Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
allegro_free_viewer_16-6 (1).exe

Overview

General Information

Sample name:allegro_free_viewer_16-6 (1).exe
Analysis ID:1525195
MD5:1c39b01dbc156506913f5b3e6fb35abc
SHA1:93b132a1713e2443bdeb4162ae15e123456b0f5b
SHA256:10e8647ccbe250696134bdb811988db16637709f2f9a5994a9813d32a6eb35b3
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Checks for available system drives (often done to infect USB drives)
Detected potential crypto function
Found potential string decryption / allocating functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • allegro_free_viewer_16-6 (1).exe (PID: 6864 cmdline: "C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe" MD5: 1C39B01DBC156506913F5B3E6FB35ABC)
    • msiexec.exe (PID: 3612 cmdline: MSIEXEC.EXE /i "C:\Users\user\AppData\Local\Downloaded Installations\{A28E479A-352B-4AFB-A0D8-D881CB11D9D7}\Cadence Allegro Free Physical Viewers 16.6.msi" SETUPEXEDIR="C:\Users\user\Desktop" SETUPEXENAME="allegro_free_viewer_16-6 (1).exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 1720 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: allegro_free_viewer_16-6 (1).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: wextract.pdb source: Cadence Allegro Free Physical Viewers 16.6.msi0.0.dr, Cadence Allegro Free Physical Viewers 16.6.msi.0.dr
Source: Binary string: C:\CodeBases\isdev\src\Runtime\MSI\Shared\Setup\Setup___Win32_Release_Prerequisites_Unicode\setupPreReq.pdb`Q source: allegro_free_viewer_16-6 (1).exe
Source: Binary string: C:\CodeBases\isdev\src\Runtime\MSI\Shared\Setup\Setup___Win32_Release_Prerequisites_Unicode\setupPreReq.pdb source: allegro_free_viewer_16-6 (1).exe
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: a:Jump to behavior
Source: allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1692522216.00000000022E4000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1691984054.00000000022E4000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000002.2942939226.000000000067E000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1691907341.00000000022F7000.00000004.00000020.00020000.00000000.sdmp, Microsoft Visual C++ 2005 SP1 Redistributable MFC Security Update KB2538242(x86).prq.0.dr, Microsoft Visual C++ 2005 SP1 Redistributable Package (x86).prq.0.drString found in binary or memory: http://saturn.installshield.com/is/prerequisites/microsoft
Source: allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1744714385.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000002.2943062968.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1744439476.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1702664335.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1703116708.00000000006E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cadence.com
Source: Cadence Allegro Free Physical Viewers 16.6.msi0.0.dr, Cadence Allegro Free Physical Viewers 16.6.msi.0.drString found in binary or memory: http://www.flexerasoftware.com0
Source: allegro_free_viewer_16-6 (1).exeString found in binary or memory: http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEF90_3_022DDEF9
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DDEBB0_3_022DDEBB
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: 0_3_022DA0500_3_022DA050
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeCode function: String function: 022DDF4C appears 64 times
Source: allegro_free_viewer_16-6 (1).exeBinary or memory string: OriginalFilename vs allegro_free_viewer_16-6 (1).exe
Source: allegro_free_viewer_16-6 (1).exe, 00000000.00000002.2942797505.0000000000560000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInstallShield Setup.exev+ vs allegro_free_viewer_16-6 (1).exe
Source: allegro_free_viewer_16-6 (1).exeBinary or memory string: OriginalFilenameInstallShield Setup.exev+ vs allegro_free_viewer_16-6 (1).exe
Source: allegro_free_viewer_16-6 (1).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean2.winEXE@4/10@0/0
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile created: C:\Users\user\AppData\Local\Downloaded InstallationsJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile created: C:\Users\user\AppData\Local\Temp\{62614748-01DB-461A-94EF-BCB066E470A5}\Jump to behavior
Source: allegro_free_viewer_16-6 (1).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile read: C:\Users\user\AppData\Local\Temp\{62614748-01DB-461A-94EF-BCB066E470A5}\Setup.INIJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile read: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe "C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe"
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess created: C:\Windows\SysWOW64\msiexec.exe MSIEXEC.EXE /i "C:\Users\user\AppData\Local\Downloaded Installations\{A28E479A-352B-4AFB-A0D8-D881CB11D9D7}\Cadence Allegro Free Physical Viewers 16.6.msi" SETUPEXEDIR="C:\Users\user\Desktop" SETUPEXENAME="allegro_free_viewer_16-6 (1).exe"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess created: C:\Windows\SysWOW64\msiexec.exe MSIEXEC.EXE /i "C:\Users\user\AppData\Local\Downloaded Installations\{A28E479A-352B-4AFB-A0D8-D881CB11D9D7}\Cadence Allegro Free Physical Viewers 16.6.msi" SETUPEXEDIR="C:\Users\user\Desktop" SETUPEXENAME="allegro_free_viewer_16-6 (1).exe"Jump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile written: C:\Users\user\AppData\Local\Temp\{62614748-01DB-461A-94EF-BCB066E470A5}\Setup.INIJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: I accept the terms in the license agreement
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: allegro_free_viewer_16-6 (1).exeStatic file information: File size 21974609 > 1048576
Source: allegro_free_viewer_16-6 (1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: Cadence Allegro Free Physical Viewers 16.6.msi0.0.dr, Cadence Allegro Free Physical Viewers 16.6.msi.0.dr
Source: Binary string: C:\CodeBases\isdev\src\Runtime\MSI\Shared\Setup\Setup___Win32_Release_Prerequisites_Unicode\setupPreReq.pdb`Q source: allegro_free_viewer_16-6 (1).exe
Source: Binary string: C:\CodeBases\isdev\src\Runtime\MSI\Shared\Setup\Setup___Win32_Release_Prerequisites_Unicode\setupPreReq.pdb source: allegro_free_viewer_16-6 (1).exe
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: allegro_free_viewer_16-6 (1).exeBinary or memory string: Shell_TrayWnd
Source: allegro_free_viewer_16-6 (1).exeBinary or memory string: BShell_TrayWnd
Source: allegro_free_viewer_16-6 (1).exeBinary or memory string: ABShell_TrayWndTahoma0x0409NoSuppressRebootKeyDotNetOptionalInstallIfSilentDotNetOptionalSETUPEXENAMESETUPEXEDIRCertKeyCacheFolderCacheRootLocationTypeSuppressWrongOSSuppressReboot
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
2
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
2
Process Injection
LSASS Memory11
Peripheral Device Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1525195 Sample: allegro_free_viewer_16-6 (1).exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 2 5 allegro_free_viewer_16-6 (1).exe 29 2->5         started        7 msiexec.exe 2->7         started        process3 9 msiexec.exe 9 5->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
