 11228c 7096 1124a0 27 API calls 7095->7096 7098 1122b1 7096->7098 7097->7095 7099 111c60 27 API calls 7097->7099 7100 1124a0 27 API calls 7098->7100 7099->7095 7101 111234 PathFileExistsW 7100->7101 7101->6944 7101->6945 7103 11192b 7102->7103 7105 1113ee 7102->7105 7104 111c00 25 API calls 7103->7104 7104->7105 7105->6961 7107 112589 7106->7107 7108 1124b9 7106->7108 7111 11331a 27 API calls 7107->7111 7109 112593 7108->7109 7110 1124d5 7108->7110 7112 1132fa 27 API calls 7109->7112 7113 11259d 7110->7113 7114 1124ec 7110->7114 7118 1124fa 7110->7118 7111->7109 7112->7113 7115 1132fa 27 API calls 7113->7115 7117 111e40 27 API calls 7114->7117 7114->7118 7116 1125a7 7115->7116 7117->7118 7118->7092 7120 1123c6 7119->7120 7126 11237e 7119->7126 7121 1123d8 7120->7121 7122 11247f 7120->7122 7124 112489 7121->7124 7125 1123f0 7121->7125 7131 1123fe 7121->7131 7123 1132fa 27 API calls 7122->7123 7123->7124 7127 1132fa 27 API calls 7124->7127 7129 111e40 27 API calls 7125->7129 7125->7131 7126->7120 7130 1123a5 7126->7130 7128 112493 7127->7128 7129->7131 7132 1124a0 27 API calls 7130->7132 7131->7093 7133 1123c0 7132->7133 7133->7093 7135 111d11 7134->7135 7136 1132fa 27 API calls 7135->7136 7137 111d1b 7136->7137 7139 115726 pre_c_initialization 25 API calls 7138->7139 7140 1157c0 7139->7140 7141 1157ce pre_c_initialization 11 API calls 7140->7141 7142 1157cd 7141->7142 7144 111d20 27 API calls 7143->7144 7145 1115eb 7144->7145 7145->6978 7145->6980 7147 11704a 7146->7147 7148 117044 7146->7148 7150 116bdb pre_c_initialization 19 API calls 7147->7150 7152 117099 SetLastError 7147->7152 7149 11837c pre_c_initialization 10 API calls 7148->7149 7149->7147 7151 11705c 7150->7151 7153 117064 7151->7153 7154 1183d2 pre_c_initialization 10 API calls 7151->7154 7152->6619 7155 116b10 _free 19 API calls 7153->7155 7156 117079 7154->7156 7157 11706a 7155->7157 7156->7153 7158 117080 7156->7158 7159 1170a5 SetLastError 7157->7159 7160 116e9f pre_c_initialization 19 API calls 7158->7160 7161 116b98 _abort 33 API calls 7159->7161 7162 11708b 7160->7162 7164 1170b1 7161->7164 7163 116b10 _free 19 API calls 7162->7163 7165 117092 7163->7165 7165->7152 7165->7159 7177 1194d9 7166->7177 7169 116ba8 7171 116bb2 IsProcessorFeaturePresent 7169->7171 7176 116bd0 7169->7176 7172 116bbd 7171->7172 7174 1155d7 _abort 8 API calls 7172->7174 7174->7176 7207 116384 7176->7207 7210 119447 7177->7210 7180 119534 7181 119540 _abort 7180->7181 7182 1170b2 __dosmaperr 19 API calls 7181->7182 7183 11956d _abort 7181->7183 7188 119567 _abort 7181->7188 7182->7188 7192 1195e5 7183->7192 7224 1171be RtlEnterCriticalSection 7183->7224 7184 1195b9 7185 1173d2 _free 19 API calls 7184->7185 7186 1195be 7185->7186 7189 1157a1 pre_c_initialization 25 API calls 7186->7189 7188->7183 7188->7184 7197 11959c 7188->7197 7189->7197 7193 119644 7192->7193 7195 11963c 7192->7195 7204 11966f 7192->7204 7225 117206 RtlLeaveCriticalSection 7192->7225 7193->7204 7226 11952b 7193->7226 7199 116384 _abort 26 API calls 7195->7199 7233 11d559 7197->7233 7199->7193 7201 11702e pre_c_initialization 36 API calls 7205 1196d2 7201->7205 7203 11952b _abort 36 API calls 7203->7204 7229 1196f4 7204->7229 7205->7197 7206 11702e pre_c_initialization 36 API calls 7205->7206 7206->7197 7237 11614f 7207->7237 7213 1193ed 7210->7213 7212 116b9d 7212->7169 7212->7180 7214 1193f9 CallCatchBlock 7213->7214 7219 1171be RtlEnterCriticalSection 7214->7219 7216 119407 7220 11943b 7216->7220 7218 11942e CallCatchBlock 7218->7212 7219->7216 7223 117206 RtlLeaveCriticalSection 7220->7223 7222 119445 7222->7218 7223->7222 7224->7192 7225->7195 7227 11702e pre_c_initialization 36 API calls 7226->7227 7228 119530 7227->7228 7228->7203 7230 1196c3 7229->7230 7231 1196fa 7229->7231 7230->7197 7230->7201 7230->7205 7236 117206 RtlLeaveCriticalSection 7231->7236 7234 1125a8 CatchGuardHandler 5 API calls 7233->7234 7235 11d564 7234->7235 7235->7235 7236->7230 7238 11615b _abort 7237->7238 7239 1162a9 _abort GetModuleHandleW 7238->7239 7247 116173 7238->7247 7242 116167 7239->7242 7241 11617b 7246 1161f0 7241->7246 7256 116219 7241->7256 7265 116888 7241->7265 7242->7247 7259 1162ed GetModuleHandleExW 7242->7259 7250 116208 7246->7250 7255 11607c _abort 5 API calls 7246->7255 7264 1171be RtlEnterCriticalSection 7247->7264 7248 116262 7254 11d559 _abort 5 API calls 7248->7254 7249 116236 7271 116268 7249->7271 7251 11607c _abort 5 API calls 7250->7251 7251->7256 7258 116267 7254->7258 7255->7250 7268 116259 7256->7268 7260 116317 GetProcAddress 7259->7260 7261 11632c 7259->7261 7260->7261 7262 1125a8 CatchGuardHandler 5 API calls 7261->7262 7263 116353 7262->7263 7263->7247 7264->7241 7279 1165c1 7265->7279 7301 117206 RtlLeaveCriticalSection 7268->7301 7270 116232 7270->7248 7270->7249 7302 118597 7271->7302 7274 116296 7277 1162ed _abort 7 API calls 7274->7277 7275 116276 GetPEB 7275->7274 7276 116286 GetCurrentProcess TerminateProcess 7275->7276 7276->7274 7278 11629e ExitProcess 7277->7278 7282 116570 7279->7282 7281 1165e5 7281->7246 7283 11657c CallCatchBlock 7282->7283 7290 1171be RtlEnterCriticalSection 7283->7290 7285 11658a 7291 116611 7285->7291 7289 1165a8 CallCatchBlock 7289->7281 7290->7285 7294 116631 7291->7294 7295 116639 7291->7295 7292 1125a8 CatchGuardHandler 5 API calls 7293 116597 7292->7293 7297 1165b5 7293->7297 7294->7292 7295->7294 7296 116b10 _free 19 API calls 7295->7296 7296->7294 7300 117206 RtlLeaveCriticalSection 7297->7300 7299 1165bf 7299->7289 7300->7299 7301->7270 7303 1185bc 7302->7303 7307 1185b2 7302->7307 7304 1181b9 pre_c_initialization 4 API calls 7303->7304 7304->7307 7305 1125a8 CatchGuardHandler 5 API calls 7306 116272 7305->7306 7306->7274 7306->7275 7307->7305 7311 1193a0 7308->7311 7314 1193b9 7311->7314 7312 1125a8 CatchGuardHandler 5 API calls 7313 112c54 7312->7313 7313->6632 7314->7312 8109 119f50 8110 119f89 8109->8110 8111 119f8d 8110->8111 8122 119fb5 8110->8122 8112 1173d2 _free 19 API calls 8111->8112 8113 119f92 8112->8113 8115 1157a1 pre_c_initialization 25 API calls 8113->8115 8114 11a2d9 8116 1125a8 CatchGuardHandler 5 API calls 8114->8116 8117 119f9d 8115->8117 8118 11a2e6 8116->8118 8119 1125a8 CatchGuardHandler 5 API calls 8117->8119 8120 119fa9 8119->8120 8122->8114 8123 119e60 8122->8123 8126 119e7b 8123->8126 8124 1125a8 CatchGuardHandler 5 API calls 8125 119ef2 8124->8125 8125->8122 8126->8124 8409 1127d4 8412 1158bb 8409->8412 8413 1170b2 __dosmaperr 19 API calls 8412->8413 8416 1158d2 8413->8416 8414 1125a8 CatchGuardHandler 5 API calls 8415 1127e5 8414->8415 8416->8414 8421 119dde 8431 11a82e 8421->8431 8425 119deb 8444 11ab0a 8425->8444 8428 119e15 8429 116b10 _free 19 API calls 8428->8429 8430 119e20 8429->8430 8448 11a837 8431->8448 8433 119de6 8434 11aa6a 8433->8434 8435 11aa76 CallCatchBlock 8434->8435 8468 1171be RtlEnterCriticalSection 8435->8468 8437 11aaec 8482 11ab01 8437->8482 8439 11aaf8 CallCatchBlock 8439->8425 8440 11aac0 RtlDeleteCriticalSection 8442 116b10 _free 19 API calls 8440->8442 8443 11aa81 8442->8443 8443->8437 8443->8440 8469 11b89c 8443->8469 8445 11ab20 8444->8445 8447 119dfa RtlDeleteCriticalSection 8444->8447 8446 116b10 _free 19 API calls 8445->8446 8445->8447 8446->8447 8447->8425 8447->8428 8449 11a843 CallCatchBlock 8448->8449 8458 1171be RtlEnterCriticalSection 8449->8458 8451 11a8e6 8463 11a906 8451->8463 8455 11a8f2 CallCatchBlock 8455->8433 8456 11a7e7 64 API calls 8457 11a852 8456->8457 8457->8451 8457->8456 8459 119e2a RtlEnterCriticalSection 8457->8459 8460 11a8dc 8457->8460 8458->8457 8459->8457 8466 119e3e RtlLeaveCriticalSection 8460->8466 8462 11a8e4 8462->8457 8467 117206 RtlLeaveCriticalSection 8463->8467 8465 11a90d 8465->8455 8466->8462 8467->8465 8468->8443 8470 11b8a8 CallCatchBlock 8469->8470 8471 11b8b9 8470->8471 8472 11b8ce 8470->8472 8473 1173d2 _free 19 API calls 8471->8473 8481 11b8c9 CallCatchBlock 8472->8481 8485 119e2a RtlEnterCriticalSection 8472->8485 8474 11b8be 8473->8474 8476 1157a1 pre_c_initialization 25 API calls 8474->8476 8476->8481 8477 11b8ea 8486 11b826 8477->8486 8479 11b8f5 8502 11b912 8479->8502 8481->8443 8750 117206 RtlLeaveCriticalSection 8482->8750 8484 11ab08 8484->8439 8485->8477 8487 11b833 8486->8487 8488 11b848 8486->8488 8489 