Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.msi

Overview

General Information

Sample name:setup.msi
Analysis ID:1582493
MD5:0a208aa5e80a1e3a42fa60331f14907b
SHA1:418259c831d919bf0bc9f5a46eaa6b803ab1b3bf
SHA256:e218b230e70d84ca9246961436261d6435095b2c3e0df1544e5de0ecd6bd4094
Tags:kevinflansburg-comLegionLoadermsiRobotDropperuser-aachum
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Suricata IDS alerts for network traffic
AI detected suspicious sample
Bypasses PowerShell execution policy
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Msiexec Initiated Connection
Sigma detected: Suspicious MsiExec Embedding Parent
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • msiexec.exe (PID: 6660 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\setup.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6796 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7112 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • powershell.exe (PID: 5332 cmdline: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue." MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 3448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7156 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • obs-ffmpeg-mux.exe (PID: 5064 cmdline: "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe" MD5: D3CAC4D7B35BACAE314F48C374452D71)
        • conhost.exe (PID: 4888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • createdump.exe (PID: 7072 cmdline: "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe" MD5: 71F796B486C7FAF25B9B16233A7CE0CD)
      • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7112, ParentProcessName: msiexec.exe, ProcessCommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", ProcessId: 5332, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7112, ParentProcessName: msiexec.exe, ProcessCommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", ProcessId: 5332, ProcessName: powershell.exe
Source: Process startedAuthor: frack113: Data: Command: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7112, ParentProcessName: msiexec.exe, ProcessCommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", ProcessId: 5332, ProcessName: powershell.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 104.21.0.151, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7112, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: frack113: Data: Command: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7112, ParentProcessName: msiexec.exe, ProcessCommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", ProcessId: 5332, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 7112, ParentProcessName: msiexec.exe, ProcessCommandLine: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue.", ProcessId: 5332, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-30T18:14:11.975703+010028292021A Network Trojan was detected192.168.2.449730104.21.0.151443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://kevinflansburg.com/updater.phpAvira URL Cloud: Label: malware
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.2% probability
Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BF1831C0-1107-42C4-BDAA-42DC366AB277}Jump to behavior
Source: unknownHTTPS traffic detected: 104.21.0.151:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\DataUploader.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\debug\createdump\createdump.pdb source: createdump.exe, 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp, createdump.exe, 00000007.00000000.1845092597.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: C:\ReleaseAI\win\Release\bin\x86\embeddeduiproxy.pdb= source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\WinUiBootstrapperEui\WinUiBootstrapperEui.pdb)) source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: ucrtbase.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\PowerShellScriptLauncher.pdbk source: setup.msi, 48a23d.msi.1.dr, MSIC4E1.tmp.1.dr
Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: api-ms-win-core-sysinfo-l1-1-0.dll.1.dr
Source: Binary string: Microsoft.Web.WebView2.Core.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: api-ms-win-core-processenvironment-l1-1-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\DataUploader.pdbj source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcamp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vccorlib140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\WinUiBootstrapperEui\WinUiBootstrapperEui.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: api-ms-win-crt-conio-l1-1-0.dll.1.dr
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: api-ms-win-core-localization-l1-2-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\msvcp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\PowerShellScriptLauncher.pdb source: setup.msi, 48a23d.msi.1.dr, MSIC4E1.tmp.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcomp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb!! source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\a\_work\1\s\BuildOutput\Release\x86\Microsoft.UI.Xaml\Microsoft.UI.Xaml.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\vcruntime140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: api-ms-win-core-file-l1-1-0.dll.1.dr
Source: Binary string: obs-ffmpeg-mux.pdb source: obs-ffmpeg-mux.exe, 0000000A.00000000.1847584170.00007FF68FB75000.00000002.00000001.01000000.00000007.sdmp, obs-ffmpeg-mux.exe, 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmp
Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\bin\x86\embeddeduiproxy.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\debug\createdump\createdump.pdb;;;GCTL source: createdump.exe, 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp, createdump.exe, 00000007.00000000.1845092597.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: Microsoft.Web.WebView2.Core.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: ucrtbase.pdbUGP source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: setup.msi, 48a23d.msi.1.dr, MSIACCD.tmp.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

Networking

barindex
Source: Network trafficSuricata IDS: 2829202 - Severity 1 - ETPRO MALWARE MSIL/Zbrain PUP/Stealer Installer UA : 192.168.2.4:49730 -> 104.21.0.151:443
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: kevinflansburg.com
Source: unknownHTTP traffic detected: POST /updater.php HTTP/1.1Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: AdvancedInstallerHost: kevinflansburg.comContent-Length: 71Cache-Control: no-cache
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: powershell.exe, 00000003.00000002.1775603686.00000000032F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0K
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: avformat-60.dll.1.drString found in binary or memory: http://dashif.org/guidelines/trickmode
Source: powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://ocsp.digicert.com0K
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://ocsp.digicert.com0N
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: powershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://schemas.micj
Source: powershell.exe, 00000003.00000002.1776776553.00000000053F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: avformat-60.dll.1.drString found in binary or memory: http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-DASH_schema_files/DASH-MPD.xsd
Source: powershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: powershell.exe, 00000003.00000002.1776776553.00000000053F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: https://aka.ms/winui2/webview2download/Reload():
Source: powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000003.00000002.1776776553.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: https://kevinflansburg.com/updater.phpx
Source: powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: setup.msi, 48a23d.msi.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 104.21.0.151:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48a23d.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAC4F.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACCD.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACFD.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD2C.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD9B.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADCB.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADFB.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIBF80.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{BF1831C0-1107-42C4-BDAA-42DC366AB277}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIC4E0.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIC4E1.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48a240.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\48a240.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIAC4F.tmpJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeCode function: 10_2_00007FF68FB72A1010_2_00007FF68FB72A10
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeCode function: 10_2_00007FF68FB72EE010_2_00007FF68FB72EE0
Source: avcodec-60.dll.1.drStatic PE information: Number of sections : 13 > 10
Source: avutil-58.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: swresample-4.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: swscale-7.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: zlib.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: avformat-60.dll.1.drStatic PE information: Number of sections : 12 > 10
Source: api-ms-win-core-handle-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-string-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-2-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-sysinfo-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-memory-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-debug-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-environment-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-processthreads-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-heap-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-2-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l2-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-2-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-profile-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-libraryloader-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-localization-l1-2-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-datetime-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-processthreads-l1-1-1.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-namedpipe-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-filesystem-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-util-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-errorhandling-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-processenvironment-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-interlocked-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-rtlsupport-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-conio-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-timezone-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-convert-l1-1-0.dll.1.drStatic PE information: No import functions for PE file found
Source: setup.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameSoftwareDetector.dllF vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameDataUploader.dllF vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenamePowerShellScriptLauncher.dllF vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameucrtbase.dllj% vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenamevcruntime140.dllT vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenamemsvcp140.dllT vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameMicrosoft.Web.WebView2.Core.dll vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameMicrosoft.UI.Xaml.dllD vs setup.msi
Source: setup.msiBinary or memory string: OriginalFilenameembeddeduiproxy.dllF vs setup.msi
Source: classification engineClassification label: mal72.evad.winMSI@17/88@1/1
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLD19A.tmpJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4888:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4312:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3448:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3228:120:WilError_03
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFDAE8B08BE469EF21.TMPJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe""
Source: C:\Windows\SysWOW64\msiexec.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\TenantRestrictions\PayloadJump to behavior
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\setup.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe""
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe"
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe""Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe"Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe" Jump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: obs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: avcodec-60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: avutil-58.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: avformat-60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: w32-pthreads.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BF1831C0-1107-42C4-BDAA-42DC366AB277}Jump to behavior
Source: setup.msiStatic file information: File size 60716544 > 1048576
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\DataUploader.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\debug\createdump\createdump.pdb source: createdump.exe, 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp, createdump.exe, 00000007.00000000.1845092597.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: C:\ReleaseAI\win\Release\bin\x86\embeddeduiproxy.pdb= source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\WinUiBootstrapperEui\WinUiBootstrapperEui.pdb)) source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: ucrtbase.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\PowerShellScriptLauncher.pdbk source: setup.msi, 48a23d.msi.1.dr, MSIC4E1.tmp.1.dr
Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: api-ms-win-core-sysinfo-l1-1-0.dll.1.dr
Source: Binary string: Microsoft.Web.WebView2.Core.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: api-ms-win-core-processenvironment-l1-1-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\DataUploader.pdbj source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcamp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vccorlib140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\WinUiBootstrapperEui\WinUiBootstrapperEui.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: api-ms-win-crt-conio-l1-1-0.dll.1.dr
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: api-ms-win-core-localization-l1-2-0.dll.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\msvcp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\PowerShellScriptLauncher.pdb source: setup.msi, 48a23d.msi.1.dr, MSIC4E1.tmp.1.dr
Source: Binary string: E:\BA\201\s\140_release\vcrt_fwd_x86_release\Release\vcomp140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb!! source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\a\_work\1\s\BuildOutput\Release\x86\Microsoft.UI.Xaml\Microsoft.UI.Xaml.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\140_release\vcrt_fwd_x86_release\Release\vcruntime140_app.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: api-ms-win-core-file-l1-1-0.dll.1.dr
Source: Binary string: obs-ffmpeg-mux.pdb source: obs-ffmpeg-mux.exe, 0000000A.00000000.1847584170.00007FF68FB75000.00000002.00000001.01000000.00000007.sdmp, obs-ffmpeg-mux.exe, 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmp
Source: Binary string: D:\a\1\s\Win32\Release\Microsoft.Toolkit.Win32.UI.XamlApplication\Microsoft.Toolkit.Win32.UI.XamlHost.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\bin\x86\embeddeduiproxy.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\debug\createdump\createdump.pdb;;;GCTL source: createdump.exe, 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp, createdump.exe, 00000007.00000000.1845092597.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: Microsoft.Web.WebView2.Core.pdb source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: ucrtbase.pdbUGP source: setup.msi, 48a23d.msi.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: setup.msi, 48a23d.msi.1.dr, MSIACCD.tmp.1.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: setup.msi, 48a23d.msi.1.dr
Source: api-ms-win-core-synch-l1-2-0.dll.1.drStatic PE information: 0x8A188CB0 [Tue Jun 2 13:31:28 2043 UTC]
Source: vcruntime140.dll.1.drStatic PE information: section name: _RDATA
Source: BCUninstaller.exe.1.drStatic PE information: section name: _RDATA
Source: createdump.exe.1.drStatic PE information: section name: _RDATA
Source: UnRar.exe.1.drStatic PE information: section name: _RDATA
Source: avformat-60.dll.1.drStatic PE information: section name: .xdata
Source: avutil-58.dll.1.drStatic PE information: section name: .xdata
Source: swresample-4.dll.1.drStatic PE information: section name: .xdata
Source: swscale-7.dll.1.drStatic PE information: section name: .xdata
Source: zlib.dll.1.drStatic PE information: section name: .xdata
Source: avcodec-60.dll.1.drStatic PE information: section name: .rodata
Source: avcodec-60.dll.1.drStatic PE information: section name: .xdata
Source: MSIC4E1.tmp.1.drStatic PE information: section name: .fptable
Source: MSIAC4F.tmp.1.drStatic PE information: section name: .fptable
Source: MSIACCD.tmp.1.drStatic PE information: section name: .fptable
Source: MSIACFD.tmp.1.drStatic PE information: section name: .fptable
Source: MSIAD2C.tmp.1.drStatic PE information: section name: .fptable
Source: MSIAD9B.tmp.1.drStatic PE information: section name: .fptable
Source: MSIADCB.tmp.1.drStatic PE information: section name: .fptable
Source: MSIADFB.tmp.1.drStatic PE information: section name: .fptable
Source: MSIBF80.tmp.1.drStatic PE information: section name: .fptable
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_051C8D47 push esi; retf 3_2_051C8D49
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_051C8D7E push esi; retf 3_2_051C8D7F
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_051C8DB1 push esi; retf 3_2_051C8DB2
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_051C8DEB push ebp; retf 3_2_051C8DEC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_051CAE9C pushad ; ret 3_2_051CAEA3
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avformat-60.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\w32-pthreads.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140_1.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\zlib.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADCB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADFB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACFD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACCD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avutil-58.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\BCUninstaller.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIBF80.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swresample-4.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\UnRar.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD2C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avcodec-60.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD9B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\msvcp140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\utest.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIC4E1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swscale-7.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAC4F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIC4E1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADCB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIADFB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD2C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAD9B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACFD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACCD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAC4F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIBF80.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3833Jump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swresample-4.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\UnRar.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIAD2C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIAD9B.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\msvcp140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140_1.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\utest.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\zlib.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIADCB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIC4E1.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIADFB.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIACFD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIACCD.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swscale-7.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIAC4F.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\BCUninstaller.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIBF80.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeAPI coverage: 8.2 %
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5804Thread sleep count: 3833 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6628Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1856Thread sleep count: 124 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6148Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: 48a23d.msi.1.drBinary or memory string: HKEY_USERSRegOpenKeyTransactedW::NetUserGetInfo() failed with error: \@invalid string_view positionVMware, Inc.VMware Virtual PlatformVMware7,1VMware20,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IGetting system informationManufacturer [Model [BIOS [\\?\UNC\\\?\shim_clone%d.%d.%d.%dDllGetVersion[%!]%!ProgramFilesFolderCommonFilesFolderDesktopFolderAllUsersDesktopFolderAppDataFolderFavoritesFolderStartMenuFolderProgramMenuFolderStartupFolderFontsFolderLocalAppDataFolderCommonAppDataFolderProgramFiles64FolderProgramFilesProgramW6432SystemFolderSystem32FolderWindowsFolderWindowsVolumeTempFolderSETUPEXEDIRshfolder.dllSHGetFolderPathWProgramFilesAPPDATAPROGRAMFILES&+
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeCode function: 7_2_00007FF7A8502ECC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF7A8502ECC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe""Jump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeCode function: 7_2_00007FF7A8502984 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF7A8502984
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeCode function: 7_2_00007FF7A8503074 SetUnhandledExceptionFilter,7_2_00007FF7A8503074
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeCode function: 7_2_00007FF7A8502ECC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF7A8502ECC
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeCode function: 10_2_00007FF68FB73E04 SetUnhandledExceptionFilter,10_2_00007FF68FB73E04
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeCode function: 10_2_00007FF68FB73C5C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF68FB73C5C
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exeCode function: 10_2_00007FF68FB73774 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF68FB73774