allegro_free_viewer_16-6 (1).exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%dallegro_free_viewer_16-6 (1).exefalse
    unknown
    http://www.cadence.comallegro_free_viewer_16-6 (1).exe, 00000000.00000003.1744714385.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000002.2943062968.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1744439476.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1702664335.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1703116708.00000000006E2000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://www.flexerasoftware.com0Cadence Allegro Free Physical Viewers 16.6.msi0.0.dr, Cadence Allegro Free Physical Viewers 16.6.msi.0.drfalse
        unknown
        http://saturn.installshield.com/is/prerequisites/microsoftallegro_free_viewer_16-6 (1).exe, 00000000.00000003.1692522216.00000000022E4000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1691984054.00000000022E4000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000002.2942939226.000000000067E000.00000004.00000020.00020000.00000000.sdmp, allegro_free_viewer_16-6 (1).exe, 00000000.00000003.1691907341.00000000022F7000.00000004.00000020.00020000.00000000.sdmp, Microsoft Visual C++ 2005 SP1 Redistributable MFC Security Update KB2538242(x86).prq.0.dr, Microsoft Visual C++ 2005 SP1 Redistributable Package (x86).prq.0.drfalse
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1525195
          Start date and time:2024-10-03 20:52:29 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 22s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:allegro_free_viewer_16-6 (1).exe
          Detection:CLEAN
          Classification:clean2.winEXE@4/10@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 12
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target allegro_free_viewer_16-6 (1).exe, PID 6864 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: allegro_free_viewer_16-6 (1).exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 8, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Cadence Allegro Free Physical Viewer, Author: Cadence Design Systems, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2012 Spring - Express Edition 19, Last Saved Time/Date: Fri Mar 1 17:31:23 2013, Create Time/Date: Fri Mar 1 17:31:23 2013, Last Printed: Fri Mar 1 17:31:23 2013, Revision Number: {A28E479A-352B-4AFB-A0D8-D881CB11D9D7}, Code page: 1252, Template: Intel;1033
          Category:dropped
          Size (bytes):19548672
          Entropy (8bit):7.971951275697983
          Encrypted:false
          SSDEEP:393216:GqtcEBjINWcCoD8wmKnp7r3rT7D6CZF8VCK4ypeO94BAx0yBhdb9:ftHBjdnw/npLT1D8lhDRbjB
          MD5:6497A05C2495DD18DA8A696FB2BBBB0A
          SHA1:11A2C7A55EEAEF40CB410B74DAA4E2B4CC9615E8
          SHA-256:6D5A06616537FB6576499F8F8F48D2BD052BC8499F1FCDB8C959A620B2FCAE77
          SHA-512:AD841C83BA7F2D55619A5D35A35CF8085254C474C5B1E2E526CBFA6BF9B5529DDF316690DE2196149FDFE5C96F70E24C86BE568C6834D04F59626ABE613C6EE2
          Malicious:false
          Reputation:low
          Preview:......................>...................+...............8........6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........;...............................................................................................................!... ...+...".......$...%...&...'...(...)...*...-...,.../.......C...0...1...2...3...4...5...6...7...@...M...:...<.......=.......?.......A...B...E...D...`...F...G...H...I...J...N...L....... ...O...P...Q...Z...S...T...U...V...W...X...Y...K...[...\...]...^..._...b...a...r...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...t...s.......u...v...w...x...y...z...
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
          Category:dropped
          Size (bytes):22492
          Entropy (8bit):3.484893836872466
          Encrypted:false
          SSDEEP:384:CTmyuV//BiTbh/G4AwC2WrP2DBWa/Oa0Mhs+XVgv:CT6V//BiXh/z/lWr0aa0Mhs+XVgv
          MD5:BE345D0260AE12C5F2F337B17E07C217
          SHA1:0976BA0982FE34F1C35A0974F6178E15C238ED7B
          SHA-256:E994689A13B9448C074F9B471EDEEC9B524890A0D82925E98AB90B658016D8F3
          SHA-512:77040DBEE29BE6B136A83B9E444D8B4F71FF739F7157E451778FB4FCCB939A67FF881A70483DE16BCB6AE1FEA64A89E00711A33EC26F4D3EEA8E16C9E9553EFF
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:..[.0.x.0.4.0.9.].....1.1.0.0.=.S.e.t.u.p. .I.n.i.t.i.a.l.i.z.a.t.i.o.n. .E.r.r.o.r.....1.1.0.1.=.%.s.....1.1.0.2.=.%.1. .S.e.t.u.p. .i.s. .p.r.e.p.a.r.i.n.g. .t.h.e. .%.2.,. .w.h.i.c.h. .w.i.l.l. .g.u.i.d.e. .y.o.u. .t.h.r.o.u.g.h. .t.h.e. .p.r.o.g.r.a.m. .s.e.t.u.p. .p.r.o.c.e.s.s... . .P.l.e.a.s.e. .w.a.i.t.......1.1.0.3.=.C.h.e.c.k.i.n.g. .O.p.e.r.a.t.i.n.g. .S.y.s.t.e.m. .V.e.r.s.i.o.n.....1.1.0.4.=.C.h.e.c.k.i.n.g. .W.i.n.d.o.w.s.(.R.). .I.n.s.t.a.l.l.e.r. .V.e.r.s.i.o.n.....1.1.0.5.=.C.o.n.f.i.g.u.r.i.n.g. .W.i.n.d.o.w.s. .I.n.s.t.a.l.l.e.r.....1.1.0.6.=.C.o.n.f.i.g.u.r.i.n.g. .%.s.....1.1.0.7.=.S.e.t.u.p. .h.a.s. .c.o.m.p.l.e.t.e.d. .c.o.n.f.i.g.u.r.i.n.g. .t.h.e. .W.i.n.d.o.w.s. .I.n.s.t.a.l.l.e.r. .o.n. .y.o.u.r. .s.y.s.t.e.m... .T.h.e. .s.y.s.t.e.m. .n.e.e.d.s. .t.o. .b.e. .r.e.s.t.a.r.t.e.d. .i.n. .o.r.d.e.r. .t.o. .c.o.n.t.i.n.u.e. .w.i.t.h. .t.h.e. .i.n.s.t.a.l.l.a.t.i.o.n... .P.l.e.a.s.e. .c.l.i.c.k. .R.e.s.t.a.r.t. .t.o. .r.e.b.o.o.t. .t.h.e. .s.y.s.t.e.m.......1.1.0.8.
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 8, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Cadence Allegro Free Physical Viewer, Author: Cadence Design Systems, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2012 Spring - Express Edition 19, Last Saved Time/Date: Fri Mar 1 17:31:23 2013, Create Time/Date: Fri Mar 1 17:31:23 2013, Last Printed: Fri Mar 1 17:31:23 2013, Revision Number: {A28E479A-352B-4AFB-A0D8-D881CB11D9D7}, Code page: 1252, Template: Intel;1033
          Category:dropped
          Size (bytes):19548672
          Entropy (8bit):7.971951275697983
          Encrypted:false
          SSDEEP:393216:GqtcEBjINWcCoD8wmKnp7r3rT7D6CZF8VCK4ypeO94BAx0yBhdb9:ftHBjdnw/npLT1D8lhDRbjB
          MD5:6497A05C2495DD18DA8A696FB2BBBB0A
          SHA1:11A2C7A55EEAEF40CB410B74DAA4E2B4CC9615E8
          SHA-256:6D5A06616537FB6576499F8F8F48D2BD052BC8499F1FCDB8C959A620B2FCAE77
          SHA-512:AD841C83BA7F2D55619A5D35A35CF8085254C474C5B1E2E526CBFA6BF9B5529DDF316690DE2196149FDFE5C96F70E24C86BE568C6834D04F59626ABE613C6EE2
          Malicious:false
          Reputation:low
          Preview:......................>...................+...............8........6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........;...............................................................................................................!... ...+...".......$...%...&...'...(...)...*...-...,.../.......C...0...1...2...3...4...5...6...7...@...M...:...<.......=.......?.......A...B...E...D...`...F...G...H...I...J...N...L....... ...O...P...Q...Z...S...T...U...V...W...X...Y...K...[...\...]...^..._...b...a...r...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...t...s.......u...v...w...x...y...z...
