| File name: | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe |
| Full analysis: | https://app.any.run/tasks/a86c1093-d9c2-4351-be7b-31de9ef05cd6 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | October 03, 2024, 17:59:04 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | 600F20ABCC1FA9F5BDA0965D07B6855D |
| SHA1: | 38F079CE6B51508A9E62BD7B24ED792CDE38D33B |
| SHA256: | 7D89A16FC0D3AFA3CD78CC51E7AE6A81343CB14DE6FDCA9325142DECA5133515 |
| SSDEEP: | 49152:v+3z044n1IndbRV+IL2Ql/HsCakLF5vbzI:v+3z41CSyltFzI |
| .exe | | | UPX compressed Win32 Executable (43.5) |
|---|---|---|
| .exe | | | Win32 EXE Yoda's Crypter (42.7) |
| .exe | | | Win32 Executable (generic) (7.2) |
| .exe | | | Generic Win/DOS Executable (3.2) |
| .exe | | | DOS Executable Generic (3.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:06:30 20:15:41+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.29 |
| CodeSize: | 1867776 |
| InitializedDataSize: | 126976 |
| UninitializedDataSize: | 3813376 |
| EntryPoint: | 0x56b240 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.5.5.46348 |
| ProductVersionNumber: | 3.5.5.46348 |
| FileFlagsMask: | 0x002b |
| FileFlags: | Special build |
| FileOS: | Unknown (0) |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | BitTorrent Inc. |
| FileDescription: | µTorrent |
| FileVersion: | 3.5.5.46348 |
| InternalName: | uTorrent.exe |
| OriginalFileName: | uTorrent.exe |
| LegalCopyright: | ©2020 BitTorrent, Inc. All Rights Reserved. |
| ProductName: | µTorrent |
| ProductVersion: | 3.5.5.46348 |
| SpecialBuild: | stable34 stable |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 368 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2428 --field-trial-handle=2340,i,8322758128169251261,6034182130335980695,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 Modules
| |||||||||||||||
| 400 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7148 --field-trial-handle=2340,i,8322758128169251261,6034182130335980695,262144 --variations-seed-version /prefetch:8 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 440 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 488 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7032 --field-trial-handle=2340,i,8322758128169251261,6034182130335980695,262144 --variations-seed-version /prefetch:8 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 812 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x324,0x328,0x32c,0x320,0x318,0x7fffd42b5fd8,0x7fffd42b5fe4,0x7fffd42b5ff0 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 Modules
| |||||||||||||||
| 1060 | "C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=false" /installsource otherinstallcmd /sessionid "{7411F74F-2257-4635-9B21-4AF1DB0B4831}" /silent | C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | — | MicrosoftEdgeUpdate.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Update Version: 1.3.195.19 Modules
| |||||||||||||||
| 1144 | "C:\Windows\System32\cscript.exe" shell_scripts/shell_ping_after_close.js "http://i-50.b-000.XYZ.bench.utorrent.com/e?i=50&e=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" | C:\Windows\SysWOW64\cscript.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Console Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1344 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | PING.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | "sc.exe" failure WCAssistantService reset= 30 actions= restart/60000 | C:\Windows\SysWOW64\sc.exe | — | WebCompanionInstaller.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | "C:\WINDOWS\system32\runonce.exe" -r | C:\Windows\System32\runonce.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Run Once Wrapper Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6524) 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | Key: | HKEY_CLASSES_ROOT\FalconBetaAccount |
| Operation: | write | Name: | remote_access_client_id |
Value: 7115093034 | |||
| (PID) Process: | (5208) cscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\cscript.exe |
