Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
view_01-64.exe

Overview

General Information

Sample name:view_01-64.exe
Analysis ID:1431424
MD5:72ac0fb34f691758105bbc4eb920ad8a
SHA1:6e4f9dedfeed0d06aec464584ca510ce08cbb5f4
SHA256:ff6cc44c832e3318bc9d673f8eb053666d38002698814c23c88df9a6d357fd66
Infos:

Detection

Score:30
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample is a service DLL but no service has been registered
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • view_01-64.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\view_01-64.exe" MD5: 72AC0FB34F691758105BBC4EB920AD8A)
    • view_01-64.tmp (PID: 7548 cmdline: "C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp" /SL5="$7047C,14900298,56832,C:\Users\user\Desktop\view_01-64.exe" MD5: A2C4D52C66B4B399FACADB8CC8386745)
      • cmd.exe (PID: 7880 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateService.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7932 cmdline: sc stop "VDR Servers Service" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • ServiceMinit.exe (PID: 7948 cmdline: server\bin\ServiceMinit.exe /UnregServer MD5: 01C338C4765202CB8D712FD7CCDF9BD1)
        • ServiceMinit.exe (PID: 7964 cmdline: server\bin\ServiceMinit.exe /Service MD5: 01C338C4765202CB8D712FD7CCDF9BD1)
      • cmd.exe (PID: 7988 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateSeverEnvironment.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • wscript.exe (PID: 8040 cmdline: wscript InstSeverEnvironment.vbs MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • cmd.exe (PID: 8068 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\Viewer\CreateLatestBackup.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • xcopy.exe (PID: 8120 cmdline: xcopy /E /Y ..\_previous ..\_latest MD5: 39FBFD3AF58238C6F9D4D408C9251FF5)
        • xcopy.exe (PID: 8136 cmdline: xcopy /E /Y /U ..\dlls ..\_latest\dlls MD5: 39FBFD3AF58238C6F9D4D408C9251FF5)
        • xcopy.exe (PID: 8152 cmdline: xcopy /E /Y /U ..\server ..\_latest\server MD5: 39FBFD3AF58238C6F9D4D408C9251FF5)
        • xcopy.exe (PID: 7192 cmdline: xcopy /E /Y /U ..\Viewer ..\_latest\Viewer MD5: 39FBFD3AF58238C6F9D4D408C9251FF5)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Michael Haag: Data: Command: wscript InstSeverEnvironment.vbs, CommandLine: wscript InstSeverEnvironment.vbs, CommandLine|base64offset|contains: +, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateSeverEnvironment.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7988, ParentProcessName: cmd.exe, ProcessCommandLine: wscript InstSeverEnvironment.vbs, ProcessId: 8040, ProcessName: wscript.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmpReversingLabs: Detection: 25%
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmpVirustotal: Detection: 34%Perma Link
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmpReversingLabs: Detection: 21%
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmpVirustotal: Detection: 34%Perma Link
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)ReversingLabs: Detection: 21%
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)Virustotal: Detection: 34%Perma Link
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)ReversingLabs: Detection: 25%
Source: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)Virustotal: Detection: 34%Perma Link
Source: view_01-64.exeVirustotal: Detection: 12%Perma Link
Source: view_01-64.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VR-7000_is1Jump to behavior
Source: Binary string: e:\scada_win\obj\Release.clientrecorder\clientrecorder.pdb source: clientrecorder.exe.13.dr
Source: Binary string: c:\furuno\scada_win\obj\Release.rcplayer\rcplayer.pdb source: view_01-64.tmp, 00000001.00000003.1944388445.00000000061E7000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: NB10nlO6L:\jcomm\src\win32\jcomm1.0\ext\comm\build\win32\win32com.pdb source: is-JN5IK.tmp.1.dr
Source: Binary string: c:\furuno\scada_win\app\confirmdialog\debug\confirmDialog.pdb source: is-KLCB3.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.rcplayer\rcplayer.pdb source: rcplayer.exe.13.dr
Source: Binary string: c:\furuno\scada_win\obj\Release.extclient\extclient.pdb source: view_01-64.tmp, 00000001.00000003.1944388445.0000000005D10000.00000004.00001000.00020000.00000000.sdmp, is-8706V.tmp.1.dr
Source: Binary string: L:\jcomm\src\win32\jcomm1.0\ext\comm\build\win32\win32com.pdb source: is-JN5IK.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.extclient\extclient.pdb source: xcopy.exe, 0000000F.00000003.1874316381.0000028490F2E000.00000004.00000020.00020000.00000000.sdmp, extclient.exe.13.dr
Source: Binary string: c:\workspace\src\client\scada_win\obj\Release.combine\combine.pdb source: is-RRTAP.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.speedtest\speedtest.pdb source: is-CKFTJ.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.liveremoteconverter\liveremoteconverter.pdb source: is-596LT.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.VdrCheckFileTest\VdrCheckFileTest.pdb source: is-7UQKD.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.ServiceMinit\ServiceMinit.pdb source: ServiceMinit.exe, ServiceMinit.exe, 00000006.00000000.1852164506.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000000.1853570408.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000002.1855826199.0000000000430000.00000002.00000001.01000000.00000008.sdmp, is-0KHA3.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.ServiceMinit\ServiceMinit.pdb$ source: ServiceMinit.exe, 00000006.00000000.1852164506.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000000.1853570408.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000002.1855826199.0000000000430000.00000002.00000001.01000000.00000008.sdmp, is-0KHA3.tmp.1.dr
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0040D61A __getdrive,FindFirstFileA,__fullpath,__fullpath,_strlen,_IsRootUNCName,GetDriveTypeA,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,6_2_0040D61A
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00417C6D __getdrive,FindFirstFileA,__fullpath,__fullpath,_strlen,_IsRootUNCName,GetDriveTypeA,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,6_2_00417C6D
Source: is-1445O.tmp.1.drString found in binary or memory: http://www.apache.org/licenses/
Source: is-1445O.tmp.1.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: view_01-64.tmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.innosetup.com/
Source: view_01-64.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: view_01-64.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: view_01-64.exe, 00000000.00000003.1644115575.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, view_01-64.exe, 00000000.00000003.1643980688.0000000002400000.00000004.00001000.00020000.00000000.sdmp, view_01-64.tmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.remobjects.com/ps
Source: view_01-64.exe, 00000000.00000003.1644115575.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, view_01-64.exe, 00000000.00000003.1643980688.0000000002400000.00000004.00001000.00020000.00000000.sdmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.remobjects.com/psU

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00406140 InitializeCriticalSection,EnterCriticalSection,OpenSCManagerA,MessageBoxA,OpenServiceA,CloseServiceHandle,MessageBoxA,ControlService,DeleteService,CloseServiceHandle,CloseServiceHandle,MessageBoxA,6_2_00406140
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_0040840C0_2_0040840C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004706A81_2_004706A8
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004809F71_2_004809F7
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004673A41_2_004673A4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0043035C1_2_0043035C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004444C81_2_004444C8
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004345C41_2_004345C4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00444A701_2_00444A70
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00486BD01_2_00486BD0
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00430EE81_2_00430EE8
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0045F0C41_2_0045F0C4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004451681_2_00445168
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0045B1741_2_0045B174
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004352C81_2_004352C8
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004694041_2_00469404
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004455741_2_00445574
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004519BC1_2_004519BC
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00487B301_2_00487B30
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0043DD501_2_0043DD50
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0048DF541_2_0048DF54
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00418ED56_2_00418ED5
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004123D56_2_004123D5
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0042A5786_2_0042A578
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004255816_2_00425581
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004326036_2_00432603
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004117226_2_00411722
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004127F56_2_004127F5
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004148466_2_00414846
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00427A556_2_00427A55
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00427B6B6_2_00427B6B
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00411BF56_2_00411BF5
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0041DE5B6_2_0041DE5B
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00412F706_2_00412F70
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00411FC96_2_00411FC9
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: String function: 00401220 appears 81 times
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: String function: 00413950 appears 84 times
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: String function: 004188A9 appears 46 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00408C0C appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00406AC4 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 0040595C appears 117 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00457F1C appears 73 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00403400 appears 60 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00445DD4 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00457D10 appears 96 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 004344DC appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 004078F4 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00403494 appears 83 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00403684 appears 225 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 00453344 appears 97 times
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: String function: 004460A4 appears 59 times
Source: view_01-64.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: view_01-64.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: view_01-64.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-5113G.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-5113G.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-5113G.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: view_01-64.exe, 00000000.00000003.1644115575.00000000020F8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs view_01-64.exe
Source: view_01-64.exe, 00000000.00000003.1643980688.0000000002400000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs view_01-64.exe
Source: view_01-64.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: sus30.winEXE@28/1012@0/0
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,1_2_00455E0C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: InitializeCriticalSection,EnterCriticalSection,OpenSCManagerA,MessageBoxA,GetModuleFileNameA,CreateServiceA,CloseServiceHandle,MessageBoxA,CloseServiceHandle,CloseServiceHandle,6_2_00405FE0
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_004051C0 CoCreateInstance,StringFromGUID2,lstrlenW,RegQueryInfoKeyA,RegQueryInfoKeyA,6_2_004051C0
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00406280 InitializeCriticalSection,EnterCriticalSection,StartServiceCtrlDispatcherA,InitializeCriticalSection,EnterCriticalSection,6_2_00406280
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00406280 InitializeCriticalSection,EnterCriticalSection,StartServiceCtrlDispatcherA,InitializeCriticalSection,EnterCriticalSection,6_2_00406280
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNOJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8076:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7996:120:WilError_03
Source: C:\Users\user\Desktop\view_01-64.exeFile created: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateService.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript InstSeverEnvironment.vbs
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCommand line argument: UnregServer6_2_00403970
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCommand line argument: RegServer6_2_00403970
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCommand line argument: Service6_2_00403970
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCommand line argument: AppID6_2_00403970
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCommand line argument: LocalService6_2_00403970
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\view_01-64.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: view_01-64.exeVirustotal: Detection: 12%
Source: view_01-64.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
Source: view_01-64.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\view_01-64.exeFile read: C:\Users\user\Desktop\view_01-64.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\view_01-64.exe "C:\Users\user\Desktop\view_01-64.exe"
Source: C:\Users\user\Desktop\view_01-64.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp "C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp" /SL5="$7047C,14900298,56832,C:\Users\user\Desktop\view_01-64.exe"
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateService.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop "VDR Servers Service"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /UnregServer
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /Service
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateSeverEnvironment.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript InstSeverEnvironment.vbs
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\Viewer\CreateLatestBackup.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y ..\_previous ..\_latest
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\dlls ..\_latest\dlls
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\server ..\_latest\server
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\Viewer ..\_latest\Viewer
Source: C:\Users\user\Desktop\view_01-64.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp "C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp" /SL5="$7047C,14900298,56832,C:\Users\user\Desktop\view_01-64.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateService.bat""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateSeverEnvironment.bat""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\Viewer\CreateLatestBackup.bat""Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop "VDR Servers Service"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /UnregServerJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /ServiceJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript InstSeverEnvironment.vbsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y ..\_previous ..\_latestJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\dlls ..\_latest\dllsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\server ..\_latest\serverJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\Viewer ..\_latest\ViewerJump to behavior
Source: C:\Users\user\Desktop\view_01-64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\view_01-64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ifsutil.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ifsutil.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ifsutil.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\xcopy.exeSection loaded: ulib.dll
Source: C:\Windows\System32\xcopy.exeSection loaded: ifsutil.dll
Source: C:\Windows\System32\xcopy.exeSection loaded: devobj.dll
Source: C:\Windows\System32\xcopy.exeSection loaded: fsutilext.dll
Source: C:\Windows\System32\xcopy.exeSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Windows\System32\xcopy.exeFile written: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\data\onlndb\Config.iniJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpWindow found: window name: TMainFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpAutomated click: Next >
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VR-7000_is1Jump to behavior
Source: view_01-64.exeStatic file information: File size 15161609 > 1048576
Source: Binary string: e:\scada_win\obj\Release.clientrecorder\clientrecorder.pdb source: clientrecorder.exe.13.dr
Source: Binary string: c:\furuno\scada_win\obj\Release.rcplayer\rcplayer.pdb source: view_01-64.tmp, 00000001.00000003.1944388445.00000000061E7000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: NB10nlO6L:\jcomm\src\win32\jcomm1.0\ext\comm\build\win32\win32com.pdb source: is-JN5IK.tmp.1.dr
Source: Binary string: c:\furuno\scada_win\app\confirmdialog\debug\confirmDialog.pdb source: is-KLCB3.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.rcplayer\rcplayer.pdb source: rcplayer.exe.13.dr
Source: Binary string: c:\furuno\scada_win\obj\Release.extclient\extclient.pdb source: view_01-64.tmp, 00000001.00000003.1944388445.0000000005D10000.00000004.00001000.00020000.00000000.sdmp, is-8706V.tmp.1.dr
Source: Binary string: L:\jcomm\src\win32\jcomm1.0\ext\comm\build\win32\win32com.pdb source: is-JN5IK.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.extclient\extclient.pdb source: xcopy.exe, 0000000F.00000003.1874316381.0000028490F2E000.00000004.00000020.00020000.00000000.sdmp, extclient.exe.13.dr
Source: Binary string: c:\workspace\src\client\scada_win\obj\Release.combine\combine.pdb source: is-RRTAP.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.speedtest\speedtest.pdb source: is-CKFTJ.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.liveremoteconverter\liveremoteconverter.pdb source: is-596LT.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.VdrCheckFileTest\VdrCheckFileTest.pdb source: is-7UQKD.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.ServiceMinit\ServiceMinit.pdb source: ServiceMinit.exe, ServiceMinit.exe, 00000006.00000000.1852164506.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000000.1853570408.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000002.1855826199.0000000000430000.00000002.00000001.01000000.00000008.sdmp, is-0KHA3.tmp.1.dr
Source: Binary string: e:\scada_win\obj\Release.ServiceMinit\ServiceMinit.pdb$ source: ServiceMinit.exe, 00000006.00000000.1852164506.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000000.1853570408.0000000000430000.00000002.00000001.01000000.00000008.sdmp, ServiceMinit.exe, 00000007.00000002.1855826199.0000000000430000.00000002.00000001.01000000.00000008.sdmp, is-0KHA3.tmp.1.dr
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
Source: is-8V50C.tmp.1.drStatic PE information: section name: .textbss
Source: is-PPA9R.tmp.1.drStatic PE information: section name: .textbss
Source: is-596LT.tmp.1.drStatic PE information: section name: .textbss
Source: is-AP3B5.tmp.1.drStatic PE information: section name: .textbss
Source: is-CKFTJ.tmp.1.drStatic PE information: section name: .textbss
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
Source: is-6L83T.tmp.1.drStatic PE information: section name: .text entropy: 6.812097707799091
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-PPA9R.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-84QUO.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRTransRtp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-5HDDL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRSocket.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-PCP74.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\confirmDialog.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\vsend.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-OUSS8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-6L83T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-2397E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\liveremoteconverter.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-8V50C.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRAVCtrlJNI.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-895CV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-SKTFO.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rserv.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\is-5113G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S4J2T.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libvorbis.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\tar32.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libogg.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\speedtest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\tarcmd.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\VDRTransRtp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\extclient.exe (copy)Jump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rcplayer.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-L1595.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-N0LRV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libvorbisfile.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-OR35G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\combine.exe (copy)Jump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\extclient.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-84GGN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\rcplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\clientrecorder.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libexpat.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-M5B6A.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\rserv.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\UTSecureLayer.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\extclient.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRAVCtrlJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-96783.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\rcplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-SDE95.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-KVTDD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-E2844.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\combine.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\speedtest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-8706V.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-CJB6D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\confirmDialog.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-EGJ3O.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-CKFTJ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRThread.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\msend.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libSecurityJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-KLCB3.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRTransRtp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-U7GO5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\win32com.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-VDN2J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-5ROI4.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\remoteclient.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-0KHA3.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Users\user\AppData\Local\Temp\is-S4J2T.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-9JE74.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-RRTAP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\VDRAVCtrlJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\NmeaDecodeJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-FURKP.tmpJump to dropped file