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:XML 1.0 document, ASCII text, with very long lines (358), with CRLF line terminators
          Category:dropped
          Size (bytes):2123
          Entropy (8bit):5.453316446303872
          Encrypted:false
          SSDEEP:48:cm1UI9Mue1nnR9nhZ9ntY9ntYR9n6R9nqA5eoSIyh2Vfg7zPcjw0Kv+Z+Woe:Br7anR9nhZ9n+9nS9nu9nqA57SIyh2Vv
          MD5:644F6D95975124D754383852D6309B49
          SHA1:2598F06469FE839A80016B87E1C76CFDBFB0AB0F
          SHA-256:06C883230AB224505E5A383EB33B7687237C3A9F105B68CC2493A65D017634F8
          SHA-512:4E8EFBF9058FB1282C54B8966E52CA2A82155459476094D43739E1A9AF6BBDA8870FF67999C8545FF6ABAF3C15A47F1AF46E0F109C4505FD3145D2EF79A68021
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8"?>..<SetupPrereq>...<conditions>....<condition Type="1" Comparison="2" Path="HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}" FileName="" ReturnValue=""></condition>...</conditions>...<operatingsystemconditions>....<operatingsystemcondition MajorVersion="6" MinorVersion="1" PlatformId="2" CSDVersion="" Bits="1" ProductType="1"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="5" MinorVersion="2" PlatformId="2" CSDVersion="" Bits="1" ProductType="2|3"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="6" MinorVersion="0" PlatformId="2" CSDVersion="" Bits="1" ProductType="2|3"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="6" MinorVersion="0" PlatformId="2" CSDVersion="" Bits="1" ProductType="1"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="5" MinorVersion="1" PlatformId="2" CSDVersion="" Bits="1" Produ
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:XML 1.0 document, ASCII text, with very long lines (356), with CRLF line terminators
          Category:dropped
          Size (bytes):2223
          Entropy (8bit):5.488922485213366
          Encrypted:false
          SSDEEP:48:cm1Uof+T2ue1nQn9nnR9nhZ9ntY9ntl9n6R5eorexIvGFrnYI6IYI6Sm78Pcje27:BLGzanc9nR9nhZ9n+9n39nu57CxIvGFe
          MD5:749F66069D937E7AF17EAD9F73E14B62
          SHA1:C5CC6A73C4A1C6868EE48D5189FA57E2B37F0ADD
          SHA-256:9AE8F0BA5FBB424FB1FD2CB744C54182DB8626828021F4204A8A366419267927
          SHA-512:C9B5B627ADEDB8C56F469C49A25BA7F5CFC5AFEE3BB7550E02BB9471280ABA3F3DA0970E5C8B7602163389508D61A0E0CA156255B888463EE61047CC9AE3C07C
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8"?>..<SetupPrereq>...<conditions>....<condition Type="1" Comparison="2" Path="HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\B25099274A207264182F8181ADD555D0" FileName="" ReturnValue=""></condition>...</conditions>...<operatingsystemconditions>....<operatingsystemcondition MajorVersion="5" MinorVersion="0" PlatformId="2" CSDVersion=""></operatingsystemcondition>....<operatingsystemcondition MajorVersion="6" MinorVersion="1" PlatformId="2" CSDVersion="" Bits="1" ProductType="1"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="5" MinorVersion="2" PlatformId="2" CSDVersion="" Bits="1" ProductType="2|3"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="6" MinorVersion="0" PlatformId="2" CSDVersion="" Bits="1" ProductType="2|3"></operatingsystemcondition>....<operatingsystemcondition MajorVersion="6" MinorVersion="0" PlatformId="2" CSDVersion="" Bits="1"></operati
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):5956
          Entropy (8bit):3.7245115970589007
          Encrypted:false
          SSDEEP:96:rEhkMaE4Avw3u3ONUXsEbFWaEPRhS+gWPQPgWRGTwQbPrvnp6kY05w7tCYOvlnAE:YhcLYcuQaEZhdxoIWRGcQbPr/p0050tk
          MD5:D31624A390015238E140003EFFFAD66E
          SHA1:0E3CABDF5211DA0DFCF642E8ACB6E68869D70450
          SHA-256:C2F6AEFDD54364D3E64A2AE93B48122EB203FBFBDD759386A9ABB095AD884603
          SHA-512:241086E1D41220DACA20790E212BB1D184AA040E02DD0BC6E094966A24C6B79664FC4B19A7227435A9DE17A13494B4C6485A5C9E9D63480C4A2FEAABC283572B
          Malicious:false
          Reputation:low
          Preview:..[.I.n.f.o.].....N.a.m.e.=.I.N.T.L.....V.e.r.s.i.o.n.=.1...0.0...0.0.0.....D.i.s.k.S.p.a.c.e.=.8.0.0.0...;.D.i.s.k.S.p.a.c.e. .r.e.q.u.i.r.e.m.e.n.t. .i.n. .K.B.........[.S.t.a.r.t.u.p.].....C.m.d.L.i.n.e.=.....S.u.p.p.r.e.s.s.W.r.o.n.g.O.S.=.Y.....S.c.r.i.p.t.D.r.i.v.e.n.=.0.....S.c.r.i.p.t.V.e.r.=.1...0...0...1.....D.o.t.N.e.t.O.p.t.i.o.n.a.l.I.n.s.t.a.l.l.I.f.S.i.l.e.n.t.=.N.....O.n.U.p.g.r.a.d.e.=.0.....P.r.o.d.u.c.t.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6.....P.a.c.k.a.g.e.N.a.m.e.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.....E.n.a.b.l.e.L.a.n.g.D.l.g.=.Y.....L.o.g.R.e.s.u.l.t.s.=.N.....D.o.M.a.i.n.t.e.n.a.n.c.e.=.N.....P.r.o.d.u.c.t.C.o.d.e.=.{.2.B.B.6.1.C.C.F.-.B.B.2.9.-.4.2.C.1.-.A.3.1.3.-.C.F.4.C.C.2.B.9.2.4.B.2.}.....P.r.o.d.u.c.t.V.e.r.s.i.o.n.=.1.6...6...0.....S.u.p.p.r.e.s.s.R.e.b.o.o.t.=.Y.....L.a.u.n.c.h.e.r.N.a.m.e.=.s.e.t.u.p...e.x.e.....P.a.c.k.a.g.e.C.o.d.e.=.{.A.2.8.E.