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe" Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -noprofile -noninteractive -executionpolicy bypass -file "c:\users\user\appdata\local\temp\pssc587.ps1" -propfile "c:\users\user\appdata\local\temp\msic574.txt" -scriptfile "c:\users\user\appdata\local\temp\scrc585.ps1" -scriptargsfile "c:\users\user\appdata\local\temp\scrc586.txt" -propsep " :<->: " -linesep " <<:>> " -testprefix "_testvalue."
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -noprofile -noninteractive -executionpolicy bypass -file "c:\users\user\appdata\local\temp\pssc587.ps1" -propfile "c:\users\user\appdata\local\temp\msic574.txt" -scriptfile "c:\users\user\appdata\local\temp\scrc585.ps1" -scriptargsfile "c:\users\user\appdata\local\temp\scrc586.txt" -propsep " :<->: " -linesep " <<:>> " -testprefix "_testvalue."Jump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exeCode function: 7_2_00007FF7A8502DA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_00007FF7A8502DA0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
1
Replication Through Removable Media
1
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
21
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
1
Scripting
11
Process Injection
1
Disable or Modify Tools
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials11
Peripheral Device Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
File Deletion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582493 Sample: setup.msi Startdate: 30/12/2024 Architecture: WINDOWS Score: 72 49 kevinflansburg.com 2->49 55 Suricata IDS alerts for network traffic 2->55 57 Antivirus detection for URL or domain 2->57 59 AI detected suspicious sample 2->59 61 2 other signatures 2->61 9 msiexec.exe 138 104 2->9         started        12 msiexec.exe 2 2->12         started        signatures3 process4 file5 35 C:\Windows\Installer\MSIC4E1.tmp, PE32 9->35 dropped 37 C:\Windows\Installer\MSIBF80.tmp, PE32 9->37 dropped 39 C:\Windows\Installer\MSIADFB.tmp, PE32 9->39 dropped 41 51 other files (none is malicious) 9->41 dropped 14 msiexec.exe 14 9->14         started        19 cmd.exe 1 9->19         started        21 createdump.exe 1 9->21         started        process6 dnsIp7 51 kevinflansburg.com 104.21.0.151, 443, 49730 CLOUDFLARENETUS United States 14->51 43 C:\Users\user\AppData\Local\...\scrC585.ps1, Unicode 14->43 dropped 45 C:\Users\user\AppData\Local\...\pssC587.ps1, Unicode 14->45 dropped 47 C:\Users\user\AppData\Local\...\msiC574.txt, Unicode 14->47 dropped 53 Bypasses PowerShell execution policy 14->53 23 powershell.exe 17 14->23         started        25 obs-ffmpeg-mux.exe 1 19->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        file8 signatures9 process10 process11 31 conhost.exe 23->31         started        33 conhost.exe 25->33         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
setup.msi5%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\BCUninstaller.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\UnRar.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-console-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-memory-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processenvironment-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-processthreads-l1-1-1.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-profile-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-synch-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-sysinfo-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-timezone-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-core-util-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avcodec-60.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avformat-60.dll3%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\avutil-58.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\msvcp140.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swresample-4.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\swscale-7.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\utest.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140_1.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\w32-pthreads.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\zlib.dll0%ReversingLabs
C:\Windows\Installer\MSIAC4F.tmp0%ReversingLabs
C:\Windows\Installer\MSIACCD.tmp0%ReversingLabs
C:\Windows\Installer\MSIACFD.tmp0%ReversingLabs
C:\Windows\Installer\MSIAD2C.tmp0%ReversingLabs
C:\Windows\Installer\MSIAD9B.tmp0%ReversingLabs
C:\Windows\Installer\MSIADCB.tmp0%ReversingLabs
C:\Windows\Installer\MSIADFB.tmp0%ReversingLabs
C:\Windows\Installer\MSIBF80.tmp0%ReversingLabs
C:\Windows\Installer\MSIC4E1.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.micj0%Avira URL Cloudsafe
https://kevinflansburg.com/updater.php100%Avira URL Cloudmalware
http://dashif.org/guidelines/trickmode0%Avira URL Cloudsafe
https://kevinflansburg.com/updater.phpx0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
kevinflansburg.com
104.21.0.151
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://kevinflansburg.com/updater.phptrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://crl.micropowershell.exe, 00000003.00000002.1775603686.00000000032F6000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.1776776553.00000000053F1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://go.micropowershell.exe, 00000003.00000002.1776776553.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/powershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://dashif.org/guidelines/trickmodeavformat-60.dll.1.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000003.00000002.1779172337.0000000006457000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.micjsetup.msi, 48a23d.msi.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-DASH_schema_files/DASH-MPD.xsdavformat-60.dll.1.drfalse
                          high
                          https://aka.ms/winui2/webview2download/Reload():setup.msi, 48a23d.msi.1.drfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1776776553.00000000053F1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1776776553.0000000005546000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://kevinflansburg.com/updater.phpxsetup.msi, 48a23d.msi.1.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.21.0.151
                                kevinflansburg.comUnited States
                                13335CLOUDFLARENETUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1582493
                                Start date and time:2024-12-30 18:13:12 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 49s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:15
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:setup.msi
                                Detection:MAL
                                Classification:mal72.evad.winMSI@17/88@1/1
                                EGA Information:
                                • Successful, ratio: 33.3%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 12
                                • Number of non-executed functions: 36
                                Cookbook Comments:
                                • Found application associated with file extension: .msi
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 4.175.87.197, 172.202.163.200, 13.107.246.45
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target obs-ffmpeg-mux.exe, PID 5064 because there are no executed function
                                • Execution Graph export aborted for target powershell.exe, PID 5332 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • VT rate limit hit for: setup.msi
                                TimeTypeDescription
                                12:14:12API Interceptor7x Sleep call for process: powershell.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.21.0.151setup.msiGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  kevinflansburg.comsetup.msiGet hashmaliciousUnknownBrowse
                                  • 104.21.0.151
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUShttps://employeeportal.net-login.com/XL0pFWEloTnBYUmM5TnBUSmVpbWxiSUpWb3BBL1lPY1hwYU5uYktNWkd5ME82bWJMcUhoRklFUWJiVmFOUi9uUS81dGZ4dnJZYkltK2NMZG5BV1pmbFhqMXNZcm1QeXBXTXI4R090NHo5NWhuL2l4TXdxNlY4VlZxWHVPNTdnc1M3aU4xWjhFTmJiTEJWVUYydWVqZjNPbnFkM3M5T0FNQ2lRL3EySjhvdVVDNzZ2UHJQb0xQdlhZbTZRPT0tLTJaT0Z2TlJ3S0NMTTZjc2ktLTZGNUIwRnVkbFRTTHR2dUFITkcxVFE9PQ==?cid=2341891188Get hashmaliciousKnowBe4Browse
                                  • 104.17.25.14
                                  random.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.64.143
                                  https://tepco-jp-lin;.%5Dshop/co/tepcoGet hashmaliciousUnknownBrowse
                                  • 1.1.1.1
                                  https://chase.com-onlinebanking.com/XWmJkMGsxak5lZzdVZUczR3RxTGFWN1g0Q2NKLy96RURPVEpZbEdkOC9nQzY1TStZSjU0T0x4Q05qOXZBRHZnZTZpMmh2eGFmSm9rcVRmV2xBeENiMEF1V3VTOVAvL2dKemVQZkZGNHAxQ1hqTU9WY0R5SGpYeDQ3UVNtNGZpWDJYdWxBUFY5OUFVc3VFU041aHl6aUxrMlBZaGs1Y25BV0xHL1Vhc1BYNVQ5d3laZ2piV3gvTjlUMmc3QWV4QUs2Q0h6Yi0tZ1lEV1pac1JHRzl5ZFpFaC0tcVVpc09xQzZsUzY0bzY0YWpuS1N2Zz09?cid=2342337857Get hashmaliciousKnowBe4Browse
                                  • 104.18.87.62
                                  BHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                                  • 172.64.41.3
                                  UmotQ1qjLq.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.96.1
                                  PI1EA8P74K.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.148.118
                                  https://aiihsr.com/FloridaCUGet hashmaliciousUnknownBrowse
                                  • 1.1.1.1
                                  https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
                                  • 104.18.35.227
                                  https://btrhbfeojofxcpxuwnsp5h7h22htohw4btqegnxatocbkgdlfiawhyid.atGet hashmaliciousUnknownBrowse
                                  • 104.21.20.126
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19BHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                                  • 104.21.0.151
                                  Open Purchase Order Summary Details-16-12-2024.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  Open Purchase Order Summary Sheet.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  xyxmml.msiGet hashmaliciousXRedBrowse
                                  • 104.21.0.151
                                  valyzt.msiGet hashmaliciousXRedBrowse
                                  • 104.21.0.151
                                  VKKDXE.exeGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  New PO - Supplier 16-12-2024-Pdf.exeGet hashmaliciousXRedBrowse
                                  • 104.21.0.151
                                  Supplier.batGet hashmaliciousLodaRAT, XRedBrowse
                                  • 104.21.0.151
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\BCUninstaller.exesetup.msiGet hashmaliciousUnknownBrowse
                                    setup.msiGet hashmaliciousUnknownBrowse
                                      48.252.190.9.zipGet hashmaliciousUnknownBrowse
                                        setup.msiGet hashmaliciousUnknownBrowse
                                          TrdIE26br9.msiGet hashmaliciousUnknownBrowse
                                            b8ygJBG5cb.msiGet hashmaliciousUnknownBrowse
                                              setup.msiGet hashmaliciousUnknownBrowse
                                                installer.msiGet hashmaliciousUnknownBrowse
                                                  setup.msiGet hashmaliciousUnknownBrowse
                                                    setup.msiGet hashmaliciousUnknownBrowse
                                                      C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\UnRar.exesetup.msiGet hashmaliciousUnknownBrowse
                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                          48.252.190.9.zipGet hashmaliciousUnknownBrowse
                                                            setup.msiGet hashmaliciousUnknownBrowse
                                                              TrdIE26br9.msiGet hashmaliciousUnknownBrowse
                                                                b8ygJBG5cb.msiGet hashmaliciousUnknownBrowse
                                                                  setup.msiGet hashmaliciousUnknownBrowse
                                                                    installer.msiGet hashmaliciousUnknownBrowse
                                                                      setup.msiGet hashmaliciousUnknownBrowse
                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):20695
                                                                          Entropy (8bit):5.819351404026307
                                                                          Encrypted:false
                                                                          SSDEEP:384:PfOEGCtdIFXvcR9H1et88eWeNHKq10+wbXO27P5BwXMPDUAW97lKVRoWnVBzwJz1:PfOEGCtdIFXvcR9H1et88eWeNHKq10+7
                                                                          MD5:0A793F1DFA8FF76BB07952805F88DB78
                                                                          SHA1:C8627FA97A56E9B55C21CAAEF4C965130C6D1208
                                                                          SHA-256:89E67B22FB483F0057B98B3B91D0EAC72CB7FB4DF1DB0DC22C86D75320522A1C
                                                                          SHA-512:38C88D238AA8A47E8E8BF3B5DC8B2597800DFEC7FF2847CA2DE5349EF8FE5286ECC88ED883CF8EC342875728D9CEF8957EAB7F48058E79574449C58AA2718F4A
                                                                          Malicious:false
                                                                          Preview:...@IXOS.@.....@.a.Y.@.....@.....@.....@.....@.....@......&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}..Strave App..setup.msi.@.....@.....@.....@......icon_24.exe..&.{B718D2D5-5B2B-4FC0-A4F1-F7E037EFCECD}.....@.....@.....@.....@.......@.....@.....@.......@......Strave App......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{F39C344E-A83E-4760-8DA8-F27602095B4F}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{BC83E781-7DE2-47A8-97C3-2E6CC9BCAD82}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{279C32E3-A00A-4513-9A8B-D3984A41A6FB}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{B61B35E4-8BE1-4171-B69B-E2423CE9179F}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{FDDB96EE-847D-4B25-85B1-65E662CF63A8}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{9608D8ED-8EC6-4540-B232-4A823606F862}&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}.@......&.{17B6E8D6-C004-40DB-BB2D-125D7C1CC21E}&.{BF1831C0-1107-42
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):1360
                                                                          Entropy (8bit):5.4135884505161025
                                                                          Encrypted:false
                                                                          SSDEEP:24:3qWSKco4KmZjKbmOIKod6lss4RPQoUP7mZ9t7J0gt/NK3R82ia8HSVbV:6WSU4xympgv4RIoUP7mZ9tK8NWR82TVx
                                                                          MD5:5C6206A08CF97D618A014CE8F353CD25
                                                                          SHA1:36A2D3745BEC14A98BC168F727C30F36904E5DEC
                                                                          SHA-256:EECB4DEA4BC58288202B1FA18A55D5C7D11A444464FFBCB694FEA18683C85FFA
                                                                          SHA-512:86978BB4E92CFE9D5487E492B73EE0FB7CC13BE7B0800C0F2BA2A87A1861D055DA7E55E18CA785CA2E73204D2388D4E0EBA1F9138465F8650A374DFC774CD70D
                                                                          Malicious:false
                                                                          Preview:@...e................................................@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):100
                                                                          Entropy (8bit):3.0073551160284637
                                                                          Encrypted:false
                                                                          SSDEEP:3:Q0JUINRYplflrOdlVWNlANf5Yplf955:Q0JB0LJOn03ANqLN
                                                                          MD5:7A131AC8F407D08D1649D8B66D73C3B0
                                                                          SHA1:D93E1B78B1289FB51E791E524162D69D19753F22
                                                                          SHA-256:9ACBF0D3EEF230CC2D5A394CA5657AE42F3E369292DA663E2537A278A811FF5B
                                                                          SHA-512:47B6FF38B4DF0845A83F17E0FE889747A478746E1E7F17926A5CCAC1DD39C71D93F05A88E0EC176C1E5D752F85D4BDCFFB5C64125D1BA92ACC91D03D6031848D
                                                                          Malicious:true
                                                                          Preview:..Q.u.i.t.e.S.e.s. .:.<.-.>.:. . .<.<.:.>.>. .E.x.t.e.n.d.E.x.p.i.r.e. .:.<.-.>.:. .0. .<.<.:.>.>. .
                                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):6668
                                                                          Entropy (8bit):3.5127462716425657
                                                                          Encrypted:false
                                                                          SSDEEP:96:5Wb5VNkKmeHn/V2BVrIovmgNlGjxcj6BngOcvjb:5WbyZ/gVyvb
                                                                          MD5:30C30EF2CB47E35101D13402B5661179
                                                                          SHA1:25696B2AAB86A9233F19017539E2DD83B2F75D4E
                                                                          SHA-256:53094DF6FA4E57A3265FF04BC1E970C10BCDB3D4094AD6DD610C05B7A8B79E0F
                                                                          SHA-512:882BE2768138BB75FF7DDE7D5CA4C2E024699398BAACD0CE1D4619902402E054297E4F464D8CB3C22B2F35D3DABC408122C207FACAD64EC8014F2C54834CF458
                                                                          Malicious:true
                                                                          Preview:..p.a.r.a.m.(..... . .[.a.l.i.a.s.(.".p.r.o.p.F.i.l.e.".).]. . . . . . .[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.t.r.u.e.).]. .[.s.t.r.i.n.g.]. .$.m.s.i.P.r.o.p.O.u.t.F.i.l.e.P.a.t.h..... .,.[.a.l.i.a.s.(.".p.r.o.p.S.e.p.".).]. . . . . . . .[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.t.r.u.e.).]. .[.s.t.r.i.n.g.]. .$.m.s.i.P.r.o.p.K.V.S.e.p.a.r.a.t.o.r..... .,.[.a.l.i.a.s.(.".l.i.n.e.S.e.p.".).]. . . . . . . .[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.t.r.u.e.).]. .[.s.t.r.i.n.g.]. .$.m.s.i.P.r.o.p.L.i.n.e.S.e.p.a.r.a.t.o.r..... .,.[.a.l.i.a.s.(.".s.c.r.i.p.t.F.i.l.e.".).]. . . . .[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.t.r.u.e.).]. .[.s.t.r.i.n.g.]. .$.u.s.e.r.S.c.r.i.p.t.F.i.l.e.P.a.t.h..... .,.[.a.l.i.a.s.(.".s.c.r.i.p.t.A.r.g.s.F.i.l.e.".).].[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.f.a.l.s.e.).].[.s.t.r.i.n.g.]. .$.u.s.e.r.S.c.r.i.p.t.A.r.g.s.F.i.l.e.P.a.t.h..... .,.[.P.a.r.a.m.e.t.e.r.(.M.a.n.d.a.t.o.r.y.=.$.t.r.u.e.).]. . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):254
                                                                          Entropy (8bit):3.555045878547657
                                                                          Encrypted:false
                                                                          SSDEEP:6:QfFok79idK3fOlFogltHN+KiVmMXFVrMTlP1LlG7JidK3falnUOn03AnfInO:QfF3KvogM/XFVrMTQNeFUr3+
                                                                          MD5:E8A84AE0A0597E0C4FBB7FA36F7D0CA7
                                                                          SHA1:B97096DF7801FA5F91542F0F9A70616DD5D49B03
                                                                          SHA-256:9F2D8F053895BF9377A4686714833304E87A4E926B7581599D44B45380B5DFDE
                                                                          SHA-512:83960868B8DBFFEF2B3EE557AD89BB18CF80043FEB2A7BFDB0630F32A1870585158E4F4B367C72BBFDD760A586E5D1FEB73192C0E769507A6ED81E90BF4925EB
                                                                          Malicious:true
                                                                          Preview:..$.o.i.g.n.q.p. .=. .A.I._.G.e.t.M.s.i.P.r.o.p.e.r.t.y. .".Q.u.i.t.e.S.e.s.".....$.a.v.o.i.j.g. .=. .[.u.i.n.t.3.2.].(.$.o.i.g.n.q.p. .-.r.e.p.l.a.c.e. .'.t.'.,. .'.'.).....A.I._.S.e.t.M.s.i.P.r.o.p.e.r.t.y. .".E.x.t.e.n.d.E.x.p.i.r.e.". .$.a.v.o.i.j.g.
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:MS Windows icon resource - 9 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
                                                                          Category:dropped
                                                                          Size (bytes):195906
                                                                          Entropy (8bit):4.669224805215773
                                                                          Encrypted:false
                                                                          SSDEEP:1536:k1Z0Ceau0a/r3NLZZOjjDcC7uFFy9Z8YJNs9Z7E9ykl:k1Z0vZXJZYDFufyXbJNCcr
                                                                          MD5:E40B08C6FF5F07916B45741B7D0C5E87
                                                                          SHA1:94C2357A59BAA3B537993F570CEA03EC51C1917B
                                                                          SHA-256:131ABD59B7D4B6177F2815E8CEB0F3DA325CB1074AEFBE99F61A382F1895AF44
                                                                          SHA-512:FA8453DD4936F772381E50533CD91DB8857F1A608CEB91F225300FC4E9DE8475EB416A3682D0C85829058570EBB9BBDF18CC650D36FA87E13BC262C827D0C695
                                                                          Malicious:false
                                                                          Preview:............ .............. .(.......``.... .........HH.... ..T..R"..@@.... .(B...v..00.... ..%...... .... ............... .....R......... .h........PNG........IHDR.............\r.f....pHYs..........o.d.. .IDATx..yx.e.>|.Ug?Y.N..d%...6M."....".=......v..f....5}..3.b.h#v..".....b.(...@.}..........8kr...}]\".N.[u.y.g....|....|....|....|....|....|....|...[..F/......h4..h$...5.....Z.f..J%322...... .p...\HH.l6.a..c.............rC>.8|..&..;....f.Y.q....a.?.e.x..eY6F....a..DBH...F....@..R.\v.!...QJ[....(...Z.!.@#!d.R..l'!.3..V........s3..|..|.`.b..LSS...._A.Q.....@. ...2.o...J)C.a(...B.a.s.B......>N.......PB.O..(.m...t..P.0L...^&..p.g.....<x..g...S......2.L..h4..a.y..#.,..A.I..@)..`.!.!.qv>W...D...Z.R...cLA..Z.|G)..p.a.J..8..t..9......S.7.EEEZ..Q*.I..;.AXJ.Y.0L....0......8Z#.....B,..*J...e...p..~???...n..+...)...7.[[[.4.M0.%..{(........jA.m..)...A.x.).+.."....|E...y.p..q..Y.m....a....CBB.,..0.s/...q.^.@1Q@nvaw.W./..#.p...J.Q.e..B..,;..._.o.Ro.....`...^....ls.!......
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):310928
                                                                          Entropy (8bit):6.001677789306043
                                                                          Encrypted:false
                                                                          SSDEEP:3072:Zczkitvo4BpYN/6mBPry8TXROLdW5m4mURs9OOGC0kvxVCd7wANmSrvlPSIB0P+4:ZA4NCmBPry/N24OOjVxM7RNrrvEc0a
                                                                          MD5:147B71C906F421AC77F534821F80A0C6
                                                                          SHA1:3381128CA482A62333E20D0293FDA50DC5893323
                                                                          SHA-256:7DCD48CEF4CC4C249F39A373A63BBA97C66F4D8AFDBE3BAB196FD452A58290B2
                                                                          SHA-512:2FCD2127D9005D66431DD8C9BD5BC60A148D6F3DFE4B80B82672AFD0D148F308377A0C38D55CA58002E5380D412CE18BD0061CB3B12F4DAA90E0174144EA20C8
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: 48.252.190.9.zip, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: TrdIE26br9.msi, Detection: malicious, Browse
                                                                          • Filename: b8ygJBG5cb.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: installer.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8.}|...|...|....../p....../v....../1...u.a.l....../u...|........./v....../}...Rich|...........PE..d...i..d..........".................`<.........@..........................................`.................................................t$...........S...`..@........(..............T.......................(.......8............................................text............................... ..`.rdata..............................@..@.data........@......................@....pdata..@....`.......&..............@..@_RDATA...............<..............@..@.rsrc....S.......T...>..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):506008
                                                                          Entropy (8bit):6.4284173495366845
                                                                          Encrypted:false
                                                                          SSDEEP:6144:yY8mmN3YWYGAj9JwXScp39ioIKzKVEKfr01//bbh3S62Wt3A3ksFqXqjh6AusDyn:yY8XiWYGAkXh3Qqia/zAot3A6AhezSpK
                                                                          MD5:98CCD44353F7BC5BAD1BC6BA9AE0CD68
                                                                          SHA1:76A4E5BF8D298800C886D29F85EE629E7726052D
                                                                          SHA-256:E51021F6CB20EFBD2169F2A2DA10CE1ABCA58B4F5F30FBF4BAE931E4ECAAC99B
                                                                          SHA-512:D6E8146A1055A59CBA5E2AAF47F6CB184ACDBE28E42EC3DAEBF1961A91CEC5904554D9D433EBF943DD3639C239EF11560FA49F00E1CFF02E11CD8D3506C4125F
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: 48.252.190.9.zip, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: TrdIE26br9.msi, Detection: malicious, Browse
                                                                          • Filename: b8ygJBG5cb.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: installer.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          • Filename: setup.msi, Detection: malicious, Browse
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g.}............|.&.....|.$.J...|.%.....H}*.....H}./....H}./.....~P.....H}./.....~D.........z...F}./....F}(.....F}./....Rich............PE..d.....@f.........."....!.b.....................@.....................................'....`.................................................|...........H........4.......(......8...0I..T....................J..(....G..@............................................text....a.......b.................. ..`.rdata...3.......4...f..............@..@.data...............................@....pdata...4.......6..................@..@_RDATA..\...........................@..@.rsrc...H...........................@..@.reloc..8...........................@..B................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12224
                                                                          Entropy (8bit):6.596101286914553
                                                                          Encrypted:false
                                                                          SSDEEP:192:4nWYhWxWWFYg7VWQ4uWjXUtpwBqnajrmaaGJ:2WYhWvZqlQGJ
                                                                          MD5:919E653868A3D9F0C9865941573025DF
                                                                          SHA1:EFF2D4FF97E2B8D7ED0E456CB53B74199118A2E2
                                                                          SHA-256:2AFBFA1D77969D0F4CEE4547870355498D5C1DA81D241E09556D0BD1D6230F8C
                                                                          SHA-512:6AEC9D7767EB82EBC893EBD97D499DEBFF8DA130817B6BB4BCB5EB5DE1B074898F87DB4F6C48B50052D4F8A027B3A707CAD9D7ED5837A6DD9B53642B8A168932
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...Y.=i.........." .........................................................0......a.....`.........................................`...,............ ...................!..............T............................................................................rdata..P...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12224
                                                                          Entropy (8bit):6.640081558424349
                                                                          Encrypted:false
                                                                          SSDEEP:192:iTWYhWyWWFYg7VWQ4uWq6Cu87ZqnajgnLSyu:sWYhWi1XHllk2yu
                                                                          MD5:7676560D0E9BC1EE9502D2F920D2892F
                                                                          SHA1:4A7A7A99900E41FF8A359CA85949ACD828DDB068
                                                                          SHA-256:00942431C2D3193061C7F4DC340E8446BFDBF792A7489F60349299DFF689C2F9
                                                                          SHA-512:F1E8DB9AD44CD1AA991B9ED0E000C58978EB60B3B7D9908B6EB78E8146E9E12590B0014FC4A97BC490FFE378C0BF59A6E02109BFD8A01C3B6D0D653A5B612D15
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d....y1..........." .........................................................0...........`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11712
                                                                          Entropy (8bit):6.6023398138369505
                                                                          Encrypted:false
                                                                          SSDEEP:192:5WYhWYWWFYg7VWQ4SWSS/njxceXqnajLJ35H:5WYhW4gjmAlnJpH
                                                                          MD5:AC51E3459E8FCE2A646A6AD4A2E220B9
                                                                          SHA1:60CF810B7AD8F460D0B8783CE5E5BBCD61C82F1A
                                                                          SHA-256:77577F35D3A61217EA70F21398E178F8749455689DB52A2B35A85F9B54C79638
                                                                          SHA-512:6239240D4F4FA64FC771370FB25A16269F91A59A81A99A6A021B8F57CA93D6BB3B3FCECC8DEDE0EF7914652A2C85D84D774F13A4143536A3F986487A776A2EAE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d.....Ab.........." .........................................................0......d.....`.........................................`................ ...................!..............T............................................................................rdata..4...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.614262942006268
                                                                          Encrypted:false
                                                                          SSDEEP:192:4WYhWFsWWFYg7VWQ4eWZzAR/BVrqnajcJH:4WYhWFMJRLlA5
                                                                          MD5:B0E0678DDC403EFFC7CDC69AE6D641FB
                                                                          SHA1:C1A4CE4DED47740D3518CD1FF9E9CE277D959335
                                                                          SHA-256:45E48320ABE6E3C6079F3F6B84636920A367989A88F9BA6847F88C210D972CF1
                                                                          SHA-512:2BADF761A0614D09A60D0ABB6289EBCBFA3BF69425640EB8494571AFD569C8695AE20130AAC0E1025E8739D76A9BFF2EFC9B4358B49EFE162B2773BE9C3E2AD4
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................." .........................................................0............`.........................................`................ ...................!..............T............................................................................rdata..@...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.654155040985372
                                                                          Encrypted:false
                                                                          SSDEEP:192:imxD3vEWYhWnWWFYg7VWQ4eWMOwNbDXbBqnaj0qJm8:iIEWYhWFpLbBlwqJm
                                                                          MD5:94788729C9E7B9C888F4E323A27AB548
                                                                          SHA1:B0BA0C4CF1D8B2B94532AA1880310F28E87756EC
                                                                          SHA-256:ACCDD7455FB6D02FE298B987AD412E00D0B8E6F5FB10B52826367E7358AE1187
                                                                          SHA-512:AB65495B1D0DD261F2669E04DC18A8DA8F837B9AC622FC69FDE271FF5E6AA958B1544EDD8988F017D3DD83454756812C927A7702B1ED71247E506530A11F21C6
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d....:.[.........." .........................................................0......~.....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):15304
                                                                          Entropy (8bit):6.548897063441128
                                                                          Encrypted:false
                                                                          SSDEEP:192:+AuVYPvVX8rFTsRWYhWyWWFYg7VWQ4eWQBAW+JSdqnajeMoLR9au:TBPvVXLWYhWiBdlaLFAu
                                                                          MD5:580D9EA2308FC2D2D2054A79EA63227C
                                                                          SHA1:04B3F21CBBA6D59A61CD839AE3192EA111856F65
                                                                          SHA-256:7CB0396229C3DA434482A5EF929D3A2C392791712242C9693F06BAA78948EF66
                                                                          SHA-512:97C1D3F4F9ADD03F21C6B3517E1D88D1BF9A8733D7BDCA1AECBA9E238D58FF35780C4D865461CC7CD29E9480B3B3B60864ABB664DCDC6F691383D0B281C33369
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................." .........................................................@............`.........................................`................0...................!..............T............................................................................rdata..(...........................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11712
                                                                          Entropy (8bit):6.622041192039296
                                                                          Encrypted:false
                                                                          SSDEEP:192:dzWYhW1sWWFYg7VWQ4yWL3sQlmqnajlD4h1N:BWYhW2e6l94h1N
                                                                          MD5:35BC1F1C6FBCCEC7EB8819178EF67664
                                                                          SHA1:BBCAD0148FF008E984A75937AADDF1EF6FDA5E0C
                                                                          SHA-256:7A3C5167731238CF262F749AA46AB3BFB2AE1B22191B76E28E1D7499D28C24B7
                                                                          SHA-512:9AB9B5B12215E57AF5B3C588ED5003D978071DC591ED18C78C4563381A132EDB7B2C508A8B75B4F1ED8823118D23C88EDA453CD4B42B9020463416F8F6832A3D
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................." .........................................................0......./....`.........................................`...L............ ...................!..............T............................................................................rdata..l...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.730719514840594
                                                                          Encrypted:false
                                                                          SSDEEP:192:/VyWYhWjAWWFYg7VWQ4eWiuNwzNbDXbBqnaj0q:/VyWYhW8g+LbBlwq
                                                                          MD5:3BF4406DE02AA148F460E5D709F4F67D
                                                                          SHA1:89B28107C39BB216DA00507FFD8ADB7838D883F6
                                                                          SHA-256:349A79FA1572E3538DFBB942610D8C47D03E8A41B98897BC02EC7E897D05237E
                                                                          SHA-512:5FF6E8AD602D9E31AC88E06A6FBB54303C57D011C388F46D957AEE8CD3B7D7CCED8B6BFA821FF347ADE62F7359ACB1FBA9EE181527F349C03D295BDB74EFBACE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0............`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.626458901834476