1173d2 _free 19 API calls 8487->8489 8500 11b843 8488->8500 8505 11a781 8488->8505 8490 11b838 8489->8490 8492 1157a1 pre_c_initialization 25 API calls 8490->8492 8492->8500 8494 11ab0a 19 API calls 8495 11b864 8494->8495 8511 119cf0 8495->8511 8497 11b86a 8518 11c5ce 8497->8518 8500->8479 8501 116b10 _free 19 API calls 8501->8500 8749 119e3e RtlLeaveCriticalSection 8502->8749 8504 11b91a 8504->8481 8506 11a795 8505->8506 8507 11a799 8505->8507 8506->8494 8507->8506 8508 119cf0 25 API calls 8507->8508 8509 11a7b9 8508->8509 8533 11b223 8509->8533 8512 119d11 8511->8512 8513 119cfc 8511->8513 8512->8497 8514 1173d2 _free 19 API calls 8513->8514 8515 119d01 8514->8515 8516 1157a1 pre_c_initialization 25 API calls 8515->8516 8517 119d0c 8516->8517 8517->8497 8519 11c5f2 8518->8519 8520 11c5dd 8518->8520 8522 11c62d 8519->8522 8526 11c619 8519->8526 8521 1173bf __dosmaperr 19 API calls 8520->8521 8523 11c5e2 8521->8523 8524 1173bf __dosmaperr 19 API calls 8522->8524 8525 1173d2 _free 19 API calls 8523->8525 8527 11c632 8524->8527 8530 11b870 8525->8530 8706 11c5a6 8526->8706 8529 1173d2 _free 19 API calls 8527->8529 8531 11c63a 8529->8531 8530->8500 8530->8501 8532 1157a1 pre_c_initialization 25 API calls 8531->8532 8532->8530 8534 11b22f CallCatchBlock 8533->8534 8535 11b237 8534->8535 8536 11b24f 8534->8536 8558 1173bf 8535->8558 8538 11b2ed 8536->8538 8542 11b284 8536->8542 8540 1173bf __dosmaperr 19 API calls 8538->8540 8543 11b2f2 8540->8543 8541 1173d2 _free 19 API calls 8552 11b244 CallCatchBlock 8541->8552 8561 11879b RtlEnterCriticalSection 8542->8561 8545 1173d2 _free 19 API calls 8543->8545 8547 11b2fa 8545->8547 8546 11b28a 8548 11b2a6 8546->8548 8549 11b2bb 8546->8549 8550 1157a1 pre_c_initialization 25 API calls 8547->8550 8551 1173d2 _free 19 API calls 8548->8551 8562 11b30e 8549->8562 8550->8552 8554 11b2ab 8551->8554 8552->8506 8556 1173bf __dosmaperr 19 API calls 8554->8556 8555 11b2b6 8613 11b2e5 8555->8613 8556->8555 8559 1170b2 __dosmaperr 19 API calls 8558->8559 8560 1173c4 8559->8560 8560->8541 8561->8546 8563 11b33c 8562->8563 8600 11b335 8562->8600 8564 11b340 8563->8564 8565 11b35f 8563->8565 8566 1173bf __dosmaperr 19 API calls 8564->8566 8569 11b3b0 8565->8569 8570 11b393 8565->8570 8568 11b345 8566->8568 8567 1125a8 CatchGuardHandler 5 API calls 8571 11b516 8567->8571 8572 1173d2 _free 19 API calls 8568->8572 8573 11b3c6 8569->8573 8616 11b80b 8569->8616 8574 1173bf __dosmaperr 19 API calls 8570->8574 8571->8555 8575 11b34c 8572->8575 8619 11aeb3 8573->8619 8578 11b398 8574->8578 8579 1157a1 pre_c_initialization 25 API calls 8575->8579 8581 1173d2 _free 19 API calls 8578->8581 8579->8600 8584 11b3a0 8581->8584 8582 11b3d4 8588 11b3d8 8582->8588 8589 11b3fa 8582->8589 8583 11b40d 8586 11b421 8583->8586 8587 11b467 WriteFile 8583->8587 8585 1157a1 pre_c_initialization 25 API calls 8584->8585 8585->8600 8592 11b457 8586->8592 8593 11b429 8586->8593 8590 11b48a GetLastError 8587->8590 8595 11b3f0 8587->8595 8594 11b4ce 8588->8594 8626 11ae46 8588->8626 8631 11ac93 GetConsoleCP 8589->8631 8590->8595 8657 11af29 8592->8657 8596 11b447 8593->8596 8597 11b42e 8593->8597 8594->8600 8601 1173d2 _free 19 API calls 8594->8601 8595->8594 8595->8600 8604 11b4aa 8595->8604 8649 11b0f6 8596->8649 8597->8594 8642 11b008 8597->8642 8600->8567 8603 11b4f3 8601->8603 8606 1173bf __dosmaperr 19 API calls 8603->8606 8607 11b4b1 8604->8607 8608 11b4c5 8604->8608 8606->8600 8609 1173d2 _free 19 API calls 8607->8609 8664 11739c 8608->8664 8611 11b4b6 8609->8611 8612 1173bf __dosmaperr 19 API calls 8611->8612 8612->8600 8705 1187be RtlLeaveCriticalSection 8613->8705 8615 11b2eb 8615->8552 8669 11b78d 8616->8669 8691 11a72b 8619->8691 8621 11aec3 8622 11702e pre_c_initialization 36 API calls 8621->8622 8623 11aec8 8621->8623 8624 11aeeb 8622->8624 8623->8582 8623->8583 8624->8623 8625 11af09 GetConsoleMode 8624->8625 8625->8623 8628 11aea0 8626->8628 8630 11ae6b 8626->8630 8627 11aea2 GetLastError 8627->8628 8628->8595 8629 11b981 WriteConsoleW CreateFileW 8629->8630 8630->8627 8630->8628 8630->8629 8636 11acf6 8631->8636 8641 11ae08 8631->8641 8632 1125a8 CatchGuardHandler 5 API calls 8633 11ae42 8632->8633 8633->8595 8635 119c7c 38 API calls __fassign 8635->8636 8636->8635 8637 11ad7c WideCharToMultiByte 8636->8637 8640 11add3 WriteFile 8636->8640 8636->8641 8700 118aca 8636->8700 8638 11ada2 WriteFile 8637->8638 8637->8641 8638->8636 8639 11ae2b GetLastError 8638->8639 8639->8641 8640->8636 8640->8639 8641->8632 8646 11b017 8642->8646 8643 11b0d9 8645 1125a8 CatchGuardHandler 5 API calls 8643->8645 8644 11b095 WriteFile 8644->8646 8647 11b0db GetLastError 8644->8647 8648 11b0f2 8645->8648 8646->8643 8646->8644 8647->8643 8648->8595 8654 11b105 8649->8654 8650 11b210 8651 1125a8 CatchGuardHandler 5 API calls 8650->8651 8652 11b21f 8651->8652 8652->8595 8653 11b187 WideCharToMultiByte 8655 11b208 GetLastError 8653->8655 8656 11b1bc WriteFile 8653->8656 8654->8650 8654->8653 8654->8656 8655->8650 8656->8654 8656->8655 8661 11af38 8657->8661 8658 11afeb 8659 1125a8 CatchGuardHandler 5 API calls 8658->8659 8662 11b004 8659->8662 8660 11afaa WriteFile 8660->8661 8663 11afed GetLastError 8660->8663 8661->8658 8661->8660 8662->8595 8663->8658 8665 1173bf __dosmaperr 19 API calls 8664->8665 8666 1173a7 _free 8665->8666 8667 1173d2 _free 19 API calls 8666->8667 8668 1173ba 8667->8668 8668->8600 8678 118872 8669->8678 8671 11b79f 8672 11b7a7 8671->8672 8673 11b7b8 SetFilePointerEx 8671->8673 8674 1173d2 _free 19 API calls 8672->8674 8675 11b7d0 GetLastError 8673->8675 8676 11b7ac 8673->8676 8674->8676 8677 11739c __dosmaperr 19 API calls 8675->8677 8676->8573 8677->8676 8679 118894 8678->8679 8680 11887f 8678->8680 8682 1173bf __dosmaperr 19 API calls 8679->8682 8685 1188b9 8679->8685 8681 1173bf __dosmaperr 19 API calls 8680->8681 8683 118884 8681->8683 8686 1188c4 8682->8686 8684 1173d2 _free 19 API calls 8683->8684 8687 11888c 8684->8687 8685->8671 8688 1173d2 _free 19 API calls 8686->8688 8687->8671 8689 1188cc 8688->8689 8690 1157a1 pre_c_initialization 25 API calls 8689->8690 8690->8687 8692 11a738 8691->8692 8694 11a745 8691->8694 8693 1173d2 _free 19 API calls 8692->8693 8695 11a73d 8693->8695 8696 11a751 8694->8696 8697 1173d2 _free 19 API calls 8694->8697 8695->8621 8696->8621 8698 11a772 8697->8698 8699 1157a1 pre_c_initialization 25 API calls 8698->8699 8699->8695 8701 11702e pre_c_initialization 36 API calls 8700->8701 8702 118ad5 8701->8702 8703 119c96 __fassign 36 API calls 8702->8703 8704 118ae5 8703->8704 8704->8636 8705->8615 8709 11c524 8706->8709 8708 11c5ca 8708->8530 8710 11c530 CallCatchBlock 8709->8710 8720 11879b RtlEnterCriticalSection 8710->8720 8712 11c53e 8713 11c570 8712->8713 8714 11c565 8712->8714 8716 1173d2 _free 19 API calls 8713->8716 8721 11c64d 8714->8721 8717 11c56b 8716->8717 8736 11c59a 8717->8736 8719 11c58d CallCatchBlock 8719->8708 8720->8712 8722 118872 25 API calls 8721->8722 8724 11c65d 8722->8724 8723 11c663 8739 1187e1 8723->8739 8724->8723 8726 118872 25 API calls 8724->8726 8735 11c695 8724->8735 8728 11c68c 8726->8728 8727 118872 25 API calls 8729 11c6a1 CloseHandle 8727->8729 8732 118872 25 API calls 8728->8732 8729->8723 8733 11c6ad GetLastError 8729->8733 8730 11c6dd 8730->8717 8732->8735 8733->8723 8734 11739c __dosmaperr 19 API calls 8734->8730 8735->8723 8735->8727 8748 1187be RtlLeaveCriticalSection 8736->8748 8738 11c5a4 8738->8719 8740 1187f0 8739->8740 8741 118857 8739->8741 8740->8741 8747 11881a 8740->8747 8742 1173d2 _free 19 API calls 8741->8742 8743 11885c 8742->8743 8744 1173bf __dosmaperr 19 API calls 8743->8744 8745 118847 8744->8745 8745->8730 8745->8734 8746 118841 SetStdHandle 8746->8745 8747->8745 8747->8746 8748->8738 8749->8504 8750->8484 8751 115fc1 8752 115fd3 8751->8752 8753 115fd9 8751->8753 8754 115f52 19 API calls 8752->8754 8754->8753 8127 117843 8132 117878 8127->8132 8130 116b10 _free 19 API calls 8131 11785f 8130->8131 8133 117851 8132->8133 8134 11788a 8132->8134 8133->8130 8133->8131 8135 1178ba 8134->8135 8136 11788f 8134->8136 8135->8133 8143 11928a 8135->8143 8137 116bdb pre_c_initialization 19 API calls 8136->8137 8139 117898 8137->8139 8141 116b10 _free 19 API calls 8139->8141 8140 1178d5 8142 116b10 _free 19 