Source: C:\Users\user\Desktop\view_01-64.exeFile created: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-596LT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-AP3B5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-JN5IK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-3H48C.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\clientrecorder.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-PVGSK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\AisLibraryJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\VdrCheckFileTest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-V337O.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-7UQKD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\rserv.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRTrace.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\clientrecorder.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000\Live Player V5 (01.64).lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000\VR-7000 VDR Maintenance Viewer (01.64).lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000\VR-7000 Uninstall.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000 Previous VersionJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000 Previous Version\Live Player V5 OLD (01.10).lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000 Previous Version\VR-7000 VDR Maintenance Viewer OLD (01.10).lnkJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00406280 InitializeCriticalSection,EnterCriticalSection,StartServiceCtrlDispatcherA,InitializeCriticalSection,EnterCriticalSection,6_2_00406280
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop "VDR Servers Service"
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
Source: C:\Users\user\Desktop\view_01-64.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-PPA9R.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-84QUO.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRTransRtp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRSocket.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-5HDDL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-PCP74.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\confirmDialog.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\vsend.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-OUSS8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-2397E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-6L83T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\liveremoteconverter.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-8V50C.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRAVCtrlJNI.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-895CV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-SKTFO.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rserv.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\is-5113G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S4J2T.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libvorbis.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\tar32.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libogg.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\speedtest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\tarcmd.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\VDRTransRtp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\extclient.exe (copy)Jump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rcplayer.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-L1595.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-N0LRV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libvorbisfile.dll (copy)Jump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\extclient.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\combine.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-OR35G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-84GGN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\rcplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\clientrecorder.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libexpat.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-M5B6A.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\rserv.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\UTSecureLayer.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\extclient.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRAVCtrlJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\rcplayer.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-96783.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-SDE95.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-KVTDD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-E2844.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\combine.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\speedtest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-8706V.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-CJB6D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\confirmDialog.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-EGJ3O.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-CKFTJ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRThread.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\libSecurityJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\msend.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-KLCB3.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRTransRtp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\win32com.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-U7GO5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\is-VDN2J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-5ROI4.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\remoteclient.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-S4J2T.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-9JE74.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-RRTAP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\VDRAVCtrlJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\NmeaDecodeJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-FURKP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-596LT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-AP3B5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-JN5IK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-3H48C.tmpJump to dropped file
Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\clientrecorder.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-PVGSK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\AisLibraryJNI.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\VdrCheckFileTest.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\is-7UQKD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\is-V337O.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\rserv.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\_previous\server\bin\clientrecorder.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpDropped PE file which has not been started: C:\Program Files (x86)\FURUNO\VR-7000\dlls\TVRTrace.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\view_01-64.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5454
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_6-23924
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0040D61A __getdrive,FindFirstFileA,__fullpath,__fullpath,_strlen,_IsRootUNCName,GetDriveTypeA,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,6_2_0040D61A
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00417C6D __getdrive,FindFirstFileA,__fullpath,__fullpath,_strlen,_IsRootUNCName,GetDriveTypeA,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,6_2_00417C6D
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
Source: view_01-64.tmp, 00000001.00000003.1946055291.000000000065C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Y
Source: view_01-64.tmp, 00000001.00000003.1946055291.000000000065C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeAPI call chain: ExitProcess graph end nodegraph_6-23926
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0040D11E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0040D11E
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00413763 GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__ioinit,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,6_2_00413763
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0040D11E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0040D11E
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0041FA65 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0041FA65
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0041EB5D SetUnhandledExceptionFilter,__encode_pointer,6_2_0041EB5D
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0041EB7F __decode_pointer,SetUnhandledExceptionFilter,6_2_0041EB7F
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00413E36 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00413E36
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop "VDR Servers Service"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /UnregServerJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe server\bin\ServiceMinit.exe /ServiceJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript InstSeverEnvironment.vbsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y ..\_previous ..\_latestJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\dlls ..\_latest\dllsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\server ..\_latest\serverJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /E /Y /U ..\Viewer ..\_latest\ViewerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_00421FCF cpuid 6_2_00421FCF
Source: C:\Users\user\Desktop\view_01-64.exeCode function: GetLocaleInfoA,0_2_0040520C
Source: C:\Users\user\Desktop\view_01-64.exeCode function: GetLocaleInfoA,0_2_00405258
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: GetLocaleInfoA,1_2_00408568
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: GetLocaleInfoA,1_2_004085B4
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,6_2_00422145
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetLocaleInfoA,6_2_0042616A
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_0042410A
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,6_2_0040C1E4
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _LcidFromHexString,GetLocaleInfoA,6_2_0042624C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,6_2_004262E2
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_00426354
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,6_2_0042436C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_00426524
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _strlen,EnumSystemLocalesA,6_2_004265E6
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetLocaleInfoA,6_2_0042D659
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_00426674
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_0042660F
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,6_2_004266B0
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoA,6_2_0041A83C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,6_2_004249FB
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,6_2_00424C7F
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,_malloc,GetLocaleInfoA,MultiByteToWideChar,__freea,6_2_00423E57
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,6_2_00423FCD
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoW_stat,6_2_00423F92
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
Source: C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exeCode function: 6_2_0041715D __lock,__invoke_watson,__invoke_watson,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,6_2_0041715D
Source: C:\Users\user\Desktop\view_01-64.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information12
Scripting
Valid Accounts3
Native API
12
Scripting
1
Exploitation for Privilege Escalation
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
3
Obfuscated Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts13
Service Execution
16
Windows Service
1
Access Token Manipulation
1
Software Packing
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Registry Run Keys / Startup Folder
16
Windows Service
1
DLL Side-Loading
NTDS36
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
2
Masquerading
LSA Secrets121
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
1
Access Token Manipulation
Cached Domain Credentials1
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
Process Injection
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431424 Sample: view_01-64.exe Startdate: 25/04/2024 Architecture: WINDOWS Score: 30 58 Multi AV Scanner detection for dropped file 2->58 60 Multi AV Scanner detection for submitted file 2->60 8 view_01-64.exe 2 2->8         started        process3 file4 48 C:\Users\user\AppData\...\view_01-64.tmp, PE32 8->48 dropped 11 view_01-64.tmp 23 571 8->11         started        process5 file6 50 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->50 dropped 52 C:\...\unins000.exe (copy), PE32 11->52 dropped 54 C:\Program Files (x86)\...\vsend.exe (copy), PE32 11->54 dropped 56 81 other files (78 malicious) 11->56 dropped 14 cmd.exe 2 11->14         started        16 cmd.exe 1 11->16         started        18 cmd.exe 1 11->18         started        process7 process8 20 xcopy.exe 35 14->20         started        23 conhost.exe 14->23         started        38 3 other processes 14->38 25 wscript.exe 16->25         started        28 conhost.exe 16->28         started        30 ServiceMinit.exe 8 18->30         started        32 ServiceMinit.exe 1 18->32         started        34 conhost.exe 18->34         started        36 sc.exe 1 18->36         started        file9 40 C:\Program Files (x86)\FURUNO\...\rserv.exe, PE32 20->40 dropped 42 C:\Program Files (x86)\...\rcplayer.exe, PE32 20->42 dropped 44 C:\Program Files (x86)\...\extclient.exe, PE32 20->44 dropped 46 3 other malicious files 20->46 dropped 62 Windows Scripting host queries suspicious COM object (likely to drop second stage) 25->62 signatures10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
view_01-64.exe12%ReversingLabs
view_01-64.exe12%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\combine.exe (copy)2%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\combine.exe (copy)3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-84QUO.tmp0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-84QUO.tmp3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmp26%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-MFO1U.tmp34%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-PVGSK.tmp2%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-PVGSK.tmp3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmp22%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-QTH30.tmp34%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-U7GO5.tmp0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\is-U7GO5.tmp3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)22%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe (copy)34%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)26%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe (copy)34%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\msend.exe (copy)0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\msend.exe (copy)3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\speedtest.exe (copy)0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\Viewer\speedtest.exe (copy)3%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRAVCtrlJNI.dll0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRAVCtrlJNI.dll0%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRTransRtp.dll0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\dlls\VDRTransRtp.dll0%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\clientrecorder.exe2%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\clientrecorder.exe4%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\extclient.exe0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\extclient.exe1%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rcplayer.exe0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rserv.exe0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_latest\server\bin\rserv.exe5%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRAVCtrlJNI.dll (copy)0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRAVCtrlJNI.dll (copy)0%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRTransRtp.dll (copy)0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\VDRTransRtp.dll (copy)0%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-M5B6A.tmp0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-M5B6A.tmp0%VirustotalBrowse
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-N0LRV.tmp0%ReversingLabs
C:\Program Files (x86)\FURUNO\VR-7000\_previous\dlls\is-N0LRV.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.remobjects.com/psU0%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
http://www.innosetup.com/0%Avira URL Cloudsafe
http://www.innosetup.com/2%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/view_01-64.tmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineview_01-64.exefalse
    high
    http://www.apache.org/licenses/LICENSE-2.0is-1445O.tmp.1.drfalse
      high
      http://www.remobjects.com/psUview_01-64.exe, 00000000.00000003.1644115575.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, view_01-64.exe, 00000000.00000003.1643980688.0000000002400000.00000004.00001000.00020000.00000000.sdmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.remobjects.com/psview_01-64.exe, 00000000.00000003.1644115575.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, view_01-64.exe, 00000000.00000003.1643980688.0000000002400000.00000004.00001000.00020000.00000000.sdmp, view_01-64.tmp, view_01-64.tmp, 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.apache.org/licenses/is-1445O.tmp.1.drfalse
        high
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUview_01-64.exefalse
          high
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1431424
          Start date and time:2024-04-25 04:43:39 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 22s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:view_01-64.exe
          Detection:SUS
          Classification:sus30.winEXE@28/1012@0/0
          EGA Information:
          • Successful, ratio: 75%
          HCA Information:
          • Successful, ratio: 96%
          • Number of executed functions: 190
          • Number of non-executed functions: 210
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target ServiceMinit.exe, PID 7964 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1218
          Entropy (8bit):4.540363884302869
          Encrypted:false
          SSDEEP:24:Q1NLI/TeZu9YM7/M2v2OAUWwGJtob132zmFdIq8qVsAFdIkjkjAloNzmWNvn:GNc/8u9YF2v2OAmGJab1mzmEP3AEyIAY
          MD5:AF54A8883211A3C956E9F41955125D54
          SHA1:DAACB0AFB3BA703B2B17AC93D5775206BD7A3AFC
          SHA-256:494AF8EE4EDB809B7E04CF42A6FC6E9BBD3781798A07BBA4CA2431A5A339835B
          SHA-512:09FAA6E6A86E29A7488E10B993DB434DCB62E331D7B0053169E9F3208C30429418EA9E664FF0AF9E7AAEF4C8DCB79BE39C28BF9846F05A902D01D55531156268
          Malicious:false
          Reputation:low
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM Main Routine..REM ------------------------------------------------------------..SET LOGFILE=nul..REM SET LOGFILE=%TEMP%\VDRServiceRegist.log..ECHO ------------------------------------------------------------ >> %LOGFILE%..ECHO %DATE% %TIME% >> %LOGFILE%....REM see ./scada_win/app/ServiceMinit/ServiceMinit.rc..SET SERVICE_NAME="VDR Servers Service"....REM Stop Service..sc stop %SERVICE_NAME%..ECHO sc stop %SERVICE_NAME% RESULT:%ERRORLEVEL% >> %LOGFILE%....REM Regist Service..SET SERVICE_MINIT=server\bin\ServiceMinit.exe..CALL :REGIST_SERVICE....ECHO DONE. >> %LOGFILE%..EXIT....REM ------------------------------------------------------------..REM Regist Service..REM ------------------------------------------------------------..:REGIST_SERVICE..IF EXIST %SERVICE_MINIT% (.. ECHO Regist Service : %SERVICE_MINIT% >> %LOGFILE%.. %SERVICE_MINIT% /UnregServer.. ECHO %SERVICE_MINIT% /
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):32
          Entropy (8bit):3.944548827786958
          Encrypted:false
          SSDEEP:3:cYWLWnTAs2en2:3WYAXK2
          MD5:1E9D5E4E473BB1E85C8E596F8B3026B5
          SHA1:C3E2328311AA8D6E7BB4D5ED0238C803D85AC905
          SHA-256:BF23E7816400F1C208E5A4D397DA03ED0BE087AEBED6845F07BB79E0838D9AEA
          SHA-512:B38BBF8555AC4B86BECA1B35505E38899C561305F198BC3B932AC9C545B9FFCE282DC0C4A52F7857EE9197B4E8AF5F53F49A35CC4BD712185F9FB9E6A72A62D5
          Malicious:false
          Preview:wscript InstSeverEnvironment.vbs
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):75
          Entropy (8bit):4.106505774273587
          Encrypted:false
          SSDEEP:3:6090ERMCAVAMerTA4v:DXYybgi
          MD5:2EA1C7B1F55930C9AEFC37D288AE89A5
          SHA1:ADFC44AE6811D426DD70BC986ADC1FA4635CBF06
          SHA-256:BD855484AE6249F651E082BDC0C83D732F988818C2596C2655FA1AE9108B0B00
          SHA-512:DFD584E2FEC5831F4C110FE309FDBE7ECDC34620A8E5F004D806B08ABDA16DD9F9DAB5F977C7DD661C194C4C19B38A4DE44627ACA199768752D4D286A6C52863
          Malicious:false
          Preview:sc stop "Grass Servers Service"..server\bin\ServiceMinit.exe /UnregServer..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):3.9069050327968804
          Encrypted:false
          SSDEEP:3:cYKLD2ns2en2:3Kn2nXK2
          MD5:60205CC6480608E98E14D4BCECE0C3C0
          SHA1:EABC789A03D9CCE98CB750A760583023F0063FFC