                                                                          Encrypted:false
                                                                          SSDEEP:192:P9RWYhWEWWFYg7VWQ4eWncTjxceXqnajLJS:LWYhWk3TjmAlnJS
                                                                          MD5:BBAFA10627AF6DFAE5ED6E4AEAE57B2A
                                                                          SHA1:3094832B393416F212DB9107ADD80A6E93A37947
                                                                          SHA-256:C78A1217F8DCB157D1A66B80348DA48EBDBBEDCEA1D487FC393191C05AAD476D
                                                                          SHA-512:D5FCBA2314FFE7FF6E8B350D65A2CDD99CA95EA36B71B861733BC1ED6B6BB4D85D4B1C4C4DE2769FBF90D4100B343C250347D9ED1425F4A6C3FE6A20AED01F17
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...>G.j.........." .........................................................0............`.........................................`...`............ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12232
                                                                          Entropy (8bit):6.577869728469469
                                                                          Encrypted:false
                                                                          SSDEEP:192:5t6DjZlTIWYhWsWWFYg7VWQ4eW4MtkR/BVrqnajc:5t6Dll0WYhWMqkRLlA
                                                                          MD5:3A4B6B36470BAD66621542F6D0D153AB
                                                                          SHA1:5005454BA8E13BAC64189C7A8416ECC1E3834DC6
                                                                          SHA-256:2E981EE04F35C0E0B7C58282B70DCC9FC0318F20F900607DAE7A0D40B36E80AF
                                                                          SHA-512:84B00167ABE67F6B58341045012723EF4839C1DFC0D8F7242370C4AD9FABBE4FEEFE73F9C6F7953EAE30422E0E743DC62503A0E8F7449E11C5820F2DFCA89294
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0......M.....`.........................................`................ ...................!..............T............................................................................rdata..(...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11712
                                                                          Entropy (8bit):6.6496318655699795
                                                                          Encrypted:false
                                                                          SSDEEP:192:nWYhWNWWFYg7VWQ4uWtGDlR/BVrqnajcU8:nWYhWLJDlRLlAU8
                                                                          MD5:A038716D7BBD490378B26642C0C18E94
                                                                          SHA1:29CD67219B65339B637A1716A78221915CEB4370
                                                                          SHA-256:B02324C49DD039FA889B4647331AA9AC65E5ADC0CC06B26F9F086E2654FF9F08
                                                                          SHA-512:43CB12D715DDA4DCDB131D99127417A71A16E4491BC2D5723F63A1C6DFABE578553BC9DC8CF8EFFAE4A6BE3E65422EC82079396E9A4D766BF91681BDBD7837B1
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...*............." .........................................................0......-.....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12736
                                                                          Entropy (8bit):6.587452239016064
                                                                          Encrypted:false
                                                                          SSDEEP:192:FvuBL3BBLZWYhWxWWFYg7VWQ4uW4g0jrQYcunYqnajv9Ml:FvuBL3BPWYhWv8jYulhMl
                                                                          MD5:D75144FCB3897425A855A270331E38C9
                                                                          SHA1:132C9ADE61D574AA318E835EB78C4CCCDDEFDEA2
                                                                          SHA-256:08484ED55E43584068C337281E2C577CF984BB504871B3156DE11C7CC1EEC38F
                                                                          SHA-512:295A6699529D6B173F686C9BBB412F38D646C66AAB329EAC4C36713FDD32A3728B9C929F9DCADDE562F625FB80BC79026A52772141AD2080A0C9797305ADFF2E
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d......c.........." .........................................................0......V`....`.........................................`................ ...................!..............T............................................................................rdata..<...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):14280
                                                                          Entropy (8bit):6.658205945107734
                                                                          Encrypted:false
                                                                          SSDEEP:384:NOMw3zdp3bwjGzue9/0jCRrndbwNWYhW6WAulh2:NOMwBprwjGzue9/0jCRrndbw5D
                                                                          MD5:8ACB83D102DABD9A5017A94239A2B0C6
                                                                          SHA1:9B43A40A7B498E02F96107E1524FE2F4112D36AE
                                                                          SHA-256:059CB23FDCF4D80B92E3DA29E9EF4C322EDF6FBA9A1837978FD983E9BDFC7413
                                                                          SHA-512:B7ECF60E20098EA509B76B1CC308A954A6EDE8D836BF709790CE7D4BD1B85B84CF5F3AEDF55AF225D2D21FBD3065D01AA201DAE6C131B8E1E3AA80ED6FC910A4
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0......._....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12224
                                                                          Entropy (8bit):6.621310788423453
                                                                          Encrypted:false
                                                                          SSDEEP:96:qo1aCFEWYhWwp/DEs39DHDs35FrsvYgmr0DD0ADEs3TDL2L4m2grMWaLNpDEs3OC:teWYhWVWWFYg7VWQ4yWwAKZRqnajl6x7
                                                                          MD5:808F1CB8F155E871A33D85510A360E9E
                                                                          SHA1:C6251ABFF887789F1F4FC6B9D85705788379D149
                                                                          SHA-256:DADBD2204B015E81F94C537AC7A36CD39F82D7C366C193062210C7288BAA19E3
                                                                          SHA-512:441F36CA196E1C773FADF17A0F64C2BBDC6AF22B8756A4A576E6B8469B4267E942571A0AE81F4B2230B8DE55702F2E1260E8D0AFD5447F2EA52F467F4CAA9BC6
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...f092.........." .........................................................0............`.........................................`...l............ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.7263193693903345
                                                                          Encrypted:false
                                                                          SSDEEP:192:cWYhWZSWWFYg7VWQ4eWkcc7ZqnajgnLSp:cWYhW84cllk2p
                                                                          MD5:CFF476BB11CC50C41D8D3BF5183D07EC
                                                                          SHA1:71E0036364FD49E3E535093E665F15E05A3BDE8F
                                                                          SHA-256:B57E70798AF248F91C8C46A3F3B2952EFFAE92CA8EF9640C952467BC6726F363
                                                                          SHA-512:7A87E4EE08169E9390D0DFE607E9A220DC7963F9B4C2CDC2F8C33D706E90DC405FBEE00DDC4943794FB502D9882B21FAAE3486BC66B97348121AE665AE58B01C
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d.....%..........." .........................................................0......[.....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12744
                                                                          Entropy (8bit):6.601327134572443
                                                                          Encrypted:false
                                                                          SSDEEP:192:qKWYhWbWWFYg7VWQ4eWYoWjxceXqnajLJe:qKWYhWJ4WjmAlnJe
                                                                          MD5:F43286B695326FC0C20704F0EEBFDEA6
                                                                          SHA1:3E0189D2A1968D7F54E721B1C8949487EF11B871
                                                                          SHA-256:AA415DB99828F30A396CBD4E53C94096DB89756C88A19D8564F0EED0674ADD43
                                                                          SHA-512:6EAD35348477A08F48A9DEB94D26DA5F4E4683E36F0A46117B078311235C8B9B40C17259C2671A90D1A210F73BF94C9C063404280AC5DD5C7F9971470BEAF8B7
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0.......Z....`.........................................`...H............ ...................!..............T............................................................................rdata..x...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):14272
                                                                          Entropy (8bit):6.519411559704781
                                                                          Encrypted:false
                                                                          SSDEEP:192:AWXk1JzX9cKSIvWYhWLWWFYg7VWQ4SWW0uI7oinEqnajxMyqY:AWXk1JzNcKSIvWYhW5+uOEle6
                                                                          MD5:E173F3AB46096482C4361378F6DCB261
                                                                          SHA1:7922932D87D3E32CE708F071C02FB86D33562530
                                                                          SHA-256:C9A686030E073975009F993485D362CC31C7F79B683DEF713E667D13E9605A14
                                                                          SHA-512:3AAFEFD8A9D7B0C869D0C49E0C23086115FD550B7DC5C75A5B8A8620AD37F36A4C24D2BF269043D81A7448C351FF56CB518EC4E151960D4F6BD655C38AFF547F
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...j............." .........................................................0......%C....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12232
                                                                          Entropy (8bit):6.659079053710614
                                                                          Encrypted:false
                                                                          SSDEEP:192:NtxDfIeA6WYhW7WWFYg7VWQ4eWpB5ABzR/BVrqnajcb:NtxDfIeA6WYhWp28RLlA
                                                                          MD5:9C9B50B204FCB84265810EF1F3C5D70A
                                                                          SHA1:0913AB720BD692ABCDB18A2609DF6A7F85D96DB3
                                                                          SHA-256:25A99BDF8BF4D16077DC30DD9FFEF7BB5A2CEAF9AFCEE7CF52AD408355239D40
                                                                          SHA-512:EA2D22234E587AD9FA255D9F57907CC14327EAD917FDEDE8B0A38516E7C7A08C4172349C8A7479EC55D1976A37E520628006F5C362F6A3EC76EC87978C4469CD
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0......6y....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11200
                                                                          Entropy (8bit):6.7627840671368835
                                                                          Encrypted:false
                                                                          SSDEEP:192:clIHyZ36WYhWulWWFYg7VWQ4yWqeQDbLtsQlmqnajlDC:clIHyZKWYhWKhlbp6l9C
                                                                          MD5:0233F97324AAAA048F705D999244BC71
                                                                          SHA1:5427D57D0354A103D4BB8B655C31E3189192FC6A
                                                                          SHA-256:42F4E84073CF876BBAB9DD42FD87124A4BA10BB0B59D2C3031CB2B2DA7140594
                                                                          SHA-512:8339F3C0D824204B541AECBD5AD0D72B35EAF6717C3F547E0FD945656BCB2D52E9BD645E14893B3F599ED8F2DE6D3BCBEBF3B23ED43203599AF7AFA5A4000311
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d....f............" .........................................................0.......>....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12224
                                                                          Entropy (8bit):6.590253878523919
                                                                          Encrypted:false
                                                                          SSDEEP:192:4GeVvXK9WYhW1WWFYg7VWQ4yWj6k50IsQlmqnajlDl:4GeVy9WYhWzVk6l9l
                                                                          MD5:E1BA66696901CF9B456559861F92786E
                                                                          SHA1:D28266C7EDE971DC875360EB1F5EA8571693603E
                                                                          SHA-256:02D987EBA4A65509A2DF8ED5DD0B1A0578966E624FCF5806614ECE88A817499F
                                                                          SHA-512:08638A0DD0FB6125F4AB56E35D707655F48AE1AA609004329A0E25C13D2E71CB3EDB319726F10B8F6D70A99F1E0848B229A37A9AB5427BFEE69CD890EDFB89D2
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...._............" .........................................................0.......S....`.........................................`................ ...................!..............T............................................................................rdata..<...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.672720452347989
                                                                          Encrypted:false
                                                                          SSDEEP:192:byMvQWYhW5fWWFYg7VWQ4eWio3gDwcunYqnajv9JS:byMvQWYhW/BXwulhw
                                                                          MD5:7A15B909B6B11A3BE6458604B2FF6F5E
                                                                          SHA1:0FEB824D22B6BEEB97BCE58225688CB84AC809C7
                                                                          SHA-256:9447218CC4AB1A2C012629AAAE8D1C8A428A99184B011BCC766792AF5891E234
                                                                          SHA-512:D01DD566FF906AAD2379A46516E6D060855558C3027CE3B991056244A8EDD09CE29EACEC5EE70CEEA326DED7FC2683AE04C87F0E189EBA0E1D38C06685B743C9
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d.....<.........." .........................................................0.......g....`.........................................`................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):13760
                                                                          Entropy (8bit):6.575688560984027
                                                                          Encrypted:false
                                                                          SSDEEP:192:L1dv3V0dfpkXc2MAvVaoKKDWYhWTJWWFYg7VWQ4uWoSUtpwBqnajrmaaGWpmJ:Zdv3V0dfpkXc0vVaeWYhWj/qlQGWpmJ
                                                                          MD5:6C3FCD71A6A1A39EAB3E5C2FD72172CD
                                                                          SHA1:15B55097E54028D1466E46FEBCA1DBB8DBEFEA4F
                                                                          SHA-256:A31A15BED26232A178BA7ECB8C8AA9487C3287BB7909952FC06ED0D2C795DB26
                                                                          SHA-512:EF1C14965E5974754CC6A9B94A4FA5107E89966CB2E584CE71BBBDD2D9DC0C0536CCC9D488C06FA828D3627206E7D9CC8065C45C6FB0C9121962CCBECB063D4F
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d......c.........." .........................................................0............`.........................................`...X............ ...................!..............T............................................................................rdata..|...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12232
                                                                          Entropy (8bit):6.70261983917014
                                                                          Encrypted:false
                                                                          SSDEEP:192:ztZ3XWYhW3WWFYg7VWQ4eWNnpit7ZqnajgnLSl:ztZ3XWYhWVg+llk2
                                                                          MD5:D175430EFF058838CEE2E334951F6C9C
                                                                          SHA1:7F17FBDCEF12042D215828C1D6675E483A4C62B1
                                                                          SHA-256:1C72AC404781A9986D8EDEB0EE5DD39D2C27CE505683CA3324C0ECCD6193610A
                                                                          SHA-512:6076086082E3E824309BA2C178E95570A34ECE6F2339BE500B8B0A51F0F316B39A4C8D70898C4D50F89F3F43D65C5EBBEC3094A47D91677399802F327287D43B
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................." .........................................................0......G.....`.........................................`...x............ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12744
                                                                          Entropy (8bit):6.599515320379107
                                                                          Encrypted:false
                                                                          SSDEEP:192:fKIMFFyWYhW6WWFYg7VWQ4eWoVjxceXqnajLJ4:fcyWYhWKRjmAlnJ4
                                                                          MD5:9D43B5E3C7C529425EDF1183511C29E4
                                                                          SHA1:07CE4B878C25B2D9D1C48C462F1623AE3821FCEF
                                                                          SHA-256:19C78EF5BA470C5B295DDDEE9244CBD07D0368C5743B02A16D375BFB494D3328
                                                                          SHA-512:C8A1C581C3E465EFBC3FF06F4636A749B99358CA899E362EA04B3706EAD021C69AE9EA0EFC1115EAE6BBD9CF6723E22518E9BEC21F27DDAAFA3CF18B3A0034A7
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...r............" .........................................................0............`.........................................`...H............ ...................!..............T............................................................................rdata..l...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12232
                                                                          Entropy (8bit):6.690164913578267
                                                                          Encrypted:false
                                                                          SSDEEP:192:4EWYhWdWWFYg7VWQ4eWvvJ6jxceXqnajLJn:4EWYhWbwYjmAlnJ
                                                                          MD5:43E1AE2E432EB99AA4427BB68F8826BB
                                                                          SHA1:EEE1747B3ADE5A9B985467512215CAF7E0D4CB9B
                                                                          SHA-256:3D798B9C345A507E142E8DACD7FB6C17528CC1453ABFEF2FFA9710D2FA9E032C
                                                                          SHA-512:40EC0482F668BDE71AEB4520A0709D3E84F093062BFBD05285E2CC09B19B7492CB96CDD6056281C213AB0560F87BD485EE4D2AEEFA0B285D2D005634C1F3AF0B
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d....Y$..........." .........................................................0.......d....`.........................................`...H............ ...................!..............T............................................................................rdata..l...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11720
                                                                          Entropy (8bit):6.615761482304143
                                                                          Encrypted:false
                                                                          SSDEEP:192:dZ89WYhWFWWFYg7VWQ4eW5QLyFqnajziMOci:dZ89WYhWDnolniMOP
                                                                          MD5:735636096B86B761DA49EF26A1C7F779
                                                                          SHA1:E51FFBDDBF63DDE1B216DCCC753AD810E91ABC58
                                                                          SHA-256:5EB724C51EECBA9AC7B8A53861A1D029BF2E6C62251D00F61AC7E2A5F813AAA3
                                                                          SHA-512:3D5110F0E5244A58F426FBB72E17444D571141515611E65330ECFEABDCC57AD3A89A1A8B2DC573DA6192212FB65C478D335A86678A883A1A1B68FF88ED624659
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d................" .........................................................0......Xc....`.........................................`...<............ ...................!..............T............................................................................rdata..\...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12744
                                                                          Entropy (8bit):6.627282858694643
                                                                          Encrypted:false
                                                                          SSDEEP:192:R0WYhWRWWFYg7VWQ4eWLeNxUUtpwBqnajrmaaG:R0WYhWPzjqlQG
                                                                          MD5:031DC390780AC08F498E82A5604EF1EB
                                                                          SHA1:CF23D59674286D3DC7A3B10CD8689490F583F15F
                                                                          SHA-256:B119ADAD588EBCA7F9C88628010D47D68BF6E7DC6050B7E4B787559F131F5EDE
                                                                          SHA-512:1468AD9E313E184B5C88FFD79A17C7D458D5603722620B500DBA06E5B831037CD1DD198C8CE2721C3260AB376582F5791958763910E77AA718449B6622D023C7
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d..../}..........." .........................................................0......a.....`.........................................0................ ...................!..............T............................................................................rdata.. ...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):15816
                                                                          Entropy (8bit):6.435326465651674
                                                                          Encrypted:false
                                                                          SSDEEP:192:JM0wd8dc9cydWYhWyWWFYg7VWQ4eW9jTXfH098uXqnajH/VCf:G0wd8xydWYhWi2bXuXlTV2
                                                                          MD5:285DCD72D73559678CFD3ED39F81DDAD
                                                                          SHA1:DF22928E43EA6A9A41C1B2B5BFCAB5BA58D2A83A
                                                                          SHA-256:6C008BE766C44BF968C9E91CDDC5B472110BEFFEE3106A99532E68C605C78D44
                                                                          SHA-512:84EF0A843798FD6BD6246E1D40924BE42550D3EF239DAB6DB4D423B142FA8F691C6F0603687901F1C52898554BF4F48D18D3AEBD47DE935560CDE4906798C39A
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...x............." .........................................................@.......5....`.........................................0................0...................!..............T............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):12232
                                                                          Entropy (8bit):6.5874576656353145
                                                                          Encrypted:false
                                                                          SSDEEP:192:6KNMWYhW6WWFYg7VWQ4eWSA5lJSdqnajeMh3:6KNMWYhWKiKdlaW
                                                                          MD5:5CCE7A5ED4C2EBAF9243B324F6618C0E
                                                                          SHA1:FDB5954EE91583A5A4CBB0054FB8B3BF6235EED3
                                                                          SHA-256:AA3E3E99964D7F9B89F288DBE30FF18CBC960EE5ADD533EC1B8326FE63787AA3
                                                                          SHA-512:FC85A3BE23621145B8DC067290BD66416B6B1566001A799975BF99F0F526935E41A2C8861625E7CFB8539CA0621ED9F46343C04B6C41DB812F58412BE9C8A0DE
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...g P..........." .........................................................0............`.........................................0..."............ ...................!..............T............................................................................rdata..R...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):13768
                                                                          Entropy (8bit):6.645869978118917
                                                                          Encrypted:false
                                                                          SSDEEP:192:CGnWlC0i5ClWYhWwWWFYg7VWQ4eWtOUtpwBqnajrmaaGN4P:9nWm5ClWYhWQ8qlQGN6
                                                                          MD5:41FBBB054AF69F0141E8FC7480D7F122
                                                                          SHA1:3613A572B462845D6478A92A94769885DA0843AF
                                                                          SHA-256:974AF1F1A38C02869073B4E7EC4B2A47A6CE8339FA62C549DA6B20668DE6798C
                                                                          SHA-512:97FB0A19227887D55905C2D622FBF5451921567F145BE7855F72909EB3027F48A57D8C4D76E98305121B1B0CC1F5F2667EF6109C59A83EA1B3E266934B2EB33C
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...Ge..Ge..Ge../e..Ge../a..Ge../...Ge../g..Ge.Rich.Ge.........................PE..d...r..x.........." .........................................................0.......(....`.........................................0................ ...................!..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):37333152
                                                                          Entropy (8bit):6.632921864082428
                                                                          Encrypted:false
                                                                          SSDEEP:393216:LzyCmQCOCLheXbl4MEf+Eidgrpj3xO6FLzq2KHplhrX5:L5WLheXbl4MEf+HgrpjVF6PD5
                                                                          MD5:32F56F3E644C4AC8C258022C93E62765
                                                                          SHA1:06DFF5904EBBF69551DFA9F92E6CC2FFA9679BA1
                                                                          SHA-256:85AF2FB4836145098423E08218AC381110A6519CB559FF6FC7648BA310704315
                                                                          SHA-512:CAE2B9E40FF71DDAF76A346C20028867439B5726A16AE1AD5E38E804253DFCF6ED0741095A619D0999728D953F2C375329E86B8DE4A0FCE55A8CDC13946D5AD8
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........(........&"...&............P........................................P.......3:...`... ......................................`...........A.....p.......t...X.9.H'.......M..............................(......................P............................text...............................`..`.rodata.0........................... ..`.data...............................@....rdata....X......X.................@..@.pdata..t...........................@..@.xdata..`...........................@..@.bss...................................edata.......`.......|..............@..@.idata...A.......B..................@....CRT....`..........................@....tls...............................@....rsrc...p..........................@....reloc...M.......N..................@..B........................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):5100112
                                                                          Entropy (8bit):6.374242928276845
                                                                          Encrypted:false
                                                                          SSDEEP:49152:WBUp8DPNkkup6GAx9HEekwEfG/66xcPiw+UgAnBM+sVf9d3PWKOyz/Omlc69kXOV:WB/Z16w8idUgfT0b6LnBSpytGyodUl
                                                                          MD5:01589E66D46ABCD9ACB739DA4B542CE4
                                                                          SHA1:6BF1BD142DF68FA39EF26E2CAE82450FED03ECB6
                                                                          SHA-256:9BB4A5F453DA85ACD26C35969C049592A71A7EF3060BFA4EB698361F2EDB37A3
                                                                          SHA-512:0527AF5C1E7A5017E223B3CC0343ED5D42EC236D53ECA30D6DECCEB2945AF0C1FBF8C7CE367E87BC10FCD54A77F5801A0D4112F783C3B7E829B2F40897AF8379
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........D..,....&"...&.R4...D.....P.........................................E.....r}N...`... .......................................D.0-....D.hX...PE.......?.......M.H'...`E..e............................>.(.....................D.`............................text....P4......R4.................`..`.data....3...p4..4...V4.............@....rdata...&....4..(....4.............@..@.pdata........?.......?.............@..@.xdata..8{....A..|...TA.............@..@.bss..........D..........................edata..0-....D.......C.............@..@.idata..hX....D..Z....C.............@....CRT....`....0E......XD.............@....tls.........@E......ZD.............@....rsrc........PE......\D.............@....reloc...e...`E..f...`D.............@..B................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1089600
                                                                          Entropy (8bit):6.535744457220272
                                                                          Encrypted:false
                                                                          SSDEEP:24576:NFUq9wHzADwiB0Bm3k6gz0sA+wLDZyoFNRsKYw:TUdMDwIgm3kpzsNpyoFDsKYw
                                                                          MD5:3AAF57892F2D66F4A4F0575C6194F0F8
                                                                          SHA1:D65C9143603940EDE756D7363AB6750F6B45AB4E
                                                                          SHA-256:9E0D0A05B798DA5D6C38D858CE1AD855C6D68BA2F9822FA3DA16E148E97F9926
                                                                          SHA-512:A5F595D9C48B8D5191149D59896694C6DD0E9E1AF782366162D7E3C90C75B2914F6E7AFF384F4B59CA7C5A1ECCCDBF5758E90A6A2B14A8625858A599DCCA429B
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........f..X.....&"...&.2...b......P......................................... ......?....`... ......................................0 .xC.... ....... .h.......@>...x..H'.... ............................. Z..(..................... .P............................text....1.......2..................`..`.data........P.......6..............@....rdata...,...`.......8..............@..@.pdata..@>.......@...f..............@..@.xdata...K.......L..................@..@.bss......... ...........................edata..xC...0 ..D..................@..@.idata........ ......6..............@....CRT....`..... ......N..............@....tls.......... ......P..............@....rsrc...h..... ......R..............@....reloc........ ......V..............@..B................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):57488
                                                                          Entropy (8bit):6.382541157520703
                                                                          Encrypted:false
                                                                          SSDEEP:768:eQ6XULhGj8TzwsoeZwVAsuEIBh8v6H3eQdFyN+yghK3m5rR8vSoQuSd:ECVbTGkiE/c+XA3g2L7S
                                                                          MD5:71F796B486C7FAF25B9B16233A7CE0CD
                                                                          SHA1:21FFC41E62CD5F2EFCC94BAF71BD2659B76D28D3
                                                                          SHA-256:B2ACB555E6D5C6933A53E74581FD68D523A60BCD6BD53E4A12D9401579284FFD
                                                                          SHA-512:A82EA6FC7E7096C10763F2D821081F1B1AFFA391684B8B47B5071640C8A4772F555B953445664C89A7DFDB528C5D91A9ADDB5D73F4F5E7509C6D58697ED68432
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l............uU.....x.....x.....x....{...........ox....ox9....ox....Rich...........................PE..d......d.........."......f...N......p).........@....................................2.....`.....................................................................P........(......d.......T...............................8............................................text....e.......f.................. ..`.rdata...6.......8...j..............@..@.data...............................@....pdata..P...........................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..d...........................@..B................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:RAR archive data, v5
                                                                          Category:dropped
                                                                          Size (bytes):414206
                                                                          Entropy (8bit):7.999579797967773
                                                                          Encrypted:true
                                                                          SSDEEP:12288:2GGrNFDDiLrieAOW/WLup5RrfXs5sZ6psdHpTRFo:2GqNFqLnQ/We5Rrf5gpsdHD6
                                                                          MD5:3369EC99E74F030639BA5BB316B7A1F0
                                                                          SHA1:D703EDEC018861DEC872146989E49C756B2043CD
                                                                          SHA-256:F452D95C5A69B1E7B00A8BC90711C62EDC8221BE80A61CF73D3A426A0DD00D40
                                                                          SHA-512:ADE0797581BEB431153A21C95B7B3F8F9BB98B4AA5D0DA5DFE63198FBED6A34CD8AC87994AE10A58CF497862F46515738E487102A08DCC85C62BC8ABE6472575
                                                                          Malicious:false
                                                                          Preview:Rar!....C.-.!..........;.;...` !.7<[...pv.?{...f..Z.R]..h.U.)..Fr../A;<.1.... L*6..f.B+..\..p...@.......]_?..(..#L..0......3..^.-.5.ht...3..P.%...Zd9b.W..m..5R.{o@1-:4.....B2K..oC..*.6j....VF.....Y.q.tGA.A.?.k\..^.'s.[..}):...(J.jJ..6...HN..|.....V..l..L.)..~=s/ob.Y5@B#iw=cw.P.....m.{A...3.B.[...2.....b.8a..M.m...........v.i;.M.4wuQ.|.=.\.s7*a3..TT&a.....:SO..X.Gp.R.:'........C..+.k...!.E...(....P.."cJ...,..:......z%.maq.h{.;.cC.rBB..G.i.KZ.....a.*..=..jx.l...O.!.GM....M....)7..%p..sY..J.Ye.#\....-pl0S4.v.t.tps<+..je.qt..h.h....A. 5R....d..T]......Y.e#.......\.z.....;.....Q....@...x.c|.Bt........*...R...wGb....>..Y...1b..Im2.W.!..d..dL....4....^....O$.PN.\zl{..pJ)..XA.0.>:.cp.sK._..>I..V.......~.....|..E.....?....K5.!u...U{.M*-a......RRG..d..>T.....I.W.........vMWbX..>.*2G........l...&.2..;...v8.<.4...N.$.oD..Q"b.0..{...|..G.Y...uF..S~.nyY.d...B.%.3.o.7......`.,...!.wp.)..O....M...!*....HY......<Z... .1..}.y.\.K....c`....,M5.J....aEH*.. z%-4
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):566704
                                                                          Entropy (8bit):6.494428734965787
                                                                          Encrypted:false
                                                                          SSDEEP:12288:M/Wn7JnU0QUgqtLe1fqSKnqEXG6IOaaal7wC/QaDWxncycIW6zuyLQEKZm+jWodj:yN59IW6zuAQEKZm+jWodEEY1u
                                                                          MD5:6DA7F4530EDB350CF9D967D969CCECF8
                                                                          SHA1:3E2681EA91F60A7A9EF2407399D13C1CA6AA71E9
                                                                          SHA-256:9FEE6F36547D6F6EA7CA0338655555DBA6BB0F798BC60334D29B94D1547DA4DA
                                                                          SHA-512:1F77F900215A4966F7F4E5D23B4AAAD203136CB8561F4E36F03F13659FE1FF4B81CAA75FEF557C890E108F28F0484AD2BAA825559114C0DAA588CF1DE6C1AFAB