API calls 8140->8142 8141->8133 8142->8133 8144 119295 8143->8144 8145 1192bd 8144->8145 8146 1192ae 8144->8146 8147 1192cc 8145->8147 8152 11a68f 8145->8152 8148 1173d2 _free 19 API calls 8146->8148 8159 11a6c2 8147->8159 8151 1192b3 ___scrt_fastfail 8148->8151 8151->8140 8153 11a69a 8152->8153 8154 11a6af RtlSizeHeap 8152->8154 8155 1173d2 _free 19 API calls 8153->8155 8154->8147 8156 11a69f 8155->8156 8157 1157a1 pre_c_initialization 25 API calls 8156->8157 8158 11a6aa 8157->8158 8158->8147 8160 11a6da 8159->8160 8161 11a6cf 8159->8161 8162 11a6e2 8160->8162 8169 11a6eb pre_c_initialization 8160->8169 8163 116b4a __onexit 20 API calls 8161->8163 8164 116b10 _free 19 API calls 8162->8164 8167 11a6d7 8163->8167 8164->8167 8165 11a6f0 8168 1173d2 _free 19 API calls 8165->8168 8166 11a715 RtlReAllocateHeap 8166->8167 8166->8169 8167->8151 8168->8167 8169->8165 8169->8166 8170 115815 new 7 API calls 8169->8170 8170->8169 8171 11c743 8172 11c759 8171->8172 8173 11c74d 8171->8173 8173->8172 8174 11c752 CloseHandle 8173->8174 8174->8172 8175 11c145 8177 11c16d 8175->8177 8176 11c1a5 8177->8176 8178 11c197 8177->8178 8179 11c19e 8177->8179 8184 11c217 8178->8184 8188 11c200 8179->8188 8185 11c220 8184->8185 8192 11c8ef 8185->8192 8189 11c220 8188->8189 8190 11c8ef __startOneArgErrorHandling 20 API calls 8189->8190 8191 11c1a3 8190->8191 8195 11c92e __startOneArgErrorHandling 8192->8195 8194 11c9b0 __startOneArgErrorHandling 8201 11c9da 8194->8201 8205 115aa1 8194->8205 8195->8194 8202 11ccf2 8195->8202 8197 11c9e6 8198 1125a8 CatchGuardHandler 5 API calls 8197->8198 8200 11c19c 8198->8200 8201->8197 8209 11d006 8201->8209 8216 11cd15 8202->8216 8206 115ac9 8205->8206 8207 1125a8 CatchGuardHandler 5 API calls 8206->8207 8208 115ae6 8207->8208 8208->8201 8210 11d013 8209->8210 8211 11d028 8209->8211 8212 11d02d 8210->8212 8214 1173d2 _free 19 API calls 8210->8214 8213 1173d2 _free 19 API calls 8211->8213 8212->8197 8213->8212 8215 11d020 8214->8215 8215->8197 8217 11cd40 __raise_exc 8216->8217 8218 11cf39 RaiseException 8217->8218 8219 11cd10 8218->8219 8219->8194 8220 112944 8221 1129aa std::exception::exception 26 API calls 8220->8221 8222 112952 8221->8222 8759 11b9c6 IsProcessorFeaturePresent 8223 114e48 8224 1125a8 CatchGuardHandler 5 API calls 8223->8224 8225 114e5a 8224->8225 8226 113f10 ___InternalCxxFrameHandler 48 API calls 8225->8226 8227 114e73 8226->8227 8760 113ec8 8762 113e7b __CallSettingFrame@12 8760->8762 8761 113efc ___FrameUnwindToState 45 API calls 8761->8762 8762->8761 8763 116a7a _unexpected 36 API calls 8762->8763 8764 113eed CallCatchBlock 8762->8764 8763->8762 8765 113ccc 8766 116a7a _unexpected 36 API calls 8765->8766 8767 113cd4 8766->8767 8231 11b671 8233 11b695 8231->8233 8232 11b771 __startOneArgErrorHandling 8238 11c4ad __startOneArgErrorHandling 8232->8238 8249 11ca44 8232->8249 8233->8232 8234 11b6e6 8233->8234 8235 11b6f8 8234->8235 8239 11c253 8234->8239 8240 11c270 RtlDecodePointer 8239->8240 8241 11c280 8239->8241 8240->8241 8242 11c30d 8241->8242 8245 11c302 8241->8245 8247 11c2b7 8241->8247 8242->8245 8246 1173d2 _free 19 API calls 8242->8246 8243 1125a8 CatchGuardHandler 5 API calls 8244 11c467 8243->8244 8244->8235 8245->8243 8246->8245 8247->8245 8248 1173d2 _free 19 API calls 8247->8248 8248->8245 8250 11ca7d __startOneArgErrorHandling 8249->8250 8251 11cd15 __raise_exc RaiseException 8250->8251 8253 11caa4 __startOneArgErrorHandling 8250->8253 8251->8253 8252 11cae7 8255 11d006 __startOneArgErrorHandling 19 API calls 8252->8255 8253->8252 8254 11cac2 8253->8254 8260 11d035 8254->8260 8257 11cae2 __startOneArgErrorHandling 8255->8257 8258 1125a8 CatchGuardHandler 5 API calls 8257->8258 8259 11cb0b 8258->8259 8259->8238 8261 11d044 8260->8261 8262 11d063 __startOneArgErrorHandling 8261->8262 8263 11d0b8 __startOneArgErrorHandling 8261->8263 8265 115aa1 __startOneArgErrorHandling 5 API calls 8262->8265 8264 11d006 __startOneArgErrorHandling 19 API calls 8263->8264 8268 11d0b1 8264->8268 8266 11d0a4 8265->8266 8267 11d006 __startOneArgErrorHandling 19 API calls 8266->8267 8266->8268 8267->8268 8268->8257 8771 1125f1 8772 1125f9 pre_c_initialization 8771->8772 8789 1163e8 8772->8789 8774 112604 pre_c_initialization 8796 112afc 8774->8796 8776 11268d 8777 112dc9 ___scrt_fastfail 4 API calls 8776->8777 8779 112694 ___scrt_initialize_default_local_stdio_options 8777->8779 8778 112619 __RTC_Initialize 8778->8776 8801 112c9d 8778->8801 8781 112632 pre_c_initialization 8781->8776 8782 112643 8781->8782 8804 112d5b RtlInitializeSListHead 8782->8804 8784 112648 pre_c_initialization __except_handler4 8805 112d67 8784->8805 8786 11266b pre_c_initialization 8811 116482 8786->8811 8788 112676 pre_c_initialization 8790 1163f7 8789->8790 8791 11641a 8789->8791 8790->8791 8792 1173d2 _free 19 API calls 8790->8792 8791->8774 8793 11640a 8792->8793 8794 1157a1 pre_c_initialization 25 API calls 8793->8794 8795 116415 8794->8795 8795->8774 8797 112b0a 8796->8797 8800 112b0f ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 8796->8800 8798 112dc9 ___scrt_fastfail 4 API calls 8797->8798 8797->8800 8799 112b92 8798->8799 8800->8778 8818 112c62 8801->8818 8804->8784 8856 116a1b 8805->8856 8807 112d78 8808 112d7f 8807->8808 8809 112dc9 ___scrt_fastfail 4 API calls 8807->8809 8808->8786 8810 112d87 8809->8810 8812 11702e pre_c_initialization 36 API calls 8811->8812 8813 11648d 8812->8813 8814 1164c5 8813->8814 8815 1173d2 _free 19 API calls 8813->8815 8814->8788 8816 1164ba 8815->8816 8817 1157a1 pre_c_initialization 25 API calls 8816->8817 8817->8814 8819 112c86 8818->8819 8820 112c7f 8818->8820 8827 1168e2 8819->8827 8824 116872 8820->8824 8823 112c84 8823->8781 8825 1168e2 __onexit 28 API calls 8824->8825 8826 116884 8825->8826 8826->8823 8830 1165e9 8827->8830 8833 11651f 8830->8833 8832 11660d 8832->8823 8834 11652b CallCatchBlock 8833->8834 8841 1171be RtlEnterCriticalSection 8834->8841 8836 116539 8842 116731 8836->8842 8838 116546 8852 116564 8838->8852 8840 116557 CallCatchBlock 8840->8832 8841->8836 8843 116747 pre_c_initialization __crt_fast_encode_pointer 8842->8843 8844 11674f 8842->8844 8843->8838 8844->8843 8845 11928a __onexit 28 API calls 8844->8845 8851 1167a8 8844->8851 8847 11679e 8845->8847 8846 11928a __onexit 28 API calls 8848 1167be 8846->8848 8849 116b10 _free 19 API calls 8847->8849 8850 116b10 _free 19 API calls 8848->8850 8849->8851 8850->8843 8851->8843 8851->8846 8855 117206 RtlLeaveCriticalSection 8852->8855 8854 11656e 8854->8840 8855->8854 8857 116a39 pre_c_initialization 8856->8857 8860 116a59 pre_c_initialization 8856->8860 8858 1173d2 _free 19 API calls 8857->8858 8859 116a4f 8858->8859 8861 1157a1 pre_c_initialization 25 API calls 8859->8861 8860->8807 8861->8860 8862 113df3 8863 113d40 8862->8863 8865 113d58 ___BuildCatchObject CallCatchBlock ___AdjustPointer 8862->8865 8864 116a7a _unexpected 36 API calls 8863->8864 8863->8865 8864->8863 8275 116977 8276 1148df ___vcrt_uninitialize 6 API calls 8275->8276 8277 11697e 8276->8277 8278 11717d 8279 117188 8278->8279 8280 11842b 10 API calls 8279->8280 8281 1171b1 8279->8281 8283 1171ad 8279->8283 8280->8279 8284 1171d5 8281->8284 8285 117201 8284->8285 8286 1171e2 8284->8286 8285->8283 8287 1171ec RtlDeleteCriticalSection 8286->8287 8287->8285 8287->8287 8869 1173fd 8870 11741d 8869->8870 8875 117433 8869->8875 8871 1173d2 _free 19 API calls 8870->8871 8872 117422 8871->8872 8873 1157a1 pre_c_initialization 25 API calls 8872->8873 8884 11742c 8873->8884 8874 1174a8 8898 115da4 8874->8898 8875->8874 8882 1175a1 8875->8882 8889 1175ca 8875->8889 8878 11751f 8880 116b10 _free 19 API calls 8878->8880 8879 1125a8 CatchGuardHandler 5 API calls 8881 1175b9 8879->8881 8880->8882 8904 11781e 8882->8904 8884->8879 8885 117516 8885->8878 8886 1175bd 8885->8886 8887 1157ce pre_c_initialization 11 API calls 8886->8887 8888 1175c9 8887->8888 8890 1175da 8889->8890 8891 116bdb pre_c_initialization 19 API calls 8890->8891 8892 11760c 8891->8892 8893 1157ce pre_c_initialization 11 API calls 8892->8893 8894 117667 ___scrt_fastfail 8893->8894 8895 117729 FindFirstFileExW 8894->8895 8896 117778 8895->8896 8897 1175ca 25 API calls 8896->8897 8899 115db9 8898->8899 8900 115db5 8898->8900 8899->8900 8901 116bdb