          SHA-256:C7E629CB94B54623B592C64F3B6029B9D21BF24B3188FB69E2C05772541F059A
          SHA-512:BA11BC7B040C5B631B39FF6F33EDA820D66151173749385811175F7B22E2DEBCE99CB9F95EF680FE23BDA478ACF5765984E20CB58F3144E88F0CB46E58567428
          Malicious:false
          Preview:wscript UninstSeverEnvironment.vbs
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1286
          Entropy (8bit):5.299118839599219
          Encrypted:false
          SSDEEP:24:IN8KW5iQM7lI5yDiseh2PD/eoSVd+sHGLuGub3MJ:y8ITRMyDPD/O8s+X1
          MD5:5618CF19864999A6D4566D60F8525B40
          SHA1:A97188305138C0518E2E43E1F47A0158CE101FC8
          SHA-256:1EB7B63FB3BE1C9E138B94F27D5272434F880DD588789B24336D46D3B631D323
          SHA-512:25A56F01A473B56E163FF702021274057245885A7CDBB7FD0547E41A17DB217EDC9452C7D4D486FD4F8A979D5BED8B92BF3F7090071D8AC4868CCFA40DD5460B
          Malicious:false
          Preview:Option Explicit..Dim WShell..Dim SFileSystem..Dim WEnvironment..Dim Members..Dim i..Dim bFind..Dim SystemRootFolder..Dim CurrentDirectory..Dim SFolderObject..Dim SFolderCollection....Set WShell = CreateObject("WScript.Shell")..Set SFileSystem= CreateObject("Scripting.FileSystemObject")..Set WEnvironment = WShell.Environment("System")....'''''''''''''''''''''''''''''''''''''''''''''''''..' ...W.X.g........s.t.H..._..........SystemRootFolder = "%SERVER_DLLS%"....Members = Split (WEnvironment.Item("PATH"), ";")..bFind = false..For i = LBound(Members) To UBound(Members).. If StrComp (Members(i), SystemRootFolder ) = 0 Then..'.WScript.Echo "...."...bFind = true.. End If..Next....If bFind = false Then.. WEnvironment.Item("PATH") = WEnvironment.Item("PATH") & ";" & SystemRootFolder ..' WScript.Echo "..............................."..End If....''''''''''''''''''''''''''''''''''''''''''''''''''..'' .J.....g.f.B...N.g.....X......'CurrentDirectory = WShell.CurrentDirecto
          Process:C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe
          File Type:ASCII text, with very long lines (311), with CRLF line terminators
          Category:modified
          Size (bytes):2160
          Entropy (8bit):5.404521438517241
          Encrypted:false
          SSDEEP:48:pqv1Is1Q9QFDP1Bcr1z+1m9s+A6Ls+hVXs+ZsnqvnIsnQ9QFDPGBcrGz+Gm9sGuS:aTGg+VzkMa88VWVp
          MD5:4D79D71509E098CF6E7975083364784A
          SHA1:D8634F251D8096D5FF9497CC0B95886178E0EB8A
          SHA-256:6165E08568990AE3137F367A436B124D3AEA9363BFEC461B1ADE9885D741310F
          SHA-512:698D90151AB23D1AD4BA370CD54CF4A355D9829E1B16ECD5096D74524DA4A7C6472FC18AE10C29E4B1477057C750EB5130BC4F64CD146FD1D8CCB4531DC44DB6
          Malicious:false
          Preview:2024/04/25 02:44:48.121 [7952:ServiceMinit.cpp:0189] ============================================..2024/04/25 02:44:48.137 [7952:ServiceMinit.cpp:0190] CServiceModule::Init()..2024/04/25 02:44:48.137 [7952:ServiceMinit.cpp:0197] CServiceModule::PATH=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;..2024/04/25 02:44:48.137 [7952:ServiceMinit.cpp:0201] CServiceModule::HG_TOP_DIR=NULL..2024/04/25 02:44:48.137 [7952:ServiceMinit.cpp:0207] CServiceModule::SERVER_DLLS=NULL..2024/04/25 02:44:48.137 [7952:ServiceMinit.cpp:0565] CServiceModule::_tWinMain()..2024/04/25 02:44:48.152 [7952:ServiceMinit.cpp:0172] CServiceModule::UnregisterServer()..2024/04/25 02:44:48.152 [7952:ServiceMinit.cpp:0302] CServiceModule::Uninstall()..2024/04/25 02:44:48.152 [7952:ServiceMinit.cpp:0245] CServiceModule::IsInstalled()..2
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1104
          Entropy (8bit):5.469738261088247
          Encrypted:false
          SSDEEP:24:IN8KNg5iQM7lISflvWtsehD5PD/uIyGLi1Y:y8STRDju/RXf
          MD5:EC4723BDFC1B0F8A04C6C483397466C6
          SHA1:5437FF0C03378D6E9BE5B9BA341A60208895B09F
          SHA-256:7402167192B842D30273CFE711E483F4974A92EC8D91E78AAA63269A343FC693
          SHA-512:60ED6560FAC57D76615A96F17FD617B499082213EF5D47377FBFC202404A82DD4498B8663DD63B46B661AA2218B00EC0E23F058587B2167FA4E452D01E95FCAA
          Malicious:false
          Preview:Option Explicit..Dim WShell..Dim SFileSystem..Dim WEnvironment..Dim Members..Dim i..Dim bFind..Dim SystemRootFolder..Dim UnInstallPath....Set WShell = CreateObject("WScript.Shell")..Set SFileSystem= CreateObject("Scripting.FileSystemObject")..Set WEnvironment = WShell.Environment("System")....'''''''''''''''''''''''''''''''''''''''''''''''''..' ...W.X.g......V.X.e.....[.g.t.H..._.........SystemRootFolder = WShell.RegRead("HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\SERVER_DLLS")......Members = Split (WEnvironment.Item("PATH"), ";")..bFind = false..UnInstallPath = vbNull..For i = LBound(Members) To UBound(Members)..'.WScript.Echo Members(i).. If StrComp (Members(i), SystemRootFolder ) = 0 Then..'.WScript.Echo "...."...bFind = true.. Else...If UnInstallPath = vbNull Then... UnInstallPath = Members(i)...Else... UnInstallPath = UnInstallPath & ";" & Members(i)...End If.. End If ..Next....If bFind = true Then..' WScript.Echo "...............
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):528
          Entropy (8bit):4.64282523445514
          Encrypted:false
          SSDEEP:6:/kHu7uNhRzj/s3FWnbnLNS6GFNAFS6W5x4fLVUaxJpeOzUKzq56KfsL/:/osuNhsW1dm95xUx9zBCfsL/
          MD5:5D2853DD89B04C09F6AFC0E0307FF7D4
          SHA1:414E14F1829A0F894E16FF25BF93432F32C33819
          SHA-256:A42744B020EFBB0D3DA88773434EE28920AC76A2D5946D8A76EF3BCA0B55A008
          SHA-512:0D6F905531BD425BA937F077EBB6AD340878CE1D542819799CB9AD601608B0BCF63BA3F0A582F825B43637B0FAA8EF57069270DB1BFFD52562AAE53644336999
          Malicious:false
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM create latest backup..REM ------------------------------------------------------------..rmdir /S /Q ..\_latest..mkdir ..\_latest....REM ** copy previous to latest (make a state with files)..xcopy /E /Y ..\_previous ..\_latest....REM ** copy current to latest (only existing files)..xcopy /E /Y /U ..\dlls ..\_latest\dlls..xcopy /E /Y /U ..\server ..\_latest\server..xcopy /E /Y /U ..\Viewer ..\_latest\Viewer....exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):230
          Entropy (8bit):3.3099117792814483
          Encrypted:false
          SSDEEP:3:/qQK2gupgw9xuvn1afugAG/s3tbadbNnLAdN:/kHu7uN5gj/s3FWnLAdN
          MD5:E7BF3257C2B7ED8755A28FA49224AC46
          SHA1:50BB3B8C7A5F2E12203675C8CE9431D5F88AB053
          SHA-256:9CA952C86AC13AE709F56191B29978A91A88A78FD98CE62F7BB0AA747A9D1BB6
          SHA-512:C682D05786C0C5FD9CCAC38D6E7E6036F8956C56D3D6940C6E80AB9D11FBE0D301BE2B68F7F9C66200603432D095568FE6692557AC98AD449D811C47601EDE1B
          Malicious:false
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM delete latest backup..REM ------------------------------------------------------------..rmdir /S /Q ..\_latest....exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):200
          Entropy (8bit):4.317983857336911
          Encrypted:false
          SSDEEP:6:w5EMJNxMGOyXFrW5WZMcEWcycFIvA1GqVJMwZVMpTsnkJIJ+1S2Vcl:w5EMXxXOyVrW5WZMcE1y0IcqTskG4Sfl
          MD5:B18579A6A1D73835A638971F351140B4
          SHA1:A84E29B48083B075FC6BC2B9E1F9700E648BE84B
          SHA-256:4DF3F8E341004A4A4B06DC2C1189ADF2969AF231DD4DB667E2235C83A8968E38
          SHA-512:9CD8D28DECAF505826B074FDF5EF41172389DE0C93A8974714DA562CAED9AB3506A2643B9C6769C0FD6C698B1786C87347CB6C7D725CBBB9B0405756A653C525
          Malicious:false
          Preview:It failed in allocating a memory necessary for the running...Please allocate an empty memory by the method such as quit other applications..or increasing a physical memory, and restart Live Player V5.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):210
          Entropy (8bit):4.305809813655651
          Encrypted:false
          SSDEEP:6:w5EMJNxMGOyXFrW5WZMcEWcycFIvA1GqVJMwTQTsnkJIJ+1Sq+s:w5EMXxXOyVrW5WZMcE1y0I3TskG4Sq
          MD5:446D5EA4B21086BCB46122F2BA5C1854
          SHA1:326D0FB4592676825418DFCAEBD531D72A99E6EC
          SHA-256:38BF8519390E5F6D4832726B02BD8E58427AFBFE2D625AEB42EECCECEE534B2A
          SHA-512:8AF339E820CEC3A1CF88DC6DFA2ED4A23C8666A0C5B425DE6641BE2B0BE76027F25495774E0EC2ABDFED586DC65B08B7ED2691F25DD1FA0A8592178E19F9FD13
          Malicious:false
          Preview:It failed in allocating a memory necessary for the running...Please allocate an empty memory by the method such as quit other applications ..or increasing a physical memory, and restart VDR Maintenance Viewer.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):145
          Entropy (8bit):4.460399365244328
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIXV5GQ9rAXVgKuJCVLOQFJEmKxUL4:S0+zIWXHblkHSXcCVxP4
          MD5:BE816084311BB68552900A9342B6CF6B
          SHA1:209167C831134C9FB593CC248C823048492E654D
          SHA-256:36D7B2270E4FD3FC3F6E32089929D854425044D12B501649FC82A63BC70E5114
          SHA-512:FDAEE278AEC06C1BF1BD17CBE0EAF813C45D8FAA071A8E1BD2999591064F0FBE8E022F0FCBDDEF4E374112D4507B9D14F6F5CB01E1ACDC45DB5AF3A992DAF1AD
          Malicious:false
          Preview:Error occurred during starting up, because JRE version is invalid...(Supported JRE version is 1.7 or later)..Please install a JRE later than 1.7.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):145
          Entropy (8bit):4.460399365244328
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIXV5GQ9rAXVgKuJCVLOQFJEmKxUL4:S0+zIWXHblkHSXcCVxP4
          MD5:BE816084311BB68552900A9342B6CF6B
          SHA1:209167C831134C9FB593CC248C823048492E654D
          SHA-256:36D7B2270E4FD3FC3F6E32089929D854425044D12B501649FC82A63BC70E5114
          SHA-512:FDAEE278AEC06C1BF1BD17CBE0EAF813C45D8FAA071A8E1BD2999591064F0FBE8E022F0FCBDDEF4E374112D4507B9D14F6F5CB01E1ACDC45DB5AF3A992DAF1AD
          Malicious:false
          Preview:Error occurred during starting up, because JRE version is invalid...(Supported JRE version is 1.7 or later)..Please install a JRE later than 1.7.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):147
          Entropy (8bit):4.54641866126203
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIW3RhgOBLZlX7ERMDDV3xEc0oJCVLOQLn:S0+zIWXHbleOBLZhbCcRYVxL
          MD5:913E80B4EDE93D8F437DE6722E16CC68
          SHA1:858CEA17D3659B3F6D7891597462542516DB7535
          SHA-256:021E6E83FA416330B0A951C530FCC9560C2427A1BBAA7604376AC529C048D0B9
          SHA-512:6ECC9D93A1CA1AD62F6561BD8015FB0F7B209765534940DF8112B0FDD979A9472B6457EFB66C0933F2582A55C46D4DB888D662E96D4E72A447496640575509CE
          Malicious:false
          Preview:Error occurred during starting up, because JRE has not installed...("JRE" is foundation software to start up Live Player V5)..Please install a JRE.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):155
          Entropy (8bit):4.489934819189806
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIW3RhgOBLZlX7ERMDDV/dA0y1JCVLOQLn:S0+zIWXHbleOBLZhjdD+CVxL
          MD5:982FCEFC9B84EFEF75FB81B7B7DB2E1B
          SHA1:2B2507AAF509883B764B36A41B65742A03B35E6F
          SHA-256:3F89F3B895CE6404B23AC134F5BAF3BFE743D5AF01208A21A1AB006C7FF646CD
          SHA-512:46A3344E011DFE49B1DB9ECC4F75399823D0C6D9E9879163B48A93ECDC46F4E7D172170F2A376600AF8639FA7BA23BB5E667335228FF880A3C9240D80283877A
          Malicious:false
          Preview:Error occurred during starting up, because JRE has not installed...("JRE" is foundation software to start up VDR Maintenance Viewer)..Please install a JRE.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):486
          Entropy (8bit):4.9144007171521285
          Encrypted:false
          SSDEEP:12:StpqbvWdwb24BURBSCPfl0Dxb//foKHBz4nKgs0g3aHrqms0g3aHAW:cqbASuT10t5HFd3M43MH
          MD5:8F64CDE5953656472AF7DBABEB328126
          SHA1:89BB49EB6815590D0FC84E7CD05059B9E926EF92
          SHA-256:9D16AE3A0B161CB9800959BB853B380F49639D8DB9BC64AEB53D602AA01E0B38
          SHA-512:A1B2F75F4385A06815C836E03DD052EDFD82F1500105A0D25E925012D15878DFC22A170F53890D43E068710FF495B2983F01E7CB6DED203B3D4337C81B52B29D
          Malicious:false
          Preview:Option Explicit..Dim fs, su, suStr..Set fs = WScript.CreateObject("Scripting.FileSystemObject")....On Error Resume Next..Set su = fs.OpenTextFile(WScript.Arguments.Item( 0 ))..If Err.Number = 0 Then.. Err.Clear.. suStr = su.ReadAll.. If Err.Number = 0 Then....MsgBox suStr,16,WScript.Arguments.Item( 1 ).. Else....MsgBox "Error occurred during proccessing.", 16, "Error".. End If.. su.Close..Else.. MsgBox "Error occurred during proccessing.", 16, "Error"..End If..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1658
          Entropy (8bit):4.656577064794492
          Encrypted:false
          SSDEEP:48:g7fwCCPbpS6cXksPB6gOQnacDxKkgtAJX2JJI1X23AfkBKJR+aRUi:7V6ksPkrQac4kgtAJX6JI1X8AfkMJR+q
          MD5:D32142014DD9E5C0628644B0D05622EF
          SHA1:6F0109D3C995D1708DA67BD1C125932C9615D284
          SHA-256:0519593353B968F7F634ABBA6211B445074322F2344FEF05AF147BA964F883DB
          SHA-512:D50C5A89FD5D4A55661D07A0BA99DE11E99F23A1F04E91929A0AF504E6427D183BC227166A4649A310031784ECEED2877A2658768BABE98341BFA2106B997920
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var StationType;..var TypeOfShipAndCargoType;..var Spare2;..var Tx_RxMode;..var ReportingInterval;..var QuietTime;..var Spare3;....MessageId = ubin(#bin,0,6);..if (MessageId == 23){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. Longitude1 = bin(#bin,40,18);.. Latitude1 = bin(#bin,58,17);.. Longitude2 = bin(#bin,75,18);.. Latitude2 = bin(#bin,93,17);.. StationType = ubin(#bin,110,4);.. TypeOfShipAndCargoType = ubin(#bin,114,8);.. Spare2 = ubin(#bin,122,22);.. Tx_RxMode = ubin(#bin,144,2);.. ReportingInterval = ubin(#bin,146,4)
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1756
          Entropy (8bit):4.653299811783491
          Encrypted:false
          SSDEEP:48:gAK6eaSYL8DxKYeFvbzl08DxKYeFvfETmTGxk8kFE:RK6ea38YYeFvbzu8YYeFvfETmyxk8kFE
          MD5:BEB8FCC7DD17D0FC0B937F5D3E355CD7
          SHA1:D15EBCBBD1E6E012FC3AC2D4F1B8BC8540D45E80
          SHA-256:91E77A991C86BD026871E7EA6091FFD149625F381709811360FEA032E9840EE3
          SHA-512:016705DD0D7394DD71945FEDAEBA2E9974BD74ED5D602D591AA33D12115E8BDD1158FE32E4DB7C055C634FE20248AEDE76D3EA100DF0B7BF4D3A70545E532332
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var PartNumber;....var Name;....var TypeOfShipAndCargoType;..var VendorID;..var CallSign;..var Dimension_ReferenceForPosition;..var ManufacturerID;..var UnitModelCode;..var UnitSerialNumber;....MessageId = ubin(#bin,0,6);....if (MessageId == 24){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. PartNumber = ubin(#bin,38,2);.... if (PartNumber == 0){.. Name = str(#bin,40,120);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PartNumber", PartNumber);.. map("Name", Name);.. }.. else if (PartNumber == 1){.. TypeOfShipAndCargoType = ubin(#bin,40,8);.. VendorID = str(#bin,48,42);.. CallSign = str(#bin,90,42);.. Dimension_R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1942
          Entropy (8bit):4.944196219842957
          Encrypted:false
          SSDEEP:48:g7J1Rh2Nz4ODxUWJ6fCVrODxUWJ6fuoLJlODxUWJ6fgJQ/VMODxUWJ6fgJQq:T4OaWQ2rOaWQ1lOaWQgEMOaWQgD
          MD5:6CBAFD95C614454E3B8E372817EE3FDA
          SHA1:51324E5242866262673C2B6A7F2B1C313EB0401B
          SHA-256:CA3190EC432D04CE92A9F13F238484221F401061BEC8FAED4348AA3C8508EFEA
          SHA-512:0FD452A0A627928CE8B1328E1091FBF822D74E552F81102399D7FF34E4B2D1FD10E521D8FE3E887C808C114746C93DC5CBB28A6F4F630C8900F30EBA5A620DCD
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;......MessageId = ubin(#bin,0,6);..if (MessageId == 25){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.....if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =....strHex(#bin,40,128);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);.... map("BinaryDataFlag", BinaryDataFlag);.....map("BinaryData", BinaryData);....}....else if (BinaryDataFlag == 1) {.....BinaryData =....strHex(#bin,40,112);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):6530
          Entropy (8bit):5.1615921348542635
          Encrypted:false
          SSDEEP:192:kfc4kGCAwx+XxqL1x+mxeB7wx+XxkL1x+mxC:wc4kG7d
          MD5:83FA3A2040435251FE10CF541AAAED24
          SHA1:DDAAB923834F825EB10E58408DE42FC793D3AB41
          SHA-256:31088D56EC40EA27E13DBB1252228B1B2C0BD80EEFEE23900F1E7855B0FA3332
          SHA-512:5DC3F093BE941DFBF62C8BBC79AFA95762E3D24C6F7272263B424A6E8D3CDD9C41BC6E748C0E493E42A738210084EFE7A36663E56CB10CD7BF637E4B1841D9D5
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;..var BinaryDataAddedBy2ndSlot;..var BinaryDataAddedBy3rdSlot;..var BinaryDataAddedBy4thSlot;..var BinaryDataAddedBy5thSlot;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;......MessageId = ubin(#bin,0,6);..if (MessageId == 26){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("DestinationIndicator", DestinationIndicator);.. map("BinaryDataFlag", BinaryDataFlag);.... ...if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =......strHex(#bin,40,108);.....BinaryDataAddedBy2ndSl
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1159
          Entropy (8bit):5.206059151715646
          Encrypted:false
          SSDEEP:24:gM8XoGnkD+3v+8mu+YOHZJLNKicOsxK4YbgLaaRDTX2zEk0i:go8MHZvHcDxK4Y0+STX2zEk0i
          MD5:49C18CBF5D067407D73FEC29DA1D2014
          SHA1:72BCF26A725B923E0717D71D703357E368BAADE8
          SHA-256:6037FD2028119CC82B40116AFE7077841D9C21DC257AB4B385BDD3DACA81E7B6
          SHA-512:9BAAAD149EFB3B0F01854DF7FFC51E5C9543FAA449554DB2D96B8DCF6AF2A389E77824DBF248C0DFC925CB585AD0B0086E9AC6EF1F40CA59F19294D0FCEC59E2
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var PositionAccuracy;..var RAIM_flag;..var NavigationalStatus;..var Longitude;..var Latitude;..var SOG;..var COG;..var StatusOfCurrentGNSSPosition;..var Spare;......MessageId = ubin(#bin,0,6);..if (MessageId == 27){...RepeatIndicator =....ubin(#bin,6,2);...UserID =......ubin(#bin,8,30);...PositionAccuracy = ....ubin(#bin,38,1);...RAIM_flag = .....ubin(#bin,39,1);...NavigationalStatus = ...ubin(#bin,40,4);...Longitude = .....bin(#bin,44,18);...Latitude = ......bin(#bin,62,17);...SOG = .......ubin(#bin,79,6);...COG = .......ubin(#bin,85,9);...StatusOfCurrentGNSSPosition = .ubin(#bin,94,1);.. Spare =.......ubin(#bin,95,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PositionAccuracy", PositionAccuracy);.. map("RAIM_flag", RAIM_flag);.. map("NavigationalStatus", NavigationalStatus);.. map("Longitude", Longitude);.. map("Latitud
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3805
          Entropy (8bit):4.611276851317889
          Encrypted:false
          SSDEEP:96:8TWfTcP0xdBIx16c44+8EYSTX0kxuw8c0MxdXBmNvcP0xdBIxbVxc44+8EYSTX02:W6n2xIc44+8EYSTX0kUw8c0MxdAd2xTl
          MD5:FB828325901EDFDA51D2D6CFBC7E579A
          SHA1:857758D7AE99B8BAF71BE50619C2F2539BCA8E97
          SHA-256:93320F89392E46FB99D1E68D6B3973B50CB6288CB8C657018D61B8872C0FF310
          SHA-512:7BA29D5397DF04099AA91CF62B11B6E2DB2EF07E0EBDDFBDF5190DD290075991C71572F1817376EB5324673079D34F320EDD8B190EEEB973B890108DA0DD7DEC
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var NavigationalStatus;..var RateOfTurn;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var SpecialManoeuvreIndicator;..var Spare;..var RAIM_flag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 1 ||.. MessageId == 2){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. NavigationalStatus = ubin(#bin,38,4);.. RateOfTurn = bin(#bin,42,8);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TrueHeading =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2270
          Entropy (8bit):4.808604794064066
          Encrypted:false
          SSDEEP:48:gfo/v+2LZlUSYjt0hJ2cuyopDfkvLcDxK4s8ikMp2MB9hiYSTX2z5ihTxs28s2By:HtLZlUl0h4cux16c44s8ikMp2MbgYSTL
          MD5:A1D955F86AF7F9DFB8181637A6F190E5
          SHA1:5C1BEFFE36E0AEFAC0E04C00547F9CC9F0A47E9B
          SHA-256:4AF3F2DB153A21F033070AAFB8CA9BFDD271B9A7F9F6DC5FD6AD2866B668D245
          SHA-512:8BF98FC5EE65B830B2CAD718BEB2983F19F6E540E8891CD12EB9AC90961A5B9B4ADC1FE8D07A00FA442CFFDD38BD8E7A27BBD8198F7521486D2029B61A69D8A7
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var UTCYear;..var UTCMonth;..var UTCDay;..var UTCHour;..var UTCMinute;..var UTCSecond;..var PositionAccuracy;..var Longitude;..var Latitude;..var TypeOfElectronicPositionFixingDevice;..var TransmissionControlForLongrangeBroadcastMessage;..var Spare;..var RAIM_flag;..var SyncState;..var SlotTime_Out;..var SubMessage;....MessageId = ubin(#bin,0,6);..if (MessageId == 4 ||.. MessageId == 11){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. UTCYear = ubin(#bin,38,14);.. UTCMonth = ubin(#bin,52,4);.. UTCDay = ubin(#bin,56,5);.. UTCHour = ubin(#bin,61,5);.. UTCMinute = ubin(#bin,66,6);.. UTCSecond = ubin(#bin,72,6);.. PositionAccuracy = ubin(#bin,78,1);.. Longitude =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1838
          Entropy (8bit):4.853870663306694
          Encrypted:false
          SSDEEP:48:gYIJPSYIIFRNWcDxK4c+F/TGyfkM5ihTE34JNoYi:xI9PzEc44c+F/yyfkM5ihTEoMYi
          MD5:02F63704CA632C50D822FAF180EFCD6D
          SHA1:B7422C9D1901B320C4BFDD9B030F3F3ABA4FD9A0
          SHA-256:F0E63E4ADDF7B88234A05D3885D30BA935867E6E062E6353F91D3E8075530512
          SHA-512:4354FE2B5012EF1E43D03E98A82C943450AB1325FF7282E619475138D15A61A5AEE3074F0AB9933C74EBF6E078229FAE8A9879E5C46F6D8D8ADC63A07B3AE0DA
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var AISVersionIndicator;..var IMONumber;..var CallSign;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var ETA;..var MaximumPresentStaticDraught;..var Destination;..var DTE;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 5){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. AISVersionIndicator = ubin(#bin,38,2);.. IMONumber = ubin(#bin,40,30);.. CallSign = str(#bin,70,42);.. Name = str(#bin,112,120);.. TypeOfShipAndCargoType = ubin(#bin,232,8);.. Dimension_ReferenceForPosition = ubin(#bin,240,30);.. TypeOfElectronicPositionFixingDevice = ubin(#bin,270,4);.. ETA = ubin(#bin,274,20);.. MaximumPresentStaticDraught = ubin(#bin
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1435
          Entropy (8bit):4.733545938429769
          Encrypted:false
          SSDEEP:24:gMiHrGpW+5HAGm516G/dBS6z4NWr5I6NQcOsxKkLvaF/JQ3acIDYT/WV6x6aF/3y:g7LQHf+S6z4Er5dOcDxKkLvaF/JQ3acA
          MD5:EBB74D32511FC192E9515B34BDE27BCF
          SHA1:B30B8F09959AE516993B1A91A9B39D73A5059E8B
          SHA-256:A1110A7CA10FAA20FA25FF05C5094CE00258F2951C77AD55111BA6EC241BEB9B
          SHA-512:F6C3F5687F6C849F74AD5A6D18BB13DC02D77D4B89F198E86763113C1ED65F63DFC673891FD0FF769164D61CD7F8C74A2E5EB8B8660D41ED0069CC8D241EF7B8
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 6 ){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. DAC = ubin(#bin,72,10);.. FunctionIdentifier = ubin(#bin,82,6);.. AcknowledgedRequiredFlag = ubin(#bin,88,1);.. TextSequenceNumber = ubin(#bin,89,11);.. ApplicationData = str(#bin,100,906);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndic
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1515
          Entropy (8bit):4.698432684936653
          Encrypted:false
          SSDEEP:24:gMiHHpyVrZVpVrGzpyrRpLr5CBS6DSW2jKktI+xXgLfcOsxKkcJ/qLo7JyRLnYJx:g7pq1RIgDfkS6Dl2jdtI+xXgLfcDxKk6
          MD5:0D164D701ED7031A70593F2654DC0A31
          SHA1:DA5EDBF15FE4F07C29425F0BF45ECF62CB874C78