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y...................Z.........O.....O.....O.....O.....O.....O.6....O.....Rich...........................PE..d...%|.a.........." .....<...\.......)...................................................`A.........................................5..h...(...,............p...9...~...'......0.......T...............................8............P...............................text....;.......<.................. ..`.rdata..j....P.......@..............@..@.data...`:...0......................@....pdata...9...p...:...6..............@..@.rsrc................p..............@..@.reloc..0............t..............@..B................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):35656
                                                                          Entropy (8bit):6.370522595411868
                                                                          Encrypted:false
                                                                          SSDEEP:768:ixmeWkfdHAWcgj7Y7rEabyLcRwEpYinAMx1nyqaJ:pXUdg8jU7r4LcRZ7Hx1nyqa
                                                                          MD5:D3CAC4D7B35BACAE314F48C374452D71
                                                                          SHA1:95D2980786BC36FEC50733B9843FDE9EAB081918
                                                                          SHA-256:4233600651FB45B9E50D2EC8B98B9A76F268893B789A425B4159675B74F802AA
                                                                          SHA-512:21C8D73CC001EF566C1F3C7924324E553A6DCA68764ECB11C115846CA54E74BD1DFED12A65AF28D9B00DDABA04F987088AA30E91B96E050E4FC1A256FFF20880
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........D..D..D..M.3.J......F......W......N......G......F..D..l......A..D.........E...._.E......E..RichD..................PE..d................"....#.2...4......`7.........@..........................................`..................................................b..,....................d..H'......<....Z..p...........................`Y..@............P...............................text....1.......2.................. ..`.rdata..H"...P...$...6..............@..@.data...H............Z..............@....pdata...............\..............@..@.rsrc................`..............@..@.reloc..<............b..............@..B........................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):22
                                                                          Entropy (8bit):3.879664004902594
                                                                          Encrypted:false
                                                                          SSDEEP:3:mKDDlR+7H6U:hOD6U
                                                                          MD5:D9324699E54DC12B3B207C7433E1711C
                                                                          SHA1:864EB0A68C2979DCFF624118C9C0618FF76FA76C
                                                                          SHA-256:EDFACD2D5328E4FFF172E0C21A54CC90BAF97477931B47B0A528BFE363EF7C7E
                                                                          SHA-512:E8CC55B04A744A71157FCCA040B8365473C1165B3446E00C61AD697427221BE11271144F93F853F22906D0FEB61BC49ADFE9CBA0A1F3B3905E7AD6BD57655EB8
                                                                          Malicious:false
                                                                          Preview:@echo off..Start "" %1
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):158968
                                                                          Entropy (8bit):6.4238235663554955
                                                                          Encrypted:false
                                                                          SSDEEP:1536:izN/1rbQ+rTccg/Lla75jjVBzYCDNzuDQr5whduOd7EKPuh9Aco6uAGUtQFUzcnX:8N/FQ+rejlaFhdrXORhjD6VGUtQWk
                                                                          MD5:7FB892E2AC9FF6981B6411FF1F932556
                                                                          SHA1:861B6A1E59D4CD0816F4FEC6FD4E31FDE8536C81
                                                                          SHA-256:A45A29AECB118FC1A27ECA103EAD50EDD5343F85365D1E27211FE3903643C623
                                                                          SHA-512:986672FBB14F3D61FFF0924801AAB3E9D6854BB3141B95EE708BF5B80F8552D5E0D57182226BABA0AE8995A6A6F613864AB0E5F26C4DCE4EB88AB82B060BDAC5
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........O.....&"...&.h..........P.....................................................`... ...................................... .......0..T....`..........X....E..H'...p..................................(...................02...............................text....f.......h..................`..`.data................l..............@....rdata...Q.......R...n..............@..@.pdata..X...........................@..@.xdata..............................@..@.bss.....................................edata....... ......................@..@.idata..T....0......................@....CRT....X....@......................@....tls.........P......................@....rsrc........`......................@....reloc.......p......................@..B................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):707200
                                                                          Entropy (8bit):6.610520126248797
                                                                          Encrypted:false
                                                                          SSDEEP:12288:hTl8xt5jEuhuoWZz8Rt5brZcXVEZMbYwepVQ0G6ddTD8qevJMLf50555555555mj:hZ8xt5jEuhuoWZz8Rt5brZcXVEZMbYJz
                                                                          MD5:1144E36E0F8F739DB55A7CF9D4E21E1B
                                                                          SHA1:9FA49645C0E3BAE0EDD44726138D7C72EECE06DD
                                                                          SHA-256:65F8E4D76067C11F183C0E1670972D81E878E6208E501475DE514BC4ED8638FD
                                                                          SHA-512:A82290D95247A67C4D06E5B120415318A0524D00B9149DDDD8B32E21BBD0EE4D86BB397778C4F137BF60DDD4167EE2E9C6490B3018031053E9FE3C0D0B3250E7
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........-.....&"...&............P.....................................................`... ......................................P.......`..........x....P......8...H'......................................(....................c..`............................text...(...........................`..`.data...............................@....rdata...s.......t..................@..@.pdata.......P...0...&..............@..@.xdata...9.......:...V..............@..@.bss.....................................edata.......P......................@..@.idata.......`......................@....CRT....`....p......................@....tls................................@....rsrc...x...........................@....reloc..............................@..B................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):12124160
                                                                          Entropy (8bit):4.1175508751036585
                                                                          Encrypted:false
                                                                          SSDEEP:49152:opbNLHjtBKapOZoWPQ8MQvfyf3t+WpskQS+ZSZmpPwoe5GOSwleJiXACPQDk8p8j:o9NDU1eB1
                                                                          MD5:8A13CBE402E0BBF3DA56315F0EBA7F8E
                                                                          SHA1:EE8B33FA87D7FA04B9B7766BCF2E2C39C4F641EA
                                                                          SHA-256:7B5E6A18A805D030779757B5B9C62721200AD899710FF930FC1C72259383278C
                                                                          SHA-512:46B804321AB1642427572DD141761E559924AF5D015F3F1DD97795FB74B6795408DEAD5EA822D2EB8FBD88E747ECCAD9C3EE8F9884DFDB73E87FAD7B541391DA
                                                                          Malicious:false
                                                                          Preview:.................*.\.....................................+................................Ol.....................................">.............................d..3......................A.......@...... t.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................(#......(............... ................Java HotSpot(TM) 64-Bit Server VM (15.0.1+9-18) for windows-amd64 JRE (15.0.1+9-18), built on Sep 15 2020 14:43:54 by "mach5one" with unknown MS VC++:1925....................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Java jmod module version 1.0
                                                                          Category:dropped
                                                                          Size (bytes):51389
                                                                          Entropy (8bit):7.916683616123071
                                                                          Encrypted:false
                                                                          SSDEEP:768:GO5DN7hkJDEnwQm0aCDOdC4Lk1eo8eNEyu/73vVjPx5S+3TYWFwSvZt6xdWDvw:GO5h7hkREnyvo8QBuDNjfvD1/3vw
                                                                          MD5:8F4C0388762CD566EAE3261FF8E55D14
                                                                          SHA1:B6C5AA0BBFDDE8058ABFD06637F7BEE055C79F4C
                                                                          SHA-256:AAEFACDD81ADEEC7DBF9C627663306EF6B8CDCDF8B66E0F46590CAA95CE09650
                                                                          SHA-512:1EF4D8A9D5457AF99171B0D70A330B702E275DCC842504579E24FC98CC0B276F8F3432782E212589FC52AA93BBBC00A236FE927BE0D832DD083E8F5EBDEB67C2
                                                                          Malicious:false
                                                                          Preview:JM..PK.........n/Q................classes/module-info.classeP.N.0..../.$...pAM.D.p..!!..X...m.d'.....P7...biw..Y.?._...pM.m..X.q..2.D8o...o.0.J.s...,...".'..>..F..r..M..G.L......!.je.BG....:v.;..a@...Y...3..?.Y....\.m.).CBwn......'.N..+G+^*#.j...R.A..qV.1o...p.....|._.-N$.!.;X....|....G......qi.W{PK...^0.........PK.........n/Q............-...classes/java/awt/datatransfer/Clipboard.class.X.w.W....c...-.Ii...#.P..........@(`.......3.....R...........<....h..W.z......=.=~....l..DN..............;y.@7..#....2.P.._.WR.b.Km..f......9w1T...A.....d..b.r.Ie.Gq,..U+.kcC.be.*.eTe......K3.usU.2...Pe.4T.aYz....>!..q..3.dL.Q..fh/#..P.t.;.f,.."..7..v.(..K7}.2nZ;.Mg..OuzU..c.....!wR.xz....7...tG..d.ED..3...fs.{n\...x...r.!.#X.6.Ke.v........1n.P......#..P...J....)^.dt....k...k...F5...e$.d...=~Do.*t.2....KX....B.#Ha..U2n.j...+fh&....&.zk,.....>...aQ......kj...:.h.Q.uTv.B ......N....*..r'..x..D.4.`k 76fZ....fG..#.....7.4.:w..6....#...x..>lfh.B'.....'l..V.....5..H..
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Java jmod module version 1.0
                                                                          Category:dropped
                                                                          Size (bytes):41127
                                                                          Entropy (8bit):7.961466748192397
                                                                          Encrypted:false
                                                                          SSDEEP:768:L0xH2Z5C7/c8GqFsHWShYYptTpmPSB4gTQSq4Yz1jHoAsbjX:wxH66/crqiH3tTVTsSVYz1jIAsfX
                                                                          MD5:D039093C051B1D555C8F9B245B3D7FA0
                                                                          SHA1:C81B0DAEDAB28354DEA0634B9AE9E10EE72C4313
                                                                          SHA-256:4A495FC5D119724F7D40699BB5D2B298B0B87199D09129AEC88BBBDBC279A68D
                                                                          SHA-512:334FD85ACE22C90F8D4F82886EEF1E6583184369A031DCEE6E0B6624291F231D406A2CEC86397C1B94D535B36A5CF7CB632BB9149B8518B794CBFA1D18A2478F
                                                                          Malicious:false
                                                                          Preview:JM..PK.........n/Q................classes/module-info.classU.M..0..../..........LL...*A.$.t.\x..e,U.N.N..7o.....=B+..,.@..:.`.....`....L.,.".B.M......:...._..uBGf.5.M..g..."..8K\..B.".z..|=6.=1.KB..v,.yJ0/......[.r..OU`....Q}...kP.94oh...b..K{...].'PK........#...PK.........n/Q............2...classes/java/lang/instrument/ClassDefinition.class.SMo.@.}.8q.4M.@.h..b;... ..d.RP$.c...#g...#@.....@.G..........7o.......@.-..J.T.eT..'.......tt.=.P9.C_t.J.5... ...Y...z|*.(..TE...e.....(.......v?pg....<...I.1.:....H.U...1.)..p...P.......|...04..Q..2...%..8~.......#..p"...n..<.Uq..=..:.c..1.2...x.o.w..#....^?q.I..:..Y...6...N..c..>2.k.U...L..&V.H...%....y...[.~GJ...B/M......%...t....+.I.E....H..}....m..j_..8C...:.n...(*..z..Z.Q...$....a.}..T.xW.$....52...T.o..mSL_~.L.FM....W.z.I.]....)..e.....A..$..xH...Td...0i..."...0X....PK..X..~........PK.........n/Q............7...classes/java/lang/instrument/ClassFileTransformer.class.S.n.@.=.8.M.n..b^-/..G..
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Java jmod module version 1.0
                                                                          Category:dropped
                                                                          Size (bytes):113725
                                                                          Entropy (8bit):7.928841651831531
                                                                          Encrypted:false
                                                                          SSDEEP:3072:6jB5A+VPT8IdtpHAUfEzhLpIrxbt2rlnH6:6ZRTPHgU2pItshH6
                                                                          MD5:3A03EF8F05A2D0472AE865D9457DAB32
                                                                          SHA1:7204170A08115A16A50D5A06C3DE7B0ADB6113B1
                                                                          SHA-256:584D15427F5B0AC0CE4BE4CAA2B3FC25030A0CF292F890C6D3F35836BC97FA6D
                                                                          SHA-512:1702C6231DAAB27700160B271C3D6171387F89DA0A97A3725B4B9D404C94713CB09BA175DE8E78A8F0CBD8DD0DD73836A38C59CE8D1BD38B4F57771CF9536E77
                                                                          Malicious:false
                                                                          Preview:JM..PK.........n/Q................classes/module-info.classuQ.N.1.=W......n\1.D.5$&....T...2%....\..~..3(......9.6...o....%..:L...x.=..p..L.......".Gm......*..Z9.R+...}x..$.Y,,..-..z..{.v.K..:9m[.dl....Q#t..F$:5c..h.*.^x".8 \N..A!....O....@.0.Z....p]......0_(.mB...=.J..<.k"4....g<......M$,....:Kz|..^.........8q..{...}.*G....p.S.W...l.M.....PK..R...).......PK.........n/Q................classes/java/util/logging/ConsoleHandler.class}S[o.A...KW..jk.....jy...K.b.R.mH|.......2.K....h...G..,..K...s..r......7....d.u....C...y3..j*..2...1..!wx..2T:.T...b.^..`.D[...0....n.cXy#C..e...=.E.....]..%L..<x.....W........z..u.s..a.e..Zq..-.E@n.!..)....F...\.E...<...[.;W..t.i%.mT".w.x..(.m,...r.....tZ..vPepFI_...D..b..0.U...S;....XP.@..C.#Cq..}aNy_..ZG...q#m<;..g2b.]"..Y.....[7."+..#"wOtb..-..."..@..(.>Y0......C.h...?.~..8A.Mp.....N....Z$ .E...."o.E.uz3;..m.P.z.....7...?.'.q>...2mN.gLv...q1..[}..@~..M.....K..sS.....PK....0w........PK.........n/Q............,...classes/ja
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Java jmod module version 1.0
                                                                          Category:dropped
                                                                          Size (bytes):896846
                                                                          Entropy (8bit):7.923431656723031
                                                                          Encrypted:false
                                                                          SSDEEP:12288:3xz+ej0yUGnip25kAyyrAm0G4hcpbLIWFWb4YNlgWUz4u5cnLXlAVz/Q+9Ec8zCU:3cZpcryy8mp4hpSxWUQuV//yDXX
                                                                          MD5:C6FBB7D49CAA027010C2A817D80CA77C
                                                                          SHA1:4191E275E1154271ABF1E54E85A4FF94F59E7223
                                                                          SHA-256:1C8D9EFAEB087AA474AD8416C3C2E0E415B311D43BCCA3B67CBF729065065F09
                                                                          SHA-512:FDDC31FA97AF16470EA2F93E3EF206FFB217E4ED8A5C379D69C512652987E345CB977DB84EDA233B190181C6E6E65C173062A93DB3E6BB9EE7E71472C9BBFE34
                                                                          Malicious:false
                                                                          Preview:JM..PK.........n/Q................classes/module-info.class.S.N.A.=-.............^PQP4F..|..]{.........S|...(cu/..i.d.z...[....'.M|`.M.GrI.).1.4...8...V.b.EE.Rg...zV.K......Os.W.S?.e.GY.Q`.od..d..Zf....2>.B.29.D.3L7...M&....8.;..2...}..n..n.g...S. ?..._V..Q..9mBo0L..~dD.t.c.ric..2r5qLvr..V....Sm..I}.}.a..Od$2e..M.v.m..w....L..s.C.;...#.f..Ln.......5..9.2....5......P......M.$V.|;...'mw.Vl.2....D..1%.l.a..o...O....!.......h...9V.L.x..?..n]/.6......iVe..{.4.K..s.[....y..|2....3,`.a.....H69.a.;09.5K.C....a_.G.`Jm...ER......9I.D.n...Wp........%..WI...tf..pg5..SN.8y..Y'.:9....U.pq.....}.]X..aE....^t..x.l...^....m.#.......a."r.l.2..Lf).y.^.h..u....PK....N.i.......PK.........n/Q............0...classes/com/sun/jmx/defaults/JmxProperties.class.UMS#U.=.aH.4.4.....J2...h..6v.L2q.......tS.)F........\.....Y..h2...*...{.......w..8Ha.....p.C.c..C;..^+S...F.0..xNt....J5.$.b.og..9l.g....Q..k......"..I....b....-..^.n..<x..4.$pY.(..,\~.F..0...Z<`X[...(p...u^.
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):639224
                                                                          Entropy (8bit):6.219852228773659
                                                                          Encrypted:false
                                                                          SSDEEP:12288:FgLcjQQPKZZK8aF4yBj3Fnx4DMDO8jalo:FggjQKuyDnxvOYaC
                                                                          MD5:01DACEA3CBE5F2557D0816FC64FAE363
                                                                          SHA1:566064A9CB1E33DB10681189A45B105CDD504FD4
                                                                          SHA-256:B4C96B1E5EEE34871D9AB43BCEE8096089742032C0669DF3C9234941AAC3D502
                                                                          SHA-512:C22BFE54894C26C0BD8A99848B33E1B9A9859B3C0C893CB6039F9486562C98AA4CEAB0D28C98C1038BD62160E03961A255B6F8627A7B2BB51B86CC7D6CBA9151
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........*...D..D..D.....D.1J...D...@..D...G..D...A..D...E..D..E..D...E..D..E.O.D...A..D...D..D......D.....D...F..D.Rich..D.........PE..d.....-a.........." ...............................................................E..... .....................................................,.......@....p..xK..................`...T.......................(.......................(............................text............................... ..`.rdata..H=.......>..................@..@.data....H... ...@..................@....pdata..xK...p...L...J..............@..@.rsrc...@...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):98224
                                                                          Entropy (8bit):6.452201564717313
                                                                          Encrypted:false
                                                                          SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                          MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                          SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                          SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                          SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):37256
                                                                          Entropy (8bit):6.297533243519742
                                                                          Encrypted:false
                                                                          SSDEEP:384:5hnvMCmWEKhUcSLt5a9k6KrOE5fY/ntz5txWE6Wc+Xf0+uncS7IO5WrCKWU/tQ0g:YCm5KhUcwrHY/ntTxT6ov07b4SwY1zl
                                                                          MD5:135359D350F72AD4BF716B764D39E749
                                                                          SHA1:2E59D9BBCCE356F0FECE56C9C4917A5CACEC63D7
                                                                          SHA-256:34048ABAA070ECC13B318CEA31425F4CA3EDD133D350318AC65259E6058C8B32
                                                                          SHA-512:CF23513D63AB2192C78CAE98BD3FEA67D933212B630BE111FA7E03BE3E92AF38E247EB2D3804437FD0FDA70FDC87916CD24CF1D3911E9F3BFB2CC4AB72B459BA
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D_.O.>...>...>...N...>..RK...>...F^..>...>..1>..RK...>..RK...>..RK...>..RK...>..RK2..>..RK...>..Rich.>..........................PE..d...)|.a.........." .....:...6......`A....................................................`A.........................................l.......m..x....................n...#......<...(b..T............................b..8............P..X............................text...e9.......:.................. ..`.rdata.. "...P...$...>..............@..@.data... ............b..............@....pdata...............d..............@..@.rsrc................h..............@..@.reloc..<............l..............@..B................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):53576
                                                                          Entropy (8bit):6.371750593889357
                                                                          Encrypted:false
                                                                          SSDEEP:1536:ij2SSS5nVoSiH/pOfv3Q3cY37Hx1nI6q:GhSSntiH/pOfvAf3
                                                                          MD5:E1EEBD44F9F4B52229D6E54155876056
                                                                          SHA1:052CEA514FC3DA5A23DE6541F97CD4D5E9009E58
                                                                          SHA-256:D96F2242444A334319B4286403D4BFADAF3F9FCCF390F3DD40BE32FB48CA512A
                                                                          SHA-512:235BB9516409A55FE7DDB49B4F3179BDCA406D62FD0EC1345ACDDF032B0F3F111C43FF957D4D09AD683D39449C0FFC4C050B387507FADF5384940BD973DAB159
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........*.<.K.o.K.o.K.o.3.o.K.oK7.n.K.oK7so.K.oK7.n.K.oK7.n.K.oK7.n.K.o'9.n.K.o.K.o.K.o,6.n.K.o,6.n.K.o,6qo.K.o.K.o.K.o,6.n.K.oRich.K.o........PE..d....Q............" ...#.b...J.......f............................................../.....`............................................X...(...........................H'......8.......p...........................P...@...............@............................text...ha.......b.................. ..`.rdata..P,...........f..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..8...........................@..B........................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):144200
                                                                          Entropy (8bit):6.592048391646652
                                                                          Encrypted:false
                                                                          SSDEEP:1536:GjxOs8gLeu4iSssNiTh9Yks32X3KqVy5SmBolzXfqLROJA0o1ZXMvr7Rn6dheIOI:I34iDsG5vm4bfqFKoDmr7h2MHTtwV6K
                                                                          MD5:3A0DBC5701D20AA87BE5680111A47662
                                                                          SHA1:BC581374CA1EBE8565DB182AC75FB37413220F03
                                                                          SHA-256:D53BC4348AD6355C20F75ED16A2F4F641D24881956A7AE8A0B739C0B50CF8091
                                                                          SHA-512:4740945606636C110AB6C365BD1BE6377A2A9AC224DE6A79AA506183472A9AD0641ECC63E5C5219EE8097ADEF6533AB35E2594D6F8A91788347FDA93CDB0440E
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...&............P....................................................`... ......................................0..|....@..8....p..................H'......................................(....................A..p............................text...............................`..`.data...............................@....rdata...W.......X..................@..@.pdata..............................@..@.xdata..............................@..@.bss......... ...........................edata..|....0......................@..@.idata..8....@......................@....CRT....X....P......................@....tls.........`......................@....rsrc........p......................@....reloc..............................@..B................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {B718D2D5-5B2B-4FC0-A4F1-F7E037EFCECD}, Number of Words: 10, Subject: Strave App, Author: Triaox Completely Solutions, Name of Creating Application: Strave App, Template: x64;2057, Comments: This installer database contains the logic and data required to install Strave App., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Dec 29 14:53:47 2024, Last Saved Time/Date: Sun Dec 29 14:53:47 2024, Last Printed: Sun Dec 29 14:53:47 2024, Number of Pages: 450
                                                                          Category:dropped
                                                                          Size (bytes):60716544
                                                                          Entropy (8bit):7.214700130079004
                                                                          Encrypted:false
                                                                          SSDEEP:1572864:BrQVmrjV7eIvnOTZscak5wE7nTZh8MoF:9TRc7XzVC5
                                                                          MD5:0A208AA5E80A1E3A42FA60331F14907B
                                                                          SHA1:418259C831D919BF0BC9F5A46EAA6B803AB1B3BF
                                                                          SHA-256:E218B230E70D84CA9246961436261D6435095B2C3E0DF1544E5DE0ECD6BD4094
                                                                          SHA-512:5BBAD3BBE549032505FD82462BD279E6F7A5BA963EB0E6234A9150C76D3EA543FAEC9995DAC5A42B320D1F0BF2B2FA95E11B5DFD366A9DAD6248B99E87C93A06
                                                                          Malicious:false
                                                                          Preview:......................>............................................2..................................................................x...............................................................................................................................................%...&...'...(...)...*...................................................Z"..."..E#..F#..G#..H#..I#..J#..K#..L#..M#..N#..O#..P#..Q#..R#..S#..T#..U#...+...+...,...,...,...,...,...,...,..-0...0../0..00...2...2...2...2...2...2...2...2..............d...........................8...............B................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-...7.../...0...1...2...3...4...5...6.......9...M...:...;...<...=...>...?...@...A...D...C...J...E...F...G...H...I...X...K...L...e...N...O...P...Q...R...S...T...U...V...W...("..""..Z...[...\...]...^..._...`...a...b...c.......~...f...g...h...i...j...k...l...m...n...o...p...q...r.......t...u...v...w...x...y...z...
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {B718D2D5-5B2B-4FC0-A4F1-F7E037EFCECD}, Number of Words: 10, Subject: Strave App, Author: Triaox Completely Solutions, Name of Creating Application: Strave App, Template: x64;2057, Comments: This installer database contains the logic and data required to install Strave App., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Dec 29 14:53:47 2024, Last Saved Time/Date: Sun Dec 29 14:53:47 2024, Last Printed: Sun Dec 29 14:53:47 2024, Number of Pages: 450
                                                                          Category:dropped
                                                                          Size (bytes):60716544
                                                                          Entropy (8bit):7.214700130079004
                                                                          Encrypted:false
                                                                          SSDEEP:1572864:BrQVmrjV7eIvnOTZscak5wE7nTZh8MoF:9TRc7XzVC5
                                                                          MD5:0A208AA5E80A1E3A42FA60331F14907B
                                                                          SHA1:418259C831D919BF0BC9F5A46EAA6B803AB1B3BF
                                                                          SHA-256:E218B230E70D84CA9246961436261D6435095B2C3E0DF1544E5DE0ECD6BD4094
                                                                          SHA-512:5BBAD3BBE549032505FD82462BD279E6F7A5BA963EB0E6234A9150C76D3EA543FAEC9995DAC5A42B320D1F0BF2B2FA95E11B5DFD366A9DAD6248B99E87C93A06
                                                                          Malicious:false
                                                                          Preview:......................>............................................2..................................................................x...............................................................................................................................................%...&...'...(...)...*...................................................Z"..."..E#..F#..G#..H#..I#..J#..K#..L#..M#..N#..O#..P#..Q#..R#..S#..T#..U#...+...+...,...,...,...,...,...,...,..-0...0../0..00...2...2...2...2...2...2...2...2..............d...........................8...............B................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-...7.../...0...1...2...3...4...5...6.......9...M...:...;...<...=...>...?...@...A...D...C...J...E...F...G...H...I...X...K...L...e...N...O...P...Q...R...S...T...U...V...W...("..""..Z...[...\...]...^..._...`...a...b...c.......~...f...g...h...i...j...k...l...m...n...o...p...q...r.......t...u...v...w...x...y...z...
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1201504
                                                                          Entropy (8bit):6.4557937684843365
                                                                          Encrypted:false
                                                                          SSDEEP:24576:W4FsQxRqkY1ngOktwC2Tec+4VGWSlnH/YrjPWeTIUGVUrHtAkJMsFUh29BKjxw:D2QxNwCsec+4VGWSlnfYvO3UGVUrHtAg
                                                                          MD5:E83D774F643972B8ECCDB3A34DA135C5
                                                                          SHA1:A58ECCFB12D723C3460563C5191D604DEF235D15
                                                                          SHA-256:D0A6F6373CFB902FCD95BC12360A9E949F5597B72C01E0BD328F9B1E2080B5B7
                                                                          SHA-512:CB5FF0E66827E6A1FA27ABDD322987906CFDB3CDB49248EFEE04D51FEE65E93B5D964FF78095866E197448358A9DE9EC7F45D4158C0913CBF0DBD849883A6E90
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............@G..@G..@G.yCF..@G.yEF..@G.|CF..@G.|DF..@G.|EF..@G.yDF..@G.yAF..@G..AG..@G.}IF..@G.}@F..@G.}.G..@G...G..@G.}BF..@GRich..@G........PE..L...'.$g.........."!...).~..........Pq.......................................`......0.....@A........................ ...t...............................`=.......l......p........................... ...@...............L............................text...J}.......~.................. ..`.rdata...;.......<..................@..@.data...............................@....fptable............................@....rsrc...............................@..@.reloc...l.......n..................@..B........................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1021792
                                                                          Entropy (8bit):6.608727172078022
                                                                          Encrypted:false
                                                                          SSDEEP:24576:2Nmq6KGDx4JYKcP/+h0lhSMXl+GGXo8Wea/xwuX:Ymq6KGk/cHrOGGY8Wea/xwuX
                                                                          MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
                                                                          SHA1:1EB7C1304B7BCA649C2A5902B18A1EA57CEAA532
                                                                          SHA-256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
                                                                          SHA-512:2DD2E4E66D2F2277F031C5F3C829A31C3B29196AB27262C6A8F1896A2113A1BE1687C9E8CD9667B89157F099DFB969EF14AE3EA602D4C772E960BC41D39C3D05
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L.....$g.........."!...).....`...... ........ ...........................................@A............................L...,...@....................Z..`=......\....K..p....................L...... K..@............ ...............................text............................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):380520
                                                                          Entropy (8bit):6.512348002260683
                                                                          Encrypted:false
                                                                          SSDEEP:6144:ZSXJmYiFGLzkhEFeCPGi5B8dZ6t+6bUSfcqKgAST:ZSXJ9khElPGvcttbxpAST
                                                                          MD5:FFDAACB43C074A8CB9A608C612D7540B
                                                                          SHA1:8F054A7F77853DE365A7763D93933660E6E1A890
                                                                          SHA-256:7484797EA4480BC71509FA28B16E607F82323E05C44F59FFA65DB3826ED1B388
                                                                          SHA-512:A9BD31377F7A6ECF75B1D90648847CB83D8BD65AD0B408C4F8DE6EB50764EEF1402E7ACDFF375B7C3B07AC9F94184BD399A10A22418DB474908B5E7A1ADFE263
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^..?{..?{..?{..x..?{..~..?{...x..?{......?{...~..?{.....?{..z..?{..?z..>{..r..?{..{..?{....?{..?.?{..y..?{.Rich.?{.........PE..L...>.$g.........."!...)..................... .......................................'....@A........................@3..X....3.......... ...............h:.......6..@...p...............................@............ ..(............................text...J........................... ..`.rdata...$... ...&..................@..@.data....!...P......................@....fptable.............@..............@....rsrc... ............B..............@..@.reloc...6.......8...\..............@..B........................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):215952
                                                                          Entropy (8bit):4.955742829148174
                                                                          Encrypted:false
                                                                          SSDEEP:1536:2RGj79WTU1Z0Ceau0a/r3NLZZOjjDcC7uFFy9Z8YJNs9Z7E9ykEI:2S79L1Z0vZXJZYDFufyXbJNCc1
                                                                          MD5:E2412B66D18CBF9050222FDCC36392D8
                                                                          SHA1:B274228AA1721812F884881EC5013FDE818F9140
                                                                          SHA-256:DCD0CDF75E4D0CA5625737EF06321F9BD2885FAB99CAD2D6A3C4D08AB96C282D
                                                                          SHA-512:2B8754A984BACE456B4A8194216DCC60E60DC53E90A975520086A5E82FF9547A895260EEC5DB3D526F8506C52100A41D9582D8EF8BB3AC1D229806E4D371BA98
                                                                          Malicious:false
                                                                          Preview:...@IXOS.@.....@.a.Y.@.....@.....@.....@.....@.....@......&.{BF1831C0-1107-42C4-BDAA-42DC366AB277}..Strave App..setup.msi.@.....@.....@.....@......icon_24.exe..&.{B718D2D5-5B2B-4FC0-A4F1-F7E037EFCECD}.....@.....@.....@.....@.......@.....@.....@.......@......Strave App......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@3....@.....@.]....&.{F39C344E-A83E-4760-8DA8-F27602095B4F}F.C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\.@.......@.....@.....@......&.{BC83E781-7DE2-47A8-97C3-2E6CC9BCAD82};.21:\Software\Triaox Completely Solutions\Strave App\Version.@.......@.....@.....@......&.{279C32E3-A00A-4513-9A8B-D3984A41A6FB}O.C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\utest.dll.@.......@.....@.....@......&.{B61B35E4-8BE1-4171-B69B-E2423CE9179F}V.C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\vcruntime140.dll.@...