pre_c_initialization 19 API calls 8899->8901 8900->8885 8902 115de7 8901->8902 8903 116b10 _free 19 API calls 8902->8903 8903->8900 8908 117828 8904->8908 8905 117838 8907 116b10 _free 19 API calls 8905->8907 8906 116b10 _free 19 API calls 8906->8908 8909 11783f 8907->8909 8908->8905 8908->8906 8909->8884 8910 115aff 8911 115b2a GetModuleFileNameW 8910->8911 8912 115b0e 8910->8912 8917 115b50 8911->8917 8912->8911 8913 115b14 8912->8913 8914 1173d2 _free 19 API calls 8913->8914 8915 115b19 8914->8915 8916 1157a1 pre_c_initialization 25 API calls 8915->8916 8918 115b23 8916->8918 8919 115da4 19 API calls 8917->8919 8920 115b7a 8919->8920 8921 115b83 8920->8921 8924 115b8f 8920->8924 8922 1173d2 _free 19 API calls 8921->8922 8926 115b88 8922->8926 8923 116b10 _free 19 API calls 8923->8918 8924->8924 8925 116b10 _free 19 API calls 8924->8925 8924->8926 8925->8926 8926->8923 8927 111eff 8930 112090 8927->8930 8929 111f13 8931 1120a2 8930->8931 8932 11209a 8930->8932 8933 1120e0 8931->8933 8934 1120a9 8931->8934 8932->8929 8935 1132dd Concurrency::cancel_current_task RaiseException 8933->8935 8936 1120d1 8934->8936 8937 1120b2 8934->8937 8938 1120e5 8935->8938 8940 1125b9 new 21 API calls 8936->8940 8937->8938 8939 1120b9 8937->8939 8942 1132dd Concurrency::cancel_current_task RaiseException 8938->8942 8943 1125b9 new 21 API calls 8939->8943 8941 1120d7 8940->8941 8941->8929 8944 1120ea 8942->8944 8945 1120bf 8943->8945 8945->8929 8288 11b561 8289 11b581 8288->8289 8292 11b5b8 8289->8292 8291 11b5ab 8293 11b5bf 8292->8293 8294 11b620 8293->8294 8298 11b5df 8293->8298 8295 11c217 20 API calls 8294->8295 8296 11c10e 8294->8296 8297 11b66e 8295->8297 8296->8291 8297->8291 8298->8296 8299 11c217 20 API calls 8298->8299 8300 11c13e 8299->8300 8300->8291 8301 114660 8312 114620 8301->8312 8313 114632 8312->8313 8314 11463f 8312->8314 8315 1125a8 CatchGuardHandler 5 API calls 8313->8315 8315->8314 8946 11b9e0 8949 11b9fe 8946->8949 8948 11b9f6 8950 11ba03 8949->8950 8951 11c253 20 API calls 8950->8951 8952 11ba98 8950->8952 8953 11bc2f 8951->8953 8952->8948 8953->8948 8954 117de5 8955 117ce3 49 API calls 8954->8955 8956 117df6 8955->8956 8957 1127e8 8958 1162a9 _abort GetModuleHandleW 8957->8958 8959 1127f0 8958->8959 8960 1127fc 8959->8960 8961 116384 _abort 26 API calls 8959->8961 8963 112807 CallCatchBlock 8960->8963 8964 116366 8960->8964 8961->8960 8965 11614f _abort 26 API calls 8964->8965 8966 116371 8965->8966 8966->8963 8316 11c46b 8317 11c484 __startOneArgErrorHandling 8316->8317 8318 11c4ad __startOneArgErrorHandling 8317->8318 8319 11ca44 20 API calls 8317->8319 8319->8318

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 111000-1110a3 call 111a90 call 114940 SHGetFolderPathW 5 1110a9-1110cd 0->5 6 1114cb-1114d4 call 111960 0->6 7 1110d3-1110dc 5->7 8 1110cf-1110d1 5->8 12 1114d9-1114e2 6->12 11 1110e0-1110e9 7->11 10 1110ef-111129 call 111a90 call 1120f0 8->10 24 11112b-111134 10->24 25 11116c-111179 10->25 11->11 13 1110eb-1110ed 11->13 15 1114f1-11150e call 1125a8 12->15 16 1114e4-1114e5 12->16 13->10 19 1114e6-1114ec call 111c00 16->19 19->15 26 111143-111167 call 111b90 24->26 27 111136-11113e call 111c00 24->27 28 111188-1111a7 PathFileExistsW 25->28 29 11117b-111183 call 111c00 25->29 26->25 27->26 33 111202-111254 call 1120f0 call 112200 PathFileExistsW 28->33 34 1111a9-1111c0 call 111960 28->34 29->28 45 111256-111282 MoveFileExW 33->45 46 111288-1112a1 PathFileExistsW 33->46 40 1111c2-1111ca call 111c00 34->40 41 1111cf-1111f5 34->41 40->41 41->15 42 1111fb-1111fd 41->42 42->19 45->46 47 1112a7-1112dd LoadLibraryW 46->47 48 11141c-111433 call 111960 46->48 50 111339-11134b 47->50 51 1112df-1112e9 GetProcAddress 47->51 56 111442-111468 48->56 57 111435-11143d call 111c00 48->57 53 111351-11137b LoadLibraryW 50->53 54 111307-111337 51->54 55 1112eb-111305 51->55 58 1113b7-1113bd 53->58 59 11137d-111387 GetProcAddress 53->59 54->53 55->53 62 111477-11149d 56->62 63 11146a-111472 call 111c00 56->63 57->56 67 1113c3-1113c9 58->67 64 111389-11139b 59->64 65 11139d-1113b5 59->65 71 1114ac-1114c9 62->71 72 11149f-1114a7 call 111c00 62->72 63->62 64->67 65->67 68 111414-11141a 67->68 69 1113cb 67->69 78 1113db-11140f call 111960 call 111920 * 4 68->78 73 1113d5 69->73 74 1113cd-1113d3 69->74 71->12 72->71 73->78 74->68 74->73 78->15
                              APIs
                              • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 0011109B
                              • PathFileExistsW.KERNELBASE(?,?), ref: 001111A3
                              • PathFileExistsW.SHLWAPI(?), ref: 00111250
                              • MoveFileExW.KERNEL32(?,?,00000001), ref: 00111282
                              • PathFileExistsW.SHLWAPI(?), ref: 0011129D
                              • LoadLibraryW.KERNEL32(?), ref: 001112CD
                              • GetProcAddress.KERNEL32(00000000,ver), ref: 001112E5
                              • FreeLibrary.KERNEL32(?), ref: 001112FF
                              • FreeLibrary.KERNEL32(?), ref: 00111331
                              • LoadLibraryW.KERNEL32(?), ref: 00111371
                              • GetProcAddress.KERNEL32(00000000,ver), ref: 00111383
                              • FreeLibrary.KERNEL32(?), ref: 00111395
                              • FreeLibrary.KERNEL32(?), ref: 001113AF
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: Library$FileFreePath$Exists$AddressLoadProc$FolderMove
                              • String ID: \Nero\Transfer\Update\$drivespan.dll$new_drivespan.dll$ver$#v
                              • API String ID: 2307531666-1653122281
                              • Opcode ID: f7b9afed8dd090d46f702cec596a34712920e5dfcbe67a1d4f33f564128a15bf
                              • Instruction ID: 9765cf6fedd90a9302ed01ed8254494b3d11d4e5e3b96570038ed1d0955a92dd
                              • Opcode Fuzzy Hash: f7b9afed8dd090d46f702cec596a34712920e5dfcbe67a1d4f33f564128a15bf
                              • Instruction Fuzzy Hash: E4D12374955228AADF68DB24CC98BEDB7B9FB18700F1041E9E519A2250DB34AFC5CF60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 91 1117a0-1117ee InitCommonControlsEx 92 1117f0-1117f2 91->92 93 1117f4-1117f9 91->93 94 11180f-111831 call 111a90 call 1122e0 92->94 95 111800-111809 93->95 101 111833-111839 call 111c00 94->101 102 11183e-111840 94->102 95->95 96 11180b-11180d 95->96 96->94 101->102 104 111842 call 111510 102->104 105 111847-111869 call 111000 LoadLibraryW 102->105 104->105 109 11186b-11187b call 1122e0 105->109 110 11188e-11189c GetProcAddress 105->110 112 1118a8-1118b6 109->112 115 11187d-11188c LoadLibraryW 109->115 110->112 113 11189e-1118a2 110->113 118 1118c3-1118d5 call 1125a8 112->118 119 1118b8-1118be call 111c00 112->119 116 1118a5 113->116 115->110 115->112 116->112 119->118
                              APIs
                              • InitCommonControlsEx.COMCTL32 ref: 001117CE
                              • LoadLibraryW.KERNELBASE(?,?,?,?,-Restart,?,?), ref: 0011185F
                              • LoadLibraryW.KERNEL32(drivespan.dll,drivespan.dll,?,?,?,-Restart,?,?), ref: 00111882
                              • GetProcAddress.KERNEL32(00000000,run), ref: 00111894
                              • FreeLibrary.KERNEL32(00000000,?,?,?,-Restart,?,?), ref: 001118A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: Library$Load$AddressCommonControlsFreeInitProc
                              • String ID: -Restart$drivespan.dll$run$#v
                              • API String ID: 1924428465-3485967269
                              • Opcode ID: 67d8b612f18054a584e856e3bc4b4cd690acad7bab4e78544687eada85d29140
                              • Instruction ID: 0533dfdc9ec023d8f40f61836a4835031dc1d88d1c7b3fc053f2cbd2389f5d5c
                              • Opcode Fuzzy Hash: 67d8b612f18054a584e856e3bc4b4cd690acad7bab4e78544687eada85d29140
                              • Instruction Fuzzy Hash: 0F31AD31514311AFC318AB20D845AAFB7E5FF99341F00893CF99692190EB34DA95CBA2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 123 118654-118661 call 116bdb 125 118666-118671 123->125 126 118673-118675 125->126 127 118677-11867f 125->127 128 1186bf-1186cd call 116b10 126->128 127->128 129 118681-118685 127->129 130 118687-1186b9 call 11842b 129->130 135 1186bb-1186be 130->135 135->128