          SHA-256:E7C741C774C132F2DC691EB54C23C9786F721508676B2DCFF65F56924B5AF49C
          SHA-512:4A7F5E9726E3152B3AB6B16D4925F9D751F1FF0EE7157EC96709D184B919C910DE58875B99933EB5E4482049530FCF9D66B35ABC32FE45E6CAE7A72BE3B95FCD
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DestinationID1;..var SequenceNumberForID1;..var DestinationID2;..var SequenceNumberForID2;..var DestinationID3;..var SequenceNumberForID3;..var DestinationID4;..var SequenceNumberForID4;....MessageId = ubin(#bin,0,6);..if (MessageId == 7 ||.. MessageId == 13){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. SequenceNumberForID1 = ubin(#bin,70,2);.. DestinationID2 = ubin(#bin,72,30);.. SequenceNumberForID2 = ubin(#bin,102,2);.. DestinationID3 = ubin(#bin,104,30);.. SequenceNumberForID3 = ubin(#bin,134,2);.. DestinationID4 = ubin(#bin,136,30);.. SequenceNumberForID4 = ubin(#bin,166,2);.... map("MessageId", Messa
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1082
          Entropy (8bit):4.755640824837969
          Encrypted:false
          SSDEEP:24:gMiHHAGm516G/IS64MyWMe6ncOsxKkcIDYT/WV6x6aF/3y:g7NflS6zyWqncDxKkcIDk/W4EaF/3y
          MD5:8DFD0E9E102C6545B0EEEF75FB84C533
          SHA1:67CE065E9AE30CDE1EFF24B81E035914B2392D81
          SHA-256:8479E9D60F5BA54DE40E609F2315F1B125ADCB8C9A325B875AD14E71391B7910
          SHA-512:ACD1414C7FF670AEAF560AE55AB6871D0E310B8E2DA823AC90229E39ACD5795081D3A1734151161545E44FDBA76F9BBE2BC084EA75BDF422126D9F769AB66819
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 8 ){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DAC = ubin(#bin,40,10);.. FunctionIdentifier = ubin(#bin,50,6); .. AcknowledgedRequiredFlag = ubin(#bin,56,1);.. TextSequenceNumber = ubin(#bin,57,11);.. ApplicationData = str(#bin,68,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("DAC", DAC);.. map("FunctionIdentifier", FunctionIdentifier);.. map("AcknowledgedRequiredFlag", AcknowledgedRequiredFlag);.. map("TextSequen
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2684
          Entropy (8bit):4.630450415113706
          Encrypted:false
          SSDEEP:48:gEAxbZXSYMtdBhRDttcDxK4YEYSTX2zkwuJYu0O0fyoUvyMxtXBmNSFTyoUSi6MW:2xbZXudBhRDttc44YEYSTX0kwuJYu0OT
          MD5:7C6D3706CF486BC3A68D0F9E6876CB8E
          SHA1:A16C9B5403495221DC78AA6068ED8F68A1A2C300
          SHA-256:67B60CF4A60AD08CE16DB988D7C0569C84D992FF0FDE707F5B5BEEB0033B062C
          SHA-512:64440A3139D8E8BB6507AB49C8DEDA87233302F802A580D3C8C62EA8511E16DCD72A3A8FBC24A54909604D2B51A3C6C772E2769BD4774784CC1128BCD7016A01
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var Altitude_GNSS;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TimeStamp;..var AltitudeSensor;..var Spare;..var DTE;..var AssignedModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 9){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. Altitude_GNSS = ubin(#bin,38,12);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TimeStamp = ubin(#bin,128,6);.. AltitudeSensor =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):668
          Entropy (8bit):4.488552652178458
          Encrypted:false
          SSDEEP:12:TK31xMiHUpW+SAuSsPzcV5NWJP1cX+sx8/k1iJW51JBKV:gMiHUpW+SfS6c7NWJP1cOsxKkgJQ3BKV
          MD5:CEB1D9852B3CE681B48BE3F31CDA2661
          SHA1:3CD95E79245A2D6D7F05036A4E0FB9D9F4876191
          SHA-256:5FE3505C1167FA704A5A5942F721807E4ABFE5F0CF43C51AC1DDFB444E8567D6
          SHA-512:E06D92A490C304025264E77771A5FF61BFC44734628B86080764D84F518881020107F5AE5B7DA28547C2C6A284C908A402631B85FB7D5ADF7FE41DB59F31B666
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 10){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. Spare2 = ubin(#bin,70,2);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationID", DestinationID);.. map("Spare2", Spare2);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):939
          Entropy (8bit):4.671076875893976
          Encrypted:false
          SSDEEP:24:gMiHrGpW+5HX9S6z4NWrvScOsxKkLvaF/JQ3acDz3i:g7LQd9S6z4ErvScDxKkLvaF/JQ3acDzy
          MD5:73496C60D3431A20685EDDE4FBD88748
          SHA1:1F04A3E7FE04A57A8D508DB7E0AF167171CBBC74
          SHA-256:F1AFE5FA585384C9A609345ECA1CA7FF4C3E32FB1AB8AC3E8098792DEFDE7B3F
          SHA-512:A8E17CF73160A99276A40C925615ABE8F2E4765DF859683AEB352A59A347B1B16A2F41AB67DD44462DEFCD2E13E14A6CE5C0704FFC0191BD3BAA44AD8B623DE0
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 12){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. SafetyRelatedText = str(#bin,72,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("SequenceNumber", SequenceNumber);.. map("DestinationID", DestinationID);.. map("RetransmitFlag", RetransmitFlag);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):581
          Entropy (8bit):4.6431236091809724
          Encrypted:false
          SSDEEP:12:TK31xMiHu+yEFpSsPzsEbKcX+sx8/kcDDaESEM9:gMiHHXFpS6lbKcOsxKkcDz3i
          MD5:A28F2261023D79C75CCC9E5D8B69219F
          SHA1:E899D7CACCAE32DE98672A562D186E4F797D6DF5
          SHA-256:3A006C6F9E484EE9FB6E2E7CC515C5FD05A16C33E7915CAB069FED4E4299E4D4
          SHA-512:4A847D84EE2622FD463C17E049D0B6344EB6C25C83494D1378EB77A19421CC62862A9EBC8941B1F58D4D4B1DC667AD32DEF6C6F821FE8E8E3D3C93B2935DAC90
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 14){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. SafetyRelatedText = str(#bin,40,966);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1685
          Entropy (8bit):4.582404421318364
          Encrypted:false
          SSDEEP:48:g7GuSPGS6c7lh9YtVBcDxKkgJ/q2kBKJkEcJyR80/g:QXBc4kgc2kMJkEcy80/g
          MD5:AEC39D3C44EF9A4AD85EAF88B3BC0AE4
          SHA1:E58692F76F4A77D30F2DE391F6E7C83127966A5A
          SHA-256:0C48F29A146F847A20B3EF8229D792A667B1CAACB76E918863BFB8ED2C084982
          SHA-512:E2CFABF3DC560A478EC50217DE1FEF8A89BE7CD5EFF4B62FF092C592E3DBC2BC2E0CA811F6AE403B65FFD221838086E83D9EED2985F0209D5C27CD5BA683915C
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID1;..var MessageID1_1;..var SlotOffset1_1;..var Spare2;..var MessageID1_2;..var SlotOffset1_2;..var Spare3;..var DestinationID2;..var MessageID2_1;..var SlotOffset2_1;..var Spare4;....MessageId = ubin(#bin,0,6);..if (MessageId == 15){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. MessageID1_1 = ubin(#bin,70,6);.. SlotOffset1_1 = ubin(#bin,76,12);.. Spare2 = ubin(#bin,88,2);.. MessageID1_2 = ubin(#bin,90,6);.. SlotOffset1_2 = ubin(#bin,96,12);.. Spare3 = ubin(#bin,108,2);.. DestinationID2 = ubin(#bin,110,30);.. MessageID2_1 = ubin(#bin,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1213
          Entropy (8bit):4.497603067977456
          Encrypted:false
          SSDEEP:24:gMiHUpcyOpS6067SFS6c7CWn5k8C/cOsxKkgJvasQFJiBgeBKV:g7Gm+pFS6c7Vn5TC/cDxKkgJvasQFJi0
          MD5:F1966811115749C980CFB828B6A4AC80
          SHA1:C8984EC1925F7978D26AAB2F4E8CD3FD6DD3F4C8
          SHA-256:78B25ACB86E64B319EE08B74A73CD5BAC8B1266C84DE9B0C618EC4D46400F852
          SHA-512:156583344A3C172B3F4963FA06EA147707929C8353CC592B21464421F75C7A35E125A48D21DB3F7360AFE81CCE3484D16E3D9C42B2E0620688DA31811FC3120B
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationIDA;..var OffsetA;..var IncrementA;..var DestinationIDB;..var OffsetB;..var IncrementB;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 16){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationIDA = ubin(#bin,40,30);.. OffsetA = ubin(#bin,70,12);.. IncrementA = ubin(#bin,82,10);.. DestinationIDB = ubin(#bin,92,30);.. OffsetB = ubin(#bin,122,12);.. IncrementB = ubin(#bin,134,10);.. Spare2 = ubin(#bin,144,4);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationIDA", DestinationI
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4969
          Entropy (8bit):4.620754023544724
          Encrypted:false
          SSDEEP:96:MdhXTQRgAbc4kgSTX0MJ4cGJLvaF/sVucik2kqc2cPE4TQQcgcIMoQcEQ/okswgS:M4aYc4kgSTX0i4cGJLvaJswcik2kqc2y
          MD5:0B5E6497C3FD19E9C225DD1F17CA61A4
          SHA1:019383E0EEFFA13E92F6BD8202A16D1E1BB77F95
          SHA-256:41FD761636E41A962EC81481CCC7BD0497ED57425920D79F9DBB9F0C1CE66C8B
          SHA-512:9F93F732D6A7F55614664E68EEAF482541F8FA93C42C645008FE8180B67A58C53DBAEC460779B755D502ADC8692C0E78F4D928977E7E237B8C926EF242B8B6C7
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude;..var Latitude;..var Spare2;..var MessageType;..var StationID;..var ZCount;..var SequenceNumber;..var N;..var Health;..var DGNSSDataWord1;..var DGNSSDataWord2;..var DGNSSDataWord3;..var DGNSSDataWord4;..var DGNSSDataWord5;..var DGNSSDataWord6;..var DGNSSDataWord7;..var DGNSSDataWord8;..var DGNSSDataWord9;..var DGNSSDataWord10;..var DGNSSDataWord11;..var DGNSSDataWord12;..var DGNSSDataWord13;..var DGNSSDataWord14;..var DGNSSDataWord15;..var DGNSSDataWord16;..var DGNSSDataWord17;..var DGNSSDataWord18;..var DGNSSDataWord19;..var DGNSSDataWord20;..var DGNSSDataWord21;..var DGNSSDataWord22;..var DGNSSDataWord23;..var DGNSSDataWord24;..var DGNSSDataWord25;..var DGNSSDataWord26;..var DGNSSDataWord27;..var DGNSSDataWord28;..var DGNSSDataWord29;....MessageId = ubin(#bin,0,6);..if (MessageId == 17){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ub
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):5586
          Entropy (8bit):4.639847403164306
          Encrypted:false
          SSDEEP:96:882eWJa8sIwyrJxla8YYXcvk4SDXUExuQdcvUmG8sOtUMMxtXBmNE8sIwyrJxr4o:8FepnyrJxY8YYXcvk4SDXUE0QdcvUmGS
          MD5:A800676ACE24CC656B3012AA31519226
          SHA1:7FA9DBB6BE0A959B84E7BA5FB6EA4CB8B4903946
          SHA-256:D3C4C79BBD7D429B97459CCC3A7F956CD9B50D27E937746F85C4ADBD3F2FE7ED
          SHA-512:8463A21491ED0B44D583DD7685D3B39BF24727DCED9B903918B92CE8728BDA8623C444E863880DB2DD363B175332F29E98F904DD7F5DEFEC0CE2614D6A5A501C
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var ClassB_UnitFlag;..var ClassB_DisplayFlag;..var ClassB_DSCFlag;..var ClassB_BandFlag;..var ClassB_Message22Flag;..var ModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);....if (MessageId == 18){.. CommunicationStateSelectorFlag = ubin(#bin,148,1);.. if (CommunicationStateSelectorFlag == 0){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2373
          Entropy (8bit):4.890773121214861
          Encrypted:false
          SSDEEP:48:gy0TA26InQSY4t0f0sIVxmyZVjsNcDxK4I0/0/EYSTX2zkxQBwdc/yfkM5ihT0YM:8826InQsqMsoxmyZVANc44Xc/EYSTX00
          MD5:AF38DCCA9DA67BE2101A1A1D242EDD3D
          SHA1:C3B003134DAFA46025E1701912749CC865664198
          SHA-256:A66FC035B313B7CF3AF1F2195D8A07AC342571D5642A47588A42B0DF32091351
          SHA-512:2861FB240EA10F75F026F963F2564E36B7ABFA9B9629E41BEE642F6DA1F3187C41F42842EAF0F6EA731197D7E84C666809B4D5456DD416B1F54E21EB01F254E1
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var RAIM_flag;..var DTE;..var AssignedModeFlag;....MessageId = ubin(#bin,0,6);..if (MessageId == 19){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy = ubin(#bin,56,1);.. Longitude = bin(#bin,57,28);.. Latitude = bin(#bin,85,27);.. COG = ubin(#bin,112,12);.. TrueHeading = ubin(#bin,124,9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2388
          Entropy (8bit):4.595677246392144
          Encrypted:false
          SSDEEP:48:g7yTG4T0eS6cnBRn9ovG+64bcDxKcgAclek8Zk4H1+40ro0cKiHSBKV:7TrTruBfMG+Rc4cgAclek8Zk4H1+40r4
          MD5:39832F29DDF54ED5059462922C4FDE5E
          SHA1:00F8777F4245EAFCB7F9ED04FC1F582CA143F931
          SHA-256:8DE6916A690FEFA550B5DDB020F2563BEDEE3FE4F7D6C64F68B45473B54E5D4F
          SHA-512:7641DE369F3C6A184093F1E4C45F37FEF1C3EF5B6EAD896E079150906498604A03C38B2F2E8BE26A01491E9903E8D697CD0F776F3F8D217DDE8B6BB5098C32A2
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceStationID;..var Spare1;..var OffsetNumber1;..var NumberOfSlots1;..var Time_Out1;..var Increment1;..var OffsetNumber2;..var NumberOfSlots2;..var Time_Out2;..var Increment2;..var OffsetNumber3;..var NumberOfSlots3;..var Time_Out3;..var Increment3;..var OffsetNumber4;..var NumberOfSlots4;..var Time_Out4;..var Increment4;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 20){.... RepeatIndicator = ubin(#bin,6,2);.. SourceStationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. OffsetNumber1 = ubin(#bin,40,12);.. NumberOfSlots1 = ubin(#bin,52,4);.. Time_Out1 = ubin(#bin,56,3);.. Increment1 = ubin(#bin,59,11);.. OffsetNumber2 = ubin(#bin,70,12);.. NumberOfSlots2 = ubin(#bin,82,4);.. Time_Out2 = ubin(
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2389
          Entropy (8bit):4.964166837499702
          Encrypted:false
          SSDEEP:48:gbl8K0/iBSBrJ52aOt0+uKTcDxKKa4+XgYSTX2zM5ihTwrYI0/0/0Tgu0Oa:nJ/iB+J52aOq+uKTc4Ka4+XgYSTX0M5n
          MD5:72BFCDBC7EA7B24D02FDA64464E0002F
          SHA1:2FA21ABA2D8B137F63E0AC2048E4AB780370A3CF
          SHA-256:AA8690C692294B7B1AC7328FE556185DB3916FD14D9ECCB63ADB1565DF7E6041
          SHA-512:8A5E63A1D49FCE018DF4B70CC83F4AFEAA2110B6EBEF2723C564E0FD860740422258C6AAAB0913388B624F617B57867C0BD45A5D3A0806E07B7A101AB69E598B
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var ID;..var TypeOfAids_To_Navigation;..var NameOfAids_To_Navigation;..var PositionAccuracy;..var Longitude;..var Latitude;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var TimeStamp;..var Off_PositionIndicator;..var ReservedForRegionalOrLocalApplications;..var RAIM_flag;..var Virtual_AtoN_flag;..var AssignedModeFlag;..var NameOfAidToNavigationExtension;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 21){.... RepeatIndicator = ubin(#bin,6,2);.. ID = ubin(#bin,8,30);.. TypeOfAids_To_Navigation = ubin(#bin,38,5);.. NameOfAids_To_Navigation = str(#bin,43,120);.. PositionAccuracy = ubin(#bin,163,1);.. Longitude = bin(#bin,164,28);.. Latitude = bin(#bin,192,27);.. Dimension_ReferenceForPosition = ubin(#bin,219,30);.. TypeOfElectronicPositionFixi
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1979
          Entropy (8bit):4.694496363970113
          Encrypted:false
          SSDEEP:48:gc4+w7qr8QSZcZzoEiFRHcDxKcgPINP2R+a/tAJX2JJI1X23ae4P74PP4xQBKV:FQqRdzoEiFtc4cgANeR+a/tAJX6JI1XZ
          MD5:C201FB59451BC2AAAB451928DD56115F
          SHA1:0087F499E34D8489358842710527F5509FDFAD6A
          SHA-256:810219C0FB0683E606355DA8EE806FC2464204F7382531B4A7E965601BC8282A
          SHA-512:8F1BBCD9731C1F8864ACB4C2D506D334DF2A97E9DAFBC9A7E1204039B1297EBEFACB21740F2D6A22AC535603171665E33064C0577B047EABD21B253B048088F3
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var StationID;..var Spare1;..var ChannelA;..var ChannelB;..var Tx_RxMode;..var Power;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var AddressedOrBroadcastMessageIndicator;..var ChannelABandwidth;..var ChannelBBandwidth;..var TransitionalZoneSize;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 22){.... RepeatIndicator = ubin(#bin,6,2);.. StationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. ChannelA = ubin(#bin,40,12);.. ChannelB = ubin(#bin,52,12);.. Tx_RxMode = ubin(#bin,64,4);.. Power = ubin(#bin,68,1);.. Longitude1 = bin(#bin,69,18);.. Latitude1 = bin(#bin,87,17);.. Longitude2 = bin(#bin,104,18);.. Latitude2 = bin(#bin,1
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1658
          Entropy (8bit):4.65722864227426
          Encrypted:false
          SSDEEP:48:K7fwCCPbpS6cXksPB6gOQnacDxKkgtAJX2JJI1X23AfkBKJR+aRUi:9V6ksPkrQac4kgtAJX6JI1X8AfkMJR+q
          MD5:E377A25E90FDFD43310B953A74D79AAE
          SHA1:A2E36874D6EF7EE01418D0E6BE0D840D0A34DBC4
          SHA-256:15E4B1E1A5A66737D042334F4EAEDC955BFE4AD636B692CE59950B89E6C7AF20
          SHA-512:64C997D5F7E8E233F12D1C2D62AFE4AC26BA4E75B2F33A04A664ECF6B50D222C03ABB182846711C367ABAB22D8BEEDCF78774285A43092EA56A5120C807C5F3C
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var StationType;..var TypeOfShipAndCargoType;..var Spare2;..var Tx_RxMode;..var ReportingInterval;..var QuietTime;..var Spare3;....MessageId = ubin(#bin,0,6);..if (MessageId == 23){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. Longitude1 = bin(#bin,40,18);.. Latitude1 = bin(#bin,58,17);.. Longitude2 = bin(#bin,75,18);.. Latitude2 = bin(#bin,93,17);.. StationType = ubin(#bin,110,4);.. TypeOfShipAndCargoType = ubin(#bin,114,8);.. Spare2 = ubin(#bin,122,22);.. Tx_RxMode = ubin(#bin,144,2);.. ReportingInterval = ubin(#bin,146,4)
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1764
          Entropy (8bit):4.641806635168766
          Encrypted:false
          SSDEEP:48:KAK6eaSYL8DxKYeFvbzl08DxKYeFvfETmTGxk8kFE:jK6ea38YYeFvbzu8YYeFvfETmyxk8kFE
          MD5:67F142757376FBA905ED6F41F5C93B4F
          SHA1:10C4E2A99321B2DCC3FD8C9AA5EE2481FB8A7F0C
          SHA-256:CB8B63B022B1784CECBB55190E61F1308363E02BA682A761D0A1C0C05A50A444
          SHA-512:A0EF26B8FFB6AAB5516B9AD28C218CD1C8CDCE443E183081B11D8A06208AFEA17C735287665EB7B05C3F8F3324161205A5796D67C65C2A3BAA97E4381D53359D
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var PartNumber;....var Name;....var TypeOfShipAndCargoType;..var VendorID;..var CallSign;..var Dimension_ReferenceForPosition;..var ManufacturerID;..var UnitModelCode;..var UnitSerialNumber;....MessageId = ubin(#bin,0,6);....if (MessageId == 24){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. PartNumber = ubin(#bin,38,2);.... if (PartNumber == 0){.. Name = str(#bin,40,120);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PartNumber", PartNumber);.. map("Name", Name);.. }.. else if (PartNumber == 1){.. TypeOfShipAndCargoType = ubin(#bin,40,8);.. VendorID = str(#bin,48,42);.. CallSign = str(#bin,90,42);.. Dimension_R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1942
          Entropy (8bit):4.9467532755605905
          Encrypted:false
          SSDEEP:48:K7J1Rh2Nz4ODxUWJ6fCVrODxUWJ6fuoLJlODxUWJ6fgJQ/VMODxUWJ6fgJQq:l4OaWQ2rOaWQ1lOaWQgEMOaWQgD
          MD5:59EEDB441F4DDFC98A78681D93E8ECD9
          SHA1:9CE970EBE9D0D878DCC6DD0315551722C5C1C039
          SHA-256:C8044BDA04233DCAAC2B40A4371D3AC61229123430ACBABEE1BBECE53DEA4A76
          SHA-512:974B96352B853B7A34BE5A618ED25B3FCDA8CDF6B24DB15C1CFE4EBC49F65DC4DAE1C20C3EB56D90757C9C6F0E8494305D919E763D5ADB1BF421FB5EC3AC7F20
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;......MessageId = ubin(#bin,0,6);..if (MessageId == 25){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.....if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =....strHex(#bin,40,128);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);.... map("BinaryDataFlag", BinaryDataFlag);.....map("BinaryData", BinaryData);....}....else if (BinaryDataFlag == 1) {.....BinaryData =....strHex(#bin,40,112);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):6530
          Entropy (8bit):5.1615127233447256
          Encrypted:false
          SSDEEP:192:mfc4kGCAwx+XxqL1x+mxeB7wx+XxkL1x+mxC:+c4kG7d
          MD5:A915C6861C7ABCDCE70573880F4F3F2A
          SHA1:993FBA37CC0FBA1B9AE2381036480F7B13DE4AC9
          SHA-256:60ECB0E990DD32A7F0E6DB3CFA98E5B71EC9DB9B54E4DFE28B2153C9F5CAE88A
          SHA-512:9C78B1C4BABDA7747BD64BF866ADDACD516208DA409DDEDCE015A96545C7858B518B73875E6D73A161E0871B344927DC2A5D1ADC0F25836300BEBC61180ED1B0
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;..var BinaryDataAddedBy2ndSlot;..var BinaryDataAddedBy3rdSlot;..var BinaryDataAddedBy4thSlot;..var BinaryDataAddedBy5thSlot;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;......MessageId = ubin(#bin,0,6);..if (MessageId == 26){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("DestinationIndicator", DestinationIndicator);.. map("BinaryDataFlag", BinaryDataFlag);.... ...if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =......strHex(#bin,40,108);.....BinaryDataAddedBy2ndSl
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1159
          Entropy (8bit):5.205717296330583
          Encrypted:false
          SSDEEP:24:KM8XoGnkD+3v+8mu+YOHZJLNKicOsxK4YbgLaaRDTX2zEk0i:Ko8MHZvHcDxK4Y0+STX2zEk0i
          MD5:85DF7DEED13B2E2A4376B2AD6C131B1D
          SHA1:6B36A48779C01658AF8E240EE1F32D8BB3594D39
          SHA-256:C68B981D53C834ABA1C3C8E6AD379259B2994B3C1E40B0CA972F4307B0336185
          SHA-512:0EC16B8DC7B16F44E2A62EE464313CBB02956C6F67485B70322BE6B05C5C71C8A7944906F7B74BBC3C5F5457B07DC808BC78030D85BF251AD2D46556F2A5D7D5
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var PositionAccuracy;..var RAIM_flag;..var NavigationalStatus;..var Longitude;..var Latitude;..var SOG;..var COG;..var StatusOfCurrentGNSSPosition;..var Spare;......MessageId = ubin(#bin,0,6);..if (MessageId == 27){...RepeatIndicator =....ubin(#bin,6,2);...UserID =......ubin(#bin,8,30);...PositionAccuracy = ....ubin(#bin,38,1);...RAIM_flag = .....ubin(#bin,39,1);...NavigationalStatus = ...ubin(#bin,40,4);...Longitude = .....bin(#bin,44,18);...Latitude = ......bin(#bin,62,17);...SOG = .......ubin(#bin,79,6);...COG = .......ubin(#bin,85,9);...StatusOfCurrentGNSSPosition = .ubin(#bin,94,1);.. Spare =.......ubin(#bin,95,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PositionAccuracy", PositionAccuracy);.. map("RAIM_flag", RAIM_flag);.. map("NavigationalStatus", NavigationalStatus);.. map("Longitude", Longitude);.. map("Latitud
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3805
          Entropy (8bit):4.6112502300957185
          Encrypted:false
          SSDEEP:96:KTWfTcP0xdBIx16c44+8EYSTX0kxuw8c0MxdXBmNvcP0xdBIxbVxc44+8EYSTX02:o6n2xIc44+8EYSTX0kUw8c0MxdAd2xTl
          MD5:08A27D7DAB316E88B8983F53967B5341
          SHA1:2A4F12A483E5E96A8E8A067BCF4D49F566EEB9A5
          SHA-256:C98467BC48919E9808BF3F70DA3187CF5D91D3B63012ADCCDFC7EDBD4FB5E246
          SHA-512:20202D926A44AE7B0C64ACEF17A195C9D3FE211822E0A47E41BAB3241667D9B34DBA35231F403D12D6C821AEF7E4A5AE4D2606A09DD6B5A47CF94B1FF2716AE5
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var NavigationalStatus;..var RateOfTurn;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var SpecialManoeuvreIndicator;..var Spare;..var RAIM_flag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 1 ||.. MessageId == 2){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. NavigationalStatus = ubin(#bin,38,4);.. RateOfTurn = bin(#bin,42,8);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TrueHeading =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2270
          Entropy (8bit):4.809327791805813
          Encrypted:false
          SSDEEP:48:Kfo/v+2LZlUSYjt0hJ2cuyopDfkvLcDxK4s8ikMp2MB9hiYSTX2z5ihTxs28s2By:ttLZlUl0h4cux16c44s8ikMp2MbgYSTL
          MD5:8D8B7DFA75A9CB9532D13D4C1AE1704F
          SHA1:A50076A9017CA67951293FA30260A9CED748D6DD
          SHA-256:78958DA440A256FFAAC5B87B1A54001CB471CA08F1E96A923E22011C6F7B63B7
          SHA-512:EDD0D8CD3019990877C36FB8A2FBC8430586B582E52A0DE94AB7EE368DEE57AFC3094CB2CF27D9FDBB83ADBD0D81AF0DE4CF2F1DF5520EEC89FC6F4FA38D2C09
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var UTCYear;..var UTCMonth;..var UTCDay;..var UTCHour;..var UTCMinute;..var UTCSecond;..var PositionAccuracy;..var Longitude;..var Latitude;..var TypeOfElectronicPositionFixingDevice;..var TransmissionControlForLongrangeBroadcastMessage;..var Spare;..var RAIM_flag;..var SyncState;..var SlotTime_Out;..var SubMessage;....MessageId = ubin(#bin,0,6);..if (MessageId == 4 ||.. MessageId == 11){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. UTCYear = ubin(#bin,38,14);.. UTCMonth = ubin(#bin,52,4);.. UTCDay = ubin(#bin,56,5);.. UTCHour = ubin(#bin,61,5);.. UTCMinute = ubin(#bin,66,6);.. UTCSecond = ubin(#bin,72,6);.. PositionAccuracy = ubin(#bin,78,1);.. Longitude =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1838