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):1628
          Entropy (8bit):3.7873266658437523
          Encrypted:false
          SSDEEP:48:ra9KZ44WZ19Kz44WZZv0+9KIv0SvPl9KIvPF9KQ:rdyQUnmI9X6IXaQ
          MD5:38A274987778BABECCF9CF784F45DFD0
          SHA1:704C9E12E118F6B7089B349275137941313D956D
          SHA-256:7B0F93FA4B6B91BDA3898743ED705D72319C5CB111D865AE3AEB8F2AE7DF7732
          SHA-512:F499795B5610457F1B6CF1A15EEE24BFA35A6B662C28A95EA77AB494C220797C125700333C333654E4257B3931F23691E1CD14B01F9967A7D9F91CE310ABCAEC
          Malicious:false
          Reputation:low
          Preview:..[.F.i.l.e.s.].....0.x.0.4.0.9...i.n.i.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.{.6.2.6.1.4.7.4.8.-.0.1.D.B.-.4.6.1.A.-.9.4.E.F.-.B.C.B.0.6.6.E.4.7.0.A.5.}.\.0.x.0.4.0.9...i.n.i.....C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.{.6.2.6.1.4.7.4.8.-.0.1.D.B.-.4.6.1.A.-.9.4.E.F.-.B.C.B.0.6.6.E.4.7.0.A.5.}.\.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.....M.i.c.r.o.s.o.f.t. .V.i.s.u.a.l. .C.+.+. .2.0.0.5. .S.P.1. .R.e.d.i.s.t.r.i.b.u.t.a.b.l.e. .M.F.C. .S.e.c.u.r.i.t.y. .U.p.d.a.t.e. .K.B.2.5.3.8.2.4.2.(.x.8.6.)...p.r.q.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.{.6.2.6.1.4.7.4.8.-.0.1.D.B.-.4.6.1.A.-.9.4.E.F.-.B.C.B.0.6.6.E.4.7.0.A.5.}.\.M.i.c.r.o.s.o.f.t. .V.i.s.u.a.l. .C.+.+. .2.0.0.5. .S.P.1. .R.e.d.i.s.t.r.i.b.u.t.a.b.l.e. .M.F.C. .S.e.c.u.r.i.t.y. .U.p.d.a.t.e. .K.B.
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):5956
          Entropy (8bit):3.7245115970589007
          Encrypted:false
          SSDEEP:96:rEhkMaE4Avw3u3ONUXsEbFWaEPRhS+gWPQPgWRGTwQbPrvnp6kY05w7tCYOvlnAE:YhcLYcuQaEZhdxoIWRGcQbPr/p0050tk
          MD5:D31624A390015238E140003EFFFAD66E
          SHA1:0E3CABDF5211DA0DFCF642E8ACB6E68869D70450
          SHA-256:C2F6AEFDD54364D3E64A2AE93B48122EB203FBFBDD759386A9ABB095AD884603
          SHA-512:241086E1D41220DACA20790E212BB1D184AA040E02DD0BC6E094966A24C6B79664FC4B19A7227435A9DE17A13494B4C6485A5C9E9D63480C4A2FEAABC283572B
          Malicious:false
          Reputation:low
          Preview:..[.I.n.f.o.].....N.a.m.e.=.I.N.T.L.....V.e.r.s.i.o.n.=.1...0.0...0.0.0.....D.i.s.k.S.p.a.c.e.=.8.0.0.0...;.D.i.s.k.S.p.a.c.e. .r.e.q.u.i.r.e.m.e.n.t. .i.n. .K.B.........[.S.t.a.r.t.u.p.].....C.m.d.L.i.n.e.=.....S.u.p.p.r.e.s.s.W.r.o.n.g.O.S.=.Y.....S.c.r.i.p.t.D.r.i.v.e.n.=.0.....S.c.r.i.p.t.V.e.r.=.1...0...0...1.....D.o.t.N.e.t.O.p.t.i.o.n.a.l.I.n.s.t.a.l.l.I.f.S.i.l.e.n.t.=.N.....O.n.U.p.g.r.a.d.e.=.0.....P.r.o.d.u.c.t.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6.....P.a.c.k.a.g.e.N.a.m.e.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.....E.n.a.b.l.e.L.a.n.g.D.l.g.=.Y.....L.o.g.R.e.s.u.l.t.s.=.N.....D.o.M.a.i.n.t.e.n.a.n.c.e.=.N.....P.r.o.d.u.c.t.C.o.d.e.=.{.2.B.B.6.1.C.C.F.-.B.B.2.9.-.4.2.C.1.-.A.3.1.3.-.C.F.4.C.C.2.B.9.2.4.B.2.}.....P.r.o.d.u.c.t.V.e.r.s.i.o.n.=.1.6...6...0.....S.u.p.p.r.e.s.s.R.e.b.o.o.t.=.Y.....L.a.u.n.c.h.e.r.N.a.m.e.=.s.e.t.u.p...e.x.e.....P.a.c.k.a.g.e.C.o.d.e.=.{.A.2.8.E.
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):5956
          Entropy (8bit):3.7245115970589007
          Encrypted:false
          SSDEEP:96:rEhkMaE4Avw3u3ONUXsEbFWaEPRhS+gWPQPgWRGTwQbPrvnp6kY05w7tCYOvlnAE:YhcLYcuQaEZhdxoIWRGcQbPr/p0050tk
          MD5:D31624A390015238E140003EFFFAD66E
          SHA1:0E3CABDF5211DA0DFCF642E8ACB6E68869D70450
          SHA-256:C2F6AEFDD54364D3E64A2AE93B48122EB203FBFBDD759386A9ABB095AD884603
          SHA-512:241086E1D41220DACA20790E212BB1D184AA040E02DD0BC6E094966A24C6B79664FC4B19A7227435A9DE17A13494B4C6485A5C9E9D63480C4A2FEAABC283572B
          Malicious:false
          Preview:..[.I.n.f.o.].....N.a.m.e.=.I.N.T.L.....V.e.r.s.i.o.n.=.1...0.0...0.0.0.....D.i.s.k.S.p.a.c.e.=.8.0.0.0...;.D.i.s.k.S.p.a.c.e. .r.e.q.u.i.r.e.m.e.n.t. .i.n. .K.B.........[.S.t.a.r.t.u.p.].....C.m.d.L.i.n.e.=.....S.u.p.p.r.e.s.s.W.r.o.n.g.O.S.=.Y.....S.c.r.i.p.t.D.r.i.v.e.n.=.0.....S.c.r.i.p.t.V.e.r.=.1...0...0...1.....D.o.t.N.e.t.O.p.t.i.o.n.a.l.I.n.s.t.a.l.l.I.f.S.i.l.e.n.t.=.N.....O.n.U.p.g.r.a.d.e.=.0.....P.r.o.d.u.c.t.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6.....P.a.c.k.a.g.e.N.a.m.e.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.....E.n.a.b.l.e.L.a.n.g.D.l.g.=.Y.....L.o.g.R.e.s.u.l.t.s.=.N.....D.o.M.a.i.n.t.e.n.a.n.c.e.=.N.....P.r.o.d.u.c.t.C.o.d.e.=.{.2.B.B.6.1.C.C.F.-.B.B.2.9.-.4.2.C.1.-.A.3.1.3.-.C.F.4.C.C.2.B.9.2.4.B.2.}.....P.r.o.d.u.c.t.V.e.r.s.i.o.n.=.1.6...6...0.....S.u.p.p.r.e.s.s.R.e.b.o.o.t.=.Y.....L.a.u.n.c.h.e.r.N.a.m.e.=.s.e.t.u.p...e.x.e.....P.a.c.k.a.g.e.C.o.d.e.=.{.A.2.8.E.