                              APIs
                                • Part of subcall function 00116BDB: RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 00116C1C
                              • _free.LIBCMT ref: 001186C0
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: d3ebc13b0ebbb74cb065b0f551faa43160cc8f1f2a8b1336f13c8a4004e98a34
                              • Instruction ID: e60028d6c0018f5b68881d21e66ebf59c78d985f30763a5118ea2b8ed9606635
                              • Opcode Fuzzy Hash: d3ebc13b0ebbb74cb065b0f551faa43160cc8f1f2a8b1336f13c8a4004e98a34
                              • Instruction Fuzzy Hash: 31012672204305ABE3298F659881D9AFBD9EB95370F25052DE58483280EF31A845C664

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 136 116bdb-116be6 137 116bf4-116bfa 136->137 138 116be8-116bf2 136->138 140 116c13-116c24 RtlAllocateHeap 137->140 141 116bfc-116bfd 137->141 138->137 139 116c28-116c33 call 1173d2 138->139 146 116c35-116c37 139->146 142 116c26 140->142 143 116bff-116c06 call 1164e4 140->143 141->140 142->146 143->139 149 116c08-116c11 call 115815 143->149 149->139 149->140
                              APIs
                              • RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 00116C1C
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 154a1d4e4747019ca817ee4bd1e9f9699052a1482f13142cf5c34be3ed4824c8
                              • Instruction ID: e27ecdb8cdb1a2291cad67ebd894d78f1ae25963a2a900427301921abd0c2442
                              • Opcode Fuzzy Hash: 154a1d4e4747019ca817ee4bd1e9f9699052a1482f13142cf5c34be3ed4824c8
                              • Instruction Fuzzy Hash: FAF0E931209625EADB3D5B229C01BDB7B98EF51770B158035BC58D7191CF32D8C186E1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 336 111510-111576 GetModuleFileNameW 337 111578-11157a 336->337 338 11157c-111582 336->338 339 111594-1115f5 call 111a90 call 1119f0 call 1118e0 337->339 340 111585-11158e 338->340 348 1115f7-111600 339->348 349 111638-111641 339->349 340->340 341 111590-111592 340->341 341->339 350 111602-11160a call 111c00 348->350 351 11160f-111633 call 111b90 348->351 352 111650-11166a GetCurrentProcessId 349->352 353 111643-11164b call 111c00 349->353 350->351 351->349 357 111670-111673 352->357 353->352 358 111754-111768 Sleep 357->358 359 111679-1116a7 Process32FirstW 357->359 360 111777-111792 call 1125a8 358->360 361 11176a-111772 call 111c00 358->361 365 11173a-11174e CloseHandle 359->365 366 1116ad-1116ba Process32NextW 359->366 361->360 365->357 365->358 366->365 368 1116c0-1116da 366->368 369 1116e0-1116e6 368->369 370 111706-111708 369->370 371 1116e8-1116eb 369->371 374 11170b-11170d 370->374 372 111702-111704 371->372 373 1116ed-1116f5 371->373 372->374 373->370 375 1116f7-111700 373->375 376 111717-111724 Process32NextW 374->376 377 11170f-111715 374->377 375->369 375->372 376->368 379 111726 376->379 377->376 378 111728-111734 Sleep 377->378 378->365 379->365
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000100,E53082D2), ref: 0011154C
                              • GetCurrentProcessId.KERNEL32(?,00000001,-00000001,?), ref: 00111650
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0011168E
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0011169E
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 001116B5
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0011171F
                              • Sleep.KERNEL32(00000064), ref: 00111734
                              • CloseHandle.KERNEL32(00000000), ref: 0011173B
                              • Sleep.KERNEL32(000000C8), ref: 00111759
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: Process32$NextSleep$CloseCreateCurrentFileFirstHandleModuleNameProcessSnapshotToolhelp32
                              • String ID: A#v$\
                              • API String ID: 8921262-2721266983
                              • Opcode ID: 80847f95094aef6a907908f3a767f44509602fdab57f1d694a2360f4f18da494
                              • Instruction ID: 3a16712415ccb573e3e7ffa21968a25df06fc830474a8fb1b8e4ac9102a06c88
                              • Opcode Fuzzy Hash: 80847f95094aef6a907908f3a767f44509602fdab57f1d694a2360f4f18da494
                              • Instruction Fuzzy Hash: 6B61A075900119AADB28EB60CD89BE9B7B9FF19304F0041E9E60AE2291E7355FC5CF64
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0011330B), ref: 001156CF
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0011330B), ref: 001156D9
                              • UnhandledExceptionFilter.KERNEL32(00000016,?,?,?,?,?,0011330B), ref: 001156E6
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: f861820707063993c3494ce4dc153da29c56cfc366f4176024e06e75548971fd
                              • Instruction ID: 102fa33d7d40bbc53922b7794fa811dea68d59282d1dc5829143ce59546a564c
                              • Opcode Fuzzy Hash: f861820707063993c3494ce4dc153da29c56cfc366f4176024e06e75548971fd
                              • Instruction Fuzzy Hash: 8D31B174901228ABCB25DF64D9897CDBBB9AF58710F5041EAE80CA7291EB309BC58F45
                              APIs
                              • GetCurrentProcess.KERNEL32(00000003,?,0011623E,00000003,00124638,0000000C,00116395,00000003,00000002,00000000,?,00116BDA,00000003), ref: 00116289
                              • TerminateProcess.KERNEL32(00000000,?,0011623E,00000003,00124638,0000000C,00116395,00000003,00000002,00000000,?,00116BDA,00000003), ref: 00116290
                              • ExitProcess.KERNEL32 ref: 001162A2
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: f678fffb91e246f1b5a99ef1c6cbd39b4cd5f79781936fd24f58c379de64c54f
                              • Instruction ID: 553375e9fcfee6ccc0f7a4ffeb0f9941f4a7dfd74a3643d519fced9c722a6fce
                              • Opcode Fuzzy Hash: f678fffb91e246f1b5a99ef1c6cbd39b4cd5f79781936fd24f58c379de64c54f
                              • Instruction Fuzzy Hash: D7E0BF31400558ABDF196F54DE09AD93BAAEB58391F008438F90586532DB36EDC2CA50
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID:
                              • String ID: /
                              • API String ID: 0-2043925204
                              • Opcode ID: 3d3a3739f7b8c0bb4d399be11562dfdf1fb421bb1d1b150646e7d5d8126463f8
                              • Instruction ID: 3bf3d98f51a8682f693ff7295a0c0b09db19d56ffa77f2b4ea44d015bd5d3cc0
                              • Opcode Fuzzy Hash: 3d3a3739f7b8c0bb4d399be11562dfdf1fb421bb1d1b150646e7d5d8126463f8
                              • Instruction Fuzzy Hash: 26410376904619ABDB289F79CC89EEB77B9EB84710F104278F905972C0E7309EC1CB64
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0011CD10,?,?,00000008,?,?,0011C9B0,00000000), ref: 0011CF42
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 58c64a8cb825e8c4678ccbb8d437b2e053bfc4ddc7ee4b44b729bc787cae77e0
                              • Instruction ID: a874a21068b77befd05931455f74e53e18a7e620de2a77daca06da090dfd387b
                              • Opcode Fuzzy Hash: 58c64a8cb825e8c4678ccbb8d437b2e053bfc4ddc7ee4b44b729bc787cae77e0
                              • Instruction Fuzzy Hash: 75B12E31650609DFD719CF28C486BA57FE1FF45364F258668E89ACF2A1C335E992CB80
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00002F23,001126A2), ref: 00112F1C
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: d23073e1e6c101878ec1fd4645430fc34405e1c0f1f6323072fd3f6b958aa81a
                              • Instruction ID: c557d3ef8a811bdb1c48e23c196f00985b7a9b661a8c8c1983d811096437586f
                              • Opcode Fuzzy Hash: d23073e1e6c101878ec1fd4645430fc34405e1c0f1f6323072fd3f6b958aa81a
                              • Instruction Fuzzy Hash:
                              APIs
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: 9509fadf51058f0344a4b876c44cd6288407936b5c4af2793983f2d6cb037f48
                              • Instruction ID: cc241a306acef957578da4c6a70d0672341315d935a9f1884508a888bc9cd162
                              • Opcode Fuzzy Hash: 9509fadf51058f0344a4b876c44cd6288407936b5c4af2793983f2d6cb037f48