          Entropy (8bit):4.853931101960552
          Encrypted:false
          SSDEEP:48:KYIJPSYIIFRNWcDxK4c+F/TGyfkM5ihTE34JNoYi:fI9PzEc44c+F/yyfkM5ihTEoMYi
          MD5:292243A99DBFEA030E07AC41B06EAA3B
          SHA1:0593054762979355BB5E9C7045F159B450476C56
          SHA-256:45ED8601C3580033614AA92B7CAA4A6DEB8FADFB1C9BCCC37AB469AA991C8019
          SHA-512:B2AC1F95B52AA509CE3428E4B1BF85FA410997DB20C850F8DA5790C9606F9E347A16A2A3975ACE559EC57424A3FBF38343746995316F2574A0DF89C52F3AB8FB
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var AISVersionIndicator;..var IMONumber;..var CallSign;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var ETA;..var MaximumPresentStaticDraught;..var Destination;..var DTE;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 5){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. AISVersionIndicator = ubin(#bin,38,2);.. IMONumber = ubin(#bin,40,30);.. CallSign = str(#bin,70,42);.. Name = str(#bin,112,120);.. TypeOfShipAndCargoType = ubin(#bin,232,8);.. Dimension_ReferenceForPosition = ubin(#bin,240,30);.. TypeOfElectronicPositionFixingDevice = ubin(#bin,270,4);.. ETA = ubin(#bin,274,20);.. MaximumPresentStaticDraught = ubin(#bin
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1435
          Entropy (8bit):4.7362638022136645
          Encrypted:false
          SSDEEP:24:KMiHrGpW+5HAGm516G/dBS6z4NWr5I6NQcOsxKkLvaF/JQ3acIDYT/WV6x6aF/3y:K7LQHf+S6z4Er5dOcDxKkLvaF/JQ3acA
          MD5:A4AC9A0128F2B41237A8E46BC91ACD30
          SHA1:3E711BFE84B4FCD9E43F9341B87D1E33F32905A6
          SHA-256:86CA1226C781E7F196880151F31E06470F5DE2BF2B2D99E6CCDA10C213D65E7C
          SHA-512:B6F9E79DEC0A45112D9C558CF4ED9146802D4FF88A59FFE7375449111FE261696A5E99B3ED9FA24E89B34663ECC6EEDB1553F8030B5ED6055EF5E69452386838
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 6 ){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. DAC = ubin(#bin,72,10);.. FunctionIdentifier = ubin(#bin,82,6);.. AcknowledgedRequiredFlag = ubin(#bin,88,1);.. TextSequenceNumber = ubin(#bin,89,11);.. ApplicationData = str(#bin,100,906);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndic
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1515
          Entropy (8bit):4.7011664865538645
          Encrypted:false
          SSDEEP:24:KMiHHpyVrZVpVrGzpyrRpLr5CBS6DSW2jKktI+xXgLfcOsxKkcJ/qLo7JyRLnYJx:K7pq1RIgDfkS6Dl2jdtI+xXgLfcDxKk6
          MD5:9F24D79BA524A0B7D161E4B41D5120AB
          SHA1:05BAE64B9FBBD4B302C80C71E88E01DE5DF32450
          SHA-256:E359725B51E29462D44C5C254EAD20ACD896975313B983BE473B6952C240AF5D
          SHA-512:CA6C2F517FDD16236FFCD4BC03696C1FCE863928F08F611FA0FF53BADD0BE3CAD810117AE1970590C881C454B9F5B710E3F69F62E4E2BA0E0973C85EC1EA16EB
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DestinationID1;..var SequenceNumberForID1;..var DestinationID2;..var SequenceNumberForID2;..var DestinationID3;..var SequenceNumberForID3;..var DestinationID4;..var SequenceNumberForID4;....MessageId = ubin(#bin,0,6);..if (MessageId == 7 ||.. MessageId == 13){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. SequenceNumberForID1 = ubin(#bin,70,2);.. DestinationID2 = ubin(#bin,72,30);.. SequenceNumberForID2 = ubin(#bin,102,2);.. DestinationID3 = ubin(#bin,104,30);.. SequenceNumberForID3 = ubin(#bin,134,2);.. DestinationID4 = ubin(#bin,136,30);.. SequenceNumberForID4 = ubin(#bin,166,2);.... map("MessageId", Messa
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1082
          Entropy (8bit):4.7592453854016386
          Encrypted:false
          SSDEEP:24:KMiHHAGm516G/IS64MyWMe6ncOsxKkcIDYT/WV6x6aF/3y:K7NflS6zyWqncDxKkcIDk/W4EaF/3y
          MD5:E77346A17E0060A09283AF49EED157F1
          SHA1:C4E46B68D2AE3DA48C8E0B7CFF4DEA81B155ECAE
          SHA-256:03D2FA8A2DDAAA84A77F6B0663F4E3363A0C46A72BD2D9A5B62B7EA3FD231797
          SHA-512:C584376BF07508813754C6D5ED59BDE4E31850C5A64D6F20CAC2D7D6440FC3FF417D1CE1EFDF9A37A8AD76368488ABFEE3015BE91E5CFE27D3DEF4977907ABCD
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 8 ){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DAC = ubin(#bin,40,10);.. FunctionIdentifier = ubin(#bin,50,6); .. AcknowledgedRequiredFlag = ubin(#bin,56,1);.. TextSequenceNumber = ubin(#bin,57,11);.. ApplicationData = str(#bin,68,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("DAC", DAC);.. map("FunctionIdentifier", FunctionIdentifier);.. map("AcknowledgedRequiredFlag", AcknowledgedRequiredFlag);.. map("TextSequen
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2684
          Entropy (8bit):4.630482052007689
          Encrypted:false
          SSDEEP:48:KEAxbZXSYMtdBhRDttcDxK4YEYSTX2zkwuJYu0O0fyoUvyMxtXBmNSFTyoUSi6MW:AxbZXudBhRDttc44YEYSTX0kwuJYu0OT
          MD5:5FA0B3A565F825CFFD9BF4B61893276E
          SHA1:BF4B382123A2741DDC8448752161DC3E75104FE7
          SHA-256:FB541F6EE8B8AF9A5377180209FCE05896C29E6E5E8A2A7EA518F7753C1E7CB7
          SHA-512:CCD6C0B6C05E48AC580B323BFF6DD2A89D877FCA0C76F24711500337AB6FDE7F0A8C2CC4F128C12458BD53F29D3E011A944AA1F95379CB40C3B0803DE2E4D094
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var Altitude_GNSS;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TimeStamp;..var AltitudeSensor;..var Spare;..var DTE;..var AssignedModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 9){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. Altitude_GNSS = ubin(#bin,38,12);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TimeStamp = ubin(#bin,128,6);.. AltitudeSensor =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):668
          Entropy (8bit):4.494391176923802
          Encrypted:false
          SSDEEP:12:TU31xMiHUpW+SAuSsPzcV5NWJP1cX+sx8/k1iJW51JBKV:KMiHUpW+SfS6c7NWJP1cOsxKkgJQ3BKV
          MD5:827E3F4AD5498C8C386643B83BE84FD9
          SHA1:169859EE10901AFE16690E3307BEE8FAD34C2BB4
          SHA-256:6914BAA4D6DBC7FF753C395D37256BFEB0155056008BD3AE77AC5E5262ABE670
          SHA-512:348376F8A1A5BD30F365C094AB5807AA2D4384391EFE8DF5F5B6B8ACB5EBAE31EFB77A4DFA3577B4E66044802E1DB804538DE664A099FCFD1ADEBF156F346221
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 10){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. Spare2 = ubin(#bin,70,2);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationID", DestinationID);.. map("Spare2", Spare2);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):939
          Entropy (8bit):4.675230373795883
          Encrypted:false
          SSDEEP:24:KMiHrGpW+5HX9S6z4NWrvScOsxKkLvaF/JQ3acDz3i:K7LQd9S6z4ErvScDxKkLvaF/JQ3acDzy
          MD5:0ECC8274AE502CC175012918C9E074DD
          SHA1:E608C6ED9C1213720646F8B8D609E2C3E28E3FFE
          SHA-256:1E9364FF1692E6E964E8E5C4DF5287450A103D73673DF533FCEAC3FD0F626AC9
          SHA-512:D59C6FE37A8ACE1F89D34795F682AB164B8E82736C09826B2D7CACDEECB784FCA306D00F8CA4A985F6261CCE89188D53A9EADB260524F9E453D4BC56A3F3F2D0
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 12){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. SafetyRelatedText = str(#bin,72,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("SequenceNumber", SequenceNumber);.. map("DestinationID", DestinationID);.. map("RetransmitFlag", RetransmitFlag);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):581
          Entropy (8bit):4.649836405273726
          Encrypted:false
          SSDEEP:12:TU31xMiHu+yEFpSsPzsEbKcX+sx8/kcDDaESEM9:KMiHHXFpS6lbKcOsxKkcDz3i
          MD5:876F56F0ADEB0AE293A3ACEA76BFF33C
          SHA1:5C7C99F1107070DC424E187F6EACB025AAA51106
          SHA-256:A74B508C93E6EEECFB3104DCCB6D7E886400D7670A6389C9E6E5D60C4EFCDA3B
          SHA-512:E7DEFACF18B36F948F3BAFBDC8FC732E080076460B0EEAE67536C25D73E4FA88388A0414FC3799A799653EFEBA9EA6473800355CD49E3847C0BC5F209D2B5F98
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 14){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. SafetyRelatedText = str(#bin,40,966);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1685
          Entropy (8bit):4.58269262036734
          Encrypted:false
          SSDEEP:48:K7GuSPGS6c7lh9YtVBcDxKkgJ/q2kBKJkEcJyR80/g:WXBc4kgc2kMJkEcy80/g
          MD5:55730594AEB619252754C447E5E8010C
          SHA1:4974469F00CB2F2AA9ACE609C50F10649641B423
          SHA-256:BDE724937067176B94557BA1AB9F09AB72191B5F9C9363A908EB61A33FBA46F8
          SHA-512:86BECC2379323115BE82E0C0F143ABF01861386B0700E7A90357EB52A8560640593BCFC80BD77C22753FC4B6836503936151F317E0DCF6474EFBDE9A2DB92869
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID1;..var MessageID1_1;..var SlotOffset1_1;..var Spare2;..var MessageID1_2;..var SlotOffset1_2;..var Spare3;..var DestinationID2;..var MessageID2_1;..var SlotOffset2_1;..var Spare4;....MessageId = ubin(#bin,0,6);..if (MessageId == 15){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. MessageID1_1 = ubin(#bin,70,6);.. SlotOffset1_1 = ubin(#bin,76,12);.. Spare2 = ubin(#bin,88,2);.. MessageID1_2 = ubin(#bin,90,6);.. SlotOffset1_2 = ubin(#bin,96,12);.. Spare3 = ubin(#bin,108,2);.. DestinationID2 = ubin(#bin,110,30);.. MessageID2_1 = ubin(#bin,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1213
          Entropy (8bit):4.49708436189082
          Encrypted:false
          SSDEEP:24:KMiHUpcyOpS6067SFS6c7CWn5k8C/cOsxKkgJvasQFJiBgeBKV:K7Gm+pFS6c7Vn5TC/cDxKkgJvasQFJi0
          MD5:5F3D4F2F8CF723893A1B9BE92757CFC5
          SHA1:4DFBF5B54084E052626503968E59D278E01E7100
          SHA-256:9E03AA69D2566E355E1E94EB1AE323CBDB2C35C5DAC9F60D55EC4AC2CE4338CD
          SHA-512:EA699C1A8AFAB06A2145706A97B5DAF81AEEF16658AF2716D1569CDBDEE0D75F1B7E87C4DB8B2CDA8C21318E4D14205C9A7822CCCE26B7E45DF4658C1A2442B8
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationIDA;..var OffsetA;..var IncrementA;..var DestinationIDB;..var OffsetB;..var IncrementB;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 16){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationIDA = ubin(#bin,40,30);.. OffsetA = ubin(#bin,70,12);.. IncrementA = ubin(#bin,82,10);.. DestinationIDB = ubin(#bin,92,30);.. OffsetB = ubin(#bin,122,12);.. IncrementB = ubin(#bin,134,10);.. Spare2 = ubin(#bin,144,4);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationIDA", DestinationI
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4969
          Entropy (8bit):4.621697866558589
          Encrypted:false
          SSDEEP:96:mdhXTQRgAbc4kgSTX0MJ4cGJLvaF/sVucik2kqc2cPE4TQQcgcIMoQcEQ/okswgS:m4aYc4kgSTX0i4cGJLvaJswcik2kqc2y
          MD5:6C551F89800A1B5F2818FEB92BAD1129
          SHA1:D446EA1576FF981951CFA621F13673B5CEFEB8A0
          SHA-256:4F790FC6E2E3FB08EFA4728A871232D6A4BF6B685616E80BE2602A880EDDECDD
          SHA-512:20C8659577692821FC0F321A145BB056FFC12E73D2FFE306FC7235EBFA1FC0B1D53B0362B0BABCB6BEE4D92A162BDED006AC81B7D25DEC27E0EBBE423BDB0505
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude;..var Latitude;..var Spare2;..var MessageType;..var StationID;..var ZCount;..var SequenceNumber;..var N;..var Health;..var DGNSSDataWord1;..var DGNSSDataWord2;..var DGNSSDataWord3;..var DGNSSDataWord4;..var DGNSSDataWord5;..var DGNSSDataWord6;..var DGNSSDataWord7;..var DGNSSDataWord8;..var DGNSSDataWord9;..var DGNSSDataWord10;..var DGNSSDataWord11;..var DGNSSDataWord12;..var DGNSSDataWord13;..var DGNSSDataWord14;..var DGNSSDataWord15;..var DGNSSDataWord16;..var DGNSSDataWord17;..var DGNSSDataWord18;..var DGNSSDataWord19;..var DGNSSDataWord20;..var DGNSSDataWord21;..var DGNSSDataWord22;..var DGNSSDataWord23;..var DGNSSDataWord24;..var DGNSSDataWord25;..var DGNSSDataWord26;..var DGNSSDataWord27;..var DGNSSDataWord28;..var DGNSSDataWord29;....MessageId = ubin(#bin,0,6);..if (MessageId == 17){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ub
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):5586
          Entropy (8bit):4.639872418726296
          Encrypted:false
          SSDEEP:96:G82eWJa8sIwyrJxla8YYXcvk4SDXUExuQdcvUmG8sOtUMMxtXBmNE8sIwyrJxr4o:GFepnyrJxY8YYXcvk4SDXUE0QdcvUmGS
          MD5:F86CB804C7E51DEAFA614D07A5B5F71B
          SHA1:98D7346554402971F6C34BD0B38D0CEF3439304F
          SHA-256:6D80DD72D8D50974DFF95CBC0F41E39F4069B68AC6B6F91D7C1523CBF8510F22
          SHA-512:4DBE448D29357F6AD2BEBCDD3FF8CE543362940776A022A87C2A75F2D243065055EBA9F5DED5D54870E574CE80BC437E71C7C8648D6A453FC0CB8774C236D312
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var ClassB_UnitFlag;..var ClassB_DisplayFlag;..var ClassB_DSCFlag;..var ClassB_BandFlag;..var ClassB_Message22Flag;..var ModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);....if (MessageId == 18){.. CommunicationStateSelectorFlag = ubin(#bin,148,1);.. if (CommunicationStateSelectorFlag == 0){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2373
          Entropy (8bit):4.890519075109663
          Encrypted:false
          SSDEEP:48:Ky0TA26InQSY4t0f0sIVxmyZVjsNcDxK4I0/0/EYSTX2zkxQBwdc/yfkM5ihT0YM:G826InQsqMsoxmyZVANc44Xc/EYSTX00
          MD5:6F3A69729D46573B6CA788F3A10890F8
          SHA1:089BBBEAC94FC5CA31367F119098CA977E399744
          SHA-256:7F471E0C9262FF6DF6D4A85662DD215E0C04445ACC628D993048F2394BF78372
          SHA-512:C9D62AFFAA8A80DB41AC4AEF56A300A4355EBAE5EBCD1B68E7FF17296BDF2FEAAE9C51299A5F04972745958AB63316D14E22B93110FE9BED4D3C3ABA541A6393
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var RAIM_flag;..var DTE;..var AssignedModeFlag;....MessageId = ubin(#bin,0,6);..if (MessageId == 19){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy = ubin(#bin,56,1);.. Longitude = bin(#bin,57,28);.. Latitude = bin(#bin,85,27);.. COG = ubin(#bin,112,12);.. TrueHeading = ubin(#bin,124,9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2388
          Entropy (8bit):4.594361313478769
          Encrypted:false
          SSDEEP:48:K7yTG4T0eS6cnBRn9ovG+64bcDxKcgAclek8Zk4H1+40ro0cKiHSBKV:RTrTruBfMG+Rc4cgAclek8Zk4H1+40r4
          MD5:353090A0521C1AAA648A3DDA352D504A
          SHA1:A1F9BBCD78D412E408D47BEF437CCFACDD39AA20
          SHA-256:2A7A59E3FE0648CE922C4482CA20FF6EEFC30025C0A98FE3527C28481368CBED
          SHA-512:9172EACC3DFA5E6CDE4CD1F37F2EEF453468723BC063A13D1FA9A54B504BE68BE4B493583548B6947746E8630E65DD896789B37E3A8B9F7BDE30AAB18BDA47C9
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceStationID;..var Spare1;..var OffsetNumber1;..var NumberOfSlots1;..var Time_Out1;..var Increment1;..var OffsetNumber2;..var NumberOfSlots2;..var Time_Out2;..var Increment2;..var OffsetNumber3;..var NumberOfSlots3;..var Time_Out3;..var Increment3;..var OffsetNumber4;..var NumberOfSlots4;..var Time_Out4;..var Increment4;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 20){.... RepeatIndicator = ubin(#bin,6,2);.. SourceStationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. OffsetNumber1 = ubin(#bin,40,12);.. NumberOfSlots1 = ubin(#bin,52,4);.. Time_Out1 = ubin(#bin,56,3);.. Increment1 = ubin(#bin,59,11);.. OffsetNumber2 = ubin(#bin,70,12);.. NumberOfSlots2 = ubin(#bin,82,4);.. Time_Out2 = ubin(
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2389
          Entropy (8bit):4.963806832412181
          Encrypted:false
          SSDEEP:48:Kbl8K0/iBSBrJ52aOt0+uKTcDxKKa4+XgYSTX2zM5ihTwrYI0/0/0Tgu0Oa:ZJ/iB+J52aOq+uKTc4Ka4+XgYSTX0M5n
          MD5:A4301C435AB0957C052AEBC900E5EDA7
          SHA1:9222D178AFD897173586D87393E28CBDF683678D
          SHA-256:838BFD687CDFF728A4115EEA3DD320AD79487979D91B8F9B6B040C46E0D6F562
          SHA-512:3C85E1EF1715F97714A03B984366DF4E6C2393814CE4B81E7CF207BB5395B11266E0A4AF7691DDDB7AD1726403D21D21CC37E9640C7004F67523B0683687F4CC
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var ID;..var TypeOfAids_To_Navigation;..var NameOfAids_To_Navigation;..var PositionAccuracy;..var Longitude;..var Latitude;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var TimeStamp;..var Off_PositionIndicator;..var ReservedForRegionalOrLocalApplications;..var RAIM_flag;..var Virtual_AtoN_flag;..var AssignedModeFlag;..var NameOfAidToNavigationExtension;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 21){.... RepeatIndicator = ubin(#bin,6,2);.. ID = ubin(#bin,8,30);.. TypeOfAids_To_Navigation = ubin(#bin,38,5);.. NameOfAids_To_Navigation = str(#bin,43,120);.. PositionAccuracy = ubin(#bin,163,1);.. Longitude = bin(#bin,164,28);.. Latitude = bin(#bin,192,27);.. Dimension_ReferenceForPosition = ubin(#bin,219,30);.. TypeOfElectronicPositionFixi
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1979
          Entropy (8bit):4.695298593428696
          Encrypted:false
          SSDEEP:48:Kc4+w7qr8QSZcZzoEiFRHcDxKcgPINP2R+a/tAJX2JJI1X23ae4P74PP4xQBKV:LQqRdzoEiFtc4cgANeR+a/tAJX6JI1XZ
          MD5:7ADC81684CE93D9EA5098B5764555AB3
          SHA1:9958A4832FB1C281EA3D5D283D1F679A3C76D27E
          SHA-256:9DF448B3006705A04D8A35A95B958EFC817BDCFF20D963BB660E63565E621BEC
          SHA-512:60126FD888AC9B57601383D72B623EE00868C3BBE8355D4F5376760FA82155654A1FFDC56D6A968AA62DD6F1AD64A45F5D69EAA1EFD716240A5B4A0F3EB92C27
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var StationID;..var Spare1;..var ChannelA;..var ChannelB;..var Tx_RxMode;..var Power;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var AddressedOrBroadcastMessageIndicator;..var ChannelABandwidth;..var ChannelBBandwidth;..var TransitionalZoneSize;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 22){.... RepeatIndicator = ubin(#bin,6,2);.. StationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. ChannelA = ubin(#bin,40,12);.. ChannelB = ubin(#bin,52,12);.. Tx_RxMode = ubin(#bin,64,4);.. Power = ubin(#bin,68,1);.. Longitude1 = bin(#bin,69,18);.. Latitude1 = bin(#bin,87,17);.. Longitude2 = bin(#bin,104,18);.. Latitude2 = bin(#bin,1
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1045
          Entropy (8bit):4.3315941590307405
          Encrypted:false
          SSDEEP:24:CGF/ESfZ21C/zAGEuXlO7ydvG2pfrFBL578tIFoNS:CGF/ESfc1C/zAGEuXlO7ydvG2pf5BL5R
          MD5:65A5197B2A22BCB71A67C509DB96A955
          SHA1:A0BC652D915EE6447BF6CD00414DA7A7A87B2A72
          SHA-256:C853BC916807319BA9CE1759594B0BE7BC5BCF0939913E08E397598DDBB70086
          SHA-512:D7977BB15486FBD52044655AD24625F7DFC1A693D381A5072E34CBE6D65E8D26CF7707BD145F2C403CBCA5B430B6C6A0F0F5C2BB84C8C5612EDAFCD6E7104B0B
          Malicious:false
          Preview:#####################################################..0,0:0:0|VDM_table15..0,0:0:0|VDM_table16..0,0:0:0|VDM_table17..0,0:0:0|VDM_table19..0,0:0:0|VDM_table21..0,0:0:0|VDM_table22..0,0:0:0|VDM_table23..0,0:0:0|VDM_table24..0,0:0:0|VDM_table25..0,0:0:0|VDM_table26..0,0:0:0|VDM_table27..0,0:0:0|VDM_table28..0,0:0:0|VDM_table29..0,0:0:0|VDM_table31..0,0:0:0|VDM_table32..0,0:0:0|VDM_table33..0,0:0:0|VDM_table34..0,0:0:0|VDM_table35..0,0:0:0|VDM_message23..0,0:0:0|VDM_message24ab..0,0:0:0|VDM_message25..0,0:0:0|VDM_message26..0,0:0:0|VDM_message27..0,0:0:0|VDO_table15..0,0:0:0|VDO_table16..0,0:0:0|VDO_table17..0,0:0:0|VDO_table19..0,0:0:0|VDO_table21..0,0:0:0|VDO_table22..0,0:0:0|VDO_table23..0,0:0:0|VDO_table24..0,0:0:0|VDO_table25..0,0:0:0|VDO_table26..0,0:0:0|VDO_table27..0,0:0:0|VDO_table28..0,0:0:0|VDO_table29..0,0:0:0|VDO_table31..0,0:0:0|VDO_table32..0,0:0:0|VDO_table33..0,0:0:0|VDO_table34..0,0:0:0|VDO_table35..0,0:0:0|VDO_message23..0,0:0:0|VDO_message24ab..0,0:0:0|VDO_message25..0
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1213
          Entropy (8bit):4.49708436189082
          Encrypted:false
          SSDEEP:24:KMiHUpcyOpS6067SFS6c7CWn5k8C/cOsxKkgJvasQFJiBgeBKV:K7Gm+pFS6c7Vn5TC/cDxKkgJvasQFJi0
          MD5:5F3D4F2F8CF723893A1B9BE92757CFC5
          SHA1:4DFBF5B54084E052626503968E59D278E01E7100
          SHA-256:9E03AA69D2566E355E1E94EB1AE323CBDB2C35C5DAC9F60D55EC4AC2CE4338CD
          SHA-512:EA699C1A8AFAB06A2145706A97B5DAF81AEEF16658AF2716D1569CDBDEE0D75F1B7E87C4DB8B2CDA8C21318E4D14205C9A7822CCCE26B7E45DF4658C1A2442B8
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationIDA;..var OffsetA;..var IncrementA;..var DestinationIDB;..var OffsetB;..var IncrementB;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 16){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationIDA = ubin(#bin,40,30);.. OffsetA = ubin(#bin,70,12);.. IncrementA = ubin(#bin,82,10);.. DestinationIDB = ubin(#bin,92,30);.. OffsetB = ubin(#bin,122,12);.. IncrementB = ubin(#bin,134,10);.. Spare2 = ubin(#bin,144,4);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationIDA", DestinationI
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1515
          Entropy (8bit):4.7011664865538645
          Encrypted:false
          SSDEEP:24:KMiHHpyVrZVpVrGzpyrRpLr5CBS6DSW2jKktI+xXgLfcOsxKkcJ/qLo7JyRLnYJx:K7pq1RIgDfkS6Dl2jdtI+xXgLfcDxKk6
          MD5:9F24D79BA524A0B7D161E4B41D5120AB
          SHA1:05BAE64B9FBBD4B302C80C71E88E01DE5DF32450
          SHA-256:E359725B51E29462D44C5C254EAD20ACD896975313B983BE473B6952C240AF5D
          SHA-512:CA6C2F517FDD16236FFCD4BC03696C1FCE863928F08F611FA0FF53BADD0BE3CAD810117AE1970590C881C454B9F5B710E3F69F62E4E2BA0E0973C85EC1EA16EB
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DestinationID1;..var SequenceNumberForID1;..var DestinationID2;..var SequenceNumberForID2;..var DestinationID3;..var SequenceNumberForID3;..var DestinationID4;..var SequenceNumberForID4;....MessageId = ubin(#bin,0,6);..if (MessageId == 7 ||.. MessageId == 13){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. SequenceNumberForID1 = ubin(#bin,70,2);.. DestinationID2 = ubin(#bin,72,30);.. SequenceNumberForID2 = ubin(#bin,102,2);.. DestinationID3 = ubin(#bin,104,30);.. SequenceNumberForID3 = ubin(#bin,134,2);.. DestinationID4 = ubin(#bin,136,30);.. SequenceNumberForID4 = ubin(#bin,166,2);.... map("MessageId", Messa
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2389
          Entropy (8bit):4.964166837499702
          Encrypted:false
          SSDEEP:48:gbl8K0/iBSBrJ52aOt0+uKTcDxKKa4+XgYSTX2zM5ihTwrYI0/0/0Tgu0Oa:nJ/iB+J52aOq+uKTc4Ka4+XgYSTX0M5n
          MD5:72BFCDBC7EA7B24D02FDA64464E0002F
          SHA1:2FA21ABA2D8B137F63E0AC2048E4AB780370A3CF
          SHA-256:AA8690C692294B7B1AC7328FE556185DB3916FD14D9ECCB63ADB1565DF7E6041
          SHA-512:8A5E63A1D49FCE018DF4B70CC83F4AFEAA2110B6EBEF2723C564E0FD860740422258C6AAAB0913388B624F617B57867C0BD45A5D3A0806E07B7A101AB69E598B
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var ID;..var TypeOfAids_To_Navigation;..var NameOfAids_To_Navigation;..var PositionAccuracy;..var Longitude;..var Latitude;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var TimeStamp;..var Off_PositionIndicator;..var ReservedForRegionalOrLocalApplications;..var RAIM_flag;..var Virtual_AtoN_flag;..var AssignedModeFlag;..var NameOfAidToNavigationExtension;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 21){.... RepeatIndicator = ubin(#bin,6,2);.. ID = ubin(#bin,8,30);.. TypeOfAids_To_Navigation = ubin(#bin,38,5);.. NameOfAids_To_Navigation = str(#bin,43,120);.. PositionAccuracy = ubin(#bin,163,1);.. Longitude = bin(#bin,164,28);.. Latitude = bin(#bin,192,27);.. Dimension_ReferenceForPosition = ubin(#bin,219,30);.. TypeOfElectronicPositionFixi
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1942
          Entropy (8bit):4.9467532755605905
          Encrypted:false
          SSDEEP:48:K7J1Rh2Nz4ODxUWJ6fCVrODxUWJ6fuoLJlODxUWJ6fgJQ/VMODxUWJ6fgJQq:l4OaWQ2rOaWQ1lOaWQgEMOaWQgD
          MD5:59EEDB441F4DDFC98A78681D93E8ECD9