| Operation: | write | Name: | JScriptSetScriptStateStarted |
Value: 196E3F0000000000 | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication |
| Operation: | write | Name: | Name |
Value: mshta.exe | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication |
| Operation: | write | Name: | ID |
Value: | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CLASSES_ROOT\Applications\uTorrent.exe |
| Operation: | write | Name: | shell |
Value: open | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CLASSES_ROOT\Applications\uTorrent.exe\shell |
| Operation: | write | Name: | open |
Value: "%APPDATA%\uTorrent\uTorrent.exe" "%1" | |||
| (PID) Process: | (6188) mshta.exe | Key: | HKEY_CLASSES_ROOT\Applications\uTorrent.exe\shell\open |
| Operation: | write | Name: | command |
Value: "%APPDATA%\uTorrent\uTorrent.exe" "%1" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\utt56C8.tmp | — | |
MD5:— | SHA256:— | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Roaming\uTorrent\settings.dat.new | binary | |
MD5:ED539BFF16274133C3F3E7B476BE19BA | SHA256:A19FB5A04B8BC61A01CFEAC1A05BE0B990EB51A972A41528DEDF468A48F6358E | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\HTA\index.hta | html | |
MD5:76903930C0ADE2285F1AB1BF54BE660D | SHA256:61ACD6E7405FAD348433F8DE4B12ED97B42CACCBCF28FE0E4BA4B4A5D2EA707E | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Roaming\uTorrent\settings.dat | binary | |
MD5:ED539BFF16274133C3F3E7B476BE19BA | SHA256:A19FB5A04B8BC61A01CFEAC1A05BE0B990EB51A972A41528DEDF468A48F6358E | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\HTA\i18n\es.json | binary | |
MD5:D208BD6553A40136D75A78D5C0E11F52 | SHA256:AAC630FBE06486BACE04D05DA5E12CC96715B263CB3CAE8F246E630B6166DE41 | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\index.hta.log | text | |
MD5:2B632A88AF93F552846FDBF6890E8613 | SHA256:2B1D8F74B6B7EF3811B62E9320953577A736ED64AB9DD5C3E2390D994A10D234 | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\HTA\uninstall.hta | html | |
MD5:D91D3DAD4FB278BAB416A6CF49FDA09E | SHA256:E5A870DDA2BCA2B632F9AA3EEE7768B5DD1498046D53AF5FB6B5D5920DEBE27A | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\HTA\i18n\de.json | binary | |
MD5:C6ABA232E3CA1843E2CE5C0EA95A597A | SHA256:7E6E3722FE5BA7CF7709055DF67EC0F7710C357C1600E500F3D4EC0F403F3354 | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Local\Temp\HYD5CE3.tmp.1727978352\HTA\install.1727978352.zip | compressed | |
MD5:A65CA84BF2C878F87206FF596142B062 | SHA256:68E37EED2E04830FCE9F735D8A2ECEBB19A651394F5D590581370AC5D7754D90 | |||
| 6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\1f91d2d17ea675d4c2c3192e241743f9_bb926e54-e3ca-40fd-ae90-2764341e7792 | binary | |
MD5:75398B4451F9ABF6BD5BC752B2694182 | SHA256:8A327234B30B3CAF572D7D2DD134350257A5126AE17201D2D6C840A567CDCFDC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2120 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6188 | mshta.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json?callback=jQuery191021072312545877508_1727978356129&_=1727978356130 | unknown | — | — | shared |
3396 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | POST | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50 | unknown | — | — | whitelisted |
4880 | cscript.exe | GET | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50&e=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 | unknown | — | — | whitelisted |
832 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1144 | cscript.exe | GET | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50&e=eyJldmVudE5hbWUiOiJoeWRyYTEiLCJhY3Rpb24iOiJodGFTdWNjZXNzIiwicGlkIjoiMzM5NiIsImgiOiIxaG1XWkNLS09FYUEwM0ZFIiwidiI6IjExMTkxNjMwMCIsImIiOjQ2MzQ4LCJjbCI6InVUb3JyZW50Iiwib3NhIjoiNjQiLCJzbG5nIjoiZW4iLCJkYiI6IiIsImRidiI6IjExLjAiLCJpYnIiOlt7Im5hbWUiOiIiLCJ2ZXJzaW9uIjoiMTIzLjAiLCJleGVOYW1lIjoiZmlyZWZveCJ9LHsibmFtZSI6IiIsInZlcnNpb24iOiIxMjIuMCIsImV4ZU5hbWUiOiJjaHJvbWUifSx7Im5hbWUiOiIiLCJ2ZXJzaW9uIjoiMTEuMCIsImV4ZU5hbWUiOiJpZXhwbG9yZSJ9LHsibmFtZSI6IiIsInZlcnNpb24iOiIxMjIuMCIsImV4ZU5hbWUiOiJtc2VkZ2UifV0sImlwIjoiMTM4LjE5OS4zNi4xOTgiLCJjbiI6Ikdlcm1hbnkiLCJwYWNraWQiOiJsYXZhc29mdF9iaW5nIn0= | unknown | — | — | whitelisted |