                              • Instruction Fuzzy Hash: DFA01230204240DB4300CF30AA452493794670459030840285800C0460D62040D16600

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 279 118f76-118f8a 280 118ff8-119000 279->280 281 118f8c-118f91 279->281 282 119002-119005 280->282 283 119047-11905f call 1190e9 280->283 281->280 284 118f93-118f98 281->284 282->283 285 119007-119044 call 116b10 * 4 282->285 292 119062-119069 283->292 284->280 287 118f9a-118f9d 284->287 285->283 287->280 290 118f9f-118fa7 287->290 293 118fc1-118fc9 290->293 294 118fa9-118fac 290->294 298 119088-11908c 292->298 299 11906b-11906f 292->299 296 118fe3-118ff7 call 116b10 * 2 293->296 297 118fcb-118fce 293->297 294->293 300 118fae-118fc0 call 116b10 call 118af0 294->300 296->280 297->296 305 118fd0-118fe2 call 116b10 call 118bee 297->305 306 1190a4-1190b0 298->306 307 11908e-119093 298->307 301 119071-119074 299->301 302 119085 299->302 300->293 301->302 309 119076-119084 call 116b10 * 2 301->309 302->298 305->296 306->292 316 1190b2-1190bf call 116b10 306->316 313 1190a1 307->313 314 119095-119098 307->314 309->302 313->306 314->313 322 11909a-1190a0 call 116b10 314->322 322->313
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 00118FBA
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B0D
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B1F
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B31
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B43
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B55
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B67
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B79
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B8B
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118B9D
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118BAF
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118BC1
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118BD3
                                • Part of subcall function 00118AF0: _free.LIBCMT ref: 00118BE5
                              • _free.LIBCMT ref: 00118FAF
                                • Part of subcall function 00116B10: HeapFree.KERNEL32(00000000,00000000,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?), ref: 00116B26
                                • Part of subcall function 00116B10: GetLastError.KERNEL32(?,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?,?), ref: 00116B38
                              • _free.LIBCMT ref: 00118FD1
                              • _free.LIBCMT ref: 00118FE6
                              • _free.LIBCMT ref: 00118FF1
                              • _free.LIBCMT ref: 00119013
                              • _free.LIBCMT ref: 00119026
                              • _free.LIBCMT ref: 00119034
                              • _free.LIBCMT ref: 0011903F
                              • _free.LIBCMT ref: 00119077
                              • _free.LIBCMT ref: 0011907E
                              • _free.LIBCMT ref: 0011909B
                              • _free.LIBCMT ref: 001190B3
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 88c7c4a2b19c57ac6e581e848b56327d2735d340900cb0f91c7b3a8424c85b85
                              • Instruction ID: 0d91526d68b9a4256a01df274cc2051254a382a12367f0fa1830fef770fa3309
                              • Opcode Fuzzy Hash: 88c7c4a2b19c57ac6e581e848b56327d2735d340900cb0f91c7b3a8424c85b85
                              • Instruction Fuzzy Hash: BA313732704601AFEB28AA38E855BDA73E9AF14350F108839F468D7191DF36EDD0CB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 380 116f39-116f4a 381 116f56-116fe1 call 116b10 * 9 call 116dff call 116e4f 380->381 382 116f4c-116f55 call 116b10 380->382 382->381
                              APIs
                              • _free.LIBCMT ref: 00116F4D
                                • Part of subcall function 00116B10: HeapFree.KERNEL32(00000000,00000000,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?), ref: 00116B26
                                • Part of subcall function 00116B10: GetLastError.KERNEL32(?,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?,?), ref: 00116B38
                              • _free.LIBCMT ref: 00116F59
                              • _free.LIBCMT ref: 00116F64
                              • _free.LIBCMT ref: 00116F6F
                              • _free.LIBCMT ref: 00116F7A
                              • _free.LIBCMT ref: 00116F85
                              • _free.LIBCMT ref: 00116F90
                              • _free.LIBCMT ref: 00116F9B
                              • _free.LIBCMT ref: 00116FA6
                              • _free.LIBCMT ref: 00116FB4
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 18d1231d0a75fa3595bc7754ead4933e02609548afb81c581e7f7f5625aeed87
                              • Instruction ID: bd1fe43655bacc098caede1ca4f22893632622c48c9363cda4af03da68d76ef3
                              • Opcode Fuzzy Hash: 18d1231d0a75fa3595bc7754ead4933e02609548afb81c581e7f7f5625aeed87
                              • Instruction Fuzzy Hash: A0117476714108FFCB09EF94E952DDA3BA5EF14390B5145B5BA088F222DB32DE90DB84

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 407 11a33f-11a358 408 11a35a-11a36a call 11ab48 407->408 409 11a36e-11a373 407->409 408->409 416 11a36c 408->416 411 11a380-11a3a4 MultiByteToWideChar 409->411 412 11a375-11a37d 409->412 414 11a537-11a54a call 1125a8 411->414 415 11a3aa-11a3b6 411->415 412->411 417 11a3b8-11a3c9 415->417 418 11a40a 415->418 416->409 421 11a3e8-11a3f9 call 116b4a 417->421 422 11a3cb-11a3da call 11d5b0 417->422 420 11a40c-11a40e 418->420 424 11a414-11a427 MultiByteToWideChar 420->424 425 11a52c 420->425 421->425 432 11a3ff 421->432 422->425 435 11a3e0-11a3e6 422->435 424->425 428 11a42d-11a448 call 11848d 424->428 429 11a52e-11a535 call 118ed9 425->429 428->425 439 11a44e-11a455 428->439 429->414 436 11a405-11a408 432->436 435->436 436->420 440 11a457-11a45c 439->440 441 11a48f-11a49b 439->441 440->429 444 11a462-11a464 440->444 442 11a4e7 441->442 443 11a49d-11a4ae 441->443 447 11a4e9-11a4eb 442->447 445 11a4b0-11a4bf call 11d5b0 443->445 446 11a4c9-11a4da call 116b4a 443->446 444->425 448 11a46a-11a484 call 11848d 444->448 451 11a525-11a52b call 118ed9 445->451 459 11a4c1-11a4c7 445->459 446->451 461 11a4dc 446->461 447->451 452 11a4ed-11a506 call 11848d 447->452 448->429 463 11a48a 448->463 451->425 452->451 465 11a508-11a50f 452->465 464 11a4e2-11a4e5 459->464 461->464 463->425 464->447 466 11a511-11a512 465->466 467 11a54b-11a551 465->467 468 11a513-11a523 WideCharToMultiByte 466->468 467->468 468->451 469 11a553-11a55a call 118ed9 468->469 469->429
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,0011A590,?,?,00000000), ref: 0011A399
                              • __alloca_probe_16.LIBCMT ref: 0011A3D1
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,0011A590,?,?,00000000,?,?,?), ref: 0011A41F
                              • __alloca_probe_16.LIBCMT ref: 0011A4B6
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0011A519
                              • __freea.LIBCMT ref: 0011A526
                                • Part of subcall function 00116B4A: RtlAllocateHeap.NTDLL(00000000,0011330B,?), ref: 00116B7C
                              • __freea.LIBCMT ref: 0011A52F
                              • __freea.LIBCMT ref: 0011A554
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID:
                              • API String ID: 3864826663-0
                              • Opcode ID: 5509558f9e19071e36100fd55e7b851d1db0bacdd017f9e6304b136e12f490be
                              • Instruction ID: 72458b7b6d5bce7240f0a191849914b866d1aa23bdbe80ef66a88f685f8c5c1c
                              • Opcode Fuzzy Hash: 5509558f9e19071e36100fd55e7b851d1db0bacdd017f9e6304b136e12f490be