          SHA1:9CE970EBE9D0D878DCC6DD0315551722C5C1C039
          SHA-256:C8044BDA04233DCAAC2B40A4371D3AC61229123430ACBABEE1BBECE53DEA4A76
          SHA-512:974B96352B853B7A34BE5A618ED25B3FCDA8CDF6B24DB15C1CFE4EBC49F65DC4DAE1C20C3EB56D90757C9C6F0E8494305D919E763D5ADB1BF421FB5EC3AC7F20
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;......MessageId = ubin(#bin,0,6);..if (MessageId == 25){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.....if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =....strHex(#bin,40,128);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);.... map("BinaryDataFlag", BinaryDataFlag);.....map("BinaryData", BinaryData);....}....else if (BinaryDataFlag == 1) {.....BinaryData =....strHex(#bin,40,112);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2388
          Entropy (8bit):4.594361313478769
          Encrypted:false
          SSDEEP:48:K7yTG4T0eS6cnBRn9ovG+64bcDxKcgAclek8Zk4H1+40ro0cKiHSBKV:RTrTruBfMG+Rc4cgAclek8Zk4H1+40r4
          MD5:353090A0521C1AAA648A3DDA352D504A
          SHA1:A1F9BBCD78D412E408D47BEF437CCFACDD39AA20
          SHA-256:2A7A59E3FE0648CE922C4482CA20FF6EEFC30025C0A98FE3527C28481368CBED
          SHA-512:9172EACC3DFA5E6CDE4CD1F37F2EEF453468723BC063A13D1FA9A54B504BE68BE4B493583548B6947746E8630E65DD896789B37E3A8B9F7BDE30AAB18BDA47C9
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceStationID;..var Spare1;..var OffsetNumber1;..var NumberOfSlots1;..var Time_Out1;..var Increment1;..var OffsetNumber2;..var NumberOfSlots2;..var Time_Out2;..var Increment2;..var OffsetNumber3;..var NumberOfSlots3;..var Time_Out3;..var Increment3;..var OffsetNumber4;..var NumberOfSlots4;..var Time_Out4;..var Increment4;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 20){.... RepeatIndicator = ubin(#bin,6,2);.. SourceStationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. OffsetNumber1 = ubin(#bin,40,12);.. NumberOfSlots1 = ubin(#bin,52,4);.. Time_Out1 = ubin(#bin,56,3);.. Increment1 = ubin(#bin,59,11);.. OffsetNumber2 = ubin(#bin,70,12);.. NumberOfSlots2 = ubin(#bin,82,4);.. Time_Out2 = ubin(
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):668
          Entropy (8bit):4.494391176923802
          Encrypted:false
          SSDEEP:12:TU31xMiHUpW+SAuSsPzcV5NWJP1cX+sx8/k1iJW51JBKV:KMiHUpW+SfS6c7NWJP1cOsxKkgJQ3BKV
          MD5:827E3F4AD5498C8C386643B83BE84FD9
          SHA1:169859EE10901AFE16690E3307BEE8FAD34C2BB4
          SHA-256:6914BAA4D6DBC7FF753C395D37256BFEB0155056008BD3AE77AC5E5262ABE670
          SHA-512:348376F8A1A5BD30F365C094AB5807AA2D4384391EFE8DF5F5B6B8ACB5EBAE31EFB77A4DFA3577B4E66044802E1DB804538DE664A099FCFD1ADEBF156F346221
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 10){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. Spare2 = ubin(#bin,70,2);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationID", DestinationID);.. map("Spare2", Spare2);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1515
          Entropy (8bit):4.698432684936653
          Encrypted:false
          SSDEEP:24:gMiHHpyVrZVpVrGzpyrRpLr5CBS6DSW2jKktI+xXgLfcOsxKkcJ/qLo7JyRLnYJx:g7pq1RIgDfkS6Dl2jdtI+xXgLfcDxKk6
          MD5:0D164D701ED7031A70593F2654DC0A31
          SHA1:DA5EDBF15FE4F07C29425F0BF45ECF62CB874C78
          SHA-256:E7C741C774C132F2DC691EB54C23C9786F721508676B2DCFF65F56924B5AF49C
          SHA-512:4A7F5E9726E3152B3AB6B16D4925F9D751F1FF0EE7157EC96709D184B919C910DE58875B99933EB5E4482049530FCF9D66B35ABC32FE45E6CAE7A72BE3B95FCD
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DestinationID1;..var SequenceNumberForID1;..var DestinationID2;..var SequenceNumberForID2;..var DestinationID3;..var SequenceNumberForID3;..var DestinationID4;..var SequenceNumberForID4;....MessageId = ubin(#bin,0,6);..if (MessageId == 7 ||.. MessageId == 13){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. SequenceNumberForID1 = ubin(#bin,70,2);.. DestinationID2 = ubin(#bin,72,30);.. SequenceNumberForID2 = ubin(#bin,102,2);.. DestinationID3 = ubin(#bin,104,30);.. SequenceNumberForID3 = ubin(#bin,134,2);.. DestinationID4 = ubin(#bin,136,30);.. SequenceNumberForID4 = ubin(#bin,166,2);.... map("MessageId", Messa
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1838
          Entropy (8bit):4.853870663306694
          Encrypted:false
          SSDEEP:48:gYIJPSYIIFRNWcDxK4c+F/TGyfkM5ihTE34JNoYi:xI9PzEc44c+F/yyfkM5ihTEoMYi
          MD5:02F63704CA632C50D822FAF180EFCD6D
          SHA1:B7422C9D1901B320C4BFDD9B030F3F3ABA4FD9A0
          SHA-256:F0E63E4ADDF7B88234A05D3885D30BA935867E6E062E6353F91D3E8075530512
          SHA-512:4354FE2B5012EF1E43D03E98A82C943450AB1325FF7282E619475138D15A61A5AEE3074F0AB9933C74EBF6E078229FAE8A9879E5C46F6D8D8ADC63A07B3AE0DA
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var AISVersionIndicator;..var IMONumber;..var CallSign;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var ETA;..var MaximumPresentStaticDraught;..var Destination;..var DTE;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 5){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. AISVersionIndicator = ubin(#bin,38,2);.. IMONumber = ubin(#bin,40,30);.. CallSign = str(#bin,70,42);.. Name = str(#bin,112,120);.. TypeOfShipAndCargoType = ubin(#bin,232,8);.. Dimension_ReferenceForPosition = ubin(#bin,240,30);.. TypeOfElectronicPositionFixingDevice = ubin(#bin,270,4);.. ETA = ubin(#bin,274,20);.. MaximumPresentStaticDraught = ubin(#bin
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2373
          Entropy (8bit):4.890773121214861
          Encrypted:false
          SSDEEP:48:gy0TA26InQSY4t0f0sIVxmyZVjsNcDxK4I0/0/EYSTX2zkxQBwdc/yfkM5ihT0YM:8826InQsqMsoxmyZVANc44Xc/EYSTX00
          MD5:AF38DCCA9DA67BE2101A1A1D242EDD3D
          SHA1:C3B003134DAFA46025E1701912749CC865664198
          SHA-256:A66FC035B313B7CF3AF1F2195D8A07AC342571D5642A47588A42B0DF32091351
          SHA-512:2861FB240EA10F75F026F963F2564E36B7ABFA9B9629E41BEE642F6DA1F3187C41F42842EAF0F6EA731197D7E84C666809B4D5456DD416B1F54E21EB01F254E1
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var RAIM_flag;..var DTE;..var AssignedModeFlag;....MessageId = ubin(#bin,0,6);..if (MessageId == 19){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy = ubin(#bin,56,1);.. Longitude = bin(#bin,57,28);.. Latitude = bin(#bin,85,27);.. COG = ubin(#bin,112,12);.. TrueHeading = ubin(#bin,124,9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):668
          Entropy (8bit):4.488552652178458
          Encrypted:false
          SSDEEP:12:TK31xMiHUpW+SAuSsPzcV5NWJP1cX+sx8/k1iJW51JBKV:gMiHUpW+SfS6c7NWJP1cOsxKkgJQ3BKV
          MD5:CEB1D9852B3CE681B48BE3F31CDA2661
          SHA1:3CD95E79245A2D6D7F05036A4E0FB9D9F4876191
          SHA-256:5FE3505C1167FA704A5A5942F721807E4ABFE5F0CF43C51AC1DDFB444E8567D6
          SHA-512:E06D92A490C304025264E77771A5FF61BFC44734628B86080764D84F518881020107F5AE5B7DA28547C2C6A284C908A402631B85FB7D5ADF7FE41DB59F31B666
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 10){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. Spare2 = ubin(#bin,70,2);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationID", DestinationID);.. map("Spare2", Spare2);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1979
          Entropy (8bit):4.694496363970113
          Encrypted:false
          SSDEEP:48:gc4+w7qr8QSZcZzoEiFRHcDxKcgPINP2R+a/tAJX2JJI1X23ae4P74PP4xQBKV:FQqRdzoEiFtc4cgANeR+a/tAJX6JI1XZ
          MD5:C201FB59451BC2AAAB451928DD56115F
          SHA1:0087F499E34D8489358842710527F5509FDFAD6A
          SHA-256:810219C0FB0683E606355DA8EE806FC2464204F7382531B4A7E965601BC8282A
          SHA-512:8F1BBCD9731C1F8864ACB4C2D506D334DF2A97E9DAFBC9A7E1204039B1297EBEFACB21740F2D6A22AC535603171665E33064C0577B047EABD21B253B048088F3
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var StationID;..var Spare1;..var ChannelA;..var ChannelB;..var Tx_RxMode;..var Power;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var AddressedOrBroadcastMessageIndicator;..var ChannelABandwidth;..var ChannelBBandwidth;..var TransitionalZoneSize;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 22){.... RepeatIndicator = ubin(#bin,6,2);.. StationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. ChannelA = ubin(#bin,40,12);.. ChannelB = ubin(#bin,52,12);.. Tx_RxMode = ubin(#bin,64,4);.. Power = ubin(#bin,68,1);.. Longitude1 = bin(#bin,69,18);.. Latitude1 = bin(#bin,87,17);.. Longitude2 = bin(#bin,104,18);.. Latitude2 = bin(#bin,1
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1159
          Entropy (8bit):5.205717296330583
          Encrypted:false
          SSDEEP:24:KM8XoGnkD+3v+8mu+YOHZJLNKicOsxK4YbgLaaRDTX2zEk0i:Ko8MHZvHcDxK4Y0+STX2zEk0i
          MD5:85DF7DEED13B2E2A4376B2AD6C131B1D
          SHA1:6B36A48779C01658AF8E240EE1F32D8BB3594D39
          SHA-256:C68B981D53C834ABA1C3C8E6AD379259B2994B3C1E40B0CA972F4307B0336185
          SHA-512:0EC16B8DC7B16F44E2A62EE464313CBB02956C6F67485B70322BE6B05C5C71C8A7944906F7B74BBC3C5F5457B07DC808BC78030D85BF251AD2D46556F2A5D7D5
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var PositionAccuracy;..var RAIM_flag;..var NavigationalStatus;..var Longitude;..var Latitude;..var SOG;..var COG;..var StatusOfCurrentGNSSPosition;..var Spare;......MessageId = ubin(#bin,0,6);..if (MessageId == 27){...RepeatIndicator =....ubin(#bin,6,2);...UserID =......ubin(#bin,8,30);...PositionAccuracy = ....ubin(#bin,38,1);...RAIM_flag = .....ubin(#bin,39,1);...NavigationalStatus = ...ubin(#bin,40,4);...Longitude = .....bin(#bin,44,18);...Latitude = ......bin(#bin,62,17);...SOG = .......ubin(#bin,79,6);...COG = .......ubin(#bin,85,9);...StatusOfCurrentGNSSPosition = .ubin(#bin,94,1);.. Spare =.......ubin(#bin,95,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PositionAccuracy", PositionAccuracy);.. map("RAIM_flag", RAIM_flag);.. map("NavigationalStatus", NavigationalStatus);.. map("Longitude", Longitude);.. map("Latitud
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):581
          Entropy (8bit):4.6431236091809724
          Encrypted:false
          SSDEEP:12:TK31xMiHu+yEFpSsPzsEbKcX+sx8/kcDDaESEM9:gMiHHXFpS6lbKcOsxKkcDz3i
          MD5:A28F2261023D79C75CCC9E5D8B69219F
          SHA1:E899D7CACCAE32DE98672A562D186E4F797D6DF5
          SHA-256:3A006C6F9E484EE9FB6E2E7CC515C5FD05A16C33E7915CAB069FED4E4299E4D4
          SHA-512:4A847D84EE2622FD463C17E049D0B6344EB6C25C83494D1378EB77A19421CC62862A9EBC8941B1F58D4D4B1DC667AD32DEF6C6F821FE8E8E3D3C93B2935DAC90
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 14){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. SafetyRelatedText = str(#bin,40,966);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):939
          Entropy (8bit):4.675230373795883
          Encrypted:false
          SSDEEP:24:KMiHrGpW+5HX9S6z4NWrvScOsxKkLvaF/JQ3acDz3i:K7LQd9S6z4ErvScDxKkLvaF/JQ3acDzy
          MD5:0ECC8274AE502CC175012918C9E074DD
          SHA1:E608C6ED9C1213720646F8B8D609E2C3E28E3FFE
          SHA-256:1E9364FF1692E6E964E8E5C4DF5287450A103D73673DF533FCEAC3FD0F626AC9
          SHA-512:D59C6FE37A8ACE1F89D34795F682AB164B8E82736C09826B2D7CACDEECB784FCA306D00F8CA4A985F6261CCE89188D53A9EADB260524F9E453D4BC56A3F3F2D0
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 12){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. SafetyRelatedText = str(#bin,72,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("SequenceNumber", SequenceNumber);.. map("DestinationID", DestinationID);.. map("RetransmitFlag", RetransmitFlag);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3805
          Entropy (8bit):4.611276851317889
          Encrypted:false
          SSDEEP:96:8TWfTcP0xdBIx16c44+8EYSTX0kxuw8c0MxdXBmNvcP0xdBIxbVxc44+8EYSTX02:W6n2xIc44+8EYSTX0kUw8c0MxdAd2xTl
          MD5:FB828325901EDFDA51D2D6CFBC7E579A
          SHA1:857758D7AE99B8BAF71BE50619C2F2539BCA8E97
          SHA-256:93320F89392E46FB99D1E68D6B3973B50CB6288CB8C657018D61B8872C0FF310
          SHA-512:7BA29D5397DF04099AA91CF62B11B6E2DB2EF07E0EBDDFBDF5190DD290075991C71572F1817376EB5324673079D34F320EDD8B190EEEB973B890108DA0DD7DEC
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var NavigationalStatus;..var RateOfTurn;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var SpecialManoeuvreIndicator;..var Spare;..var RAIM_flag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 1 ||.. MessageId == 2){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. NavigationalStatus = ubin(#bin,38,4);.. RateOfTurn = bin(#bin,42,8);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TrueHeading =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1082
          Entropy (8bit):4.7592453854016386
          Encrypted:false
          SSDEEP:24:KMiHHAGm516G/IS64MyWMe6ncOsxKkcIDYT/WV6x6aF/3y:K7NflS6zyWqncDxKkcIDk/W4EaF/3y
          MD5:E77346A17E0060A09283AF49EED157F1
          SHA1:C4E46B68D2AE3DA48C8E0B7CFF4DEA81B155ECAE
          SHA-256:03D2FA8A2DDAAA84A77F6B0663F4E3363A0C46A72BD2D9A5B62B7EA3FD231797
          SHA-512:C584376BF07508813754C6D5ED59BDE4E31850C5A64D6F20CAC2D7D6440FC3FF417D1CE1EFDF9A37A8AD76368488ABFEE3015BE91E5CFE27D3DEF4977907ABCD
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 8 ){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DAC = ubin(#bin,40,10);.. FunctionIdentifier = ubin(#bin,50,6); .. AcknowledgedRequiredFlag = ubin(#bin,56,1);.. TextSequenceNumber = ubin(#bin,57,11);.. ApplicationData = str(#bin,68,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("DAC", DAC);.. map("FunctionIdentifier", FunctionIdentifier);.. map("AcknowledgedRequiredFlag", AcknowledgedRequiredFlag);.. map("TextSequen
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2684
          Entropy (8bit):4.630482052007689
          Encrypted:false
          SSDEEP:48:KEAxbZXSYMtdBhRDttcDxK4YEYSTX2zkwuJYu0O0fyoUvyMxtXBmNSFTyoUSi6MW:AxbZXudBhRDttc44YEYSTX0kwuJYu0OT
          MD5:5FA0B3A565F825CFFD9BF4B61893276E
          SHA1:BF4B382123A2741DDC8448752161DC3E75104FE7
          SHA-256:FB541F6EE8B8AF9A5377180209FCE05896C29E6E5E8A2A7EA518F7753C1E7CB7
          SHA-512:CCD6C0B6C05E48AC580B323BFF6DD2A89D877FCA0C76F24711500337AB6FDE7F0A8C2CC4F128C12458BD53F29D3E011A944AA1F95379CB40C3B0803DE2E4D094
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var Altitude_GNSS;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TimeStamp;..var AltitudeSensor;..var Spare;..var DTE;..var AssignedModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 9){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. Altitude_GNSS = ubin(#bin,38,12);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TimeStamp = ubin(#bin,128,6);.. AltitudeSensor =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2373
          Entropy (8bit):4.890519075109663
          Encrypted:false
          SSDEEP:48:Ky0TA26InQSY4t0f0sIVxmyZVjsNcDxK4I0/0/EYSTX2zkxQBwdc/yfkM5ihT0YM:G826InQsqMsoxmyZVANc44Xc/EYSTX00
          MD5:6F3A69729D46573B6CA788F3A10890F8
          SHA1:089BBBEAC94FC5CA31367F119098CA977E399744
          SHA-256:7F471E0C9262FF6DF6D4A85662DD215E0C04445ACC628D993048F2394BF78372
          SHA-512:C9D62AFFAA8A80DB41AC4AEF56A300A4355EBAE5EBCD1B68E7FF17296BDF2FEAAE9C51299A5F04972745958AB63316D14E22B93110FE9BED4D3C3ABA541A6393
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var RAIM_flag;..var DTE;..var AssignedModeFlag;....MessageId = ubin(#bin,0,6);..if (MessageId == 19){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy = ubin(#bin,56,1);.. Longitude = bin(#bin,57,28);.. Latitude = bin(#bin,85,27);.. COG = ubin(#bin,112,12);.. TrueHeading = ubin(#bin,124,9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):5586
          Entropy (8bit):4.639847403164306
          Encrypted:false
          SSDEEP:96:882eWJa8sIwyrJxla8YYXcvk4SDXUExuQdcvUmG8sOtUMMxtXBmNE8sIwyrJxr4o:8FepnyrJxY8YYXcvk4SDXUE0QdcvUmGS
          MD5:A800676ACE24CC656B3012AA31519226
          SHA1:7FA9DBB6BE0A959B84E7BA5FB6EA4CB8B4903946
          SHA-256:D3C4C79BBD7D429B97459CCC3A7F956CD9B50D27E937746F85C4ADBD3F2FE7ED
          SHA-512:8463A21491ED0B44D583DD7685D3B39BF24727DCED9B903918B92CE8728BDA8623C444E863880DB2DD363B175332F29E98F904DD7F5DEFEC0CE2614D6A5A501C
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var ClassB_UnitFlag;..var ClassB_DisplayFlag;..var ClassB_DSCFlag;..var ClassB_BandFlag;..var ClassB_Message22Flag;..var ModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);....if (MessageId == 18){.. CommunicationStateSelectorFlag = ubin(#bin,148,1);.. if (CommunicationStateSelectorFlag == 0){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1213
          Entropy (8bit):4.497603067977456
          Encrypted:false
          SSDEEP:24:gMiHUpcyOpS6067SFS6c7CWn5k8C/cOsxKkgJvasQFJiBgeBKV:g7Gm+pFS6c7Vn5TC/cDxKkgJvasQFJi0
          MD5:F1966811115749C980CFB828B6A4AC80
          SHA1:C8984EC1925F7978D26AAB2F4E8CD3FD6DD3F4C8
          SHA-256:78B25ACB86E64B319EE08B74A73CD5BAC8B1266C84DE9B0C618EC4D46400F852
          SHA-512:156583344A3C172B3F4963FA06EA147707929C8353CC592B21464421F75C7A35E125A48D21DB3F7360AFE81CCE3484D16E3D9C42B2E0620688DA31811FC3120B
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationIDA;..var OffsetA;..var IncrementA;..var DestinationIDB;..var OffsetB;..var IncrementB;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 16){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationIDA = ubin(#bin,40,30);.. OffsetA = ubin(#bin,70,12);.. IncrementA = ubin(#bin,82,10);.. DestinationIDB = ubin(#bin,92,30);.. OffsetB = ubin(#bin,122,12);.. IncrementB = ubin(#bin,134,10);.. Spare2 = ubin(#bin,144,4);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare1", Spare1);.. map("DestinationIDA", DestinationI
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1045
          Entropy (8bit):4.3315941590307405
          Encrypted:false
          SSDEEP:24:CGF/ESfZ21C/zAGEuXlO7ydvG2pfrFBL578tIFoNS:CGF/ESfc1C/zAGEuXlO7ydvG2pf5BL5R
          MD5:65A5197B2A22BCB71A67C509DB96A955
          SHA1:A0BC652D915EE6447BF6CD00414DA7A7A87B2A72
          SHA-256:C853BC916807319BA9CE1759594B0BE7BC5BCF0939913E08E397598DDBB70086
          SHA-512:D7977BB15486FBD52044655AD24625F7DFC1A693D381A5072E34CBE6D65E8D26CF7707BD145F2C403CBCA5B430B6C6A0F0F5C2BB84C8C5612EDAFCD6E7104B0B
          Malicious:false
          Preview:#####################################################..0,0:0:0|VDM_table15..0,0:0:0|VDM_table16..0,0:0:0|VDM_table17..0,0:0:0|VDM_table19..0,0:0:0|VDM_table21..0,0:0:0|VDM_table22..0,0:0:0|VDM_table23..0,0:0:0|VDM_table24..0,0:0:0|VDM_table25..0,0:0:0|VDM_table26..0,0:0:0|VDM_table27..0,0:0:0|VDM_table28..0,0:0:0|VDM_table29..0,0:0:0|VDM_table31..0,0:0:0|VDM_table32..0,0:0:0|VDM_table33..0,0:0:0|VDM_table34..0,0:0:0|VDM_table35..0,0:0:0|VDM_message23..0,0:0:0|VDM_message24ab..0,0:0:0|VDM_message25..0,0:0:0|VDM_message26..0,0:0:0|VDM_message27..0,0:0:0|VDO_table15..0,0:0:0|VDO_table16..0,0:0:0|VDO_table17..0,0:0:0|VDO_table19..0,0:0:0|VDO_table21..0,0:0:0|VDO_table22..0,0:0:0|VDO_table23..0,0:0:0|VDO_table24..0,0:0:0|VDO_table25..0,0:0:0|VDO_table26..0,0:0:0|VDO_table27..0,0:0:0|VDO_table28..0,0:0:0|VDO_table29..0,0:0:0|VDO_table31..0,0:0:0|VDO_table32..0,0:0:0|VDO_table33..0,0:0:0|VDO_table34..0,0:0:0|VDO_table35..0,0:0:0|VDO_message23..0,0:0:0|VDO_message24ab..0,0:0:0|VDO_message25..0
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4969
          Entropy (8bit):4.620754023544724
          Encrypted:false
          SSDEEP:96:MdhXTQRgAbc4kgSTX0MJ4cGJLvaF/sVucik2kqc2cPE4TQQcgcIMoQcEQ/okswgS:M4aYc4kgSTX0i4cGJLvaJswcik2kqc2y
          MD5:0B5E6497C3FD19E9C225DD1F17CA61A4
          SHA1:019383E0EEFFA13E92F6BD8202A16D1E1BB77F95
          SHA-256:41FD761636E41A962EC81481CCC7BD0497ED57425920D79F9DBB9F0C1CE66C8B
          SHA-512:9F93F732D6A7F55614664E68EEAF482541F8FA93C42C645008FE8180B67A58C53DBAEC460779B755D502ADC8692C0E78F4D928977E7E237B8C926EF242B8B6C7
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude;..var Latitude;..var Spare2;..var MessageType;..var StationID;..var ZCount;..var SequenceNumber;..var N;..var Health;..var DGNSSDataWord1;..var DGNSSDataWord2;..var DGNSSDataWord3;..var DGNSSDataWord4;..var DGNSSDataWord5;..var DGNSSDataWord6;..var DGNSSDataWord7;..var DGNSSDataWord8;..var DGNSSDataWord9;..var DGNSSDataWord10;..var DGNSSDataWord11;..var DGNSSDataWord12;..var DGNSSDataWord13;..var DGNSSDataWord14;..var DGNSSDataWord15;..var DGNSSDataWord16;..var DGNSSDataWord17;..var DGNSSDataWord18;..var DGNSSDataWord19;..var DGNSSDataWord20;..var DGNSSDataWord21;..var DGNSSDataWord22;..var DGNSSDataWord23;..var DGNSSDataWord24;..var DGNSSDataWord25;..var DGNSSDataWord26;..var DGNSSDataWord27;..var DGNSSDataWord28;..var DGNSSDataWord29;....MessageId = ubin(#bin,0,6);..if (MessageId == 17){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ub
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):581
          Entropy (8bit):4.649836405273726
          Encrypted:false
          SSDEEP:12:TU31xMiHu+yEFpSsPzsEbKcX+sx8/kcDDaESEM9:KMiHHXFpS6lbKcOsxKkcDz3i
          MD5:876F56F0ADEB0AE293A3ACEA76BFF33C
          SHA1:5C7C99F1107070DC424E187F6EACB025AAA51106
          SHA-256:A74B508C93E6EEECFB3104DCCB6D7E886400D7670A6389C9E6E5D60C4EFCDA3B
          SHA-512:E7DEFACF18B36F948F3BAFBDC8FC732E080076460B0EEAE67536C25D73E4FA88388A0414FC3799A799653EFEBA9EA6473800355CD49E3847C0BC5F209D2B5F98
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 14){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. SafetyRelatedText = str(#bin,40,966);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):6530
          Entropy (8bit):5.1615127233447256
          Encrypted:false
          SSDEEP:192:mfc4kGCAwx+XxqL1x+mxeB7wx+XxkL1x+mxC:+c4kG7d
          MD5:A915C6861C7ABCDCE70573880F4F3F2A
          SHA1:993FBA37CC0FBA1B9AE2381036480F7B13DE4AC9
          SHA-256:60ECB0E990DD32A7F0E6DB3CFA98E5B71EC9DB9B54E4DFE28B2153C9F5CAE88A
          SHA-512:9C78B1C4BABDA7747BD64BF866ADDACD516208DA409DDEDCE015A96545C7858B518B73875E6D73A161E0871B344927DC2A5D1ADC0F25836300BEBC61180ED1B0
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;..var BinaryDataAddedBy2ndSlot;..var BinaryDataAddedBy3rdSlot;..var BinaryDataAddedBy4thSlot;..var BinaryDataAddedBy5thSlot;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;......MessageId = ubin(#bin,0,6);..if (MessageId == 26){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("DestinationIndicator", DestinationIndicator);.. map("BinaryDataFlag", BinaryDataFlag);.... ...if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =......strHex(#bin,40,108);.....BinaryDataAddedBy2ndSl
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1979
          Entropy (8bit):4.695298593428696
          Encrypted:false
          SSDEEP:48:Kc4+w7qr8QSZcZzoEiFRHcDxKcgPINP2R+a/tAJX2JJI1X23ae4P74PP4xQBKV:LQqRdzoEiFtc4cgANeR+a/tAJX6JI1XZ
          MD5:7ADC81684CE93D9EA5098B5764555AB3
          SHA1:9958A4832FB1C281EA3D5D283D1F679A3C76D27E
          SHA-256:9DF448B3006705A04D8A35A95B958EFC817BDCFF20D963BB660E63565E621BEC
          SHA-512:60126FD888AC9B57601383D72B623EE00868C3BBE8355D4F5376760FA82155654A1FFDC56D6A968AA62DD6F1AD64A45F5D69EAA1EFD716240A5B4A0F3EB92C27