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):787808
                                                                          Entropy (8bit):6.693392695195763
                                                                          Encrypted:false
                                                                          SSDEEP:24576:aE33f8zyjmfyY43pNRmkL7mh0lhSMXlEeGXDMGz+:L3fSyjmfyY43pNRp7T0eGwGz+
                                                                          MD5:8CF47242B5DF6A7F6D2D7AF9CC3A7921
                                                                          SHA1:B51595A8A113CF889B0D1DD4B04DF16B3E18F318
                                                                          SHA-256:CCB57BDBB19E1AEB2C8DD3845CDC53880C1979284E7B26A1D8AE73BBEAF25474
                                                                          SHA-512:748C4767D258BFA6AD2664AA05EF7DC16F2D204FAE40530430EF5D1F38C8F61F074C6EC6501489053195B6B6F6E02D29FDE970D74C6AE97649D8FE1FD342A288
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............m..m..m.'n..m.'h.q.m.'i..m.."i..m.."n..m.."h..m.'l..m..l..m.#d..m.#m..m.#...m.....m.#o..m.Rich.m.........PE..L.....$g.........."!...).....4............................................... ............@A........................@J.......J..........................`=......4`...~..p........................... ~..@............................................text............................... ..`.rdata..Z...........................@..@.data...D-...`.......B..............@....fptable.............^..............@....rsrc................`..............@..@.reloc..4`.......b...f..............@..B........................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):20480
                                                                          Entropy (8bit):1.1616813671975863
                                                                          Encrypted:false
                                                                          SSDEEP:12:JSbX72Fj7AGiLIlHVRpMh/7777777777777777777777777vDHFGYvcp3Xl0i8Q:JlQI5cMCe6F
                                                                          MD5:2BE3DA870109C2E7B546E2ABD1EBE36E
                                                                          SHA1:B1DBA023218E5492473C718B33EDF523B7AEE1F4
                                                                          SHA-256:07995BE8367D74973DAA1C7C76B4744CE7B78F3717CFC010EF7F6289F3D7D1FE
                                                                          SHA-512:4A3F50275FAD779E81C878AE8DEF61DB1F4D08BA25CFB45755254811F38CA8F25EA075A7ECD0637CE44A432C5F2D029D1B2CFF3FEE3A022D49173C789F96C79D
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):20480
                                                                          Entropy (8bit):1.5848109990092094
                                                                          Encrypted:false
                                                                          SSDEEP:48:n8PhuuRc06WXOCFT5E4SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:mhu1UFTqsEChMXG
                                                                          MD5:5AD7E02D2DCA66A5405E2F59ED645044
                                                                          SHA1:FADD7177F9787E6CBE89668811DC61FF75C1911E
                                                                          SHA-256:2F0F875918122589E3B8A9D8B6804609DF6A786F15B4DFFD63BB0FE5F6C60D03
                                                                          SHA-512:1A8A3EDAE48F9CF1C0D5BC1871F0A5566A49F95D23A555C819DBDDA7DF7E1C0C55012D2500805EEF74A2CBCF25C41789727AD598BCBAD10AD875B2CF1A98DAAC
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):432221
                                                                          Entropy (8bit):5.375164705265607
                                                                          Encrypted:false
                                                                          SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauA:zTtbmkExhMJCIpEr5
                                                                          MD5:8DE1A7E178502E35792DE7C5CD49DA21
                                                                          SHA1:90C95D82288620DAFF2182999CA87FE4816A01FC
                                                                          SHA-256:D8EA3ED4B9B070E5310218D7B8FFF15DECCAA7FA0287644FE744B3E521D3569F
                                                                          SHA-512:F910ECC858CC5F2E3C267D29203B4A2C737958280A588A5B59F492886D7483575419EF42AD390A6DA42908FFD3048FD57A8D75863E2C74CEFFF2F5D488FD3FD2
                                                                          Malicious:false
                                                                          Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):32768
                                                                          Entropy (8bit):1.268631131908713
                                                                          Encrypted:false
                                                                          SSDEEP:48:GRmuMPvcFXOTT524SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:+meOTcsEChMXG
                                                                          MD5:7BF66315892299703F3AD30E2BA399BC
                                                                          SHA1:E493AEAF94F15067C1E1D18A6F90AA493B34A121
                                                                          SHA-256:D7D866DBC5201054003E29A2EB023B7C6BB532DF35950A4410C2EFAFCBA6E919
                                                                          SHA-512:882ED596BE9562BE9BA8CF757089B39BD4953A3519FDE0D374603126189B47F85B58D92D10E3572D015F980AC3AE2456401399AF64BAD1FC5690057B2D68DC8F
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):20480
                                                                          Entropy (8bit):1.5848109990092094
                                                                          Encrypted:false
                                                                          SSDEEP:48:n8PhuuRc06WXOCFT5E4SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:mhu1UFTqsEChMXG
                                                                          MD5:5AD7E02D2DCA66A5405E2F59ED645044
                                                                          SHA1:FADD7177F9787E6CBE89668811DC61FF75C1911E
                                                                          SHA-256:2F0F875918122589E3B8A9D8B6804609DF6A786F15B4DFFD63BB0FE5F6C60D03
                                                                          SHA-512:1A8A3EDAE48F9CF1C0D5BC1871F0A5566A49F95D23A555C819DBDDA7DF7E1C0C55012D2500805EEF74A2CBCF25C41789727AD598BCBAD10AD875B2CF1A98DAAC
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):32768
                                                                          Entropy (8bit):0.06909318256452635
                                                                          Encrypted:false
                                                                          SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOcA865vryVky6l3X:2F0i8n0itFzDHFGYv93X
                                                                          MD5:4E5ACB8D8782544BB9067F5A1B6DD668
                                                                          SHA1:E21872BB0638A131E9DF2C4AAAC4D73C41DD30E6
                                                                          SHA-256:8402DACDF17735DAE1DB1F16460651A7F0A061C2DBEB103306D345D2831F14E8
                                                                          SHA-512:BBF4FC45ACBD9138DA0891EB0D69D3175857BDA35F1EE4FEA4EE049269A7E9B75368177603C0B87E1AA9A4A0655F3DEC517883096BA1B223572E827EF5FE8AC4
                                                                          Malicious:false
                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):512
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                          Malicious:false
                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):512
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                          Malicious:false
                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):32768
                                                                          Entropy (8bit):1.268631131908713
                                                                          Encrypted:false
                                                                          SSDEEP:48:GRmuMPvcFXOTT524SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:+meOTcsEChMXG
                                                                          MD5:7BF66315892299703F3AD30E2BA399BC
                                                                          SHA1:E493AEAF94F15067C1E1D18A6F90AA493B34A121
                                                                          SHA-256:D7D866DBC5201054003E29A2EB023B7C6BB532DF35950A4410C2EFAFCBA6E919
                                                                          SHA-512:882ED596BE9562BE9BA8CF757089B39BD4953A3519FDE0D374603126189B47F85B58D92D10E3572D015F980AC3AE2456401399AF64BAD1FC5690057B2D68DC8F
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):512
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                          Malicious:false
                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):32768
                                                                          Entropy (8bit):1.268631131908713
                                                                          Encrypted:false
                                                                          SSDEEP:48:GRmuMPvcFXOTT524SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:+meOTcsEChMXG
                                                                          MD5:7BF66315892299703F3AD30E2BA399BC
                                                                          SHA1:E493AEAF94F15067C1E1D18A6F90AA493B34A121
                                                                          SHA-256:D7D866DBC5201054003E29A2EB023B7C6BB532DF35950A4410C2EFAFCBA6E919
                                                                          SHA-512:882ED596BE9562BE9BA8CF757089B39BD4953A3519FDE0D374603126189B47F85B58D92D10E3572D015F980AC3AE2456401399AF64BAD1FC5690057B2D68DC8F
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                          Category:dropped
                                                                          Size (bytes):20480
                                                                          Entropy (8bit):1.5848109990092094
                                                                          Encrypted:false
                                                                          SSDEEP:48:n8PhuuRc06WXOCFT5E4SPD8lQMoAECiCyKSCD8l5oiXOD8lQSCD8lIT:mhu1UFTqsEChMXG
                                                                          MD5:5AD7E02D2DCA66A5405E2F59ED645044
                                                                          SHA1:FADD7177F9787E6CBE89668811DC61FF75C1911E
                                                                          SHA-256:2F0F875918122589E3B8A9D8B6804609DF6A786F15B4DFFD63BB0FE5F6C60D03
                                                                          SHA-512:1A8A3EDAE48F9CF1C0D5BC1871F0A5566A49F95D23A555C819DBDDA7DF7E1C0C55012D2500805EEF74A2CBCF25C41789727AD598BCBAD10AD875B2CF1A98DAAC
                                                                          Malicious:false
                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):512
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                          Malicious:false
                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):512
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                          Malicious:false
                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):73728
                                                                          Entropy (8bit):0.14534892780615877
                                                                          Encrypted:false
                                                                          SSDEEP:48:3TeD8lQSCD8llD8lQMoAECiCyKSCD8l5oiXd44:q5EChMXd
                                                                          MD5:62AD3FBF8D559AD2DB586B8DE1667814
                                                                          SHA1:540CDA0A1890BBB82B7F2311632E3588721244A7
                                                                          SHA-256:EF36502E25E5CB9733B48B7F7420052A0075CFB7DE8E8B1EB277D3F37A564557
                                                                          SHA-512:2EE1FFF8D99AB90ABD16F7F7801D095DCE3B76D45AD1A80B8C7FC3B226EBC884BD23193184C6CE097E1D69B8442F692C0C1F4647732D88AC75E85B5F36CB8F75
                                                                          Malicious:false
                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):638
                                                                          Entropy (8bit):4.751962275036146
                                                                          Encrypted:false
                                                                          SSDEEP:12:ku/L92WF4gx9l+jsPczo/CdaD0gwiSrlEX6OPkRVdoaQLeU4wv:ku/h5F4Bs0oCdalwisCkRVKVeU4wv
                                                                          MD5:15CA959638E74EEC47E0830B90D0696E
                                                                          SHA1:E836936738DCB6C551B6B76054F834CFB8CC53E5
                                                                          SHA-256:57F2C730C98D62D6C84B693294F6191FD2BEC7D7563AD9963A96AE87ABEBF9EE
                                                                          SHA-512:101390C5D2FA93162804B589376CF1E4A1A3DD4BDF4B6FE26D807AFC3FF80DA26EE3BAEB731D297A482165DE7CA48508D6EAA69A5509168E9CEF20B4A88A49FD
                                                                          Malicious:false
                                                                          Preview:[createdump] createdump [options] pid..-f, --name - dump path and file name. The default is '%TEMP%\dump.%p.dmp'. These specifiers are substituted with following values:.. %p PID of dumped process... %e The process executable filename... %h Hostname return by gethostname()... %t Time of dump, expressed as seconds since the Epoch, 1970-01-01 00:00:00 +0000 (UTC)...-n, --normal - create minidump...-h, --withheap - create minidump with heap (default)...-t, --triage - create triage minidump...-u, --full - create full core dump...-d, --diag - enable diagnostic messages...-v, --verbose - enable verbose diagnostic messages...
                                                                          File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {B718D2D5-5B2B-4FC0-A4F1-F7E037EFCECD}, Number of Words: 10, Subject: Strave App, Author: Triaox Completely Solutions, Name of Creating Application: Strave App, Template: x64;2057, Comments: This installer database contains the logic and data required to install Strave App., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Dec 29 14:53:47 2024, Last Saved Time/Date: Sun Dec 29 14:53:47 2024, Last Printed: Sun Dec 29 14:53:47 2024, Number of Pages: 450
                                                                          Entropy (8bit):7.214700130079004
                                                                          TrID:
                                                                          • Windows SDK Setup Transform Script (63028/2) 88.73%
                                                                          • Generic OLE2 / Multistream Compound File (8008/1) 11.27%
                                                                          File name:setup.msi
                                                                          File size:60'716'544 bytes
                                                                          MD5:0a208aa5e80a1e3a42fa60331f14907b
                                                                          SHA1:418259c831d919bf0bc9f5a46eaa6b803ab1b3bf
                                                                          SHA256:e218b230e70d84ca9246961436261d6435095b2c3e0df1544e5de0ecd6bd4094
                                                                          SHA512:5bbad3bbe549032505fd82462bd279e6f7a5ba963eb0e6234a9150c76d3ea543faec9995dac5a42b320d1f0bf2b2fa95e11b5dfd366a9dad6248b99e87c93a06
                                                                          SSDEEP:1572864:BrQVmrjV7eIvnOTZscak5wE7nTZh8MoF:9TRc7XzVC5
                                                                          TLSH:1CD76C01B3FA4148F2F75EB17EBA85A5947ABD521B30C0EF1244A60E1B71BC25BB1763
                                                                          File Content Preview:........................>............................................2..................................................................x......................................................................................................................
                                                                          Icon Hash:2d2e3797b32b2b99
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-30T18:14:11.975703+01002829202ETPRO MALWARE MSIL/Zbrain PUP/Stealer Installer UA1192.168.2.449730104.21.0.151443TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 30, 2024 18:14:11.411066055 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.411119938 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:11.411217928 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.414928913 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.414949894 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:11.920999050 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:11.921087027 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.970818043 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.970860004 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:11.971193075 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:11.971249104 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.975451946 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.975528002 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:11.975569010 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:12.419101954 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:12.419164896 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:12.419275045 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:12.419300079 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:12.419595957 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:12.419616938 CET44349730104.21.0.151192.168.2.4
                                                                          Dec 30, 2024 18:14:12.419631004 CET49730443192.168.2.4104.21.0.151
                                                                          Dec 30, 2024 18:14:12.419677019 CET49730443192.168.2.4104.21.0.151
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 30, 2024 18:14:11.351742983 CET6181153192.168.2.41.1.1.1
                                                                          Dec 30, 2024 18:14:11.407079935 CET53618111.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 30, 2024 18:14:11.351742983 CET192.168.2.41.1.1.10x7674Standard query (0)kevinflansburg.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 30, 2024 18:14:11.407079935 CET1.1.1.1192.168.2.40x7674No error (0)kevinflansburg.com104.21.0.151A (IP address)IN (0x0001)false
                                                                          Dec 30, 2024 18:14:11.407079935 CET1.1.1.1192.168.2.40x7674No error (0)kevinflansburg.com172.67.151.29A (IP address)IN (0x0001)false
                                                                          • kevinflansburg.com
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449730104.21.0.1514437112C:\Windows\SysWOW64\msiexec.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-30 17:14:11 UTC196OUTPOST /updater.php HTTP/1.1
                                                                          Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                          User-Agent: AdvancedInstaller
                                                                          Host: kevinflansburg.com
                                                                          Content-Length: 71
                                                                          Cache-Control: no-cache
                                                                          2024-12-30 17:14:11 UTC71OUTData Raw: 44 61 74 65 3d 33 30 25 32 46 31 32 25 32 46 32 30 32 34 26 54 69 6d 65 3d 31 32 25 33 41 31 34 25 33 41 31 30 26 42 75 69 6c 64 56 65 72 73 69 6f 6e 3d 38 2e 39 2e 39 26 53 6f 72 6f 71 56 69 6e 73 3d 54 72 75 65
                                                                          Data Ascii: Date=30%2F12%2F2024&Time=12%3A14%3A10&BuildVersion=8.9.9&SoroqVins=True
                                                                          2024-12-30 17:14:12 UTC840INHTTP/1.1 500 Internal Server Error
                                                                          Date: Mon, 30 Dec 2024 17:14:12 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Cache-Control: no-store
                                                                          cf-cache-status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rwh2n0cYaFLW27rWp4i35G1dBsAVG%2FgsykYA3Sow5a8bAA%2Bk7yWysWOMVbXwPljVkg%2B1MApRTsHz8%2B4V2Ld3hdHpyBQWnfHcHfyT42jRBemRFDC56F5Av1RaDV5IHDmt4NyQZrw%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8fa3aa312ccdde98-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=21984&min_rtt=2464&rtt_var=12696&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=927&delivery_rate=1185064&cwnd=212&unsent_bytes=0&cid=bff2e5ddbba36145&ts=514&x=0"
                                                                          2024-12-30 17:14:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:12:14:02
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\msiexec.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\setup.msi"
                                                                          Imagebase:0x7ff62b930000
                                                                          File size:69'632 bytes
                                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:12:14:02
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\msiexec.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                                                          Imagebase:0x7ff62b930000
                                                                          File size:69'632 bytes
                                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:2
                                                                          Start time:12:14:05
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 4E6784214EE54458A6F2B118AF4B8242
                                                                          Imagebase:0xdc0000
                                                                          File size:59'904 bytes
                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:12:14:11
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline: -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssC587.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiC574.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrC585.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrC586.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                          Imagebase:0x30000
                                                                          File size:433'152 bytes
                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:12:14:11
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:6
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\cmd.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\suriqk.bat" "C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe""
                                                                          Imagebase:0x7ff74cb90000
                                                                          File size:289'792 bytes
                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\createdump.exe"
                                                                          Imagebase:0x7ff70f330000
                                                                          File size:57'488 bytes
                                                                          MD5 hash:71F796B486C7FAF25B9B16233A7CE0CD
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 0%, ReversingLabs
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:9
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:10
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Triaox Completely Solutions\Strave App\obs-ffmpeg-mux.exe"
                                                                          Imagebase:0x7ff68fb70000
                                                                          File size:35'656 bytes
                                                                          MD5 hash:D3CAC4D7B35BACAE314F48C374452D71
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 0%, ReversingLabs
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:11
                                                                          Start time:12:14:20
                                                                          Start date:30/12/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $^q$$^q$$^q
                                                                            • API String ID: 0-831282457
                                                                            • Opcode ID: f750a83e31bfc95ec5b979d53bfe1404eb6b4c203a3cc8e80813ee1257e17574
                                                                            • Instruction ID: b338a74f71c04a1bcd6303d476da40f70986c4a47eb04d79e7afb27048f58d07
                                                                            • Opcode Fuzzy Hash: f750a83e31bfc95ec5b979d53bfe1404eb6b4c203a3cc8e80813ee1257e17574
                                                                            • Instruction Fuzzy Hash: E161F3B170021E9FCB25DF69D84466AFBE6AF85310F18C46AE445CB351EB32CD85CBA1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $^q$$^q
                                                                            • API String ID: 0-355816377
                                                                            • Opcode ID: 98cd6aafc6199d45b81dabe7f2c0035ef3f56fe5c94465fb9376a83a9274181c
                                                                            • Instruction ID: 280997fec884b13cbcf8ab3d7a2cc8ced47cc1cae081ab5485bb5ea4eef1147a
                                                                            • Opcode Fuzzy Hash: 98cd6aafc6199d45b81dabe7f2c0035ef3f56fe5c94465fb9376a83a9274181c
                                                                            • Instruction Fuzzy Hash: AD316CF1A0420EDFCF35CE25C984AA6FBF1EF42251F1981A6D4458B251E736D9C4CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776531957.00000000051C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_51c0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5a8f9018de73d5df5d68966ca71dad7af9a779497ada0624bb30811251882bdc
                                                                            • Instruction ID: 46a6c3f7c1d8d17fec86bf76bcd7cd53b64aca487d9b74e0c9d297e2e5d3f3a7
                                                                            • Opcode Fuzzy Hash: 5a8f9018de73d5df5d68966ca71dad7af9a779497ada0624bb30811251882bdc
                                                                            • Instruction Fuzzy Hash: 5CA15E35A00208EFDB14DFA4D984AADBBB3FF84310F158599D406AF365DB75AD49CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776531957.00000000051C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_51c0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c168f4d0fdc754da4d5489cf63226a4021fa52d327f70b6db4aabc012e5f8ece
                                                                            • Instruction ID: b9b75966ee07d2dda367223b86d6ec1cf8d7c0131bae2bb6990767b718d9e07f
                                                                            • Opcode Fuzzy Hash: c168f4d0fdc754da4d5489cf63226a4021fa52d327f70b6db4aabc012e5f8ece
                                                                            • Instruction Fuzzy Hash: FF31D474A402459FDB05DB68C594BAE7FB2EF89350F0801A9E102EB3A5DF759C4ACB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776531957.00000000051C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_51c0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2af5ea2092a0230df13afdbfc128de6eef060b376d1207ae80704f2d6164a5fe
                                                                            • Instruction ID: 985135bf402f5d435e52ac7544b5059c305a29ab0745891c00353dc067c2bc2f
                                                                            • Opcode Fuzzy Hash: 2af5ea2092a0230df13afdbfc128de6eef060b376d1207ae80704f2d6164a5fe
                                                                            • Instruction Fuzzy Hash: 48318070A00649DFDB18DFA4C484BAEBFB2BF84304F14846DC802AB6A5EB71A845CB44
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776072821.000000000357D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0357D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_357d000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d9a09853a5536279fe20466d1f9eab3afd781161da6983114dd26a9f8c707fed
                                                                            • Instruction ID: 76fbfa3ece48344286569f1ffb1b613d631ccf852615c2c7302fcfd28046e84a
                                                                            • Opcode Fuzzy Hash: d9a09853a5536279fe20466d1f9eab3afd781161da6983114dd26a9f8c707fed
                                                                            • Instruction Fuzzy Hash: BE01A2714093449EE710CE2AF984B67FFE8FF41324F1CC96AED484A266D679D841C6B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776072821.000000000357D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0357D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_357d000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b3c7f95e23f3b9fa931e6d2738fbfc9ad0b423985de88f81be7e118bfb2a7066
                                                                            • Instruction ID: af7d8586c68d1d5f4ace5e1ca2e92eccff274f54cd32699d3130406c9738752f
                                                                            • Opcode Fuzzy Hash: b3c7f95e23f3b9fa931e6d2738fbfc9ad0b423985de88f81be7e118bfb2a7066
                                                                            • Instruction Fuzzy Hash: F7012D6100E3C09ED7128B259894B56BFB8EF53224F1D81DBD9888F2A7C2699844C772
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776531957.00000000051C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_51c0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b5e4d728107d981ec57eb1ba225a468d27e6db56e5b89dff338e8d3a5668c73a
                                                                            • Instruction ID: 22b76e4638ba445a7d7d3484a563db2eccb2181c8c42a01363f2a8ff40d5b13a
                                                                            • Opcode Fuzzy Hash: b5e4d728107d981ec57eb1ba225a468d27e6db56e5b89dff338e8d3a5668c73a
                                                                            • Instruction Fuzzy Hash: AFF0DA75A001059FCB15CF9CD990AEEF7B1FF88324F208159E515A72A1C736AC52CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1776531957.00000000051C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051C0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_51c0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ed87d5c7a7d3e2c3ccfbd27856f12b8eafbb9c5f947a97142855840f6226bdb1
                                                                            • Instruction ID: 187ce474d002f5111763fba1bf0448469f02b3e8caf0f6948620d0edc1886da4
                                                                            • Opcode Fuzzy Hash: ed87d5c7a7d3e2c3ccfbd27856f12b8eafbb9c5f947a97142855840f6226bdb1
                                                                            • Instruction Fuzzy Hash: 94F03074B4030A9FDB14DBA4D5A5B6E7BB2EF80340F104558E1029F368DB799D498BC0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 84bk$84bk$tP^q$tP^q$tP^q$tP^q$$^q$$^q$$^q$$^q$Zk$Zk
                                                                            • API String ID: 0-3990107629
                                                                            • Opcode ID: 1ae756f06c3276bed5548ffda50b15094ac25a886e52b493344b4b5ac370bccb
                                                                            • Instruction ID: 7b85eb24b882c5757d70ed0b6da3a9d5997a0e0ae2e275dcceab56c276294857
                                                                            • Opcode Fuzzy Hash: 1ae756f06c3276bed5548ffda50b15094ac25a886e52b493344b4b5ac370bccb
                                                                            • Instruction Fuzzy Hash: 5B8147B17043599FD7148B69D80066AFBE6BFC6210F2884ABD484CF352DA32CC85C7A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                            • API String ID: 0-3732357466
                                                                            • Opcode ID: fd671859547a9bb66be8645f85d7438b9b97430764b3c5fff17a9774bb2bc339
                                                                            • Instruction ID: 278254068778aa1ad2965728508b4c41a423c49b175fb590ceb11af38a3975f6
                                                                            • Opcode Fuzzy Hash: fd671859547a9bb66be8645f85d7438b9b97430764b3c5fff17a9774bb2bc339
                                                                            • Instruction Fuzzy Hash: 13513BB270430ACFDB255A69D90066BFBB6EFC6220F1884BFD645CB255DA32C845C7A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 4'^q$4'^q$4'^q$4'^q$$^q
                                                                            • API String ID: 0-4240210763
                                                                            • Opcode ID: 9fb38802f4bd324f73ed82256c2bd8557c259b92176333b94127c76e0f3c5565
                                                                            • Instruction ID: c521b9b9a7d9447059170bb744222200700d9498051f3ddea9c1c8ae309afa24
                                                                            • Opcode Fuzzy Hash: 9fb38802f4bd324f73ed82256c2bd8557c259b92176333b94127c76e0f3c5565
                                                                            • Instruction Fuzzy Hash: 38214971B482154FC7192A3CB8245AAEFE79FC166071A44EBC245CF359DE25CC4A47D2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 4ak$4ak$$^q$$^q$$^q
                                                                            • API String ID: 0-1320071355
                                                                            • Opcode ID: 3d5069d1639dce90441790c869e77ad047b07a2c11a258950bcbb6dd87a2996d
                                                                            • Instruction ID: bc79f9b8ade0296965490de9b098d3defd0f10507965b45eb02d9715aa62e5e7
                                                                            • Opcode Fuzzy Hash: 3d5069d1639dce90441790c869e77ad047b07a2c11a258950bcbb6dd87a2996d
                                                                            • Instruction Fuzzy Hash: 2511D5F132421A9BC7285929D85063BF6DA8FC1651B1484BAD645CA396EE36CC4182B5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.1780946375.0000000007D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D40000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_7d40000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 84bk$tP^q$$^q$Zk
                                                                            • API String ID: 0-3115766179
                                                                            • Opcode ID: 8f3fbe3abb29bbb998681c9352390e741587944fdaa8a7d8c04e9535a33e2b30
                                                                            • Instruction ID: dbe759cda2cc8625e8f2bd9dbcf4983d8caf59e615288dff8007ca7e527b1d76
                                                                            • Opcode Fuzzy Hash: 8f3fbe3abb29bbb998681c9352390e741587944fdaa8a7d8c04e9535a33e2b30
                                                                            • Instruction Fuzzy Hash: 53313AB1A04359EFDB218E54C840A66FBF2FF85310F1880AAD4849F242DB33DD85C7A1