          Process:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):5956
          Entropy (8bit):3.7245115970589007
          Encrypted:false
          SSDEEP:96:rEhkMaE4Avw3u3ONUXsEbFWaEPRhS+gWPQPgWRGTwQbPrvnp6kY05w7tCYOvlnAE:YhcLYcuQaEZhdxoIWRGcQbPr/p0050tk
          MD5:D31624A390015238E140003EFFFAD66E
          SHA1:0E3CABDF5211DA0DFCF642E8ACB6E68869D70450
          SHA-256:C2F6AEFDD54364D3E64A2AE93B48122EB203FBFBDD759386A9ABB095AD884603
          SHA-512:241086E1D41220DACA20790E212BB1D184AA040E02DD0BC6E094966A24C6B79664FC4B19A7227435A9DE17A13494B4C6485A5C9E9D63480C4A2FEAABC283572B
          Malicious:false
          Preview:..[.I.n.f.o.].....N.a.m.e.=.I.N.T.L.....V.e.r.s.i.o.n.=.1...0.0...0.0.0.....D.i.s.k.S.p.a.c.e.=.8.0.0.0...;.D.i.s.k.S.p.a.c.e. .r.e.q.u.i.r.e.m.e.n.t. .i.n. .K.B.........[.S.t.a.r.t.u.p.].....C.m.d.L.i.n.e.=.....S.u.p.p.r.e.s.s.W.r.o.n.g.O.S.=.Y.....S.c.r.i.p.t.D.r.i.v.e.n.=.0.....S.c.r.i.p.t.V.e.r.=.1...0...0...1.....D.o.t.N.e.t.O.p.t.i.o.n.a.l.I.n.s.t.a.l.l.I.f.S.i.l.e.n.t.=.N.....O.n.U.p.g.r.a.d.e.=.0.....P.r.o.d.u.c.t.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6.....P.a.c.k.a.g.e.N.a.m.e.=.C.a.d.e.n.c.e. .A.l.l.e.g.r.o. .F.r.e.e. .P.h.y.s.i.c.a.l. .V.i.e.w.e.r.s. .1.6...6...m.s.i.....E.n.a.b.l.e.L.a.n.g.D.l.g.=.Y.....L.o.g.R.e.s.u.l.t.s.=.N.....D.o.M.a.i.n.t.e.n.a.n.c.e.=.N.....P.r.o.d.u.c.t.C.o.d.e.=.{.2.B.B.6.1.C.C.F.-.B.B.2.9.-.4.2.C.1.-.A.3.1.3.-.C.F.4.C.C.2.B.9.2.4.B.2.}.....P.r.o.d.u.c.t.V.e.r.s.i.o.n.=.1.6...6...0.....S.u.p.p.r.e.s.s.R.e.b.o.o.t.=.Y.....L.a.u.n.c.h.e.r.N.a.m.e.=.s.e.t.u.p...e.x.e.....P.a.c.k.a.g.e.C.o.d.e.=.{.A.2.8.E.
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.983375695593585
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.40%
          • InstallShield setup (43055/19) 0.43%
          • Windows Screen Saver (13104/52) 0.13%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          File name:allegro_free_viewer_16-6 (1).exe
          File size:21'974'609 bytes
          MD5:1c39b01dbc156506913f5b3e6fb35abc
          SHA1:93b132a1713e2443bdeb4162ae15e123456b0f5b
          SHA256:10e8647ccbe250696134bdb811988db16637709f2f9a5994a9813d32a6eb35b3
          SHA512:44240b3d76631a583b6a3c6b2063e7851dfc60a50034a452df1ed5999c653f5db9ab3386adc76f79655226bbf0174a9bac3689e18fa35aa62ba0c5be1007c436
          SSDEEP:393216:/O/4h33ifew5jRQ62wCZbtFdzp+y0+oBpbmMVumStQN+Yop6:/OYiGUIwSXhps+oPbBd+p6
          TLSH:112733236AC2C03ED5B255714C2F8EA456A1BC634B3009DBB5A4FD2D2FF4692B427F16
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......OD...%...%...%...];..%...]$..%...]2..%..,....%...w5..%..,....%...%...$...]5.v%...w%..%...] ..%..Rich.%.........................
          Icon Hash:55497933cc61714d
          Entrypoint:0x49895b
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4F97506D [Wed Apr 25 01:16:29 2012 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:c461a01c43174b5a2e9b8d8d589aa134
          Instruction
          call 00007F709D081913h
          jmp 00007F709D06EF3Eh
          test eax, eax
          je 00007F709D06F0CFh
          xor ecx, ecx
          test eax, eax
          setnle cl
          lea ecx, dword ptr [ecx+ecx-01h]
          mov eax, ecx
          ret
          movzx eax, byte ptr [eax]
          movzx ecx, byte ptr [ecx]
          sub eax, ecx
          je 00007F709D06F0CFh
          xor ecx, ecx
          test eax, eax
          setnle cl
          lea ecx, dword ptr [ecx+ecx-01h]
          mov eax, ecx
          ret
          mov ax, word ptr [esi]
          cmp ax, word ptr [ecx]
          je 00007F709D06F0F7h
          movzx edx, byte ptr [ecx]
          movzx eax, al
          sub eax, edx
          je 00007F709D06F0D3h
          xor edx, edx
          test eax, eax
          setnle dl
          lea edx, dword ptr [edx+edx-01h]
          mov eax, edx
          test eax, eax
          jne 00007F709D06F0DEh
          movzx eax, byte ptr [esi+01h]
          movzx ecx, byte ptr [ecx+01h]
          sub eax, ecx
          je 00007F709D06F0D2h
          xor ecx, ecx
          test eax, eax
          setnle cl
          lea ecx, dword ptr [ecx+ecx-01h]
          mov eax, ecx
          ret
          xor eax, eax
          ret
          mov eax, dword ptr [esi]
          cmp eax, dword ptr [ecx]
          je 00007F709D06F131h
          movzx edx, byte ptr [ecx]
          movzx eax, al
          sub eax, edx
          je 00007F709D06F0D3h
          xor edx, edx
          test eax, eax
          setnle dl
          lea edx, dword ptr [edx+edx-01h]
          mov eax, edx
          test eax, eax
          jne 00007F709D06F118h
          movzx eax, byte ptr [esi+01h]
          movzx edx, byte ptr [ecx+01h]
          sub eax, edx
          je 00007F709D06F0D3h
          xor edx, edx
          test eax, eax
          setnle dl
          lea edx, dword ptr [edx+edx-01h]
          mov eax, edx
          test eax, eax
          jne 00007F709D06F0FBh
          movzx eax, byte ptr [esi+02h]
          movzx edx, byte ptr [ecx+02h]
          sub eax, edx
          je 00007F709D06F0D3h
          xor edx, edx
          test eax, eax
          setnle dl
          lea edx, dword ptr [edx+edx+00h]
          Programming Language:
          • [ASM] VS2008 SP1 build 30729
          • [ C ] VS2008 SP1 build 30729
          • [ C ] VS2005 build 50727
          • [C++] VS2008 build 21022
          • [IMP] VS2005 build 50727
          • [C++] VS2008 SP1 build 30729
          • [RES] VS2008 build 21022
          • [LNK] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x113c840xdc.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x11f0000x50330.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0xe47300x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf83f80x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xe40000x648.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x113ad00x40.rdata