                              • Instruction Fuzzy Hash: 3351DC72612216AFDB2D8E64DC41EFB7BAAEF44710B594239FD05D6141EB34DCC0C6A2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 472 11ac93-11acf0 GetConsoleCP 473 11ae33-11ae45 call 1125a8 472->473 474 11acf6-11ad12 472->474 476 11ad14-11ad2b 474->476 477 11ad2d-11ad3e call 118aca 474->477 479 11ad67-11ad76 call 119c7c 476->479 484 11ad40-11ad43 477->484 485 11ad64-11ad66 477->485 479->473 486 11ad7c-11ad9c WideCharToMultiByte 479->486 487 11ad49-11ad5b call 119c7c 484->487 488 11ae0a-11ae29 484->488 485->479 486->473 489 11ada2-11adb8 WriteFile 486->489 487->473 494 11ad61-11ad62 487->494 488->473 491 11ae2b-11ae31 GetLastError 489->491 492 11adba-11adcb 489->492 491->473 492->473 495 11adcd-11add1 492->495 494->486 496 11add3-11adf1 WriteFile 495->496 497 11adff-11ae02 495->497 496->491 498 11adf3-11adf7 496->498 497->474 499 11ae08 497->499 498->473 500 11adf9-11adfc 498->500 499->473 500->497
                              APIs
                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,0011B408,?,00000000,?,00000000,00000000), ref: 0011ACD5
                              • __fassign.LIBCMT ref: 0011AD50
                              • __fassign.LIBCMT ref: 0011AD6B
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 0011AD91
                              • WriteFile.KERNEL32(?,?,00000000,0011B408,00000000,?,?,?,?,?,?,?,?,?,0011B408,?), ref: 0011ADB0
                              • WriteFile.KERNEL32(?,?,00000001,0011B408,00000000,?,?,?,?,?,?,?,?,?,0011B408,?), ref: 0011ADE9
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: 2a9386363752069c64f88583acc3c9605b4c1f7f3582e24771bf13d3ced8df47
                              • Instruction ID: 0765a69513da1f6a72cda2644989b53275a87e52a7446665f43197a87a88efd5
                              • Opcode Fuzzy Hash: 2a9386363752069c64f88583acc3c9605b4c1f7f3582e24771bf13d3ced8df47
                              • Instruction Fuzzy Hash: E851E671D01249AFCF18CFA8DC95AEEBBF9EF09300F14412AE955E7291D7309991CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 501 118c93-118c9e 502 118d74-118d76 501->502 503 118ca4-118d71 call 118c57 * 5 call 116b10 * 3 call 118c57 * 5 call 116b10 * 4 501->503 503->502
                              APIs
                                • Part of subcall function 00118C57: _free.LIBCMT ref: 00118C80
                              • _free.LIBCMT ref: 00118CE1
                                • Part of subcall function 00116B10: HeapFree.KERNEL32(00000000,00000000,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?), ref: 00116B26
                                • Part of subcall function 00116B10: GetLastError.KERNEL32(?,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?,?), ref: 00116B38
                              • _free.LIBCMT ref: 00118CEC
                              • _free.LIBCMT ref: 00118CF7
                              • _free.LIBCMT ref: 00118D4B
                              • _free.LIBCMT ref: 00118D56
                              • _free.LIBCMT ref: 00118D61
                              • _free.LIBCMT ref: 00118D6C
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 0bb379ea52c51a684ff9bb70345eabbbe80e5a958499be13c44c1439a6277fea
                              • Instruction ID: 0c09cb6c0bbb88432901245aaeee1c96516957d2ef035c03748bcc89f370bde6
                              • Opcode Fuzzy Hash: 0bb379ea52c51a684ff9bb70345eabbbe80e5a958499be13c44c1439a6277fea
                              • Instruction Fuzzy Hash: E211F971745B04FADA24BBB0DC46FCB779CAF14700F408C39B299A6092DF76B5D486A4
                              APIs
                              • GetLastError.KERNEL32(?,?,00114AD7,00113E74,001244D8,00000010,0011363C,?,?,?,?,?,00000000,?), ref: 00114AEE
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00114AFC
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00114B15
                              • SetLastError.KERNEL32(00000000,00114AD7,00113E74,001244D8,00000010,0011363C,?,?,?,?,?,00000000,?), ref: 00114B67
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: a60242514fa03a707726bbe683912458ccedcb467d2a4997a3402eaa826274d5
                              • Instruction ID: 6888831e2ce06b4fa346b55e457881eac59ee1bc2044e2c987231b8b239d395b
                              • Opcode Fuzzy Hash: a60242514fa03a707726bbe683912458ccedcb467d2a4997a3402eaa826274d5
                              • Instruction Fuzzy Hash: A201D83260C711AFA73C17747C85FD66A99EF65BB57200339F125864E1EF518CD2614C
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0011629E,00000003,?,0011623E,00000003,00124638,0000000C,00116395,00000003,00000002), ref: 0011630D
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00116320
                              • FreeLibrary.KERNEL32(00000000,?,?,?,0011629E,00000003,?,0011623E,00000003,00124638,0000000C,00116395,00000003,00000002,00000000), ref: 00116343
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll$#v
                              • API String ID: 4061214504-833151533
                              • Opcode ID: bfb69301cbac7ec6b7851348c042d8ad270ac411e2fa23bd28ed7a6ea260f708
                              • Instruction ID: 2cabb5ed3b0416187cbc94a8b7cfc0955cf00a73dde772bda3bcf57b18888451
                              • Opcode Fuzzy Hash: bfb69301cbac7ec6b7851348c042d8ad270ac411e2fa23bd28ed7a6ea260f708
                              • Instruction Fuzzy Hash: B3F04F74A14208FBCB199F90DD09BDDBFB5EF48711F00417CF809A22A0DB3189C2DA94
                              APIs
                              • GetLastError.KERNEL32(?,?,00116A8B,001246C0,0000000C,00112F63), ref: 00117032
                              • _free.LIBCMT ref: 00117065
                              • _free.LIBCMT ref: 0011708D
                              • SetLastError.KERNEL32(00000000), ref: 0011709A
                              • SetLastError.KERNEL32(00000000), ref: 001170A6
                              • _abort.LIBCMT ref: 001170AC
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 67082e56c64b79f76860566fd4761d96617d1e6ac2cf130a3a2d6a7da7ae115d
                              • Instruction ID: 2fd72f45da0311f4a7c8ed950488dde452ed1cbd6c451496fa5711a12f5854d2
                              • Opcode Fuzzy Hash: 67082e56c64b79f76860566fd4761d96617d1e6ac2cf130a3a2d6a7da7ae115d
                              • Instruction Fuzzy Hash: 6FF0A435608B0066C63E73346C1ABDF262AABDA761F354234F518D23D2FF2688C25124
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,001181FC,?,00000000,00000000,00000000,?,001183F9,00000006,FlsSetValue), ref: 00118287
                              • GetLastError.KERNEL32(?,001181FC,?,00000000,00000000,00000000,?,001183F9,00000006,FlsSetValue,00120278,00120280,00000000,00000364,?,00117100), ref: 00118293
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001181FC,?,00000000,00000000,00000000,?,001183F9,00000006,FlsSetValue,00120278,00120280,00000000), ref: 001182A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID: #v
                              • API String ID: 3177248105-554117064
                              • Opcode ID: c31a4c57aab56dd7a00f69395b4b50da1c405d44ded9fd914a65c6cda4ac6583
                              • Instruction ID: abaf544180b47078bc959b59eeb7cad645c583e3bf82d073107b1b02003d862c
                              • Opcode Fuzzy Hash: c31a4c57aab56dd7a00f69395b4b50da1c405d44ded9fd914a65c6cda4ac6583
                              • Instruction Fuzzy Hash: CF01F732212A22ABC72E8BA8EC44AE67799AF09761721C634F906D3540DB30D881C6E0
                              APIs
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 40ca2a85b3ebedd0778df24ac286bbddad25dd9cda8d62b8234fe6d4ddce6632
                              • Instruction ID: b77412764d26be57a46ea49a9878c3df1c92db99bdae5dd9a5726ce331e34838
                              • Opcode Fuzzy Hash: 40ca2a85b3ebedd0778df24ac286bbddad25dd9cda8d62b8234fe6d4ddce6632
                              • Instruction Fuzzy Hash: 0541A572A00210AFCB28DF78D881A9DB7F5EF99714F154579E515EB381DB32AD41CB80
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000100,?,00000000,?,?,00000000), ref: 00118E09
                              • __alloca_probe_16.LIBCMT ref: 00118E41
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00118E92
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00118EA4
                              • __freea.LIBCMT ref: 00118EAD
                                • Part of subcall function 00116B4A: RtlAllocateHeap.NTDLL(00000000,0011330B,?), ref: 00116B7C
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 313313983-0
                              • Opcode ID: fb6176c3b33e2a63ac155d2fd5ac3ae0072a9679e241e9cd124b14250638f6d9