                                                                            Execution Graph

                                                                            Execution Coverage:3.4%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:1.7%
                                                                            Total number of Nodes:700
                                                                            Total number of Limit Nodes:1
                                                                            execution_graph 2489 7ff7a8505f75 2497 7ff7a8505e35 __GSHandlerCheck_EH 2489->2497 2490 7ff7a8505f92 2502 7ff7a85043d0 2490->2502 2492 7ff7a8505f97 2493 7ff7a8505fa2 2492->2493 2494 7ff7a85043d0 ExFilterRethrow 10 API calls 2492->2494 2495 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2493->2495 2494->2493 2496 7ff7a8505fb5 2495->2496 2497->2490 2499 7ff7a8503bd0 2497->2499 2500 7ff7a85043d0 ExFilterRethrow 10 API calls 2499->2500 2501 7ff7a8503bde 2500->2501 2501->2497 2505 7ff7a85043ec 2502->2505 2504 7ff7a85043d9 2504->2492 2506 7ff7a8504404 2505->2506 2507 7ff7a850440b GetLastError 2505->2507 2506->2504 2519 7ff7a8506678 2507->2519 2520 7ff7a8506498 __vcrt_InitializeCriticalSectionEx 5 API calls 2519->2520 2521 7ff7a850669f TlsGetValue 2520->2521 2523 7ff7a8507372 2524 7ff7a85043d0 ExFilterRethrow 10 API calls 2523->2524 2525 7ff7a8507389 2524->2525 2526 7ff7a85043d0 ExFilterRethrow 10 API calls 2525->2526 2527 7ff7a85073a4 2526->2527 2528 7ff7a85043d0 ExFilterRethrow 10 API calls 2527->2528 2529 7ff7a85073ad 2528->2529 2534 7ff7a8505414 2529->2534 2532 7ff7a85043d0 ExFilterRethrow 10 API calls 2533 7ff7a85073f8 2532->2533 2535 7ff7a8505443 __except_validate_context_record 2534->2535 2536 7ff7a85043d0 ExFilterRethrow 10 API calls 2535->2536 2537 7ff7a8505448 2536->2537 2538 7ff7a8505498 2537->2538 2544 7ff7a85055b2 __GSHandlerCheck_EH 2537->2544 2548 7ff7a8505551 2537->2548 2539 7ff7a850559f 2538->2539 2547 7ff7a85054f3 __GSHandlerCheck_EH 2538->2547 2538->2548 2574 7ff7a8503678 2539->2574 2540 7ff7a85055f7 2540->2548 2581 7ff7a85049a4 2540->2581 2543 7ff7a85056a2 abort 2544->2540 2544->2548 2578 7ff7a8503bbc 2544->2578 2545 7ff7a8505543 2550 7ff7a8505cf0 2545->2550 2547->2543 2547->2545 2548->2532 2634 7ff7a8503ba8 2550->2634 2552 7ff7a8505d40 __GSHandlerCheck_EH 2553 7ff7a8505d72 2552->2553 2554 7ff7a8505d5b 2552->2554 2556 7ff7a85043d0 ExFilterRethrow 10 API calls 2553->2556 2555 7ff7a85043d0 ExFilterRethrow 10 API calls 2554->2555 2557 7ff7a8505d60 2555->2557 2559 7ff7a8505d77 2556->2559 2558 7ff7a8505fd0 abort 2557->2558 2564 7ff7a8505d6a 2557->2564 2560 7ff7a85043d0 ExFilterRethrow 10 API calls 2559->2560 2559->2564 2562 7ff7a8505d82 2560->2562 2561 7ff7a85043d0 ExFilterRethrow 10 API calls 2572 7ff7a8505d96 __GSHandlerCheck_EH 2561->2572 2563 7ff7a85043d0 ExFilterRethrow 10 API calls 2562->2563 2563->2564 2564->2561 2565 7ff7a8505f92 2566 7ff7a85043d0 ExFilterRethrow 10 API calls 2565->2566 2567 7ff7a8505f97 2566->2567 2568 7ff7a8505fa2 2567->2568 2569 7ff7a85043d0 ExFilterRethrow 10 API calls 2567->2569 2570 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2568->2570 2569->2568 2571 7ff7a8505fb5 2570->2571 2571->2548 2572->2565 2573 7ff7a8503bd0 __GSHandlerCheck_EH 10 API calls 2572->2573 2573->2572 2575 7ff7a850368a 2574->2575 2576 7ff7a8505cf0 __GSHandlerCheck_EH 19 API calls 2575->2576 2577 7ff7a85036a5 2576->2577 2577->2548 2579 7ff7a85043d0 ExFilterRethrow 10 API calls 2578->2579 2580 7ff7a8503bc5 2579->2580 2580->2540 2582 7ff7a8504a01 __GSHandlerCheck_EH 2581->2582 2583 7ff7a8504a20 2582->2583 2584 7ff7a8504a09 2582->2584 2585 7ff7a85043d0 ExFilterRethrow 10 API calls 2583->2585 2586 7ff7a85043d0 ExFilterRethrow 10 API calls 2584->2586 2587 7ff7a8504a25 2585->2587 2590 7ff7a8504a0e 2586->2590 2589 7ff7a85043d0 ExFilterRethrow 10 API calls 2587->2589 2587->2590 2588 7ff7a8504e99 abort 2591 7ff7a8504a30 2589->2591 2590->2588 2594 7ff7a8504b54 __GSHandlerCheck_EH 2590->2594 2595 7ff7a85043d0 ExFilterRethrow 10 API calls 2590->2595 2592 7ff7a85043d0 ExFilterRethrow 10 API calls 2591->2592 2592->2590 2593 7ff7a8504def 2593->2588 2596 7ff7a8504ded 2593->2596 2673 7ff7a8504ea0 2593->2673 2594->2593 2628 7ff7a8504b90 __GSHandlerCheck_EH 2594->2628 2597 7ff7a8504ac0 2595->2597 2598 7ff7a85043d0 ExFilterRethrow 10 API calls 2596->2598 2600 7ff7a8504e37 2597->2600 2603 7ff7a85043d0 ExFilterRethrow 10 API calls 2597->2603 2602 7ff7a8504e30 2598->2602 2599 7ff7a8504dd4 __GSHandlerCheck_EH 2599->2596 2608 7ff7a8504e81 2599->2608 2604 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2600->2604 2602->2588 2602->2600 2605 7ff7a8504ad0 2603->2605 2606 7ff7a8504e43 2604->2606 2607 7ff7a85043d0 ExFilterRethrow 10 API calls 2605->2607 2606->2548 2609 7ff7a8504ad9 2607->2609 2610 7ff7a85043d0 ExFilterRethrow 10 API calls 2608->2610 2637 7ff7a8503be8 2609->2637 2612 7ff7a8504e86 2610->2612 2614 7ff7a85043d0 ExFilterRethrow 10 API calls 2612->2614 2616 7ff7a8504e8f terminate 2614->2616 2615 7ff7a85043d0 ExFilterRethrow 10 API calls 2617 7ff7a8504b16 2615->2617 2616->2588 2617->2594 2618 7ff7a85043d0 ExFilterRethrow 10 API calls 2617->2618 2619 7ff7a8504b22 2618->2619 2620 7ff7a85043d0 ExFilterRethrow 10 API calls 2619->2620 2621 7ff7a8504b2b 2620->2621 2640 7ff7a8505fd8 2621->2640 2622 7ff7a8503bbc 10 API calls BuildCatchObjectHelperInternal 2622->2628 2626 7ff7a8504b3f 2647 7ff7a85060c8 2626->2647 2628->2599 2628->2622 2651 7ff7a85052d0 2628->2651 2665 7ff7a85048d0 2628->2665 2629 7ff7a8504e7b terminate 2629->2608 2631 7ff7a8504b47 std::bad_alloc::bad_alloc __GSHandlerCheck_EH 2631->2629 2632 7ff7a8503f84 Concurrency::cancel_current_task 2 API calls 2631->2632 2633 7ff7a8504e7a 2632->2633 2633->2629 2635 7ff7a85043d0 ExFilterRethrow 10 API calls 2634->2635 2636 7ff7a8503bb1 2635->2636 2636->2552 2638 7ff7a85043d0 ExFilterRethrow 10 API calls 2637->2638 2639 7ff7a8503bf6 2638->2639 2639->2588 2639->2615 2641 7ff7a85060bf abort 2640->2641 2644 7ff7a8506003 2640->2644 2642 7ff7a8504b3b 2642->2594 2642->2626 2643 7ff7a8503bbc 10 API calls BuildCatchObjectHelperInternal 2643->2644 2644->2642 2644->2643 2645 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2644->2645 2689 7ff7a8505190 2644->2689 2645->2644 2648 7ff7a8506135 2647->2648 2650 7ff7a85060e5 Is_bad_exception_allowed 2647->2650 2648->2631 2649 7ff7a8503ba8 10 API calls Is_bad_exception_allowed 2649->2650 2650->2648 2650->2649 2652 7ff7a85052fd 2651->2652 2663 7ff7a850538d 2651->2663 2653 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2652->2653 2654 7ff7a8505306 2653->2654 2655 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2654->2655 2656 7ff7a850531f 2654->2656 2654->2663 2655->2656 2657 7ff7a850534c 2656->2657 2658 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2656->2658 2656->2663 2659 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2657->2659 2658->2657 2660 7ff7a8505360 2659->2660 2661 7ff7a8505379 2660->2661 2662 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2660->2662 2660->2663 2664 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2661->2664 2662->2661 2663->2628 2664->2663 2666 7ff7a850490d __GSHandlerCheck_EH 2665->2666 2667 7ff7a8504933 2666->2667 2703 7ff7a850480c 2666->2703 2668 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2667->2668 2670 7ff7a8504945 2668->2670 2712 7ff7a8503838 RtlUnwindEx 2670->2712 2674 7ff7a8504ef4 2673->2674 2675 7ff7a8505169 2673->2675 2676 7ff7a85043d0 ExFilterRethrow 10 API calls 2674->2676 2677 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2675->2677 2678 7ff7a8504ef9 2676->2678 2679 7ff7a8505175 2677->2679 2680 7ff7a8504f0e EncodePointer 2678->2680 2681 7ff7a8504f60 __GSHandlerCheck_EH 2678->2681 2679->2596 2682 7ff7a85043d0 ExFilterRethrow 10 API calls 2680->2682 2681->2675 2683 7ff7a8505189 abort 2681->2683 2686 7ff7a8504f82 __GSHandlerCheck_EH 2681->2686 2684 7ff7a8504f1e 2682->2684 2684->2681 2736 7ff7a85034f8 2684->2736 2686->2675 2687 7ff7a8503ba8 10 API calls Is_bad_exception_allowed 2686->2687 2688 7ff7a85048d0 __GSHandlerCheck_EH 21 API calls 2686->2688 2687->2686 2688->2686 2690 7ff7a850524c 2689->2690 2691 7ff7a85051bd 2689->2691 2690->2644 2692 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2691->2692 2693 7ff7a85051c6 2692->2693 2693->2690 2694 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2693->2694 2695 7ff7a85051df 2693->2695 2694->2695 2695->2690 2696 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2695->2696 2697 7ff7a850520b 2695->2697 2696->2697 2698 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2697->2698 2699 7ff7a850521f 2698->2699 2699->2690 2700 7ff7a8505238 2699->2700 2701 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2699->2701 2702 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2700->2702 2701->2700 2702->2690 2704 7ff7a850482f 2703->2704 2715 7ff7a8504608 2704->2715 2706 7ff7a8504840 2707 7ff7a8504881 __AdjustPointer 2706->2707 2708 7ff7a8504845 __AdjustPointer 2706->2708 2709 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2707->2709 2711 7ff7a8504864 BuildCatchObjectHelperInternal 2707->2711 2710 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2708->2710 2708->2711 2709->2711 2710->2711 2711->2667 2713 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2712->2713 2714 7ff7a850394e 2713->2714 2714->2628 2716 7ff7a8504635 2715->2716 2718 7ff7a850463e 2715->2718 2717 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2716->2717 2717->2718 2719 7ff7a8503ba8 Is_bad_exception_allowed 10 API calls 2718->2719 2720 7ff7a850465d 2718->2720 2727 7ff7a85046c2 __AdjustPointer BuildCatchObjectHelperInternal 2718->2727 2719->2720 2721 7ff7a85046aa 2720->2721 2722 7ff7a85046ca 2720->2722 2720->2727 2724 7ff7a85047e9 abort abort 2721->2724 2721->2727 2723 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2722->2723 2726 7ff7a850474a 2722->2726 2722->2727 2723->2726 2725 7ff7a850480c 2724->2725 2728 7ff7a8504608 BuildCatchObjectHelperInternal 10 API calls 2725->2728 2726->2727 2729 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2726->2729 2727->2706 2730 7ff7a8504840 2728->2730 2729->2727 2731 7ff7a8504881 __AdjustPointer 2730->2731 2733 7ff7a8504845 __AdjustPointer 2730->2733 2732 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2731->2732 2735 7ff7a8504864 BuildCatchObjectHelperInternal 2731->2735 2732->2735 2734 7ff7a8503bbc BuildCatchObjectHelperInternal 10 API calls 2733->2734 2733->2735 2734->2735 2735->2706 2737 7ff7a85043d0 ExFilterRethrow 10 API calls 2736->2737 2738 7ff7a8503524 2737->2738 2738->2681 2739 7ff7a8502970 2742 7ff7a8502da0 2739->2742 2743 7ff7a8502dc3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 2742->2743 2744 7ff7a8502979 2742->2744 2743->2744 2745 7ff7a85016f0 2748 7ff7a8503d50 2745->2748 2749 7ff7a8503d5f free 2748->2749 2750 7ff7a850170c 2748->2750 2749->2750 2751 7ff7a85072f0 2752 7ff7a8507303 2751->2752 2753 7ff7a8507310 2751->2753 2755 7ff7a8501e80 2752->2755 2756 7ff7a8501e93 2755->2756 2758 7ff7a8501eb7 2755->2758 2757 7ff7a8501ed8 _invalid_parameter_noinfo_noreturn 2756->2757 2756->2758 2758->2753 2967 7ff7a8507130 2968 7ff7a8507168 __GSHandlerCheckCommon 2967->2968 2969 7ff7a8507194 2968->2969 2971 7ff7a8503c00 2968->2971 2972 7ff7a85043d0 ExFilterRethrow 10 API calls 2971->2972 2973 7ff7a8503c42 2972->2973 2974 7ff7a85043d0 ExFilterRethrow 10 API calls 2973->2974 2975 7ff7a8503c4f 2974->2975 2976 7ff7a85043d0 ExFilterRethrow 10 API calls 2975->2976 2977 7ff7a8503c58 __GSHandlerCheck_EH 2976->2977 2978 7ff7a8505414 __GSHandlerCheck_EH 31 API calls 2977->2978 2979 7ff7a8503ca9 2978->2979 2979->2969 2980 7ff7a85043b0 2981 7ff7a85043ca 2980->2981 2982 7ff7a85043b9 2980->2982 2982->2981 2983 7ff7a85043c5 free 2982->2983 2983->2981 2759 7ff7a850756f 2760 7ff7a85043d0 ExFilterRethrow 10 API calls 2759->2760 2761 7ff7a850757d 2760->2761 2762 7ff7a8507588 2761->2762 2763 7ff7a85043d0 ExFilterRethrow 10 API calls 2761->2763 2763->2762 2987 7ff7a85059ad 2988 7ff7a85043d0 ExFilterRethrow 10 API calls 2987->2988 2989 7ff7a85059ba 2988->2989 2990 7ff7a85043d0 ExFilterRethrow 10 API calls 2989->2990 2993 7ff7a85059c3 __GSHandlerCheck_EH 2990->2993 2991 7ff7a8505a0a RaiseException 2992 7ff7a8505a29 2991->2992 2994 7ff7a8503b54 11 API calls 2992->2994 2993->2991 2998 7ff7a8505a31 2994->2998 2995 7ff7a85043d0 ExFilterRethrow 10 API calls 2996 7ff7a8505a6d 2995->2996 2997 7ff7a85043d0 ExFilterRethrow 10 API calls 2996->2997 2999 7ff7a8505a76 2997->2999 3000 7ff7a8504104 10 API calls 2998->3000 3004 7ff7a8505a5a __GSHandlerCheck_EH 2998->3004 3001 7ff7a85043d0 ExFilterRethrow 10 API calls 2999->3001 3000->3004 3002 7ff7a8505a7f 3001->3002 3003 7ff7a85043d0 ExFilterRethrow 10 API calls 3002->3003 3005 7ff7a8505a8e 3003->3005 3004->2995 2243 7ff7a85027ec 2266 7ff7a8502b8c 2243->2266 2246 7ff7a8502943 2306 7ff7a8502ecc IsProcessorFeaturePresent 2246->2306 2247 7ff7a850280d 2249 7ff7a850294d 2247->2249 2255 7ff7a850282b __scrt_release_startup_lock 2247->2255 2250 7ff7a8502ecc 7 API calls 2249->2250 2251 7ff7a8502958 2250->2251 2253 7ff7a8502960 _exit 2251->2253 2252 7ff7a8502850 2254 7ff7a85028d6 _get_initial_narrow_environment __p___argv __p___argc 2272 7ff7a8501060 2254->2272 2255->2252 2255->2254 2258 7ff7a85028ce _register_thread_local_exe_atexit_callback 2255->2258 2258->2254 2261 7ff7a8502903 2262 7ff7a850290d 2261->2262 2263 7ff7a8502908 _cexit 2261->2263 2302 7ff7a8502d20 2262->2302 2263->2262 2313 7ff7a850316c 2266->2313 2269 7ff7a8502805 2269->2246 2269->2247 2270 7ff7a8502bbb __scrt_initialize_crt 2270->2269 2315 7ff7a850404c 2270->2315 2273 7ff7a8501386 2272->2273 2281 7ff7a85010b4 2272->2281 2342 7ff7a8501450 __acrt_iob_func 2273->2342 2275 7ff7a8501399 2300 7ff7a8503020 GetModuleHandleW 2275->2300 2276 7ff7a8501289 2276->2273 2277 7ff7a850129f 2276->2277 2347 7ff7a8502688 2277->2347 2279 7ff7a85012a9 2282 7ff7a8501325 2279->2282 2283 7ff7a85012b9 GetTempPathA 2279->2283 2280 7ff7a8501125 strcmp 2280->2281 2281->2276 2281->2280 2284 7ff7a8501151 strcmp 2281->2284 2291 7ff7a850117d strcmp 2281->2291 2298 7ff7a8501226 strcmp 2281->2298 2356 7ff7a85023c0 2282->2356 2286 7ff7a85012cb GetLastError 2283->2286 2287 7ff7a85012e9 strcat_s 2283->2287 2284->2281 2289 7ff7a8501450 6 API calls 2286->2289 2287->2282 2290 7ff7a8501304 2287->2290 2292 7ff7a85012df GetLastError 2289->2292 2293 7ff7a8501450 6 API calls 2290->2293 2291->2281 2296 7ff7a8501312 2292->2296 2293->2296 2296->2275 2297 7ff7a8501344 __acrt_iob_func fflush __acrt_iob_func fflush 2297->2296 2298->2281 2299 7ff7a8501239 atoi 2298->2299 2299->2281 2301 7ff7a85028ff 2300->2301 2301->2251 2301->2261 2303 7ff7a8502d31 __scrt_initialize_crt 2302->2303 2304 7ff7a8502916 2303->2304 2305 7ff7a850404c __scrt_initialize_crt 7 API calls 2303->2305 2304->2252 2305->2304 2307 7ff7a8502ef2 2306->2307 2308 7ff7a8502f11 RtlCaptureContext RtlLookupFunctionEntry 2307->2308 2309 7ff7a8502f76 2308->2309 2310 7ff7a8502f3a RtlVirtualUnwind 2308->2310 2311 7ff7a8502fa8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 2309->2311 2310->2309 2312 7ff7a8502ffa 2311->2312 2312->2249 2314 7ff7a8502bae __scrt_dllmain_crt_thread_attach 2313->2314 2314->2269 2314->2270 2316 7ff7a8504054 2315->2316 2317 7ff7a850405e 2315->2317 2321 7ff7a85044f4 2316->2321 2317->2269 2322 7ff7a8504503 2321->2322 2324 7ff7a8504059 2321->2324 2329 7ff7a8506630 2322->2329 2325 7ff7a8506460 2324->2325 2326 7ff7a850648b 2325->2326 2327 7ff7a850648f 2326->2327 2328 7ff7a850646e DeleteCriticalSection 2326->2328 2327->2317 2328->2326 2333 7ff7a8506498 2329->2333 2334 7ff7a85065b2 TlsFree 2333->2334 2335 7ff7a85064dc 2333->2335 2335->2334 2336 7ff7a850650a LoadLibraryExW 2335->2336 2337 7ff7a85065a1 GetProcAddress 2335->2337 2341 7ff7a850654d LoadLibraryExW 2335->2341 2338 7ff7a8506581 2336->2338 2339 7ff7a850652b GetLastError 2336->2339 2337->2334 2338->2337 2340 7ff7a8506598 FreeLibrary 2338->2340 2339->2335 2340->2337 2341->2335 2341->2338 2392 7ff7a8501010 2342->2392 2344 7ff7a850148a __acrt_iob_func 2395 7ff7a8501000 2344->2395 2346 7ff7a85014a2 __stdio_common_vfprintf __acrt_iob_func fflush 2346->2275 2350 7ff7a8502690 2347->2350 2348 7ff7a85026aa malloc 2349 7ff7a85026b4 2348->2349 2348->2350 2349->2279 2350->2348 2351 7ff7a85026ba 2350->2351 2352 7ff7a85026c5 2351->2352 2397 7ff7a8502b30 2351->2397 2401 7ff7a8501720 2352->2401 2355 7ff7a85026cb 2355->2279 2357 7ff7a8502688 5 API calls 2356->2357 2358 7ff7a85023f5 OpenProcess 2357->2358 2359 7ff7a850243b GetLastError 2358->2359 2360 7ff7a8502458 K32GetModuleBaseNameA 2358->2360 2361 7ff7a8501450 6 API calls 2359->2361 2362 7ff7a8502492 2360->2362 2363 7ff7a8502470 GetLastError 2360->2363 2368 7ff7a8502453 2361->2368 2418 7ff7a8501800 2362->2418 2364 7ff7a8501450 6 API calls 2363->2364 2366 7ff7a8502484 CloseHandle 2364->2366 2366->2368 2371 7ff7a85025fa 2368->2371 2374 7ff7a85025f3 _invalid_parameter_noinfo_noreturn 2368->2374 2369 7ff7a85025b3 CloseHandle 2369->2368 2370 7ff7a85024ae 2372 7ff7a85013c0 6 API calls 2370->2372 2429 7ff7a8502660 2371->2429 2373 7ff7a85024cf CreateFileA 2372->2373 2375 7ff7a8502543 2373->2375 2376 7ff7a850250f GetLastError 2373->2376 2374->2371 2380 7ff7a8502550 MiniDumpWriteDump 2375->2380 2383 7ff7a850258a CloseHandle CloseHandle 2375->2383 2379 7ff7a8501450 6 API calls 2376->2379 2381 7ff7a8502538 CloseHandle 2379->2381 2382 7ff7a8502576 GetLastError 2380->2382 2380->2383 2381->2368 2382->2375 2385 7ff7a850258c 2382->2385 2383->2368 2386 7ff7a8501450 6 API calls 2385->2386 2386->2383 2387 7ff7a85013c0 __acrt_iob_func 2388 7ff7a8501010 fprintf __stdio_common_vfprintf 2387->2388 2389 7ff7a85013fa __acrt_iob_func 2388->2389 2488 7ff7a8501000 2389->2488 2391 7ff7a8501412 __stdio_common_vfprintf __acrt_iob_func fflush 2391->2297 2396 7ff7a8501000 2392->2396 2394 7ff7a8501036 __stdio_common_vfprintf 2394->2344 2395->2346 2396->2394 2398 7ff7a8502b3e std::bad_alloc::bad_alloc 2397->2398 2407 7ff7a8503f84 2398->2407 2400 7ff7a8502b4f 2402 7ff7a850172e Concurrency::cancel_current_task 2401->2402 2403 7ff7a8503f84 Concurrency::cancel_current_task 2 API calls 2402->2403 2404 7ff7a850173f 2403->2404 2412 7ff7a8503cc0 2404->2412 2408 7ff7a8503fa3 2407->2408 2409 7ff7a8503fc0 RtlPcToFileHeader 2407->2409 2408->2409 2410 7ff7a8503fe7 RaiseException 2409->2410 2411 7ff7a8503fd8 2409->2411 2410->2400 2411->2410 2413 7ff7a850176d 2412->2413 2414 7ff7a8503ce1 2412->2414 2413->2355 2414->2413 2414->2414 2415 7ff7a8503cf6 malloc 2414->2415 2416 7ff7a8503d23 free 2415->2416 2417 7ff7a8503d07 2415->2417 2416->2413 2417->2416 2419 7ff7a8501863 WSAStartup 2418->2419 2420 7ff7a8501850 2418->2420 2426 7ff7a850187f 2419->2426 2428 7ff7a850185c 2419->2428 2421 7ff7a8501450 6 API calls 2420->2421 2421->2428 2422 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2424 7ff7a8501d87 2422->2424 2423 7ff7a8501dd0 2427 7ff7a8501450 6 API calls 2423->2427 2424->2369 2424->2370 2426->2423 2426->2428 2438 7ff7a85020c0 2426->2438 2427->2428 2428->2422 2430 7ff7a8502669 2429->2430 2431 7ff7a8501334 2430->2431 2432 7ff7a85029c0 IsProcessorFeaturePresent 2430->2432 2431->2297 2431->2387 2433 7ff7a85029d8 2432->2433 2483 7ff7a8502a94 RtlCaptureContext 2433->2483 2439 7ff7a85020e9 2438->2439 2440 7ff7a8502218 2438->2440 2442 7ff7a8502144 2439->2442 2444 7ff7a850216c 2439->2444 2445 7ff7a8502137 2439->2445 2462 7ff7a85017e0 2440->2462 2453 7ff7a8502690 2442->2453 2443 7ff7a850221d 2447 7ff7a8501720 Concurrency::cancel_current_task 4 API calls 2443->2447 2448 7ff7a8502690 5 API calls 2444->2448 2452 7ff7a8502155 BuildCatchObjectHelperInternal 2444->2452 2445->2442 2445->2443 2449 7ff7a8502223 2447->2449 2448->2452 2450 7ff7a85021e0 _invalid_parameter_noinfo_noreturn 2451 7ff7a85021d3 BuildCatchObjectHelperInternal 2450->2451 2451->2426 2452->2450 2452->2451 2454 7ff7a85026aa malloc 2453->2454 2455 7ff7a85026b4 2454->2455 2456 7ff7a850269b 2454->2456 2455->2452 2456->2454 2457 7ff7a85026ba 2456->2457 2458 7ff7a85026c5 2457->2458 2459 7ff7a8502b30 Concurrency::cancel_current_task 2 API calls 2457->2459 2460 7ff7a8501720 Concurrency::cancel_current_task 4 API calls 2458->2460 2459->2458 2461 7ff7a85026cb 2460->2461 2461->2452 2475 7ff7a85034d4 2462->2475 2480 7ff7a85033f8 2475->2480 2478 7ff7a8503f84 Concurrency::cancel_current_task 2 API calls 2479 7ff7a85034f6 2478->2479 2481 7ff7a8503cc0 __std_exception_copy 2 API calls 2480->2481 2482 7ff7a850342c 2481->2482 2482->2478 2484 7ff7a8502aae RtlLookupFunctionEntry 2483->2484 2485 7ff7a8502ac4 RtlVirtualUnwind 2484->2485 2486 7ff7a85029eb 2484->2486 2485->2484 2485->2486 2487 7ff7a8502984 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2486->2487 2488->2391 3006 7ff7a85074a7 3009 7ff7a8505cc0 3006->3009 3014 7ff7a8505c38 3009->3014 3012 7ff7a8505ce0 3013 7ff7a85043d0 ExFilterRethrow 10 API calls 3013->3012 3015 7ff7a8505ca3 3014->3015 3016 7ff7a8505c5a 3014->3016 3015->3012 3015->3013 3016->3015 3017 7ff7a85043d0 ExFilterRethrow 10 API calls 3016->3017 3017->3015 3018 7ff7a8504024 3025 7ff7a850642c 3018->3025 3021 7ff7a8504031 3037 7ff7a8506714 3025->3037 3028 7ff7a850402d 3028->3021 3030 7ff7a85044ac 3028->3030 3029 7ff7a8506460 __vcrt_uninitialize_locks DeleteCriticalSection 3029->3028 3042 7ff7a85065e8 3030->3042 3038 7ff7a8506498 __vcrt_InitializeCriticalSectionEx 5 API calls 3037->3038 3039 7ff7a850674a 3038->3039 3040 7ff7a8506444 3039->3040 3041 7ff7a850675f InitializeCriticalSectionAndSpinCount 3039->3041 3040->3028 3040->3029 3041->3040 3043 7ff7a8506498 __vcrt_InitializeCriticalSectionEx 5 API calls 3042->3043 3044 7ff7a850660d TlsAlloc 3043->3044 2767 7ff7a8505860 2768 7ff7a85043d0 ExFilterRethrow 10 API calls 2767->2768 2769 7ff7a85058ad 2768->2769 2770 7ff7a85043d0 ExFilterRethrow 10 API calls 2769->2770 2771 7ff7a85058bb __except_validate_context_record 2770->2771 2772 7ff7a85043d0 ExFilterRethrow 10 API calls 2771->2772 2773 7ff7a8505914 2772->2773 2774 7ff7a85043d0 ExFilterRethrow 10 API calls 2773->2774 2775 7ff7a850591d 2774->2775 2776 7ff7a85043d0 ExFilterRethrow 10 API calls 2775->2776 2777 7ff7a8505926 2776->2777 2796 7ff7a8503b18 2777->2796 2780 7ff7a85043d0 ExFilterRethrow 10 API calls 2781 7ff7a8505959 2780->2781 2782 7ff7a8505aa9 abort 2781->2782 2783 7ff7a8505991 2781->2783 2803 7ff7a8503b54 2783->2803 2785 7ff7a8505a5a __GSHandlerCheck_EH 2786 7ff7a85043d0 ExFilterRethrow 10 API calls 2785->2786 2787 7ff7a8505a6d 2786->2787 2788 7ff7a85043d0 ExFilterRethrow 10 API calls 2787->2788 2790 7ff7a8505a76 2788->2790 2792 7ff7a85043d0 ExFilterRethrow 10 API calls 2790->2792 2793 7ff7a8505a7f 2792->2793 2794 7ff7a85043d0 ExFilterRethrow 10 API calls 2793->2794 2795 7ff7a8505a8e 2794->2795 2797 7ff7a85043d0 ExFilterRethrow 10 API calls 2796->2797 2798 7ff7a8503b29 2797->2798 2799 7ff7a8503b34 2798->2799 2800 7ff7a85043d0 ExFilterRethrow 10 API calls 2798->2800 2801 7ff7a85043d0 ExFilterRethrow 10 API calls 2799->2801 2800->2799 2802 7ff7a8503b45 2801->2802 2802->2780 2802->2781 2804 7ff7a85043d0 ExFilterRethrow 10 API calls 2803->2804 2806 7ff7a8503b66 2804->2806 2805 7ff7a8503ba1 abort 2806->2805 2807 7ff7a85043d0 ExFilterRethrow 10 API calls 2806->2807 2808 7ff7a8503b71 2807->2808 2808->2805 2809 7ff7a8503b8d 2808->2809 2810 7ff7a85043d0 ExFilterRethrow 10 API calls 2809->2810 2811 7ff7a8503b92 2810->2811 2811->2785 2812 7ff7a8504104 2811->2812 2813 7ff7a85043d0 ExFilterRethrow 10 API calls 2812->2813 2814 7ff7a8504112 2813->2814 2814->2785 2815 7ff7a8507260 2816 7ff7a8507273 2815->2816 2817 7ff7a8507280 2815->2817 2818 7ff7a8501e80 _invalid_parameter_noinfo_noreturn 2816->2818 2818->2817 2819 7ff7a8501ce0 2820 7ff7a8502688 5 API calls 2819->2820 2821 7ff7a8501cea gethostname 2820->2821 2822 7ff7a8501da9 WSAGetLastError 2821->2822 2823 7ff7a8501d08 2821->2823 2824 7ff7a8501450 6 API calls 2822->2824 2833 7ff7a8502040 2823->2833 2825 7ff7a8501d76 2824->2825 2828 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2825->2828 2827 7ff7a85018a0 2827->2825 2830 7ff7a8501dd0 2827->2830 2831 7ff7a85020c0 21 API calls 2827->2831 2829 7ff7a8501d87 2828->2829 2832 7ff7a8501450 6 API calls 2830->2832 2831->2827 2832->2825 2834 7ff7a85020a2 2833->2834 2837 7ff7a8502063 BuildCatchObjectHelperInternal 2833->2837 2838 7ff7a8502230 2834->2838 2836 7ff7a85020b5 2836->2827 2837->2827 2839 7ff7a850225e 2838->2839 2840 7ff7a85023ab 2838->2840 2841 7ff7a85022be 2839->2841 2844 7ff7a85022e6 2839->2844 2845 7ff7a85022b1 2839->2845 2842 7ff7a85017e0 21 API calls 2840->2842 2846 7ff7a8502690 5 API calls 2841->2846 2843 7ff7a85023b0 2842->2843 2847 7ff7a8501720 Concurrency::cancel_current_task 4 API calls 2843->2847 2850 7ff7a8502690 5 API calls 2844->2850 2851 7ff7a85022cf BuildCatchObjectHelperInternal 2844->2851 2845->2841 2845->2843 2846->2851 2848 7ff7a85023b6 2847->2848 2849 7ff7a8502364 _invalid_parameter_noinfo_noreturn 2852 7ff7a8502357 BuildCatchObjectHelperInternal 2849->2852 2850->2851 2851->2849 2851->2852 2852->2836 2853 7ff7a850195f 2854 7ff7a850196d 2853->2854 2854->2854 2855 7ff7a8501a23 2854->2855 2869 7ff7a8501ee0 2854->2869 2857 7ff7a8502230 22 API calls 2855->2857 2858 7ff7a8501a67 BuildCatchObjectHelperInternal 2855->2858 2857->2858 2859 7ff7a8501da2 _invalid_parameter_noinfo_noreturn 2858->2859 2860 7ff7a85018a0 2858->2860 2861 7ff7a8501da9 WSAGetLastError 2859->2861 2863 7ff7a8501d76 2860->2863 2864 7ff7a8501dd0 2860->2864 2866 7ff7a85020c0 21 API calls 2860->2866 2862 7ff7a8501450 6 API calls 2861->2862 2862->2863 2865 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 2863->2865 2867 7ff7a8501450 6 API calls 2864->2867 2868 7ff7a8501d87 2865->2868 2866->2860 2867->2863 2871 7ff7a8501f25 2869->2871 2882 7ff7a8501f04 BuildCatchObjectHelperInternal 2869->2882 2870 7ff7a8502031 2872 7ff7a85017e0 21 API calls 2870->2872 2871->2870 2873 7ff7a8501f74 2871->2873 2876 7ff7a8501fa9 2871->2876 2874 7ff7a8502036 2872->2874 2873->2874 2875 7ff7a8502690 5 API calls 2873->2875 2877 7ff7a8501720 Concurrency::cancel_current_task 4 API calls 2874->2877 2881 7ff7a8501f92 BuildCatchObjectHelperInternal 2875->2881 2879 7ff7a8502690 5 API calls 2876->2879 2876->2881 2880 7ff7a850203c 2877->2880 2878 7ff7a850202a _invalid_parameter_noinfo_noreturn 2878->2870 2879->2881 2881->2878 2881->2882 2882->2855 3049 7ff7a850191a 3050 7ff7a85018a0 3049->3050 3051 7ff7a850194d 3049->3051 3053 7ff7a8501d76 3050->3053 3054 7ff7a8501dd0 3050->3054 3056 7ff7a85020c0 21 API calls 3050->3056 3052 7ff7a85020c0 21 API calls 3051->3052 3052->3050 3055 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 3053->3055 3057 7ff7a8501450 6 API calls 3054->3057 3058 7ff7a8501d87 3055->3058 3056->3050 3057->3053 3059 7ff7a850291a 3060 7ff7a8503020 __scrt_is_managed_app GetModuleHandleW 3059->3060 3061 7ff7a8502921 3060->3061 3062 7ff7a8502925 3061->3062 3063 7ff7a8502960 _exit 3061->3063 2883 7ff7a8507559 2886 7ff7a8504158 2883->2886 2887 7ff7a8504182 2886->2887 2888 7ff7a8504170 2886->2888 2889 7ff7a85043d0 ExFilterRethrow 10 API calls 2887->2889 2888->2887 2890 7ff7a8504178 2888->2890 2891 7ff7a8504187 2889->2891 2892 7ff7a85043d0 ExFilterRethrow 10 API calls 2890->2892 2895 7ff7a8504180 2890->2895 2893 7ff7a85043d0 ExFilterRethrow 10 API calls 2891->2893 2891->2895 2894 7ff7a85041a7 2892->2894 2893->2895 2896 7ff7a85043d0 ExFilterRethrow 10 API calls 2894->2896 2897 7ff7a85041b4 terminate 2896->2897 3064 7ff7a8501b18 _time64 3065 7ff7a8501b34 3064->3065 3066 7ff7a8501bf1 3065->3066 3067 7ff7a8501ee0 22 API calls 3065->3067 3068 7ff7a8502230 22 API calls 3066->3068 3069 7ff7a8501c34 BuildCatchObjectHelperInternal 3066->3069 3067->3066 3068->3069 3070 7ff7a8501da2 _invalid_parameter_noinfo_noreturn 3069->3070 3071 7ff7a85018a0 3069->3071 3072 7ff7a8501da9 WSAGetLastError 3070->3072 3074 7ff7a8501d76 3071->3074 3075 7ff7a8501dd0 3071->3075 3077 7ff7a85020c0 21 API calls 3071->3077 3073 7ff7a8501450 6 API calls 3072->3073 3073->3074 3076 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 3074->3076 3078 7ff7a8501450 6 API calls 3075->3078 3079 7ff7a8501d87 3076->3079 3077->3071 3078->3074 3080 7ff7a85074d6 3081 7ff7a8503b54 11 API calls 3080->3081 3086 7ff7a85074e9 3081->3086 3082 7ff7a850751a __GSHandlerCheck_EH 3083 7ff7a85043d0 ExFilterRethrow 10 API calls 3082->3083 3084 7ff7a850752e 3083->3084 3085 7ff7a85043d0 ExFilterRethrow 10 API calls 3084->3085 3087 7ff7a850753b 3085->3087 3086->3082 3088 7ff7a8504104 10 API calls 3086->3088 3089 7ff7a85043d0 ExFilterRethrow 10 API calls 3087->3089 3088->3082 3090 7ff7a8507548 3089->3090 2898 7ff7a8507411 2899 7ff7a8507495 2898->2899 2900 7ff7a8507429 2898->2900 2900->2899 2901 7ff7a85043d0 ExFilterRethrow 10 API calls 2900->2901 2902 7ff7a8507476 2901->2902 2903 7ff7a85043d0 ExFilterRethrow 10 API calls 2902->2903 2904 7ff7a850748b terminate 2903->2904 2904->2899 2939 7ff7a8501510 2940 7ff7a8503cc0 __std_exception_copy 2 API calls 2939->2940 2941 7ff7a8501539 2940->2941 2911 7ff7a8507090 2912 7ff7a85070d2 __GSHandlerCheckCommon 2911->2912 2913 7ff7a85070fa 2912->2913 2915 7ff7a8503d78 2912->2915 2918 7ff7a8503da8 _IsNonwritableInCurrentImage __C_specific_handler __except_validate_context_record 2915->2918 2916 7ff7a8503e99 2916->2913 2917 7ff7a8503e64 RtlUnwindEx 2917->2918 2918->2916 2918->2917 2926 7ff7a8503090 2927 7ff7a85030c4 2926->2927 2928 7ff7a85030a8 2926->2928 2928->2927 2933 7ff7a85041c0 2928->2933 2932 7ff7a85030e2 2934 7ff7a85043d0 ExFilterRethrow 10 API calls 2933->2934 2935 7ff7a85030d6 2934->2935 2936 7ff7a85041d4 2935->2936 2937 7ff7a85043d0 ExFilterRethrow 10 API calls 2936->2937 2938 7ff7a85041dd 2937->2938 2938->2932 3091 7ff7a8501550 3092 7ff7a8503d50 __std_exception_destroy free 3091->3092 3093 7ff7a8501567 3092->3093 3094 7ff7a85027d0 3098 7ff7a8503074 SetUnhandledExceptionFilter 3094->3098 3099 7ff7a85048c7 abort 2942 7ff7a8502700 2943 7ff7a8502710 2942->2943 2955 7ff7a8502bd8 2943->2955 2945 7ff7a8502ecc 7 API calls 2946 7ff7a85027b5 2945->2946 2947 7ff7a8502734 _RTC_Initialize 2953 7ff7a8502797 2947->2953 2963 7ff7a8502e64 InitializeSListHead 2947->2963 2953->2945 2954 7ff7a85027a5 2953->2954 2956 7ff7a8502be9 2955->2956 2961 7ff7a8502c1b 2955->2961 2957 7ff7a8502c58 2956->2957 2960 7ff7a8502bee __scrt_release_startup_lock 2956->2960 2958 7ff7a8502ecc 7 API calls 2957->2958 2959 7ff7a8502c62 2958->2959 2960->2961 2962 7ff7a8502c0b _initialize_onexit_table 2960->2962 2961->2947 2962->2961 3107 7ff7a850733c _seh_filter_exe 3111 7ff7a8501d39 3112 7ff7a8501d40 3111->3112 3113 7ff7a8502040 22 API calls 3112->3113 3115 7ff7a85018a0 3112->3115 3113->3115 3114 7ff7a8501d76 3117 7ff7a8502660 __GSHandlerCheck_EH 8 API calls 3114->3117 3115->3114 3116 7ff7a8501dd0 3115->3116 3118 7ff7a85020c0 21 API calls 3115->3118 3119 7ff7a8501450 6 API calls 3116->3119 3120 7ff7a8501d87 3117->3120 3118->3115 3119->3114