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xe2d2b0xe2e00b2e6465308e6857a116cdbdb0dc54c40False0.48667785812672176data6.595235280972763IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xe40000x31dec0x31e0085171aa4179d7f4afec4302c929554e9False0.3660812186716792data4.7616231100461786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x1160000x8b480x2a00f0272d79af07cde9705c963653bf45d4False0.30943080357142855data4.556437664717249IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x11f0000x503300x50400ad88c03d55a938d633cd13836fc4e0eaFalse0.3958029108255452data6.631876643942977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          GIF0x11fe540x7aeaGIF image data, version 89a, 219 x 3730.9879552532892646
          GIF0x1279400x6592GIF image data, version 89a, 175 x 312EnglishUnited States0.9916544881162987
          RT_BITMAP0x12ded40x14220Device independent bitmap graphic, 220 x 370 x 8, image size 814000.34390764454792394
          RT_BITMAP0x1420f40x1b5cDevice independent bitmap graphic, 180 x 75 x 4, image size 69000.18046830382638493
          RT_BITMAP0x143c500x38e4Device independent bitmap graphic, 180 x 75 x 8, image size 135000.26689096402087337
          RT_BITMAP0x1475340x1238Device independent bitmap graphic, 60 x 60 x 8, image size 36000.23499142367066894
          RT_BITMAP0x14876c0x6588Device independent bitmap graphic, 161 x 152 x 8, image size 24928, resolution 3796 x 3796 px/m, 256 important colors0.3035934133579563
          RT_BITMAP0x14ecf40x11f88Device independent bitmap graphic, 161 x 152 x 24, image size 73568, resolution 3780 x 3780 px/m0.12790729268557766
          RT_ICON0x160c7c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.21341463414634146
          RT_ICON0x1612e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.34139784946236557
          RT_ICON0x1615cc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.5202702702702703
          RT_ICON0x1616f40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.47334754797441364
          RT_ICON0x16259c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6101083032490975
          RT_ICON0x162e440x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.596820809248555
          RT_ICON0x1633ac0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2932572614107884
          RT_ICON0x1659540x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4343339587242026
          RT_ICON0x1669fc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7198581560283688
          RT_ICON0x166e640x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.35618279569892475
          RT_ICON0x16714c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.42473118279569894
          RT_DIALOG0x1674340x1eedata0.4716599190283401
          RT_DIALOG0x1676240x286data0.43962848297213625
          RT_DIALOG0x1678ac0x2d0data0.43333333333333335
          RT_DIALOG0x167b7c0x54data0.6904761904761905
          RT_DIALOG0x167bd00x42data0.8333333333333334
          RT_DIALOG0x167c140xe6data0.6434782608695652
          RT_DIALOG0x167cfc0x124data0.5068493150684932
          RT_DIALOG0x167e200xd6data0.5747663551401869
          RT_DIALOG0x167ef80x266data0.4560260586319218
          RT_DIALOG0x1681600x3d8data0.41971544715447157
          RT_DIALOG0x1685380x172data0.5135135135135135
          RT_DIALOG0x1686ac0x20cdata0.48282442748091603
          RT_DIALOG0x1688b80x1eadata0.5102040816326531
          RT_DIALOG0x168aa40x212data0.4830188679245283
          RT_DIALOG0x168cb80x7cdata0.7580645161290323
          RT_DIALOG0x168d340x3ccdata0.43209876543209874
          RT_DIALOG0x1691000x158data0.5494186046511628
          RT_DIALOG0x1692580x1eadata0.5163265306122449
          RT_DIALOG0x1694440x116data0.6079136690647482
          RT_DIALOG0x16955c0xeedata0.6260504201680672
          RT_DIALOG0x16964c0x1d4data0.5021367521367521
          RT_DIALOG0x1698200x1ecdata0.5142276422764228
          RT_DIALOG0x169a0c0x2b8data0.4813218390804598
          RT_STRING0x169cc40x160dataEnglishUnited States0.5340909090909091
          RT_STRING0x169e240x23edataEnglishUnited States0.40418118466898956
          RT_STRING0x16a0640x378dataEnglishUnited States0.4222972972972973
          RT_STRING0x16a3dc0x252dataEnglishUnited States0.4393939393939394
          RT_STRING0x16a6300x1f4dataEnglishUnited States0.442
          RT_STRING0x16a8240x66cdataEnglishUnited States0.36253041362530414
          RT_STRING0x16ae900x366dataEnglishUnited States0.41379310344827586
          RT_STRING0x16b1f80x27edataEnglishUnited States0.4561128526645768
          RT_STRING0x16b4780x518dataEnglishUnited States0.39800613496932513
          RT_STRING0x16b9900x882dataEnglishUnited States0.3002754820936639
          RT_STRING0x16c2140x23edataEnglishUnited States0.45121951219512196
          RT_STRING0x16c4540x3badataEnglishUnited States0.3280922431865828
          RT_STRING0x16c8100x12cdataEnglishUnited States0.5266666666666666
          RT_STRING0x16c93c0x4adataEnglishUnited States0.6756756756756757
          RT_STRING0x16c9880xdadataEnglishUnited States0.6100917431192661
          RT_STRING0x16ca640x110dataEnglishUnited States0.5845588235294118
          RT_STRING0x16cb740x20adataEnglishUnited States0.4521072796934866
          RT_STRING0x16cd800xbaMatlab v4 mat-file (little endian) P, numeric, rows 0, columns 0EnglishUnited States0.5860215053763441
          RT_STRING0x16ce3c0xa8dataEnglishUnited States0.6607142857142857
          RT_STRING0x16cee40x12adataEnglishUnited States0.5201342281879194
          RT_STRING0x16d0100x422dataEnglishUnited States0.2741020793950851
          RT_STRING0x16d4340x5c2dataEnglishUnited States0.37720488466757124
          RT_STRING0x16d9f80x40dataEnglishUnited States0.671875
          RT_STRING0x16da380xcaadataEnglishUnited States0.2313386798272671
          RT_STRING0x16e6e40x284dataEnglishUnited States0.43788819875776397
          RT_GROUP_ICON0x16e9680x84data0.6363636363636364
          RT_GROUP_ICON0x16e9ec0x14data1.25
          RT_GROUP_ICON0x16ea000x14data1.25
          RT_VERSION0x16ea140x46cdata0.4363957597173145
          RT_MANIFEST0x16ee800x4afXML 1.0 document, ASCII text, with CRLF line terminators0.46788990825688076
          DLLImport
          VERSION.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