6168 | cscript.exe | GET | 200 | 104.19.208.152:80 | http://webcompanion.com/nano_download.php?partner=BT170902 | unknown | — | — | malicious |
3396 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | POST | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50 | unknown | — | — | whitelisted |
6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | POST | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50 | unknown | — | — | whitelisted |
6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | POST | 200 | 44.212.231.148:80 | http://i-50.b-000.xyz.bench.utorrent.com/e?i=50 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5000 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4324 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | 44.212.231.148:80 | i-50.b-000.xyz.bench.utorrent.com | AMAZON-AES | US | whitelisted |
6524 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | 67.215.238.66:80 | download-lb.utorrent.com | ASN-QUADRANET-GLOBAL | US | whitelisted |
3396 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | 44.212.231.148:80 | i-50.b-000.xyz.bench.utorrent.com | AMAZON-AES | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
router.bittorrent.com |
| whitelisted |
router.utorrent.com |
| whitelisted |
i-50.b-000.xyz.bench.utorrent.com |
| whitelisted |
download-lb.utorrent.com |
| whitelisted |
ip-api.com |
| shared |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
6188 | mshta.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
6168 | cscript.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
6168 | cscript.exe | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from WinHttpRequest non-exe extension |
6168 | cscript.exe | Misc activity | ET INFO WinHttpRequest Downloading EXE |
6168 | cscript.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3396 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | Potential Corporate Privacy Violation | ET P2P BTWebClient UA uTorrent in use |
3396 | 7d89a16fc0d3afa3cd78cc51e7ae6a81343cb14de6fdca9325142deca5133515.exe | Potential Corporate Privacy Violation | ET P2P BTWebClient UA uTorrent in use |
3832 | uTorrent.exe | Potential Corporate Privacy Violation | ET P2P BTWebClient UA uTorrent in use |
Process | Message |
|---|---|
WebCompanionInstaller.exe | Detecting windows culture
|
WebCompanionInstaller.exe | 10/3/2024 5:59:36 PM :-> Starting installer 8.9.0.992 with: .\WebCompanionInstaller.exe --partner=BT170902 --version=8.9.0.992 --silent --partner=BT170902 --homepage=1 --search=1, Run as admin: True
|
WebCompanionInstaller.exe | Failed to report progress in SendPostRequest: System.Net.WebException: The remote name could not be resolved: 'flow.lavasoft.com'
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at WebCompanionInstaller.Utils.RestUtils.SendPostRequest(String url, String body)
|
WebCompanionInstaller.exe | SecurityProtocol set to 4032
|
WebCompanionInstaller.exe | Preparing for installing Web Companion
|
WebCompanionInstaller.exe | Failed to report progress in SendPostRequest: System.Net.WebException: The remote name could not be resolved: 'flow.lavasoft.com'
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at WebCompanionInstaller.Utils.RestUtils.SendPostRequest(String url, String body)
|
WebCompanionInstaller.exe | 10/3/2024 5:59:37 PM :-> Generating Machine and Install Id ...
|
WebCompanionInstaller.exe | 10/3/2024 5:59:37 PM :-> Machine Id and Install Id has been generated
|
WebCompanionInstaller.exe | Failed to report progress in SendPostRequest: System.Net.WebException: The remote name could not be resolved: 'flow.lavasoft.com'
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at WebCompanionInstaller.Utils.RestUtils.SendPostRequest(String url, String body)
|
WebCompanionInstaller.exe | 10/3/2024 5:59:37 PM :-> Checking prerequisites ...
|