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 7ff7a8501060-7ff7a85010ae 1 7ff7a8501386-7ff7a8501394 call 7ff7a8501450 0->1 2 7ff7a85010b4-7ff7a85010c6 0->2 7 7ff7a8501399 1->7 3 7ff7a85010d0-7ff7a85010d6 2->3 5 7ff7a850127f-7ff7a8501283 3->5 6 7ff7a85010dc-7ff7a85010df 3->6 5->3 8 7ff7a8501289-7ff7a8501299 5->8 9 7ff7a85010e1-7ff7a85010e5 6->9 10 7ff7a85010ed 6->10 11 7ff7a850139e-7ff7a85013b7 7->11 8->1 12 7ff7a850129f-7ff7a85012b7 call 7ff7a8502688 8->12 9->10 13 7ff7a85010e7-7ff7a85010eb 9->13 14 7ff7a85010f0-7ff7a85010fc 10->14 25 7ff7a850132a-7ff7a8501336 call 7ff7a85023c0 12->25 26 7ff7a85012b9-7ff7a85012c9 GetTempPathA 12->26 13->10 16 7ff7a8501104-7ff7a850110b 13->16 17 7ff7a8501110-7ff7a8501113 14->17 18 7ff7a85010fe-7ff7a8501102 14->18 20 7ff7a850127b 16->20 21 7ff7a8501125-7ff7a8501136 strcmp 17->21 22 7ff7a8501115-7ff7a8501119 17->22 18->14 18->16 20->5 23 7ff7a850113c-7ff7a850113f 21->23 24 7ff7a8501267-7ff7a850126e 21->24 22->21 27 7ff7a850111b-7ff7a850111f 22->27 28 7ff7a8501151-7ff7a8501162 strcmp 23->28 29 7ff7a8501141-7ff7a8501145 23->29 33 7ff7a8501276 24->33 41 7ff7a8501346 25->41 42 7ff7a8501338-7ff7a8501344 call 7ff7a85013c0 25->42 31 7ff7a85012cb-7ff7a85012e7 GetLastError call 7ff7a8501450 GetLastError 26->31 32 7ff7a85012e9-7ff7a8501302 strcat_s 26->32 27->21 27->24 36 7ff7a8501258-7ff7a8501265 28->36 37 7ff7a8501168-7ff7a850116b 28->37 29->28 34 7ff7a8501147-7ff7a850114b 29->34 52 7ff7a8501313-7ff7a8501323 call 7ff7a8502680 31->52 39 7ff7a8501325 32->39 40 7ff7a8501304-7ff7a8501312 call 7ff7a8501450 32->40 33->20 34->28 34->36 36->20 43 7ff7a850117d-7ff7a850118e strcmp 37->43 44 7ff7a850116d-7ff7a8501171 37->44 39->25 40->52 49 7ff7a850134b-7ff7a8501384 __acrt_iob_func fflush __acrt_iob_func fflush call 7ff7a8502680 41->49 42->49 50 7ff7a8501194-7ff7a8501197 43->50 51 7ff7a8501247-7ff7a8501256 43->51 44->43 48 7ff7a8501173-7ff7a8501177 44->48 48->43 48->51 49->11 56 7ff7a85011a5-7ff7a85011af 50->56 57 7ff7a8501199-7ff7a850119d 50->57 51->33 52->11 62 7ff7a85011b0-7ff7a85011bb 56->62 57->56 61 7ff7a850119f-7ff7a85011a3 57->61 61->56 63 7ff7a85011c3-7ff7a85011d2 61->63 64 7ff7a85011bd-7ff7a85011c1 62->64 65 7ff7a85011d7-7ff7a85011da 62->65 63->33 64->62 64->63 66 7ff7a85011ec-7ff7a85011f6 65->66 67 7ff7a85011dc-7ff7a85011e0 65->67 69 7ff7a8501200-7ff7a850120b 66->69 67->66 68 7ff7a85011e2-7ff7a85011e6 67->68 68->20 68->66 70 7ff7a8501215-7ff7a8501218 69->70 71 7ff7a850120d-7ff7a8501211 69->71 73 7ff7a8501226-7ff7a8501237 strcmp 70->73 74 7ff7a850121a-7ff7a850121e 70->74 71->69 72 7ff7a8501213 71->72 72->20 73->20 76 7ff7a8501239-7ff7a8501245 atoi 73->76 74->73 75 7ff7a8501220-7ff7a8501224 74->75 75->20 75->73 76->20
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: strcmp$ErrorLast__acrt_iob_funcfflush$PathTempatoistrcat_s
                                                                            • String ID: -$-$-$-$-$-$-$--diag$--full$--name$--normal$--triage$--verbose$--withheap$Dump successfully written$GetTempPath failed (0x%08x)$createdump [options] pid-f, --name - dump path and file name. The default is '%TEMP%\dump.%p.dmp'. These specifiers are substituted with following values: %p PID of dumped process. %e The process executable filename. %h Hostname return by gethostn$dump.%p.dmp$full dump$minidump$minidump with heap$strcat_s failed (%d)$triage minidump$v
                                                                            • API String ID: 2647627392-2367407095
                                                                            • Opcode ID: 3e8843d71ddd811f5735ae345386871f6517bdd5673e2455e3aa9b185965a2cd
                                                                            • Instruction ID: 54c4f9f6bd81098dc342d67cef2bee4a8dac08f848990295f84c5f8efe8b26dd
                                                                            • Opcode Fuzzy Hash: 3e8843d71ddd811f5735ae345386871f6517bdd5673e2455e3aa9b185965a2cd
                                                                            • Instruction Fuzzy Hash: 4CA1B462D4E7834DFF61AF2194002B9E6B0AB46754FC64131CDAD026B5FE3CE845C32A

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __p___argc__p___argv__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                                                            • String ID:
                                                                            • API String ID: 2308368977-0
                                                                            • Opcode ID: 5a9b20bb9eaae0def914decdfc47a4fcc48693c8541f2657ef11ecffac799aa6
                                                                            • Instruction ID: 7a2c90a8ba3cc5ed061e31883f4d4b45df3da30dbe9374adabc5c2b7056bfe28
                                                                            • Opcode Fuzzy Hash: 5a9b20bb9eaae0def914decdfc47a4fcc48693c8541f2657ef11ecffac799aa6
                                                                            • Instruction Fuzzy Hash: 10314A21E0A60349EB1ABB60D4513F9E271AF41780FC64439ED2D472B3FE2CA945C278

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$__stdio_common_vfprintf$fflushfprintf
                                                                            • String ID: [createdump]
                                                                            • API String ID: 3735572767-2657508301
                                                                            • Opcode ID: f7b41b5d75985a22341ebafe60962d777547180dfe076665e84a48d8af4ee52e
                                                                            • Instruction ID: 0530a31a1f649cd7aa7bf4b787f70984cf3be8b3f227e172dd5391308a7ee845
                                                                            • Opcode Fuzzy Hash: f7b41b5d75985a22341ebafe60962d777547180dfe076665e84a48d8af4ee52e
                                                                            • Instruction Fuzzy Hash: 28014F21A09B4286EB04AB50F81566AE374FF84BD1F804535EE9D03B75EF3CD465C714

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                            • String ID:
                                                                            • API String ID: 3140674995-0
                                                                            • Opcode ID: 92083fc3b2590fb7f42fdf2bff26a09e0be32edceb9cda99800bf26d983c5eac
                                                                            • Instruction ID: fd4c27d93bf18a6f6610ee88d95ed1f9f599dbf393d0d6eb951186eabf8ffb5f
                                                                            • Opcode Fuzzy Hash: 92083fc3b2590fb7f42fdf2bff26a09e0be32edceb9cda99800bf26d983c5eac
                                                                            • Instruction Fuzzy Hash: 5631927260AB818AEB649F60E8507EDB374FB44344F814039DA5E47BA4EF38C648C724
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8c8a5ce5a61a9accbe9d72245b7862f6c7c599a8b634bc8698eb0ff17e984138
                                                                            • Instruction ID: ad844740824ca50fe3ed7ec5f2cadb3354dbc4ebe02ffe8033581f03b2bda75d
                                                                            • Opcode Fuzzy Hash: 8c8a5ce5a61a9accbe9d72245b7862f6c7c599a8b634bc8698eb0ff17e984138
                                                                            • Instruction Fuzzy Hash: 33A0022590FD02D8E748AB50EC74571E330FB50300BE24432D82D414B0BF3CA554C328

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A850242D
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A850243B
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501475
                                                                              • Part of subcall function 00007FF7A8501450: fprintf.MSPDB140-MSVCRT ref: 00007FF7A8501485
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501494
                                                                              • Part of subcall function 00007FF7A8501450: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014B3
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014BE
                                                                              • Part of subcall function 00007FF7A8501450: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014C7
                                                                            • K32GetModuleBaseNameA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A8502466
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A8502470
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A8502487
                                                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A85025F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$ErrorLast$BaseCloseHandleModuleNameOpenProcess__stdio_common_vfprintf_invalid_parameter_noinfo_noreturnfflushfprintf
                                                                            • String ID: Get process name FAILED %d$Invalid dump path '%s' error %d$Invalid process id '%d' error %d$Write dump FAILED 0x%08x$Writing %s to file %s
                                                                            • API String ID: 3971781330-1292085346
                                                                            • Opcode ID: 8ec448eeb6e8f02312a1538d84a3c8dfc991fc7cafdc13e8cd0ded943aea62a7
                                                                            • Instruction ID: ed995dc376b11cb9b090fa61ca7a698c92aafe3039725b19c98c8e8ae0f47544
                                                                            • Opcode Fuzzy Hash: 8ec448eeb6e8f02312a1538d84a3c8dfc991fc7cafdc13e8cd0ded943aea62a7
                                                                            • Instruction Fuzzy Hash: 5861B631A09A4189EB10AB11E85067EF771FB85791F914134EEAD07AB5EF3CE445C718

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 177 7ff7a85049a4-7ff7a8504a07 call 7ff7a8504518 180 7ff7a8504a20-7ff7a8504a29 call 7ff7a85043d0 177->180 181 7ff7a8504a09-7ff7a8504a12 call 7ff7a85043d0 177->181 188 7ff7a8504a3f-7ff7a8504a42 180->188 189 7ff7a8504a2b-7ff7a8504a38 call 7ff7a85043d0 * 2 180->189 186 7ff7a8504e99-7ff7a8504e9f abort 181->186 187 7ff7a8504a18-7ff7a8504a1e 181->187 187->188 188->186 191 7ff7a8504a48-7ff7a8504a54 188->191 189->188 193 7ff7a8504a56-7ff7a8504a7d 191->193 194 7ff7a8504a7f 191->194 196 7ff7a8504a81-7ff7a8504a83 193->196 194->196 196->186 198 7ff7a8504a89-7ff7a8504a8f 196->198 199 7ff7a8504a95-7ff7a8504a99 198->199 200 7ff7a8504b59-7ff7a8504b6f call 7ff7a8505724 198->200 199->200 201 7ff7a8504a9f-7ff7a8504aaa 199->201 205 7ff7a8504b75-7ff7a8504b79 200->205 206 7ff7a8504def-7ff7a8504df3 200->206 201->200 204 7ff7a8504ab0-7ff7a8504ab5 201->204 204->200 207 7ff7a8504abb-7ff7a8504ac5 call 7ff7a85043d0 204->207 205->206 208 7ff7a8504b7f-7ff7a8504b8a 205->208 210 7ff7a8504df5-7ff7a8504dfc 206->210 211 7ff7a8504e2b-7ff7a8504e35 call 7ff7a85043d0 206->211 218 7ff7a8504acb-7ff7a8504af1 call 7ff7a85043d0 * 2 call 7ff7a8503be8 207->218 219 7ff7a8504e37-7ff7a8504e56 call 7ff7a8502660 207->219 208->206 212 7ff7a8504b90-7ff7a8504b94 208->212 210->186 214 7ff7a8504e02-7ff7a8504e26 call 7ff7a8504ea0 210->214 211->186 211->219 216 7ff7a8504dd4-7ff7a8504dd8 212->216 217 7ff7a8504b9a-7ff7a8504bd1 call 7ff7a85036d0 212->217 214->211 216->211 222 7ff7a8504dda-7ff7a8504de7 call 7ff7a8503670 216->222 217->216 231 7ff7a8504bd7-7ff7a8504be2 217->231 246 7ff7a8504af3-7ff7a8504af7 218->246 247 7ff7a8504b11-7ff7a8504b1b call 7ff7a85043d0 218->247 233 7ff7a8504e81-7ff7a8504e98 call 7ff7a85043d0 * 2 terminate 222->233 234 7ff7a8504ded 222->234 235 7ff7a8504be6-7ff7a8504bf6 231->235 233->186 234->211 238 7ff7a8504d2f-7ff7a8504dce 235->238 239 7ff7a8504bfc-7ff7a8504c02 235->239 238->216 238->235 239->238 242 7ff7a8504c08-7ff7a8504c31 call 7ff7a85056a8 239->242 242->238 253 7ff7a8504c37-7ff7a8504c7e call 7ff7a8503bbc * 2 242->253 246->247 251 7ff7a8504af9-7ff7a8504b04 246->251 247->200 255 7ff7a8504b1d-7ff7a8504b3d call 7ff7a85043d0 * 2 call 7ff7a8505fd8 247->255 251->247 254 7ff7a8504b06-7ff7a8504b0b 251->254 263 7ff7a8504c80-7ff7a8504ca5 call 7ff7a8503bbc call 7ff7a85052d0 253->263 264 7ff7a8504cba-7ff7a8504cd0 call 7ff7a8505ab0 253->264 254->186 254->247 273 7ff7a8504b54 255->273 274 7ff7a8504b3f-7ff7a8504b49 call 7ff7a85060c8 255->274 279 7ff7a8504cd7-7ff7a8504d26 call 7ff7a85048d0 263->279 280 7ff7a8504ca7-7ff7a8504cb3 263->280 275 7ff7a8504cd2 264->275 276 7ff7a8504d2b 264->276 273->200 283 7ff7a8504b4f-7ff7a8504e7a call 7ff7a8504090 call 7ff7a8505838 call 7ff7a8503f84 274->283 284 7ff7a8504e7b-7ff7a8504e80 terminate 274->284 275->253 276->238 279->276 280->263 282 7ff7a8504cb5 280->282 282->264 283->284 284->233
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: terminate$Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                            • String ID: csm$csm$csm
                                                                            • API String ID: 695522112-393685449
                                                                            • Opcode ID: b33eca4017884e99d2f222704934a1d2e619e74398d1b95ed41b8d3f9756be10
                                                                            • Instruction ID: 95a6532ab904ef05c9f81bf20f89c881261f110f1f7640a915322de9d6d10287
                                                                            • Opcode Fuzzy Hash: b33eca4017884e99d2f222704934a1d2e619e74398d1b95ed41b8d3f9756be10
                                                                            • Instruction Fuzzy Hash: DEE1B072909A828EE720AF24D4803ADF7B0FB4474CF964135DEAD476A6EF38E485C754

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$__stdio_common_vfprintf$fflushfprintf
                                                                            • String ID: [createdump]
                                                                            • API String ID: 3735572767-2657508301
                                                                            • Opcode ID: 5b675bc39e039bc525fd467c26ca74d7b5bd1981a0b88a155956b168aee24ed4
                                                                            • Instruction ID: 6cde6c229c8ce857b2a3db1b27edd3ba60098c409f96490d003c6b353e2291ee
                                                                            • Opcode Fuzzy Hash: 5b675bc39e039bc525fd467c26ca74d7b5bd1981a0b88a155956b168aee24ed4
                                                                            • Instruction Fuzzy Hash: D8012C31A09B428AEB04AB50F8146AAE370FB84BD1F804135EE9D03B75AF7CD4A5C754

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • WSAStartup.WS2_32 ref: 00007FF7A850186C
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501475
                                                                              • Part of subcall function 00007FF7A8501450: fprintf.MSPDB140-MSVCRT ref: 00007FF7A8501485
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501494
                                                                              • Part of subcall function 00007FF7A8501450: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014B3
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014BE
                                                                              • Part of subcall function 00007FF7A8501450: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$Startup__stdio_common_vfprintffflushfprintf
                                                                            • String ID: %%%%%%%%$%%%%%%%%$--name$Invalid dump name format char '%c'$Pipe syntax in dump name not supported
                                                                            • API String ID: 3378602911-3973674938
                                                                            • Opcode ID: 6d691e12a95190b73438bc01f861d361a60469c0dc3d28550e2b0afd423a51ff
                                                                            • Instruction ID: 55b01da915a8d308c1464b1d6a1d7aa2363db84421b6192710a4e085119c3359
                                                                            • Opcode Fuzzy Hash: 6d691e12a95190b73438bc01f861d361a60469c0dc3d28550e2b0afd423a51ff
                                                                            • Instruction Fuzzy Hash: 55312762E09AC08AE755AF1598547F9E7B1BB45384FC60032EDAD033A1EE3CD144C318

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000000,00007FF7A850669F,?,?,?,00007FF7A850441E,?,?,?,00007FF7A85043D9), ref: 00007FF7A850651D
                                                                            • GetLastError.KERNEL32(?,00000000,00007FF7A850669F,?,?,?,00007FF7A850441E,?,?,?,00007FF7A85043D9,?,?,?,?,00007FF7A8503524), ref: 00007FF7A850652B
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00007FF7A850669F,?,?,?,00007FF7A850441E,?,?,?,00007FF7A85043D9,?,?,?,?,00007FF7A8503524), ref: 00007FF7A8506555
                                                                            • FreeLibrary.KERNEL32(?,00000000,00007FF7A850669F,?,?,?,00007FF7A850441E,?,?,?,00007FF7A85043D9,?,?,?,?,00007FF7A8503524), ref: 00007FF7A850659B
                                                                            • GetProcAddress.KERNEL32(?,00000000,00007FF7A850669F,?,?,?,00007FF7A850441E,?,?,?,00007FF7A85043D9,?,?,?,?,00007FF7A8503524), ref: 00007FF7A85065A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                            • String ID: api-ms-
                                                                            • API String ID: 2559590344-2084034818
                                                                            • Opcode ID: 91eaabdab86b5d7484fb536d38c8d26551698fbc6984510a5f5d6d43d06b7795
                                                                            • Instruction ID: 03d797b477368149b7f95f9e39e1658a0b10602738056d3f2ba02e73439206c7
                                                                            • Opcode Fuzzy Hash: 91eaabdab86b5d7484fb536d38c8d26551698fbc6984510a5f5d6d43d06b7795
                                                                            • Instruction Fuzzy Hash: DB31A131A1BB0289EF15BB129810575E2E4FF08BA1FDA4634DD6D0A7A4FF3CE4458728