          COMCTL32.dll
          KERNEL32.dllIsValidLocale, GetLocaleInfoW, ExitThread, lstrcpyA, GetCommandLineW, GetExitCodeProcess, GetSystemDefaultLangID, GetUserDefaultLangID, lstrcmpW, lstrcmpiW, VerLanguageNameW, FindClose, FindNextFileW, CompareFileTime, FindFirstFileW, MoveFileW, GetPrivateProfileStringW, CreateDirectoryW, SetFileAttributesW, GetSystemTimeAsFileTime, LocalFree, FormatMessageW, GetSystemInfo, MulDiv, RaiseException, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, LoadLibraryExW, GetModuleHandleW, GetVersion, GetLocalTime, GetFileAttributesW, FileTimeToLocalFileTime, GetFileTime, GetCurrentDirectoryW, VirtualQuery, IsBadReadPtr, FlushFileBuffers, SetEndOfFile, GetDriveTypeW, GetCurrentThread, GetProcAddress, LocalAlloc, InterlockedExchange, LoadLibraryA, FreeLibrary, LoadLibraryW, GetTempFileNameW, lstrcatW, QueryPerformanceFrequency, InterlockedDecrement, CreateEventW, CompareStringW, CompareStringA, GetVersionExW, InterlockedIncrement, CopyFileW, CreateThread, GetExitCodeThread, GetTickCount, GlobalFree, GlobalLock, GlobalUnlock, FindResourceW, LoadResource, SizeofResource, GlobalAlloc, LockResource, ExpandEnvironmentStringsW, GetTempPathW, SetErrorMode, SetEnvironmentVariableA, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetTimeZoneInformation, GetConsoleMode, GetConsoleCP, LCMapStringA, InitializeCriticalSectionAndSpinCount, SetConsoleCtrlHandler, GetStringTypeW, GetStringTypeA, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, GetDateFormatA, GetTimeFormatA, GetStartupInfoA, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapDestroy, HeapCreate, HeapReAlloc, VirtualAlloc, VirtualFree, FatalAppExitA, GetModuleHandleA, LCMapStringW, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, HeapSize, GetCurrentThreadId, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetWindowsDirectoryW, lstrcpyW, GetSystemDirectoryW, SetCurrentDirectoryW, CreateProcessW, WaitForSingleObject, DeleteFileW, RemoveDirectoryW, Sleep, ExitProcess, GetCurrentProcess, DuplicateHandle, GetPrivateProfileSectionW, TerminateProcess, MoveFileExW, GetThreadContext, VirtualProtectEx, WriteProcessMemory, FlushInstructionCache, SetThreadContext, ResumeThread, GetModuleFileNameW, lstrlenW, lstrcpynW, GetProcessHeap, HeapAlloc, HeapFree, WriteFile, ReadFile, SetFilePointer, MultiByteToWideChar, WideCharToMultiByte, CreateFileW, GetFileSize, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, CloseHandle, lstrlenA, GetLastError, SetLastError, GetShortPathNameW, WritePrivateProfileSectionW, GetDiskFreeSpaceW, GetModuleFileNameA, GetStdHandle, GetStartupInfoW, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlUnwind, FreeResource, lstrcmpiA, GetPrivateProfileSectionNamesA, GetPrivateProfileIntA, lstrcatA, GetPrivateProfileStringA, lstrcpynA, lstrcmpA, SearchPathW, VirtualProtect, SystemTimeToFileTime, QueryPerformanceCounter, SetEvent, ResetEvent, GetCurrentProcessId, GetEnvironmentVariableW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, GetDateFormatW, GetTimeFormatW, FindResourceExW, OpenProcess, GetProcessTimes
          USER32.dllDispatchMessageW, PostMessageW, KillTimer, PostQuitMessage, SetTimer, DefWindowProcW, TranslateMessage, wvsprintfW, CharPrevW, LoadImageW, CreateDialogParamW, MoveWindow, GetParent, GetWindowTextW, SetCursor, GetDlgItemTextW, GetWindow, SetFocus, SetDlgItemTextW, SetForegroundWindow, SetActiveWindow, GetDlgCtrlID, GetDC, FillRect, GetSysColor, GetSysColorBrush, GetSystemMetrics, SetRect, FindWindowW, IntersectRect, SubtractRect, CreateDialogIndirectParamW, CharNextW, EnableWindow, FindWindowExW, GetWindowRect, ScreenToClient, SendMessageW, IsDialogMessageW, IsWindow, DestroyWindow, SendDlgItemMessageW, MessageBoxW, WaitForInputIdle, GetWindowLongW, SetWindowLongW, GetClientRect, ClientToScreen, ExitWindowsEx, CharUpperW, CallWindowProcW, MapWindowPoints, GetPropW, DrawFocusRect, InflateRect, DrawTextW, CopyRect, GetClassNameW, RemovePropW, SetPropW, EnumChildWindows, UpdateWindow, InvalidateRect, DrawIcon, MapDialogRect, wsprintfA, RegisterClassExW, SetWindowPos, GetWindowDC, ReleaseDC, EndPaint, BeginPaint, EndDialog, SetWindowTextW, GetDlgItem, ShowWindow, DialogBoxIndirectParamW, GetDesktopWindow, MsgWaitForMultipleObjects, PeekMessageW, wsprintfW, LoadIconW, LoadCursorW, RegisterClassW, CreateWindowExW, GetMessageW
          GDI32.dllCreateHalftonePalette, UnrealizeObject, SelectPalette, RealizePalette, CreateFontW, SetBkMode, GetDeviceCaps, CreateSolidBrush, GetDIBColorTable, CreateFontIndirectW, TranslateCharsetInfo, CreateCompatibleDC, SelectObject, BitBlt, CreateDIBitmap, DeleteDC, DeleteObject, GetStockObject, RestoreDC, GetTextExtentPoint32W, CreatePalette, CreatePatternBrush, CreateCompatibleBitmap, CreateDCW, DeleteMetaFile, SetMetaFileBitsEx, SetStretchBltMode, SelectClipRgn, CreateRectRgn, SetPixel, PatBlt, PlayMetaFile, SetBkColor, StretchBlt, CreateBitmap, SetViewportExtEx, SetViewportOrgEx, SetWindowExtEx, SetWindowOrgEx, SetMapMode, SaveDC, GetSystemPaletteEntries, GetObjectW, SetTextColor
          ADVAPI32.dllOpenThreadToken, OpenProcessToken, RegEnumKeyW, RegCreateKeyW, LookupPrivilegeValueW, GetTokenInformation, AllocateAndInitializeSid, EqualSid, FreeSid, InitializeSecurityDescriptor, SetSecurityDescriptorOwner, SetSecurityDescriptorGroup, SetSecurityDescriptorDacl, RegEnumKeyExW, RegQueryInfoKeyW, RegDeleteKeyW, RegEnumValueW, RegDeleteValueW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyExW, RegCloseKey, AdjustTokenPrivileges, RegOpenKeyW
          SHELL32.dllSHGetSpecialFolderLocation, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, ShellExecuteW, ShellExecuteExW, CommandLineToArgvW
          ole32.dllCoCreateInstance, CLSIDFromProgID, CoTaskMemAlloc, CoCreateGuid, CreateItemMoniker, ProgIDFromCLSID, CoTaskMemFree, CoInitialize, CoUninitialize, CoInitializeSecurity, GetRunningObjectTable, CoTaskMemRealloc, StringFromGUID2
          OLEAUT32.dllGetErrorInfo, VarUI4FromStr, SystemTimeToVariantTime, LoadTypeLib, RegisterTypeLib, SetErrorInfo, CreateErrorInfo, VarBstrCmp, VariantChangeType, VariantClear, VarBstrFromDate, SysStringByteLen, SysAllocStringByteLen, SysAllocString, VarBstrCat, SysStringLen, SysReAllocStringLen, SysAllocStringLen, SysFreeString