                              • Instruction ID: de9955d04308f9450986eb24aa3297e6d4115693889718e3311ef6bf25877a83
                              • Opcode Fuzzy Hash: fb6176c3b33e2a63ac155d2fd5ac3ae0072a9679e241e9cd124b14250638f6d9
                              • Instruction Fuzzy Hash: 9031AD72A0121AABDF289F64DC85EEF7BA5EB50710B058138FC04D6191EB35DDA1CBA0
                              APIs
                              • GetLastError.KERNEL32(0011330B,0011330B,?,001173D7,00116B8D,?,?,001147F0,?,?,00000000,?,?,0011322E,0011330B,?), ref: 001170B7
                              • _free.LIBCMT ref: 001170EC
                              • _free.LIBCMT ref: 00117113
                              • SetLastError.KERNEL32(00000000,?,0011330B), ref: 00117120
                              • SetLastError.KERNEL32(00000000,?,0011330B), ref: 00117129
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: c01e23d537b6f0242e7a02d754408976c046577b05111037590b12c59b9945b1
                              • Instruction ID: 495dff93e8507f0923cdf9ec2cfb86d4427a775af33f73c429fa0756ec195657
                              • Opcode Fuzzy Hash: c01e23d537b6f0242e7a02d754408976c046577b05111037590b12c59b9945b1
                              • Instruction Fuzzy Hash: 8001F43634CB00B7822E63346C859EF267EEBE9771B214138F915D23D2EF25C8C25024
                              APIs
                              • _free.LIBCMT ref: 00118C06
                                • Part of subcall function 00116B10: HeapFree.KERNEL32(00000000,00000000,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?), ref: 00116B26
                                • Part of subcall function 00116B10: GetLastError.KERNEL32(?,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?,?), ref: 00116B38
                              • _free.LIBCMT ref: 00118C18
                              • _free.LIBCMT ref: 00118C2A
                              • _free.LIBCMT ref: 00118C3C
                              • _free.LIBCMT ref: 00118C4E
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 69c1728f4ee483c74fc09754009e2f8711690577953299d1256d5977819af9dc
                              • Instruction ID: d482350effabe1d50d46deca91f9daedbcaf6299af1320bc87f4de5a0a129cc9
                              • Opcode Fuzzy Hash: 69c1728f4ee483c74fc09754009e2f8711690577953299d1256d5977819af9dc
                              • Instruction Fuzzy Hash: 9AF0EC72709200BB862CEB68F586DD673EEAB00710B544C29F004D7941CF25FCD18AB8
                              APIs
                              • _free.LIBCMT ref: 0011699E
                                • Part of subcall function 00116B10: HeapFree.KERNEL32(00000000,00000000,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?), ref: 00116B26
                                • Part of subcall function 00116B10: GetLastError.KERNEL32(?,?,00118C85,?,00000000,?,00000000,?,00118CAC,?,00000007,?,?,0011910E,?,?), ref: 00116B38
                              • _free.LIBCMT ref: 001169B0
                              • _free.LIBCMT ref: 001169C3
                              • _free.LIBCMT ref: 001169D4
                              • _free.LIBCMT ref: 001169E5
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 0b5c5cd3c646f88132bfb900958f437b60ca65ada373151f517f9a3accee3116
                              • Instruction ID: 7d941a6fa0dca8cb0ef8330539bae3852ebeae5dd46d2d9d52b83429ac0d556f
                              • Opcode Fuzzy Hash: 0b5c5cd3c646f88132bfb900958f437b60ca65ada373151f517f9a3accee3116
                              • Instruction Fuzzy Hash: B4F03070B09160FF8A2AAF24BC1184A37A4BB157543000516F814D26F5CB3758F7DF9D
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Contacts\Flexpcis.exe,00000104), ref: 00115B3A
                              • _free.LIBCMT ref: 00115C05
                              • _free.LIBCMT ref: 00115C0F
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Contacts\Flexpcis.exe
                              • API String ID: 2506810119-3052542024
                              • Opcode ID: 9b813e8d03f5469f6f74242b4601ac67e2b41c59265366e2243681064c2ff9e4
                              • Instruction ID: f4a852f004bc91aee4abb13c33a04bc584d4930bb1d7c0fe63d2c8876e570b8c
                              • Opcode Fuzzy Hash: 9b813e8d03f5469f6f74242b4601ac67e2b41c59265366e2243681064c2ff9e4
                              • Instruction Fuzzy Hash: AB319F71A08658EFCB29DF99D8859DEBBBEEBC5310B1040B6F80497251D7708EC5CB94
                              APIs
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00111EC4
                                • Part of subcall function 001132DD: __CxxThrowException@8.LIBVCRUNTIME ref: 001132F4
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00111ED9
                              • new.LIBCMT ref: 00111EDF
                              • new.LIBCMT ref: 00111EF3
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task$Exception@8Throw
                              • String ID:
                              • API String ID: 3339364867-0
                              • Opcode ID: 017d9c8b81e5d4f69db123a6eac26bb976ead4edc04de306e4252b5d586b20f3
                              • Instruction ID: da08ed44608f02d5380a72fe394dc176cc4ee8ace8558d12664f8ce4deb6c9cf
                              • Opcode Fuzzy Hash: 017d9c8b81e5d4f69db123a6eac26bb976ead4edc04de306e4252b5d586b20f3
                              • Instruction Fuzzy Hash: 9441C371A10601ABCB2CDF64D8816EAF7F9EB44350B100A3DE962C7690E730E989C761
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0011360E
                                • Part of subcall function 00113C46: ___AdjustPointer.LIBCMT ref: 00113C90
                              • _UnwindNestedFrames.LIBCMT ref: 00113625
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00113637
                              • CallCatchBlock.LIBVCRUNTIME ref: 0011365B
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: c818ee3c194d0a60d1f22e1fc4dc6d3ef6eda792af7de8886e093e75c8865d1b
                              • Instruction ID: 6218213cb11a698cedd69e90da8ceb6c74b6451d6afc31817db58a0c905f2cf2
                              • Opcode Fuzzy Hash: c818ee3c194d0a60d1f22e1fc4dc6d3ef6eda792af7de8886e093e75c8865d1b
                              • Instruction Fuzzy Hash: 49012932000109BBCF165F95DC01EDA7FBAFF58754F054024F92865125D732EAA1EBA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b4d3f94c81d3943c378cad470bf1a73962749ad578d4a4a79ac19c895b724af
                              • Instruction ID: ee026d5b69adce893ebc3347d31b0ac2009570b8bef61697409560a67147f6e2
                              • Opcode Fuzzy Hash: 4b4d3f94c81d3943c378cad470bf1a73962749ad578d4a4a79ac19c895b724af
                              • Instruction Fuzzy Hash: 7BF0A0B27042040AD71CF774AC669EE72998B383607104739F12AC6281FB32E9F4C559
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 001148B6
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 001148BB
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 001148C0
                                • Part of subcall function 0011514E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0011515F
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 001148D5
                              Memory Dump Source
                              • Source File: 00000006.00000002.2741089699.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                              • Associated: 00000006.00000002.2741001883.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741170201.000000000011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741237485.0000000000126000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.2741324925.0000000000128000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_110000_Flexpcis.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: e092bf8d1f2de1a436e08f72e43c775e9d4ad525a9e452ad70d54133d921d8c2
                              • Instruction ID: 6053b9a1b883a8066d39e448733b73b823d17d3c64a0c3aa603746caf52aaf50
                              • Opcode Fuzzy Hash: e092bf8d1f2de1a436e08f72e43c775e9d4ad525a9e452ad70d54133d921d8c2
                              • Instruction Fuzzy Hash: EFC04C25014E81EA1E2DBEF121122ED03021CF2F86B9525F1E89117803AB5508CA197B