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 360 7ff7a8501b18-7ff7a8501b32 _time64 361 7ff7a8501b34-7ff7a8501b37 360->361 362 7ff7a8501b80-7ff7a8501ba8 360->362 363 7ff7a8501b40-7ff7a8501b68 361->363 362->362 364 7ff7a8501baa-7ff7a8501bd8 362->364 363->363 365 7ff7a8501b6a-7ff7a8501b71 363->365 366 7ff7a8501bfa-7ff7a8501c32 364->366 367 7ff7a8501bda-7ff7a8501bf5 call 7ff7a8501ee0 364->367 365->364 368 7ff7a8501c64-7ff7a8501c78 call 7ff7a8502230 366->368 369 7ff7a8501c34-7ff7a8501c43 366->369 367->366 378 7ff7a8501c7d-7ff7a8501c88 368->378 372 7ff7a8501c45 369->372 373 7ff7a8501c48-7ff7a8501c62 call 7ff7a85068c0 369->373 372->373 373->378 379 7ff7a8501cbb-7ff7a8501cde 378->379 380 7ff7a8501c8a-7ff7a8501c98 378->380 381 7ff7a8501d55-7ff7a8501d70 379->381 382 7ff7a8501cb3-7ff7a8501cb6 call 7ff7a8502680 380->382 383 7ff7a8501c9a-7ff7a8501cad 380->383 387 7ff7a8501d76 381->387 388 7ff7a85018a0-7ff7a85018a3 381->388 382->379 383->382 385 7ff7a8501da2-7ff7a8501dce _invalid_parameter_noinfo_noreturn WSAGetLastError call 7ff7a8501450 call 7ff7a8502680 383->385 390 7ff7a8501d78-7ff7a8501da1 call 7ff7a8502660 385->390 387->390 391 7ff7a85018a5-7ff7a85018b7 388->391 392 7ff7a85018f3-7ff7a85018fe 388->392 398 7ff7a85018e2-7ff7a85018ee call 7ff7a85020c0 391->398 399 7ff7a85018b9-7ff7a85018c8 391->399 395 7ff7a8501904-7ff7a8501915 392->395 396 7ff7a8501dd0-7ff7a8501dde call 7ff7a8501450 392->396 395->381 396->390 398->381 404 7ff7a85018cd-7ff7a85018dd 399->404 405 7ff7a85018ca 399->405 404->381 405->404
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: _time64
                                                                            • String ID: %%%%%%%%$Could not get the host name for dump name: %d
                                                                            • API String ID: 1670930206-4114407318
                                                                            • Opcode ID: 30f253d6cb86930f70187238c9af70fef4a32202514a54efb800f102df6d23dc
                                                                            • Instruction ID: c181c02e4eb3e520a662979442ed85f5cdf4bec5e7f9f2cf348045701ffab3be
                                                                            • Opcode Fuzzy Hash: 30f253d6cb86930f70187238c9af70fef4a32202514a54efb800f102df6d23dc
                                                                            • Instruction Fuzzy Hash: E551E462E19B818AEB049B28D4543ADEBA4FB417D0F810135EEAD17BB9EF3CD041D354

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: EncodePointerabort
                                                                            • String ID: MOC$RCC
                                                                            • API String ID: 1188231555-2084237596
                                                                            • Opcode ID: 97abe66515cb1414aeefc8003222462485e27fa84eefc4111ad6d0138f6fd2ea
                                                                            • Instruction ID: 8df67d73984f4027c5ffc66c5519335a82683fc0cffcf37520c178bfb469588e
                                                                            • Opcode Fuzzy Hash: 97abe66515cb1414aeefc8003222462485e27fa84eefc4111ad6d0138f6fd2ea
                                                                            • Instruction Fuzzy Hash: D891D173A09B828EE710EB65E8802ADFBB0FB44788F554129EE9D17765EF38D195C700

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 459 7ff7a8505414-7ff7a8505461 call 7ff7a85063f4 call 7ff7a85043d0 464 7ff7a8505463-7ff7a8505469 459->464 465 7ff7a850548e-7ff7a8505492 459->465 464->465 468 7ff7a850546b-7ff7a850546e 464->468 466 7ff7a85055b2-7ff7a85055c7 call 7ff7a8505724 465->466 467 7ff7a8505498-7ff7a850549b 465->467 480 7ff7a85055d2-7ff7a85055d8 466->480 481 7ff7a85055c9-7ff7a85055cc 466->481 469 7ff7a85054a1-7ff7a85054d1 467->469 470 7ff7a8505680 467->470 472 7ff7a8505480-7ff7a8505483 468->472 473 7ff7a8505470-7ff7a8505474 468->473 469->470 474 7ff7a85054d7-7ff7a85054de 469->474 475 7ff7a8505685-7ff7a85056a1 470->475 472->465 478 7ff7a8505485-7ff7a8505488 472->478 477 7ff7a8505476-7ff7a850547e 473->477 473->478 474->470 479 7ff7a85054e4-7ff7a85054e8 474->479 477->465 477->472 478->465 478->470 482 7ff7a850559f-7ff7a85055ad call 7ff7a8503678 479->482 483 7ff7a85054ee-7ff7a85054f1 479->483 484 7ff7a85055da-7ff7a85055de 480->484 485 7ff7a8505647-7ff7a850567b call 7ff7a85049a4 480->485 481->470 481->480 482->470 487 7ff7a8505556-7ff7a8505559 483->487 488 7ff7a85054f3-7ff7a8505508 call 7ff7a8504520 483->488 484->485 490 7ff7a85055e0-7ff7a85055e7 484->490 485->470 487->482 491 7ff7a850555b-7ff7a8505563 487->491 495 7ff7a85056a2-7ff7a85056a7 abort 488->495 500 7ff7a850550e-7ff7a8505511 488->500 490->485 494 7ff7a85055e9-7ff7a85055f0 490->494 491->495 496 7ff7a8505569-7ff7a8505593 491->496 494->485 498 7ff7a85055f2-7ff7a8505605 call 7ff7a8503bbc 494->498 496->495 499 7ff7a8505599-7ff7a850559d 496->499 498->485 506 7ff7a8505607-7ff7a8505645 498->506 503 7ff7a8505546-7ff7a8505551 call 7ff7a8505cf0 499->503 504 7ff7a8505513-7ff7a8505538 500->504 505 7ff7a850553a-7ff7a850553d 500->505 503->470 504->505 505->495 507 7ff7a8505543 505->507 506->475 507->503
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __except_validate_context_recordabort
                                                                            • String ID: csm$csm
                                                                            • API String ID: 746414643-3733052814
                                                                            • Opcode ID: 1056e810e0031d83590426beccc43492b2f2866ca19cabfb7471893f0b3bcd0b
                                                                            • Instruction ID: 90c4ed99fc52a4b00d637b7ebc45ce749fdb5f7f7a25c6fe1788a8a40a4384f4
                                                                            • Opcode Fuzzy Hash: 1056e810e0031d83590426beccc43492b2f2866ca19cabfb7471893f0b3bcd0b
                                                                            • Instruction Fuzzy Hash: 5471C13290A6828EDB21AF21905467DFBB0FB40B89F968131DE9D57AA5EF3CD450CB14

                                                                            Control-flow Graph

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %%%%%%%%$Could not get the host name for dump name: %d
                                                                            • API String ID: 0-4114407318
                                                                            • Opcode ID: 3a1402493b52144332fc7ef885a246e0bef5bb5eddb931c8bdeb75c83dbb8659
                                                                            • Instruction ID: 1c2b8bd00be8e38f9042e97e5b8aea43b149e071cba5f6bcebe2a960bbbf23b5
                                                                            • Opcode Fuzzy Hash: 3a1402493b52144332fc7ef885a246e0bef5bb5eddb931c8bdeb75c83dbb8659
                                                                            • Instruction Fuzzy Hash: 9C51E622E19B854AE700DB29E4407AAE7B1EB817D0F810135EEAD07BB9EF3DD041D754

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFrameInfo__except_validate_context_record
                                                                            • String ID: csm
                                                                            • API String ID: 2558813199-1018135373
                                                                            • Opcode ID: 08459d2de849ea082ca6f7467207d0873ef5a0572d3180cf677e49d91fe67cef
                                                                            • Instruction ID: 633a1c5de0ec352cfa4e04fa096ec2f76b786b32ea7eb383dccc23504788c5c4
                                                                            • Opcode Fuzzy Hash: 08459d2de849ea082ca6f7467207d0873ef5a0572d3180cf677e49d91fe67cef
                                                                            • Instruction Fuzzy Hash: B5514A3261AB428AD720AB15E0402AEF7B4FB88B94F551134DF9D07B65EF78E4A0CB54
                                                                            APIs
                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 00007FF7A85017EB
                                                                            • WSAStartup.WS2_32 ref: 00007FF7A850186C
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501475
                                                                              • Part of subcall function 00007FF7A8501450: fprintf.MSPDB140-MSVCRT ref: 00007FF7A8501485
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A8501494
                                                                              • Part of subcall function 00007FF7A8501450: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014B3
                                                                              • Part of subcall function 00007FF7A8501450: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014BE
                                                                              • Part of subcall function 00007FF7A8501450: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7A85014C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$StartupXinvalid_argument__stdio_common_vfprintffflushfprintfstd::_
                                                                            • String ID: --name$Pipe syntax in dump name not supported$string too long
                                                                            • API String ID: 1412700758-3183687674
                                                                            • Opcode ID: 937e6b2c28cea08e1eee527b5bf6a7363096d6cc0634c1c423fcc3cad23f2144
                                                                            • Instruction ID: 1fc3aef0dca0f59dfb4b562ae1bad7885239805afe0ca1077e62d16a9dbdd39e
                                                                            • Opcode Fuzzy Hash: 937e6b2c28cea08e1eee527b5bf6a7363096d6cc0634c1c423fcc3cad23f2144
                                                                            • Instruction Fuzzy Hash: 4901B122A1998199F761AF12EC917EAE360BB89798F910036EE5C06671EE3CD486C714
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastgethostname
                                                                            • String ID: %%%%%%%%$Could not get the host name for dump name: %d
                                                                            • API String ID: 3782448640-4114407318
                                                                            • Opcode ID: 320cb389b9e396755b8a5578c83a0b73153155c3fa84c5d330cc0819ada1fb95
                                                                            • Instruction ID: 6fc404ad04fc5472236d650bcf5bdf2d0992a6d72171f7a418667b5f9318dcee
                                                                            • Opcode Fuzzy Hash: 320cb389b9e396755b8a5578c83a0b73153155c3fa84c5d330cc0819ada1fb95
                                                                            • Instruction Fuzzy Hash: DB112B11E0A1424DE749BB20A8507FAE2609F857A0FC21230EDBF072F6FD3CD0424368
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: terminate
                                                                            • String ID: MOC$RCC$csm
                                                                            • API String ID: 1821763600-2671469338
                                                                            • Opcode ID: 2eecf08628838b8288b91de4d166118c23004d29b6453832f1ed38693e8fa958
                                                                            • Instruction ID: 54be0a979d6edbbc2f55689a7bca21e8b3d158fc16bf9d1c3d2d2432da4ebd1d
                                                                            • Opcode Fuzzy Hash: 2eecf08628838b8288b91de4d166118c23004d29b6453832f1ed38693e8fa958
                                                                            • Instruction Fuzzy Hash: 50F0A436909646D9E3287B51F1410ACF374FF58B8DF8A6075DF2806262EF7CE4A0C655
                                                                            APIs
                                                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(-3333333333333333,?,00000000,00007FF7A85018EE), ref: 00007FF7A85021E0
                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A850221E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                                            • String ID: Invalid process id '%d' error %d
                                                                            • API String ID: 73155330-4244389950
                                                                            • Opcode ID: bba2875ca5ab07f9a8534c7e54732a79a80581b419c8ee845a73c6edf0a3127c
                                                                            • Instruction ID: cff5565dfbd15308b67bc49d93179c43ac7ca697e3020b371f840e3f16970e21
                                                                            • Opcode Fuzzy Hash: bba2875ca5ab07f9a8534c7e54732a79a80581b419c8ee845a73c6edf0a3127c
                                                                            • Instruction Fuzzy Hash: C4311622B0A78289EF15AF1195042ADE3B5AB05BD0F890631DF7D07BE5EE7CE0508328
                                                                            APIs
                                                                            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A850173F), ref: 00007FF7A8503FC8
                                                                            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A850173F), ref: 00007FF7A850400E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000007.00000002.1848327579.00007FF7A8501000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7A8500000, based on PE: true
                                                                            • Associated: 00000007.00000002.1848128757.00007FF7A8500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1848889498.00007FF7A8508000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849259336.00007FF7A850C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000007.00000002.1849388657.00007FF7A850D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_7_2_7ff7a8500000_createdump.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFileHeaderRaise
                                                                            • String ID: csm
                                                                            • API String ID: 2573137834-1018135373
                                                                            • Opcode ID: 7531413fd5ba05c8efc2732aab9693bebd0b5d96e62eb0afc70bc4d0601aafd3
                                                                            • Instruction ID: d8cef2c322364c4902885ad05fca16d069a19cbc9d1711327ccf043f444d7bcc
                                                                            • Opcode Fuzzy Hash: 7531413fd5ba05c8efc2732aab9693bebd0b5d96e62eb0afc70bc4d0601aafd3
                                                                            • Instruction Fuzzy Hash: DF116D32619B4182EB109F15F500269F7B0FB88B84F594230EE9D07B68EF3DC555C704
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: strncmp$__acrt_iob_func$av_dict_freeav_strerrorfprintfprintf$av_dict_getos_event_init$__stdio_common_vfprintf_errnoav_dict_countav_dict_parse_stringav_mallocavformat_write_headeravio_alloc_contextavio_openbreallocmemmovepthread_createpthread_mutex_initstrerror
                                                                            • String ID: %s=%s$Couldn't open '%s', %s$Error opening '%s': %s$Failed to parse muxer settings: %s%s$Using muxer settings:
                                                                            • API String ID: 2783795328-2826353358
                                                                            • Opcode ID: 0ced714b6d2bafb841ab697dc7cb68e417ab27a254e86fbca716fd3c82a395c5
                                                                            • Instruction ID: 7c35c2f611cf2b15e472a6d95d6de6d8466416ddb0cdaf2f2dd7531b0e0333fe
                                                                            • Opcode Fuzzy Hash: 0ced714b6d2bafb841ab697dc7cb68e417ab27a254e86fbca716fd3c82a395c5
                                                                            • Instruction Fuzzy Hash: B6A16F32B18A82D7EB14DB61D4513F863B0FF5A788F40813AEA4D97696EF2CE254C350
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$freemalloc$fprintf$ByteCharMultiWideav_rescale_q_rndrealloc$ErrorMode__stdio_common_vfprintf_fileno_setmodeav_interleaved_write_frameav_strerrormemsetsetvbuf
                                                                            • String ID: Couldn't initialize muxer$av_interleaved_write_frame failed: %d: %s
                                                                            • API String ID: 4192084208-164389310
                                                                            • Opcode ID: 90e4d641eae2122b72088982d14054dbbcc6ef952270b6c02c8a2abd6878b3b9
                                                                            • Instruction ID: fd5f401c10431aed18627478c96516f142a07ad5a8f55227862a7efe95c3a24d
                                                                            • Opcode Fuzzy Hash: 90e4d641eae2122b72088982d14054dbbcc6ef952270b6c02c8a2abd6878b3b9
                                                                            • Instruction Fuzzy Hash: E1E17C32A08A82C7EB209F61D8503A967B1FF8AB94F558139DE0E97B95DF3CE545C700
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                            • String ID:
                                                                            • API String ID: 313767242-0
                                                                            • Opcode ID: 8e29f9cfb3282d508510f87b074f2afb23630758b427b43b81c2847ae2e7d6a0
                                                                            • Instruction ID: 3fa2d43a05c949a9f93980be369f03c4bca12854a56a0f904989ae8526447d65
                                                                            • Opcode Fuzzy Hash: 8e29f9cfb3282d508510f87b074f2afb23630758b427b43b81c2847ae2e7d6a0
                                                                            • Instruction Fuzzy Hash: 6E310972609B81CAEB609FA0E8907E97375FF85744F44443ADA4E87B98EF38D648C710
                                                                            APIs
                                                                              • Part of subcall function 00007FF68FB72570: printf.MSPDB140-MSVCRT ref: 00007FF68FB72587
                                                                              • Part of subcall function 00007FF68FB72530: atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,00000000,00007FF68FB72617,?,?,?,00007FF68FB71BD6,?,?,?,00007FF68FB71A02), ref: 00007FF68FB72552
                                                                            • puts.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF68FB71BD6,?,?,?,00007FF68FB71A02), ref: 00007FF68FB728DF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: atoiprintfputs
                                                                            • String ID: Invalid number of audio tracks$Invalid number of video tracks$Must have at least 1 audio track or 1 video track$audio codec$audio track count$file name$muxer settings$stream key$video bitrate$video chroma sample location$video codec$video codec tag$video color primaries$video color range$video color trc$video colorspace$video fps den$video fps num$video height$video max luminance$video track count$video width${stream_key}
                                                                            • API String ID: 3402752964-4246942696
                                                                            • Opcode ID: bbb72588bee9787a683502761444138c14bf0f1375247d53f9cdc5c5b4da8170
                                                                            • Instruction ID: 9c1d6b48ab911ecccdbaf05a208c53ad4ed913b3294a907f096a286a8b363fbb
                                                                            • Opcode Fuzzy Hash: bbb72588bee9787a683502761444138c14bf0f1375247d53f9cdc5c5b4da8170
                                                                            • Instruction Fuzzy Hash: 2E814674908656D3FA14DF91AA149F963B2BF0AB90F81413ADD0D87696DF3DE20AC710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy$__acrt_iob_func__stdio_common_vfprintffclosefprintfmallocos_event_signalos_event_waitpthread_mutex_lock
                                                                            • String ID: Error allocating memory for output$Error writing to '%s', %s
                                                                            • API String ID: 2637689336-4070097938
                                                                            • Opcode ID: a31c7b85b8c0d82d0157cb35a6e72543ed071c06804e902690462ed57beb3fc0
                                                                            • Instruction ID: 3a61ddd1177b73779bb54f404a992aa186b9d6c20ca714c3203aca3c7fe3d9ef
                                                                            • Opcode Fuzzy Hash: a31c7b85b8c0d82d0157cb35a6e72543ed071c06804e902690462ed57beb3fc0
                                                                            • Instruction Fuzzy Hash: 4EA14E32A19A82C6E751DF21E4403E96370FF4AB88F484039DE8D9BB59DF78E145C720
                                                                            APIs
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68FB71A6D
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7204A
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72065
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72080
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7209B
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB720B6
                                                                            • avformat_network_init.AVFORMAT-60 ref: 00007FF68FB71A85
                                                                            • av_guess_format.AVFORMAT-60 ref: 00007FF68FB71AAF
                                                                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68FB71ABC
                                                                            • fprintf.MSPDB140-MSVCRT ref: 00007FF68FB71AD0
                                                                            • avformat_alloc_output_context2.AVFORMAT-60 ref: 00007FF68FB71AEC
                                                                            • av_strerror.AVUTIL-58 ref: 00007FF68FB71B19
                                                                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68FB71B23
                                                                            • fprintf.MSPDB140-MSVCRT ref: 00007FF68FB71B38
                                                                              • Part of subcall function 00007FF68FB72910: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68FB71B4C), ref: 00007FF68FB72939
                                                                              • Part of subcall function 00007FF68FB72370: avcodec_free_context.AVCODEC-60 ref: 00007FF68FB72388
                                                                              • Part of subcall function 00007FF68FB72370: av_free.AVUTIL-58 ref: 00007FF68FB723B1
                                                                              • Part of subcall function 00007FF68FB72370: avio_context_free.AVFORMAT-60 ref: 00007FF68FB723BD
                                                                              • Part of subcall function 00007FF68FB72370: avformat_free_context.AVFORMAT-60 ref: 00007FF68FB723CC
                                                                              • Part of subcall function 00007FF68FB72370: avcodec_free_context.AVCODEC-60 ref: 00007FF68FB72402
                                                                              • Part of subcall function 00007FF68FB72370: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68FB72415
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: strncmp$__acrt_iob_funcavcodec_free_contextfprintf$av_freeav_guess_formatav_strerroravformat_alloc_output_context2avformat_free_contextavformat_network_initavio_context_freecallocfree
                                                                            • String ID: Couldn't find an appropriate muxer for '%s'$Couldn't initialize output context: %s$http$mpegts$video/M2PT
                                                                            • API String ID: 3777911973-2524251934
                                                                            • Opcode ID: 078559d49e555ef7517477361438487f95b7fa6d5945ffa6822e70d97715306d
                                                                            • Instruction ID: 9f47ec9baced7d6d30096b84d82275daee4c6ee9f84bfb29168beec44110ff7b
                                                                            • Opcode Fuzzy Hash: 078559d49e555ef7517477361438487f95b7fa6d5945ffa6822e70d97715306d
                                                                            • Instruction Fuzzy Hash: D4317E31A1C682C3FA609B2594112BA63B0FF8B794F50623EED5DC7696EF2CE540C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_funcav_content_light_metadata_allocav_mastering_display_metadata_allocav_memdupav_stream_add_side_dataavcodec_alloc_context3avcodec_descriptor_get_by_name
                                                                            • String ID: 2$Couldn't find codec '%s'$E
                                                                            • API String ID: 3726879996-2734579634
                                                                            • Opcode ID: 984bf621481a9a25f05ee9f8f0874bf5fd16c3df77fd558344dbfddc274f0f6a
                                                                            • Instruction ID: 324fa67f1a21cd4b38ea51d377d4cec2ddaba3326957701b0d7aa7511196e5ed
                                                                            • Opcode Fuzzy Hash: 984bf621481a9a25f05ee9f8f0874bf5fd16c3df77fd558344dbfddc274f0f6a
                                                                            • Instruction Fuzzy Hash: 8781D176609B80CBD754CF25E54025EBBB0F78AB88F10412AEB8D87B59DF7AD854CB00
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func$avcodec_descriptor_get_by_nameavcodec_find_encoder
                                                                            • String ID: Couldn't find codec '%s'$Couldn't find codec descriptor '%s'$title
                                                                            • API String ID: 3715327632-3279048111
                                                                            • Opcode ID: c9720edbb9d548ebec2452977bce4eb4d803eed367fb80ba86fd3ea18017a218
                                                                            • Instruction ID: 255560a7ce62956eb4f5b3bcd63e24e4b855c04bd9091f0ebeda52e009d415c1
                                                                            • Opcode Fuzzy Hash: c9720edbb9d548ebec2452977bce4eb4d803eed367fb80ba86fd3ea18017a218
                                                                            • Instruction Fuzzy Hash: 09612472605B85CADB18CF16E5907A977B0FB8AB98F05403ADE4E877A4DF38E055CB10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: bfreefreeos_event_destroy$av_packet_freeav_write_traileros_event_signalpthread_joinpthread_mutex_destroypthread_mutex_lockpthread_mutex_unlock
                                                                            • String ID:
                                                                            • API String ID: 3736584056-0
                                                                            • Opcode ID: 8bdf6fd2e92e54ef71616242ce810bf52dd6c25259264d2bdbef31b8de60417c
                                                                            • Instruction ID: 83a8ba7a1c8c82b42841e963dfc65f5daf30d6b5266abcb4d1e7ad73d78e438e
                                                                            • Opcode Fuzzy Hash: 8bdf6fd2e92e54ef71616242ce810bf52dd6c25259264d2bdbef31b8de60417c
                                                                            • Instruction Fuzzy Hash: 05311032A19682C2E755DF31C4613FC2370FF96B48F488139DE4D8A196DF29E585C360
                                                                            APIs
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7204A
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72065
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72080
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7209B
                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB720B6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: strncmp
                                                                            • String ID: http$rist$srt$tcp$udp
                                                                            • API String ID: 1114863663-504309389
                                                                            • Opcode ID: d2521f5543573ed7a9b47c763349208ce3ea302e6d5c14a99d4cb2250db2cd2e
                                                                            • Instruction ID: 86ec377a9f7ca21dc110771953a39961d53bcf2d66517b2e0c6e54adf74cfb39
                                                                            • Opcode Fuzzy Hash: d2521f5543573ed7a9b47c763349208ce3ea302e6d5c14a99d4cb2250db2cd2e
                                                                            • Instruction Fuzzy Hash: 0D0199B1B18503C2FB615F62E85066423B4BF46B95F84503EC90DC7294DF2DE689C734
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: memcpypthread_mutex_lockpthread_mutex_unlock$os_event_resetos_event_signalos_event_wait
                                                                            • String ID:
                                                                            • API String ID: 2918620995-0
                                                                            • Opcode ID: 2ecd02ec26d4cc9ba7addf2ffba6d2c38598a6939d4a4f97ceb40f02c73610ba
                                                                            • Instruction ID: 10bc52350bfa2b1f2a73c351f47c66e6039bdd6481328d95818b3e47bf939b3d
                                                                            • Opcode Fuzzy Hash: 2ecd02ec26d4cc9ba7addf2ffba6d2c38598a6939d4a4f97ceb40f02c73610ba
                                                                            • Instruction Fuzzy Hash: 1C415F32618A82C2DA50DF62E4513AD6770FF86B98F484036EF8D87B5ACF38E194C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: __p___argc__p___wargv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_wide_environment_register_thread_local_exe_atexit_callback
                                                                            • String ID:
                                                                            • API String ID: 1184979102-0
                                                                            • Opcode ID: d1267e791b308d50114738cb6d3fcce0682459912f5f90b2ba963487117e6561
                                                                            • Instruction ID: 002d5e5a017b3a7ee0ca408258dff49268d9a61fe505717aac4371b25b30389d
                                                                            • Opcode Fuzzy Hash: d1267e791b308d50114738cb6d3fcce0682459912f5f90b2ba963487117e6561
                                                                            • Instruction Fuzzy Hash: 5A310431A0C243C3FA14AB6594527BA27B1BF47785F58803DEA4EC76E7EE2DE804C611
                                                                            APIs
                                                                            • avcodec_free_context.AVCODEC-60 ref: 00007FF68FB72388
                                                                            • avformat_free_context.AVFORMAT-60 ref: 00007FF68FB723CC
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7204A
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72065
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB72080
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB7209B
                                                                              • Part of subcall function 00007FF68FB72030: strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68FB723A2), ref: 00007FF68FB720B6
                                                                            • av_free.AVUTIL-58 ref: 00007FF68FB723B1
                                                                            • avio_context_free.AVFORMAT-60 ref: 00007FF68FB723BD
                                                                            • avio_close.AVFORMAT-60 ref: 00007FF68FB723C4
                                                                            • avcodec_free_context.AVCODEC-60 ref: 00007FF68FB72402
                                                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68FB72415
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: strncmp$avcodec_free_context$av_freeavformat_free_contextavio_closeavio_context_freefree
                                                                            • String ID:
                                                                            • API String ID: 1086289117-0
                                                                            • Opcode ID: 5750c0e3cd2fb8260dfd87b4c22098c1e8e3cbc363b4994d39577057d30215b3
                                                                            • Instruction ID: eede34745dc5f326cdff811f4677f0c84a286b2d9410627c5a6d78bad3a183ee
                                                                            • Opcode Fuzzy Hash: 5750c0e3cd2fb8260dfd87b4c22098c1e8e3cbc363b4994d39577057d30215b3
                                                                            • Instruction Fuzzy Hash: CD213E32A14651C3EB109F65E45127C63B0FF86F88F05553ADA4D8769ACF38E452C720
                                                                            APIs
                                                                            • avformat_new_stream.AVFORMAT-60(?,?,?,00007FF68FB712F1), ref: 00007FF68FB729AD
                                                                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF68FB712F1), ref: 00007FF68FB729C0
                                                                            • fprintf.MSPDB140-MSVCRT ref: 00007FF68FB729D3
                                                                              • Part of subcall function 00007FF68FB72320: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,00007FF68FB729D8,?,?,?,00007FF68FB712F1), ref: 00007FF68FB72357
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.1849858347.00007FF68FB71000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF68FB70000, based on PE: true
                                                                            • Associated: 0000000A.00000002.1849842350.00007FF68FB70000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850169393.00007FF68FB75000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850715736.00007FF68FB76000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.1850734646.00007FF68FB79000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_7ff68fb70000_obs-ffmpeg-mux.jbxd
                                                                            Similarity
                                                                            • API ID: __acrt_iob_func__stdio_common_vfprintfavformat_new_streamfprintf
                                                                            • String ID: Couldn't create stream for encoder '%s'
                                                                            • API String ID: 306180413-3485626053
                                                                            • Opcode ID: 97d36ac62344db8522675eb32487dc47749b1acbad2880230df25e82e6eb689d
                                                                            • Instruction ID: 892b977c73c981b4c6fc75c968943f5a1b43abf6099d91248bee836f0c886a23
                                                                            • Opcode Fuzzy Hash: 97d36ac62344db8522675eb32487dc47749b1acbad2880230df25e82e6eb689d
                                                                            • Instruction Fuzzy Hash: 42F06932B19B80C2EA48CB56F45106AA7B0FB8DBD0B489039EE4D83719EF3CD591CB00