          RPCRT4.dllUuidCreate, UuidToStringW, RpcStringFreeW, UuidFromStringW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:14:53:21
          Start date:03/10/2024
          Path:C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\allegro_free_viewer_16-6 (1).exe"
          Imagebase:0x400000
          File size:21'974'609 bytes
          MD5 hash:1C39B01DBC156506913F5B3E6FB35ABC
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:14:53:27
          Start date:03/10/2024
          Path:C:\Windows\SysWOW64\msiexec.exe
          Wow64 process (32bit):true
          Commandline:MSIEXEC.EXE /i "C:\Users\user\AppData\Local\Downloaded Installations\{A28E479A-352B-4AFB-A0D8-D881CB11D9D7}\Cadence Allegro Free Physical Viewers 16.6.msi" SETUPEXEDIR="C:\Users\user\Desktop" SETUPEXENAME="allegro_free_viewer_16-6 (1).exe"
          Imagebase:0x940000
          File size:59'904 bytes
          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:2
          Start time:14:53:27
          Start date:03/10/2024
          Path:C:\Windows\System32\msiexec.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\msiexec.exe /V
          Imagebase:0x7ff6f3a40000
          File size:69'632 bytes
          MD5 hash:E5DA170027542E25EDE42FC54C929077
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Reset < >
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022D9000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22d9000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9eca11295905d389b37dee020f573a572583ba1ee29ca8485dfd3cfced47f068
            • Instruction ID: 712f4b4165b6cd4fa7f4def0ab02ed557f146552c279734ee720333cf8adc8ec
            • Opcode Fuzzy Hash: 9eca11295905d389b37dee020f573a572583ba1ee29ca8485dfd3cfced47f068
            • Instruction Fuzzy Hash: 07B3DB9680E7C60FC71787305C7A650BFB06E23215B5E86CBC0C6CA8F7E25D5A19CB66
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DA000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22d9000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9eca11295905d389b37dee020f573a572583ba1ee29ca8485dfd3cfced47f068
            • Instruction ID: 712f4b4165b6cd4fa7f4def0ab02ed557f146552c279734ee720333cf8adc8ec
            • Opcode Fuzzy Hash: 9eca11295905d389b37dee020f573a572583ba1ee29ca8485dfd3cfced47f068
            • Instruction Fuzzy Hash: 07B3DB9680E7C60FC71787305C7A650BFB06E23215B5E86CBC0C6CA8F7E25D5A19CB66
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction ID: 0e295c7b40543a8ac53996f1dd7ecc6f42d4f26851ee276957293f6c897a15b4
            • Opcode Fuzzy Hash: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction Fuzzy Hash: 2AB110A680E7C54FC7178B704C7A651BFB02E23105B4E86CBC4C6CE4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DB000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction ID: 0e295c7b40543a8ac53996f1dd7ecc6f42d4f26851ee276957293f6c897a15b4
            • Opcode Fuzzy Hash: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction Fuzzy Hash: 2AB110A680E7C54FC7178B704C7A651BFB02E23105B4E86CBC4C6CE4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022D9000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction ID: 0e295c7b40543a8ac53996f1dd7ecc6f42d4f26851ee276957293f6c897a15b4
            • Opcode Fuzzy Hash: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction Fuzzy Hash: 2AB110A680E7C54FC7178B704C7A651BFB02E23105B4E86CBC4C6CE4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction ID: 0e295c7b40543a8ac53996f1dd7ecc6f42d4f26851ee276957293f6c897a15b4
            • Opcode Fuzzy Hash: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction Fuzzy Hash: 2AB110A680E7C54FC7178B704C7A651BFB02E23105B4E86CBC4C6CE4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DA000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction ID: 0e295c7b40543a8ac53996f1dd7ecc6f42d4f26851ee276957293f6c897a15b4
            • Opcode Fuzzy Hash: 2d4bc96b08a67c7fb73f16bb2b4914b0eb4a7ee5577aeef600589e78a8bc4059
            • Instruction Fuzzy Hash: 2AB110A680E7C54FC7178B704C7A651BFB02E23105B4E86CBC4C6CE4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction ID: 6f73378b14d0d90aa62c3c2e6591c1ceb656c93f87aa0ad4209e567ba89ea5c0
            • Opcode Fuzzy Hash: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction Fuzzy Hash: 60A11FA680E7C54FC7178B704C6A651BFB02E23105B4F86CBC086CF4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DB000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction ID: 6f73378b14d0d90aa62c3c2e6591c1ceb656c93f87aa0ad4209e567ba89ea5c0
            • Opcode Fuzzy Hash: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction Fuzzy Hash: 60A11FA680E7C54FC7178B704C6A651BFB02E23105B4F86CBC086CF4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022D9000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction ID: 6f73378b14d0d90aa62c3c2e6591c1ceb656c93f87aa0ad4209e567ba89ea5c0
            • Opcode Fuzzy Hash: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction Fuzzy Hash: 60A11FA680E7C54FC7178B704C6A651BFB02E23105B4F86CBC086CF4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction ID: 6f73378b14d0d90aa62c3c2e6591c1ceb656c93f87aa0ad4209e567ba89ea5c0
            • Opcode Fuzzy Hash: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction Fuzzy Hash: 60A11FA680E7C54FC7178B704C6A651BFB02E23105B4F86CBC086CF4F7E6599A19CB62
            Memory Dump Source
            • Source File: 00000000.00000003.1692908780.00000000022D9000.00000004.00000020.00020000.00000000.sdmp, Offset: 022DA000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_22dc000_allegro_free_viewer_16-6 (1).jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction ID: 6f73378b14d0d90aa62c3c2e6591c1ceb656c93f87aa0ad4209e567ba89ea5c0
            • Opcode Fuzzy Hash: f2c840f89157026ec069c61c0b3ce9edefdfa9fc9b6fdd3c18e3b45b52f14822
            • Instruction Fuzzy Hash: 60A11FA680E7C54FC7178B704C6A651BFB02E23105B4F86CBC086CF4F7E6599A19CB62