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var StationID;..var Spare1;..var ChannelA;..var ChannelB;..var Tx_RxMode;..var Power;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var AddressedOrBroadcastMessageIndicator;..var ChannelABandwidth;..var ChannelBBandwidth;..var TransitionalZoneSize;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 22){.... RepeatIndicator = ubin(#bin,6,2);.. StationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. ChannelA = ubin(#bin,40,12);.. ChannelB = ubin(#bin,52,12);.. Tx_RxMode = ubin(#bin,64,4);.. Power = ubin(#bin,68,1);.. Longitude1 = bin(#bin,69,18);.. Latitude1 = bin(#bin,87,17);.. Longitude2 = bin(#bin,104,18);.. Latitude2 = bin(#bin,1
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2684
          Entropy (8bit):4.630450415113706
          Encrypted:false
          SSDEEP:48:gEAxbZXSYMtdBhRDttcDxK4YEYSTX2zkwuJYu0O0fyoUvyMxtXBmNSFTyoUSi6MW:2xbZXudBhRDttc44YEYSTX0kwuJYu0OT
          MD5:7C6D3706CF486BC3A68D0F9E6876CB8E
          SHA1:A16C9B5403495221DC78AA6068ED8F68A1A2C300
          SHA-256:67B60CF4A60AD08CE16DB988D7C0569C84D992FF0FDE707F5B5BEEB0033B062C
          SHA-512:64440A3139D8E8BB6507AB49C8DEDA87233302F802A580D3C8C62EA8511E16DCD72A3A8FBC24A54909604D2B51A3C6C772E2769BD4774784CC1128BCD7016A01
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var Altitude_GNSS;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TimeStamp;..var AltitudeSensor;..var Spare;..var DTE;..var AssignedModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 9){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. Altitude_GNSS = ubin(#bin,38,12);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TimeStamp = ubin(#bin,128,6);.. AltitudeSensor =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1082
          Entropy (8bit):4.755640824837969
          Encrypted:false
          SSDEEP:24:gMiHHAGm516G/IS64MyWMe6ncOsxKkcIDYT/WV6x6aF/3y:g7NflS6zyWqncDxKkcIDk/W4EaF/3y
          MD5:8DFD0E9E102C6545B0EEEF75FB84C533
          SHA1:67CE065E9AE30CDE1EFF24B81E035914B2392D81
          SHA-256:8479E9D60F5BA54DE40E609F2315F1B125ADCB8C9A325B875AD14E71391B7910
          SHA-512:ACD1414C7FF670AEAF560AE55AB6871D0E310B8E2DA823AC90229E39ACD5795081D3A1734151161545E44FDBA76F9BBE2BC084EA75BDF422126D9F769AB66819
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 8 ){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare = ubin(#bin,38,2);.. DAC = ubin(#bin,40,10);.. FunctionIdentifier = ubin(#bin,50,6); .. AcknowledgedRequiredFlag = ubin(#bin,56,1);.. TextSequenceNumber = ubin(#bin,57,11);.. ApplicationData = str(#bin,68,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("Spare", Spare);.. map("DAC", DAC);.. map("FunctionIdentifier", FunctionIdentifier);.. map("AcknowledgedRequiredFlag", AcknowledgedRequiredFlag);.. map("TextSequen
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1658
          Entropy (8bit):4.65722864227426
          Encrypted:false
          SSDEEP:48:K7fwCCPbpS6cXksPB6gOQnacDxKkgtAJX2JJI1X23AfkBKJR+aRUi:9V6ksPkrQac4kgtAJX6JI1X8AfkMJR+q
          MD5:E377A25E90FDFD43310B953A74D79AAE
          SHA1:A2E36874D6EF7EE01418D0E6BE0D840D0A34DBC4
          SHA-256:15E4B1E1A5A66737D042334F4EAEDC955BFE4AD636B692CE59950B89E6C7AF20
          SHA-512:64C997D5F7E8E233F12D1C2D62AFE4AC26BA4E75B2F33A04A664ECF6B50D222C03ABB182846711C367ABAB22D8BEEDCF78774285A43092EA56A5120C807C5F3C
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var StationType;..var TypeOfShipAndCargoType;..var Spare2;..var Tx_RxMode;..var ReportingInterval;..var QuietTime;..var Spare3;....MessageId = ubin(#bin,0,6);..if (MessageId == 23){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. Longitude1 = bin(#bin,40,18);.. Latitude1 = bin(#bin,58,17);.. Longitude2 = bin(#bin,75,18);.. Latitude2 = bin(#bin,93,17);.. StationType = ubin(#bin,110,4);.. TypeOfShipAndCargoType = ubin(#bin,114,8);.. Spare2 = ubin(#bin,122,22);.. Tx_RxMode = ubin(#bin,144,2);.. ReportingInterval = ubin(#bin,146,4)
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):6530
          Entropy (8bit):5.1615921348542635
          Encrypted:false
          SSDEEP:192:kfc4kGCAwx+XxqL1x+mxeB7wx+XxkL1x+mxC:wc4kG7d
          MD5:83FA3A2040435251FE10CF541AAAED24
          SHA1:DDAAB923834F825EB10E58408DE42FC793D3AB41
          SHA-256:31088D56EC40EA27E13DBB1252228B1B2C0BD80EEFEE23900F1E7855B0FA3332
          SHA-512:5DC3F093BE941DFBF62C8BBC79AFA95762E3D24C6F7272263B424A6E8D3CDD9C41BC6E748C0E493E42A738210084EFE7A36663E56CB10CD7BF637E4B1841D9D5
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;..var BinaryDataAddedBy2ndSlot;..var BinaryDataAddedBy3rdSlot;..var BinaryDataAddedBy4thSlot;..var BinaryDataAddedBy5thSlot;..var CommunicationStateSelectorFlag;..var SyncState;..var SlotTime_Out;..var SubMessage;..var SlotIncrement;..var NumberOfSlots;..var Keep_flag;......MessageId = ubin(#bin,0,6);..if (MessageId == 26){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("DestinationIndicator", DestinationIndicator);.. map("BinaryDataFlag", BinaryDataFlag);.... ...if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =......strHex(#bin,40,108);.....BinaryDataAddedBy2ndSl
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2270
          Entropy (8bit):4.809327791805813
          Encrypted:false
          SSDEEP:48:Kfo/v+2LZlUSYjt0hJ2cuyopDfkvLcDxK4s8ikMp2MB9hiYSTX2z5ihTxs28s2By:ttLZlUl0h4cux16c44s8ikMp2MbgYSTL
          MD5:8D8B7DFA75A9CB9532D13D4C1AE1704F
          SHA1:A50076A9017CA67951293FA30260A9CED748D6DD
          SHA-256:78958DA440A256FFAAC5B87B1A54001CB471CA08F1E96A923E22011C6F7B63B7
          SHA-512:EDD0D8CD3019990877C36FB8A2FBC8430586B582E52A0DE94AB7EE368DEE57AFC3094CB2CF27D9FDBB83ADBD0D81AF0DE4CF2F1DF5520EEC89FC6F4FA38D2C09
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var UTCYear;..var UTCMonth;..var UTCDay;..var UTCHour;..var UTCMinute;..var UTCSecond;..var PositionAccuracy;..var Longitude;..var Latitude;..var TypeOfElectronicPositionFixingDevice;..var TransmissionControlForLongrangeBroadcastMessage;..var Spare;..var RAIM_flag;..var SyncState;..var SlotTime_Out;..var SubMessage;....MessageId = ubin(#bin,0,6);..if (MessageId == 4 ||.. MessageId == 11){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. UTCYear = ubin(#bin,38,14);.. UTCMonth = ubin(#bin,52,4);.. UTCDay = ubin(#bin,56,5);.. UTCHour = ubin(#bin,61,5);.. UTCMinute = ubin(#bin,66,6);.. UTCSecond = ubin(#bin,72,6);.. PositionAccuracy = ubin(#bin,78,1);.. Longitude =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1658
          Entropy (8bit):4.656577064794492
          Encrypted:false
          SSDEEP:48:g7fwCCPbpS6cXksPB6gOQnacDxKkgtAJX2JJI1X23AfkBKJR+aRUi:7V6ksPkrQac4kgtAJX6JI1X8AfkMJR+q
          MD5:D32142014DD9E5C0628644B0D05622EF
          SHA1:6F0109D3C995D1708DA67BD1C125932C9615D284
          SHA-256:0519593353B968F7F634ABBA6211B445074322F2344FEF05AF147BA964F883DB
          SHA-512:D50C5A89FD5D4A55661D07A0BA99DE11E99F23A1F04E91929A0AF504E6427D183BC227166A4649A310031784ECEED2877A2658768BABE98341BFA2106B997920
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude1;..var Latitude1;..var Longitude2;..var Latitude2;..var StationType;..var TypeOfShipAndCargoType;..var Spare2;..var Tx_RxMode;..var ReportingInterval;..var QuietTime;..var Spare3;....MessageId = ubin(#bin,0,6);..if (MessageId == 23){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. Longitude1 = bin(#bin,40,18);.. Latitude1 = bin(#bin,58,17);.. Longitude2 = bin(#bin,75,18);.. Latitude2 = bin(#bin,93,17);.. StationType = ubin(#bin,110,4);.. TypeOfShipAndCargoType = ubin(#bin,114,8);.. Spare2 = ubin(#bin,122,22);.. Tx_RxMode = ubin(#bin,144,2);.. ReportingInterval = ubin(#bin,146,4)
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):5586
          Entropy (8bit):4.639872418726296
          Encrypted:false
          SSDEEP:96:G82eWJa8sIwyrJxla8YYXcvk4SDXUExuQdcvUmG8sOtUMMxtXBmNE8sIwyrJxr4o:GFepnyrJxY8YYXcvk4SDXUE0QdcvUmGS
          MD5:F86CB804C7E51DEAFA614D07A5B5F71B
          SHA1:98D7346554402971F6C34BD0B38D0CEF3439304F
          SHA-256:6D80DD72D8D50974DFF95CBC0F41E39F4069B68AC6B6F91D7C1523CBF8510F22
          SHA-512:4DBE448D29357F6AD2BEBCDD3FF8CE543362940776A022A87C2A75F2D243065055EBA9F5DED5D54870E574CE80BC437E71C7C8648D6A453FC0CB8774C236D312
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var ReservedForRegionalOrLocalApplications;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var ReservedForRegionalApplications;..var ClassB_UnitFlag;..var ClassB_DisplayFlag;..var ClassB_DSCFlag;..var ClassB_BandFlag;..var ClassB_Message22Flag;..var ModeFlag;..var RAIM_flag;..var CommunicationStateSelectorFlag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);....if (MessageId == 18){.. CommunicationStateSelectorFlag = ubin(#bin,148,1);.. if (CommunicationStateSelectorFlag == 0){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. ReservedForRegionalOrLocalApplications = ubin(#bin,38,8);.. SOG = ubin(#bin,46,10);.. PositionAccuracy =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1685
          Entropy (8bit):4.582404421318364
          Encrypted:false
          SSDEEP:48:g7GuSPGS6c7lh9YtVBcDxKkgJ/q2kBKJkEcJyR80/g:QXBc4kgc2kMJkEcy80/g
          MD5:AEC39D3C44EF9A4AD85EAF88B3BC0AE4
          SHA1:E58692F76F4A77D30F2DE391F6E7C83127966A5A
          SHA-256:0C48F29A146F847A20B3EF8229D792A667B1CAACB76E918863BFB8ED2C084982
          SHA-512:E2CFABF3DC560A478EC50217DE1FEF8A89BE7CD5EFF4B62FF092C592E3DBC2BC2E0CA811F6AE403B65FFD221838086E83D9EED2985F0209D5C27CD5BA683915C
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID1;..var MessageID1_1;..var SlotOffset1_1;..var Spare2;..var MessageID1_2;..var SlotOffset1_2;..var Spare3;..var DestinationID2;..var MessageID2_1;..var SlotOffset2_1;..var Spare4;....MessageId = ubin(#bin,0,6);..if (MessageId == 15){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. MessageID1_1 = ubin(#bin,70,6);.. SlotOffset1_1 = ubin(#bin,76,12);.. Spare2 = ubin(#bin,88,2);.. MessageID1_2 = ubin(#bin,90,6);.. SlotOffset1_2 = ubin(#bin,96,12);.. Spare3 = ubin(#bin,108,2);.. DestinationID2 = ubin(#bin,110,30);.. MessageID2_1 = ubin(#bin,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1435
          Entropy (8bit):4.733545938429769
          Encrypted:false
          SSDEEP:24:gMiHrGpW+5HAGm516G/dBS6z4NWr5I6NQcOsxKkLvaF/JQ3acIDYT/WV6x6aF/3y:g7LQHf+S6z4Er5dOcDxKkLvaF/JQ3acA
          MD5:EBB74D32511FC192E9515B34BDE27BCF
          SHA1:B30B8F09959AE516993B1A91A9B39D73A5059E8B
          SHA-256:A1110A7CA10FAA20FA25FF05C5094CE00258F2951C77AD55111BA6EC241BEB9B
          SHA-512:F6C3F5687F6C849F74AD5A6D18BB13DC02D77D4B89F198E86763113C1ED65F63DFC673891FD0FF769164D61CD7F8C74A2E5EB8B8660D41ED0069CC8D241EF7B8
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 6 ){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. DAC = ubin(#bin,72,10);.. FunctionIdentifier = ubin(#bin,82,6);.. AcknowledgedRequiredFlag = ubin(#bin,88,1);.. TextSequenceNumber = ubin(#bin,89,11);.. ApplicationData = str(#bin,100,906);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndic
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3805
          Entropy (8bit):4.6112502300957185
          Encrypted:false
          SSDEEP:96:KTWfTcP0xdBIx16c44+8EYSTX0kxuw8c0MxdXBmNvcP0xdBIxbVxc44+8EYSTX02:o6n2xIc44+8EYSTX0kUw8c0MxdAd2xTl
          MD5:08A27D7DAB316E88B8983F53967B5341
          SHA1:2A4F12A483E5E96A8E8A067BCF4D49F566EEB9A5
          SHA-256:C98467BC48919E9808BF3F70DA3187CF5D91D3B63012ADCCDFC7EDBD4FB5E246
          SHA-512:20202D926A44AE7B0C64ACEF17A195C9D3FE211822E0A47E41BAB3241667D9B34DBA35231F403D12D6C821AEF7E4A5AE4D2606A09DD6B5A47CF94B1FF2716AE5
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var NavigationalStatus;..var RateOfTurn;..var SOG;..var PositionAccuracy;..var Longitude;..var Latitude;..var COG;..var TrueHeading;..var TimeStamp;..var SpecialManoeuvreIndicator;..var Spare;..var RAIM_flag;..var SyncState;....var SlotTime_Out;..var SubMessage;....var SlotIncrement;..var NumberOfSlots;..var Keep_flag;....MessageId = ubin(#bin,0,6);..if (MessageId == 1 ||.. MessageId == 2){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. NavigationalStatus = ubin(#bin,38,4);.. RateOfTurn = bin(#bin,42,8);.. SOG = ubin(#bin,50,10);.. PositionAccuracy = ubin(#bin,60,1);.. Longitude = bin(#bin,61,28);.. Latitude = bin(#bin,89,27);.. COG = ubin(#bin,116,12);.. TrueHeading =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1435
          Entropy (8bit):4.7362638022136645
          Encrypted:false
          SSDEEP:24:KMiHrGpW+5HAGm516G/dBS6z4NWr5I6NQcOsxKkLvaF/JQ3acIDYT/WV6x6aF/3y:K7LQHf+S6z4Er5dOcDxKkLvaF/JQ3acA
          MD5:A4AC9A0128F2B41237A8E46BC91ACD30
          SHA1:3E711BFE84B4FCD9E43F9341B87D1E33F32905A6
          SHA-256:86CA1226C781E7F196880151F31E06470F5DE2BF2B2D99E6CCDA10C213D65E7C
          SHA-512:B6F9E79DEC0A45112D9C558CF4ED9146802D4FF88A59FFE7375449111FE261696A5E99B3ED9FA24E89B34663ECC6EEDB1553F8030B5ED6055EF5E69452386838
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var DAC;..var FunctionIdentifier;..var AcknowledgedRequiredFlag;..var TextSequenceNumber;..var ApplicationData;....MessageId = ubin(#bin,0,6);..if (MessageId == 6 ){.. RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. DAC = ubin(#bin,72,10);.. FunctionIdentifier = ubin(#bin,82,6);.. AcknowledgedRequiredFlag = ubin(#bin,88,1);.. TextSequenceNumber = ubin(#bin,89,11);.. ApplicationData = str(#bin,100,906);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndic
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1159
          Entropy (8bit):5.206059151715646
          Encrypted:false
          SSDEEP:24:gM8XoGnkD+3v+8mu+YOHZJLNKicOsxK4YbgLaaRDTX2zEk0i:go8MHZvHcDxK4Y0+STX2zEk0i
          MD5:49C18CBF5D067407D73FEC29DA1D2014
          SHA1:72BCF26A725B923E0717D71D703357E368BAADE8
          SHA-256:6037FD2028119CC82B40116AFE7077841D9C21DC257AB4B385BDD3DACA81E7B6
          SHA-512:9BAAAD149EFB3B0F01854DF7FFC51E5C9543FAA449554DB2D96B8DCF6AF2A389E77824DBF248C0DFC925CB585AD0B0086E9AC6EF1F40CA59F19294D0FCEC59E2
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var PositionAccuracy;..var RAIM_flag;..var NavigationalStatus;..var Longitude;..var Latitude;..var SOG;..var COG;..var StatusOfCurrentGNSSPosition;..var Spare;......MessageId = ubin(#bin,0,6);..if (MessageId == 27){...RepeatIndicator =....ubin(#bin,6,2);...UserID =......ubin(#bin,8,30);...PositionAccuracy = ....ubin(#bin,38,1);...RAIM_flag = .....ubin(#bin,39,1);...NavigationalStatus = ...ubin(#bin,40,4);...Longitude = .....bin(#bin,44,18);...Latitude = ......bin(#bin,62,17);...SOG = .......ubin(#bin,79,6);...COG = .......ubin(#bin,85,9);...StatusOfCurrentGNSSPosition = .ubin(#bin,94,1);.. Spare =.......ubin(#bin,95,1);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PositionAccuracy", PositionAccuracy);.. map("RAIM_flag", RAIM_flag);.. map("NavigationalStatus", NavigationalStatus);.. map("Longitude", Longitude);.. map("Latitud
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1942
          Entropy (8bit):4.944196219842957
          Encrypted:false
          SSDEEP:48:g7J1Rh2Nz4ODxUWJ6fCVrODxUWJ6fuoLJlODxUWJ6fgJQ/VMODxUWJ6fgJQq:T4OaWQ2rOaWQ1lOaWQgEMOaWQgD
          MD5:6CBAFD95C614454E3B8E372817EE3FDA
          SHA1:51324E5242866262673C2B6A7F2B1C313EB0401B
          SHA-256:CA3190EC432D04CE92A9F13F238484221F401061BEC8FAED4348AA3C8508EFEA
          SHA-512:0FD452A0A627928CE8B1328E1091FBF822D74E552F81102399D7FF34E4B2D1FD10E521D8FE3E887C808C114746C93DC5CBB28A6F4F630C8900F30EBA5A620DCD
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var DestinationIndicator;..var BinaryDataFlag;..var DestinationID;..var BinaryData;......MessageId = ubin(#bin,0,6);..if (MessageId == 25){.....RepeatIndicator =....ubin(#bin,6,2);...SourceID =......ubin(#bin,8,30);...DestinationIndicator =...ubin(#bin,38,1);...BinaryDataFlag =....ubin(#bin,39,1);.....if (DestinationIndicator == 0) {....if (BinaryDataFlag == 0) {.....BinaryData =....strHex(#bin,40,128);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);.... map("BinaryDataFlag", BinaryDataFlag);.....map("BinaryData", BinaryData);....}....else if (BinaryDataFlag == 1) {.....BinaryData =....strHex(#bin,40,112);...... map("MessageId", MessageId);.... map("RepeatIndicator", RepeatIndicator);.... map("SourceID", SourceID);.... map("DestinationIndicator", DestinationIndicator);
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):939
          Entropy (8bit):4.671076875893976
          Encrypted:false
          SSDEEP:24:gMiHrGpW+5HX9S6z4NWrvScOsxKkLvaF/JQ3acDz3i:g7LQd9S6z4ErvScDxKkLvaF/JQ3acDzy
          MD5:73496C60D3431A20685EDDE4FBD88748
          SHA1:1F04A3E7FE04A57A8D508DB7E0AF167171CBBC74
          SHA-256:F1AFE5FA585384C9A609345ECA1CA7FF4C3E32FB1AB8AC3E8098792DEFDE7B3F
          SHA-512:A8E17CF73160A99276A40C925615ABE8F2E4765DF859683AEB352A59A347B1B16A2F41AB67DD44462DEFCD2E13E14A6CE5C0704FFC0191BD3BAA44AD8B623DE0
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceID;..var SequenceNumber;..var DestinationID;..var RetransmitFlag;..var Spare;..var SafetyRelatedText;....MessageId = ubin(#bin,0,6);..if (MessageId == 12){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. SequenceNumber = ubin(#bin,38,2);.. DestinationID = ubin(#bin,40,30);.. RetransmitFlag = ubin(#bin,70,1);.. Spare = ubin(#bin,71,1);.. SafetyRelatedText = str(#bin,72,936);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("SourceID", SourceID);.. map("SequenceNumber", SequenceNumber);.. map("DestinationID", DestinationID);.. map("RetransmitFlag", RetransmitFlag);.. map("Spare", Spare);.. map("SafetyRelatedText", SafetyRelatedText);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1685
          Entropy (8bit):4.58269262036734
          Encrypted:false
          SSDEEP:48:K7GuSPGS6c7lh9YtVBcDxKkgJ/q2kBKJkEcJyR80/g:WXBc4kgc2kMJkEcy80/g
          MD5:55730594AEB619252754C447E5E8010C
          SHA1:4974469F00CB2F2AA9ACE609C50F10649641B423
          SHA-256:BDE724937067176B94557BA1AB9F09AB72191B5F9C9363A908EB61A33FBA46F8
          SHA-512:86BECC2379323115BE82E0C0F143ABF01861386B0700E7A90357EB52A8560640593BCFC80BD77C22753FC4B6836503936151F317E0DCF6474EFBDE9A2DB92869
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var DestinationID1;..var MessageID1_1;..var SlotOffset1_1;..var Spare2;..var MessageID1_2;..var SlotOffset1_2;..var Spare3;..var DestinationID2;..var MessageID2_1;..var SlotOffset2_1;..var Spare4;....MessageId = ubin(#bin,0,6);..if (MessageId == 15){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. DestinationID1 = ubin(#bin,40,30);.. MessageID1_1 = ubin(#bin,70,6);.. SlotOffset1_1 = ubin(#bin,76,12);.. Spare2 = ubin(#bin,88,2);.. MessageID1_2 = ubin(#bin,90,6);.. SlotOffset1_2 = ubin(#bin,96,12);.. Spare3 = ubin(#bin,108,2);.. DestinationID2 = ubin(#bin,110,30);.. MessageID2_1 = ubin(#bin,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1838
          Entropy (8bit):4.853931101960552
          Encrypted:false
          SSDEEP:48:KYIJPSYIIFRNWcDxK4c+F/TGyfkM5ihTE34JNoYi:fI9PzEc44c+F/yyfkM5ihTEoMYi
          MD5:292243A99DBFEA030E07AC41B06EAA3B
          SHA1:0593054762979355BB5E9C7045F159B450476C56
          SHA-256:45ED8601C3580033614AA92B7CAA4A6DEB8FADFB1C9BCCC37AB469AA991C8019
          SHA-512:B2AC1F95B52AA509CE3428E4B1BF85FA410997DB20C850F8DA5790C9606F9E347A16A2A3975ACE559EC57424A3FBF38343746995316F2574A0DF89C52F3AB8FB
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var AISVersionIndicator;..var IMONumber;..var CallSign;..var Name;..var TypeOfShipAndCargoType;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var ETA;..var MaximumPresentStaticDraught;..var Destination;..var DTE;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 5){.... RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. AISVersionIndicator = ubin(#bin,38,2);.. IMONumber = ubin(#bin,40,30);.. CallSign = str(#bin,70,42);.. Name = str(#bin,112,120);.. TypeOfShipAndCargoType = ubin(#bin,232,8);.. Dimension_ReferenceForPosition = ubin(#bin,240,30);.. TypeOfElectronicPositionFixingDevice = ubin(#bin,270,4);.. ETA = ubin(#bin,274,20);.. MaximumPresentStaticDraught = ubin(#bin
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4969
          Entropy (8bit):4.621697866558589
          Encrypted:false
          SSDEEP:96:mdhXTQRgAbc4kgSTX0MJ4cGJLvaF/sVucik2kqc2cPE4TQQcgcIMoQcEQ/okswgS:m4aYc4kgSTX0i4cGJLvaJswcik2kqc2y
          MD5:6C551F89800A1B5F2818FEB92BAD1129
          SHA1:D446EA1576FF981951CFA621F13673B5CEFEB8A0
          SHA-256:4F790FC6E2E3FB08EFA4728A871232D6A4BF6B685616E80BE2602A880EDDECDD
          SHA-512:20C8659577692821FC0F321A145BB056FFC12E73D2FFE306FC7235EBFA1FC0B1D53B0362B0BABCB6BEE4D92A162BDED006AC81B7D25DEC27E0EBBE423BDB0505
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var SourceID;..var Spare1;..var Longitude;..var Latitude;..var Spare2;..var MessageType;..var StationID;..var ZCount;..var SequenceNumber;..var N;..var Health;..var DGNSSDataWord1;..var DGNSSDataWord2;..var DGNSSDataWord3;..var DGNSSDataWord4;..var DGNSSDataWord5;..var DGNSSDataWord6;..var DGNSSDataWord7;..var DGNSSDataWord8;..var DGNSSDataWord9;..var DGNSSDataWord10;..var DGNSSDataWord11;..var DGNSSDataWord12;..var DGNSSDataWord13;..var DGNSSDataWord14;..var DGNSSDataWord15;..var DGNSSDataWord16;..var DGNSSDataWord17;..var DGNSSDataWord18;..var DGNSSDataWord19;..var DGNSSDataWord20;..var DGNSSDataWord21;..var DGNSSDataWord22;..var DGNSSDataWord23;..var DGNSSDataWord24;..var DGNSSDataWord25;..var DGNSSDataWord26;..var DGNSSDataWord27;..var DGNSSDataWord28;..var DGNSSDataWord29;....MessageId = ubin(#bin,0,6);..if (MessageId == 17){.... RepeatIndicator = ubin(#bin,6,2);.. SourceID = ub
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2389
          Entropy (8bit):4.963806832412181
          Encrypted:false
          SSDEEP:48:Kbl8K0/iBSBrJ52aOt0+uKTcDxKKa4+XgYSTX2zM5ihTwrYI0/0/0Tgu0Oa:ZJ/iB+J52aOq+uKTc4Ka4+XgYSTX0M5n
          MD5:A4301C435AB0957C052AEBC900E5EDA7
          SHA1:9222D178AFD897173586D87393E28CBDF683678D
          SHA-256:838BFD687CDFF728A4115EEA3DD320AD79487979D91B8F9B6B040C46E0D6F562
          SHA-512:3C85E1EF1715F97714A03B984366DF4E6C2393814CE4B81E7CF207BB5395B11266E0A4AF7691DDDB7AD1726403D21D21CC37E9640C7004F67523B0683687F4CC
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var ID;..var TypeOfAids_To_Navigation;..var NameOfAids_To_Navigation;..var PositionAccuracy;..var Longitude;..var Latitude;..var Dimension_ReferenceForPosition;..var TypeOfElectronicPositionFixingDevice;..var TimeStamp;..var Off_PositionIndicator;..var ReservedForRegionalOrLocalApplications;..var RAIM_flag;..var Virtual_AtoN_flag;..var AssignedModeFlag;..var NameOfAidToNavigationExtension;..var Spare;....MessageId = ubin(#bin,0,6);..if (MessageId == 21){.... RepeatIndicator = ubin(#bin,6,2);.. ID = ubin(#bin,8,30);.. TypeOfAids_To_Navigation = ubin(#bin,38,5);.. NameOfAids_To_Navigation = str(#bin,43,120);.. PositionAccuracy = ubin(#bin,163,1);.. Longitude = bin(#bin,164,28);.. Latitude = bin(#bin,192,27);.. Dimension_ReferenceForPosition = ubin(#bin,219,30);.. TypeOfElectronicPositionFixi
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1764
          Entropy (8bit):4.641806635168766
          Encrypted:false
          SSDEEP:48:KAK6eaSYL8DxKYeFvbzl08DxKYeFvfETmTGxk8kFE:jK6ea38YYeFvbzu8YYeFvfETmyxk8kFE
          MD5:67F142757376FBA905ED6F41F5C93B4F
          SHA1:10C4E2A99321B2DCC3FD8C9AA5EE2481FB8A7F0C
          SHA-256:CB8B63B022B1784CECBB55190E61F1308363E02BA682A761D0A1C0C05A50A444
          SHA-512:A0EF26B8FFB6AAB5516B9AD28C218CD1C8CDCE443E183081B11D8A06208AFEA17C735287665EB7B05C3F8F3324161205A5796D67C65C2A3BAA97E4381D53359D
          Malicious:false
          Preview:Search for AIVDO....var MessageId;....var RepeatIndicator;..var UserID;..var PartNumber;....var Name;....var TypeOfShipAndCargoType;..var VendorID;..var CallSign;..var Dimension_ReferenceForPosition;..var ManufacturerID;..var UnitModelCode;..var UnitSerialNumber;....MessageId = ubin(#bin,0,6);....if (MessageId == 24){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. PartNumber = ubin(#bin,38,2);.... if (PartNumber == 0){.. Name = str(#bin,40,120);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PartNumber", PartNumber);.. map("Name", Name);.. }.. else if (PartNumber == 1){.. TypeOfShipAndCargoType = ubin(#bin,40,8);.. VendorID = str(#bin,48,42);.. CallSign = str(#bin,90,42);.. Dimension_R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2388
          Entropy (8bit):4.595677246392144
          Encrypted:false
          SSDEEP:48:g7yTG4T0eS6cnBRn9ovG+64bcDxKcgAclek8Zk4H1+40ro0cKiHSBKV:7TrTruBfMG+Rc4cgAclek8Zk4H1+40r4
          MD5:39832F29DDF54ED5059462922C4FDE5E
          SHA1:00F8777F4245EAFCB7F9ED04FC1F582CA143F931
          SHA-256:8DE6916A690FEFA550B5DDB020F2563BEDEE3FE4F7D6C64F68B45473B54E5D4F
          SHA-512:7641DE369F3C6A184093F1E4C45F37FEF1C3EF5B6EAD896E079150906498604A03C38B2F2E8BE26A01491E9903E8D697CD0F776F3F8D217DDE8B6BB5098C32A2
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var SourceStationID;..var Spare1;..var OffsetNumber1;..var NumberOfSlots1;..var Time_Out1;..var Increment1;..var OffsetNumber2;..var NumberOfSlots2;..var Time_Out2;..var Increment2;..var OffsetNumber3;..var NumberOfSlots3;..var Time_Out3;..var Increment3;..var OffsetNumber4;..var NumberOfSlots4;..var Time_Out4;..var Increment4;..var Spare2;....MessageId = ubin(#bin,0,6);..if (MessageId == 20){.... RepeatIndicator = ubin(#bin,6,2);.. SourceStationID = ubin(#bin,8,30);.. Spare1 = ubin(#bin,38,2);.. OffsetNumber1 = ubin(#bin,40,12);.. NumberOfSlots1 = ubin(#bin,52,4);.. Time_Out1 = ubin(#bin,56,3);.. Increment1 = ubin(#bin,59,11);.. OffsetNumber2 = ubin(#bin,70,12);.. NumberOfSlots2 = ubin(#bin,82,4);.. Time_Out2 = ubin(
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1756
          Entropy (8bit):4.653299811783491
          Encrypted:false
          SSDEEP:48:gAK6eaSYL8DxKYeFvbzl08DxKYeFvfETmTGxk8kFE:RK6ea38YYeFvbzu8YYeFvfETmyxk8kFE
          MD5:BEB8FCC7DD17D0FC0B937F5D3E355CD7
          SHA1:D15EBCBBD1E6E012FC3AC2D4F1B8BC8540D45E80
          SHA-256:91E77A991C86BD026871E7EA6091FFD149625F381709811360FEA032E9840EE3
          SHA-512:016705DD0D7394DD71945FEDAEBA2E9974BD74ED5D602D591AA33D12115E8BDD1158FE32E4DB7C055C634FE20248AEDE76D3EA100DF0B7BF4D3A70545E532332
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var PartNumber;....var Name;....var TypeOfShipAndCargoType;..var VendorID;..var CallSign;..var Dimension_ReferenceForPosition;..var ManufacturerID;..var UnitModelCode;..var UnitSerialNumber;....MessageId = ubin(#bin,0,6);....if (MessageId == 24){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. PartNumber = ubin(#bin,38,2);.... if (PartNumber == 0){.. Name = str(#bin,40,120);.... map("MessageId", MessageId);.. map("RepeatIndicator", RepeatIndicator);.. map("UserID", UserID);.. map("PartNumber", PartNumber);.. map("Name", Name);.. }.. else if (PartNumber == 1){.. TypeOfShipAndCargoType = ubin(#bin,40,8);.. VendorID = str(#bin,48,42);.. CallSign = str(#bin,90,42);.. Dimension_R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2270
          Entropy (8bit):4.808604794064066
          Encrypted:false
          SSDEEP:48:gfo/v+2LZlUSYjt0hJ2cuyopDfkvLcDxK4s8ikMp2MB9hiYSTX2z5ihTxs28s2By:HtLZlUl0h4cux16c44s8ikMp2MbgYSTL
          MD5:A1D955F86AF7F9DFB8181637A6F190E5
          SHA1:5C1BEFFE36E0AEFAC0E04C00547F9CC9F0A47E9B
          SHA-256:4AF3F2DB153A21F033070AAFB8CA9BFDD271B9A7F9F6DC5FD6AD2866B668D245
          SHA-512:8BF98FC5EE65B830B2CAD718BEB2983F19F6E540E8891CD12EB9AC90961A5B9B4ADC1FE8D07A00FA442CFFDD38BD8E7A27BBD8198F7521486D2029B61A69D8A7
          Malicious:false
          Preview:Search for AIVDM....var MessageId;....var RepeatIndicator;..var UserID;..var UTCYear;..var UTCMonth;..var UTCDay;..var UTCHour;..var UTCMinute;..var UTCSecond;..var PositionAccuracy;..var Longitude;..var Latitude;..var TypeOfElectronicPositionFixingDevice;..var TransmissionControlForLongrangeBroadcastMessage;..var Spare;..var RAIM_flag;..var SyncState;..var SlotTime_Out;..var SubMessage;....MessageId = ubin(#bin,0,6);..if (MessageId == 4 ||.. MessageId == 11){.. RepeatIndicator = ubin(#bin,6,2);.. UserID = ubin(#bin,8,30);.. UTCYear = ubin(#bin,38,14);.. UTCMonth = ubin(#bin,52,4);.. UTCDay = ubin(#bin,56,5);.. UTCHour = ubin(#bin,61,5);.. UTCMinute = ubin(#bin,66,6);.. UTCSecond = ubin(#bin,72,6);.. PositionAccuracy = ubin(#bin,78,1);.. Longitude =
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):352256
          Entropy (8bit):5.802065785822964
          Encrypted:false
          SSDEEP:6144:K7wMUPVG6p6aH0hgfLt9o8/2Q4/u8EE4evApyT0zQEVIFzhCOvkohG93dBNlHYMr:K75UPVOELSynwGQDf0/L3KpfCFiBV9ZK
          MD5:1669F9908DBDCA5C41F3C3716B69F0F6
          SHA1:65CB7E616D5AF8F7FDD7C42ADFEFD12678A53086
          SHA-256:EAE40AB4DA851C51CA3358A89F5F192F358390C43BD57231D3BE0C53106679ED
          SHA-512:7ECE3BBEECE2B9EB23BA54EAFBEB7014D46C78DA9C811890E9A0C9F7055E8BB44727AD634AB275AC51EF720783C003C0A5CD891FA9347203BE3D804396136488
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 2%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8...|...|...|....R.~...[P.k...[P.}...[P.}...Rich|...........................PE..L....|.[.................p..........<.............@..........................`.......G....@..................................;..(....@.......................P......p...................................................................H............text....j.......p.................. ..`.rdata..z...........................@..@.rsrc........@.......@..............@..@.reloc.......P.......P..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):293
          Entropy (8bit):4.525014586331824
          Encrypted:false
          SSDEEP:6:3m+YC0kumLw2p2H+0YG2q8Uhpu60kumLw2p2H+0YG2q8Uhpn:j1Xw2pW//N8UbBXw2pW//N8Ubn
          MD5:033B7E9065C575DA635A0CB9AF2EB4A0
          SHA1:F8B74DADC1B5AFA5874971B55E93990BFA1D70B1
          SHA-256:E1B17DE7A1EC3386392294E420FE615B0E95B22F8AE993329FD92CD97E281B32
          SHA-512:812C59A2549E5C506DE1A929B177B66F639784EBAF8822160C6B67684AF9519A5969E7060ADC60693EBAF934B952735FF2FDC3692DEC6BD224CE9400E935BF5C
          Malicious:false
          Preview:#._.C.A...O.\...p..View=ACM,ACN,ALA,ALC,ALF,ALR,DOR,DPT,DTM,ETL,FIR,GEN,GNS,HBT,HDG,HDT,HSS,HTC,HTD,MWV,PRC,RPM,RSA,TRC,TRD,VBW,VDM,VDO,WAT,XDR,ZDA....#.d...p..Request=ACM,ACN,ALA,ALC,ALF,ALR,DOR,DPT,DTM,ETL,FIR,GEN,GNS,HBT,HDG,HDT,HSS,HTC,HTD,MWV,PRC,RPM,RSA,TRC,TRD,VBW,VDM,VDO,WAT,XDR,ZDA..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):165
          Entropy (8bit):4.8586043469919
          Encrypted:false
          SSDEEP:3:pyeoOpR4YzANYcuGAeTNDYPv3vnwjGkZaum/vnwjGkZkqzVo/vnwjGkL0YMovov:pNBRL5GAkNDIv3vZiCvZihUvZJLovy
          MD5:97673D0F3F41FC7683F3254861ECCD88
          SHA1:E6EAB7BF699EC44AB9A0A5790225A1AD09B30CAC
          SHA-256:41A928CE7E46F7B837B8BA56350E8B5AC16E7C2A59C1F0F1E13CC1B35D86AF18
          SHA-512:E9BD9A69E26C3F7D3E471ADD8C3322C9207A1A273EE63EFAF05C63069E3BA9B08A6AFDC07ED7C9168613106BA2239C9876FC322C33AE7EAC36AEA5B0ABE2485B
          Malicious:false
          Preview:[AUDIO]..;..Format=0..;..TestCh=9..;..RTPNoReceiveTimeThreshold=2000..;..BUFFERING_BUFFER_TIME=10000..;..BUFFERING_BUFFERING_TIME=5000..;..BUFFERING_BSIZE_SMA=10....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):496
          Entropy (8bit):4.845217196904258
          Encrypted:false
          SSDEEP:12:jtDxhKXsFcNxoDGk5nd86aYrtcgQSRPUZr:jtxFcH8GL6thxZsZr
          MD5:C0582BB0D509E17E929E10B06019817B
          SHA1:506B4FCBA9DC928D9D57D15FB9A5B433EA7A0860
          SHA-256:96F0DB08B88A8AD2F4914F3ECC462BD98A322692D19B198B3B42A94CFBC7215D
          SHA-512:75DA41B0AEBD5A80DBD45E2EC297A3F01FEB92CA503FF11C923C8E56AE47128B4300A0F0CB6C5513EEFE7DEB27251250FBA4996A499F7D29A6A85E2EB1555435
          Malicious:false
          Preview:#._.C.A...O.\...p..View=scadaserv,jbserv,radarserv,audioserv,logger,mmdeliserv,dserv,storageserv,extserv,pduserv,statmon,alarmserv,compserv,storagemaster,longtermserv,fixeddruserv,floatdruserv,userdiskserv,scserv,rapserv,amsserv,serialbroad,moduleserv,vlcupdateserv,dcaserv....#.d...p(.|.[.g...)..Request=15000,12001,10113,10103,10020,10109,24005,10200,10106,10102,10092,10100,10104,10204,10203,10201,10202,10205,10116,10117,10118,10119,10110,10120,10130....#Detail.d...p(ON|OFF)..Detail=2,1|2,0
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):310
          Entropy (8bit):5.8919784671826125
          Encrypted:false
          SSDEEP:6:nJMHgyQZkUUvJVrI2LxNeWM2jM+5N8KXIhADB/xSG2mjMPOLKXIhADB/1Wr4:nJ932vJVRLxLM2uvAd5SGBUOLvAd9u4
          MD5:E79C4648F2E0BBFC08688DB8B6547736
          SHA1:578B54EAC3D84CF622AE4E14ABE041EE38282134
          SHA-256:B621B2A410F4331212E96067A60102EDA4943D8CA9A8CAA5ECB41428BCB8D6E7
          SHA-512:4C12EDE7BC515F7A1629FAB447211B8410E2381CA5E1EBBF1009E8DB68139C4C754A63781E51903BFD45A9BA6FBB38442D711125FBECB994A9AA44A96398AB65
          Malicious:false
          Preview:#..# ...[.U..`.A...[....A...`.B.g.p....N...X...L.[..............# $Id: UserAlarmConfig.ini,v 1.1 2007/10/04 13:26:57 h-adachi Exp $..#....# ...[.U..`.A...[.......`....AlarmDefinitionListDialog.maxAlarmSize=50....# ...[.U..`.A...[..............AlarmDefinitionDialog.maxAlarmNameLength=100....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [Hz]
          Category:dropped
          Size (bytes):418
          Entropy (8bit):4.715922343484061
          Encrypted:false
          SSDEEP:12:7ANNfeqTfzMMZfeqTfATfQRNHWrFAQcUFNqdM/4RNiSh:kL1YE1goRNHGuD8eX
          MD5:A56E7B14AC1DA6FBBE8ABE0900150832
          SHA1:DA899FCABDDEB5DD3A029539396408E57C1D46F0
          SHA-256:261E02EA0B948D4493813D399886BE24B232AEAF6E3E9D4C73CD11559CFC2FEE
          SHA-512:1928D3C57951C688D58F7EA5A3CE69A1753486C33225A617955E2552F7D3F07EE2E2B12F08553D481135189410C833960C429CEEEA582393465396D312093389
          Malicious:false
          Preview:[Audio Settings]....; Wheather secondary buffers are allocated on software memory or not..; If set to 1, secondary buffers are allocated on software memory...; If 0, they are allocated on hardware memory...LocSoftWare=0....; Audio playing frequency[Hz]..PlayFrequency=44100....; Write period[ms]..WritePeriod=100....; Wheather DirectSound is restored or not when DirectSound error was occured..RestoreDirectSound=0....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          Category:dropped
          Size (bytes):3499
          Entropy (8bit):3.8109413133981853
          Encrypted:false
          SSDEEP:12:MMHdwYqw1laDCDWfjrEtYSqfGfSfGYtffafjpKMofCfGfKfWHCyfjqf6fGfifWH4:JdGw1laDwYnHWIsNemg9pBRsPVcUlHsx
          MD5:2B90076C91D4C836062D461C7C100127
          SHA1:278EC34D0C6F28F5FC6A25D281751B3E610EB58E
          SHA-256:D8960BA6522FA12F20EB2E20E6646B493656DF30049DE51CEDCCBA5DAD5D6D6A
          SHA-512:E076E6F49CA546BC5464C5DBDF6F3C159E05F3663AF135C4C53CE2851AC958F216E9A0974532B8471D2365487C7BCD37586C2999F86F8A84B953952DB91492BA
          Malicious:false
          Preview:.<?xml version="1.0" encoding="utf-8"?>..<xs:schema id="config" xmlns="" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata">.. <xs:element name="config" msdata:IsDataSet="true" msdata:Locale="en-US">.. <xs:complexType>.. <xs:choice minOccurs="0" maxOccurs="unbounded">.. <xs:element name="category">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="data" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="channel" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="parameter" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:attribute name="id" type="xs:string" />.. <xs:attribute name="name" type
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1243
          Entropy (8bit):5.1123851417888
          Encrypted:false
          SSDEEP:24:2d3vcFaZMiRPHaXsOM1rxXMdqksgsmK9q7sgsO:c3UFKvP6XsOmxXMdBsgsmK9MsgsO
          MD5:F5E5AE9CC45A6AEB783D78DB9CC44DBD
          SHA1:D8404CCF9F2530E7F0B23295476783A377FA55F0
          SHA-256:69DFE8856E5C95ECFFCB7DF2E64C2E223F7266CB4B0509BD05DB18E15A6B78B6
          SHA-512:F27D94067B28D2876B6F8944DDF47CC4A65C915137E97A44FF013BDEDF86D81BE34C642C69716C500D0640AF2112C4B93CBD3E57B71D245EAE9A0479C0EA68D0
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<!DOCTYPE log4j:configuration SYSTEM "log4j.dtd">....<log4j:configuration xmlns:log4j='http://jakarta.apache.org/log4j/'>.... <appender name="file" class="org.apache.log4j.RollingFileAppender">.. <param name="File" value="log/maintenance.log" />.. <param name="Append" value="true" />.. <param name="MaxFileSize" value="5MB" />.. <param name="MaxBackupIndex" value="20" />.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <appender name="STDOUT" class="org.apache.log4j.ConsoleAppender">.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <root>.. <priority value ="info" />.. <appender-ref ref="STDOUT"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):293
          Entropy (8bit):4.525014586331824
          Encrypted:false
          SSDEEP:6:3m+YC0kumLw2p2H+0YG2q8Uhpu60kumLw2p2H+0YG2q8Uhpn:j1Xw2pW//N8UbBXw2pW//N8Ubn
          MD5:033B7E9065C575DA635A0CB9AF2EB4A0
          SHA1:F8B74DADC1B5AFA5874971B55E93990BFA1D70B1
          SHA-256:E1B17DE7A1EC3386392294E420FE615B0E95B22F8AE993329FD92CD97E281B32
          SHA-512:812C59A2549E5C506DE1A929B177B66F639784EBAF8822160C6B67684AF9519A5969E7060ADC60693EBAF934B952735FF2FDC3692DEC6BD224CE9400E935BF5C
          Malicious:false
          Preview:#._.C.A...O.\...p..View=ACM,ACN,ALA,ALC,ALF,ALR,DOR,DPT,DTM,ETL,FIR,GEN,GNS,HBT,HDG,HDT,HSS,HTC,HTD,MWV,PRC,RPM,RSA,TRC,TRD,VBW,VDM,VDO,WAT,XDR,ZDA....#.d...p..Request=ACM,ACN,ALA,ALC,ALF,ALR,DOR,DPT,DTM,ETL,FIR,GEN,GNS,HBT,HDG,HDT,HSS,HTC,HTD,MWV,PRC,RPM,RSA,TRC,TRD,VBW,VDM,VDO,WAT,XDR,ZDA..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):165
          Entropy (8bit):4.8586043469919
          Encrypted:false
          SSDEEP:3:pyeoOpR4YzANYcuGAeTNDYPv3vnwjGkZaum/vnwjGkZkqzVo/vnwjGkL0YMovov:pNBRL5GAkNDIv3vZiCvZihUvZJLovy
          MD5:97673D0F3F41FC7683F3254861ECCD88
          SHA1:E6EAB7BF699EC44AB9A0A5790225A1AD09B30CAC
          SHA-256:41A928CE7E46F7B837B8BA56350E8B5AC16E7C2A59C1F0F1E13CC1B35D86AF18
          SHA-512:E9BD9A69E26C3F7D3E471ADD8C3322C9207A1A273EE63EFAF05C63069E3BA9B08A6AFDC07ED7C9168613106BA2239C9876FC322C33AE7EAC36AEA5B0ABE2485B
          Malicious:false
          Preview:[AUDIO]..;..Format=0..;..TestCh=9..;..RTPNoReceiveTimeThreshold=2000..;..BUFFERING_BUFFER_TIME=10000..;..BUFFERING_BUFFERING_TIME=5000..;..BUFFERING_BSIZE_SMA=10....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):310
          Entropy (8bit):5.8919784671826125
          Encrypted:false
          SSDEEP:6:nJMHgyQZkUUvJVrI2LxNeWM2jM+5N8KXIhADB/xSG2mjMPOLKXIhADB/1Wr4:nJ932vJVRLxLM2uvAd5SGBUOLvAd9u4
          MD5:E79C4648F2E0BBFC08688DB8B6547736
          SHA1:578B54EAC3D84CF622AE4E14ABE041EE38282134
          SHA-256:B621B2A410F4331212E96067A60102EDA4943D8CA9A8CAA5ECB41428BCB8D6E7
          SHA-512:4C12EDE7BC515F7A1629FAB447211B8410E2381CA5E1EBBF1009E8DB68139C4C754A63781E51903BFD45A9BA6FBB38442D711125FBECB994A9AA44A96398AB65
          Malicious:false
          Preview:#..# ...[.U..`.A...[....A...`.B.g.p....N...X...L.[..............# $Id: UserAlarmConfig.ini,v 1.1 2007/10/04 13:26:57 h-adachi Exp $..#....# ...[.U..`.A...[.......`....AlarmDefinitionListDialog.maxAlarmSize=50....# ...[.U..`.A...[..............AlarmDefinitionDialog.maxAlarmNameLength=100....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):496
          Entropy (8bit):4.845217196904258
          Encrypted:false
          SSDEEP:12:jtDxhKXsFcNxoDGk5nd86aYrtcgQSRPUZr:jtxFcH8GL6thxZsZr
          MD5:C0582BB0D509E17E929E10B06019817B
          SHA1:506B4FCBA9DC928D9D57D15FB9A5B433EA7A0860
          SHA-256:96F0DB08B88A8AD2F4914F3ECC462BD98A322692D19B198B3B42A94CFBC7215D
          SHA-512:75DA41B0AEBD5A80DBD45E2EC297A3F01FEB92CA503FF11C923C8E56AE47128B4300A0F0CB6C5513EEFE7DEB27251250FBA4996A499F7D29A6A85E2EB1555435
          Malicious:false
          Preview:#._.C.A...O.\...p..View=scadaserv,jbserv,radarserv,audioserv,logger,mmdeliserv,dserv,storageserv,extserv,pduserv,statmon,alarmserv,compserv,storagemaster,longtermserv,fixeddruserv,floatdruserv,userdiskserv,scserv,rapserv,amsserv,serialbroad,moduleserv,vlcupdateserv,dcaserv....#.d...p(.|.[.g...)..Request=15000,12001,10113,10103,10020,10109,24005,10200,10106,10102,10092,10100,10104,10204,10203,10201,10202,10205,10116,10117,10118,10119,10110,10120,10130....#Detail.d...p(ON|OFF)..Detail=2,1|2,0
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1873
          Entropy (8bit):5.081099648233084
          Encrypted:false
          SSDEEP:48:c3UFKvPu4QXsOmxXM2zbcPuSXYdBsgsmK9MsgsrnKI8Bs6l:KUFyBQ8nxc4c5IPKZKIQ
          MD5:63ADAE87090601111C5135DB3FB264A4
          SHA1:C106487D3DD98A617D938CE1C04310E139D560CF
          SHA-256:2EF093C25E49029D036E648F5D972B7B153D600887C94DFF65F55614911FA8DE
          SHA-512:7C533B85C3457B74CB3D7CDC5F35E9AF71E1EB09255CED76C446FAA5A04F0FDC6AA08C0574CC11997EA4916C1A042AF6670873446CA74D1674210EA43C1A68AD
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<!DOCTYPE log4j:configuration SYSTEM "log4j.dtd">....<log4j:configuration xmlns:log4j='http://jakarta.apache.org/log4j/'>.... <appender name="file" class="org.apache.log4j.RollingFileAppender">.. <param name="File" value="log/liveplayer.log" />.. <param name="Append" value="true" />.. <param name="MaxFileSize" value="5MB" />.. <param name="MaxBackupIndex" value="20" />.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <appender name="STDOUT" class="org.apache.log4j.ConsoleAppender">.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.. .. <appender name="exploration" class="org.apache.log4j.RollingFileAppend
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [Hz]
          Category:dropped
          Size (bytes):418
          Entropy (8bit):4.715922343484061
          Encrypted:false
          SSDEEP:12:7ANNfeqTfzMMZfeqTfATfQRNHWrFAQcUFNqdM/4RNiSh:kL1YE1goRNHGuD8eX
          MD5:A56E7B14AC1DA6FBBE8ABE0900150832
          SHA1:DA899FCABDDEB5DD3A029539396408E57C1D46F0
          SHA-256:261E02EA0B948D4493813D399886BE24B232AEAF6E3E9D4C73CD11559CFC2FEE
          SHA-512:1928D3C57951C688D58F7EA5A3CE69A1753486C33225A617955E2552F7D3F07EE2E2B12F08553D481135189410C833960C429CEEEA582393465396D312093389
          Malicious:false
          Preview:[Audio Settings]....; Wheather secondary buffers are allocated on software memory or not..; If set to 1, secondary buffers are allocated on software memory...; If 0, they are allocated on hardware memory...LocSoftWare=0....; Audio playing frequency[Hz]..PlayFrequency=44100....; Write period[ms]..WritePeriod=100....; Wheather DirectSound is restored or not when DirectSound error was occured..RestoreDirectSound=0....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          Category:dropped
          Size (bytes):3499
          Entropy (8bit):3.8109413133981853
          Encrypted:false
          SSDEEP:12:MMHdwYqw1laDCDWfjrEtYSqfGfSfGYtffafjpKMofCfGfKfWHCyfjqf6fGfifWH4:JdGw1laDwYnHWIsNemg9pBRsPVcUlHsx
          MD5:2B90076C91D4C836062D461C7C100127
          SHA1:278EC34D0C6F28F5FC6A25D281751B3E610EB58E
          SHA-256:D8960BA6522FA12F20EB2E20E6646B493656DF30049DE51CEDCCBA5DAD5D6D6A
          SHA-512:E076E6F49CA546BC5464C5DBDF6F3C159E05F3663AF135C4C53CE2851AC958F216E9A0974532B8471D2365487C7BCD37586C2999F86F8A84B953952DB91492BA
          Malicious:false
          Preview:.<?xml version="1.0" encoding="utf-8"?>..<xs:schema id="config" xmlns="" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata">.. <xs:element name="config" msdata:IsDataSet="true" msdata:Locale="en-US">.. <xs:complexType>.. <xs:choice minOccurs="0" maxOccurs="unbounded">.. <xs:element name="category">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="data" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="channel" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:sequence>.. <xs:element name="parameter" minOccurs="0" maxOccurs="unbounded">.. <xs:complexType>.. <xs:attribute name="id" type="xs:string" />.. <xs:attribute name="name" type
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1873
          Entropy (8bit):5.081099648233084
          Encrypted:false
          SSDEEP:48:c3UFKvPu4QXsOmxXM2zbcPuSXYdBsgsmK9MsgsrnKI8Bs6l:KUFyBQ8nxc4c5IPKZKIQ
          MD5:63ADAE87090601111C5135DB3FB264A4
          SHA1:C106487D3DD98A617D938CE1C04310E139D560CF
          SHA-256:2EF093C25E49029D036E648F5D972B7B153D600887C94DFF65F55614911FA8DE
          SHA-512:7C533B85C3457B74CB3D7CDC5F35E9AF71E1EB09255CED76C446FAA5A04F0FDC6AA08C0574CC11997EA4916C1A042AF6670873446CA74D1674210EA43C1A68AD
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<!DOCTYPE log4j:configuration SYSTEM "log4j.dtd">....<log4j:configuration xmlns:log4j='http://jakarta.apache.org/log4j/'>.... <appender name="file" class="org.apache.log4j.RollingFileAppender">.. <param name="File" value="log/liveplayer.log" />.. <param name="Append" value="true" />.. <param name="MaxFileSize" value="5MB" />.. <param name="MaxBackupIndex" value="20" />.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <appender name="STDOUT" class="org.apache.log4j.ConsoleAppender">.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.. .. <appender name="exploration" class="org.apache.log4j.RollingFileAppend
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1243
          Entropy (8bit):5.1123851417888
          Encrypted:false
          SSDEEP:24:2d3vcFaZMiRPHaXsOM1rxXMdqksgsmK9q7sgsO:c3UFKvP6XsOmxXMdBsgsmK9MsgsO
          MD5:F5E5AE9CC45A6AEB783D78DB9CC44DBD
          SHA1:D8404CCF9F2530E7F0B23295476783A377FA55F0
          SHA-256:69DFE8856E5C95ECFFCB7DF2E64C2E223F7266CB4B0509BD05DB18E15A6B78B6
          SHA-512:F27D94067B28D2876B6F8944DDF47CC4A65C915137E97A44FF013BDEDF86D81BE34C642C69716C500D0640AF2112C4B93CBD3E57B71D245EAE9A0479C0EA68D0
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<!DOCTYPE log4j:configuration SYSTEM "log4j.dtd">....<log4j:configuration xmlns:log4j='http://jakarta.apache.org/log4j/'>.... <appender name="file" class="org.apache.log4j.RollingFileAppender">.. <param name="File" value="log/maintenance.log" />.. <param name="Append" value="true" />.. <param name="MaxFileSize" value="5MB" />.. <param name="MaxBackupIndex" value="20" />.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <appender name="STDOUT" class="org.apache.log4j.ConsoleAppender">.. <layout class="org.apache.log4j.PatternLayout">.. <param name="ConversionPattern".. value="%d{yyyy/MM/dd HH:mm:ss,SSS} [%-5p] [%t] [%c{2}:%M:L%L] - %m%n"/>.. </layout> .. </appender>.... <root>.. <priority value ="info" />.. <appender-ref ref="STDOUT"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1849
          Category:dropped
          Size (bytes):363
          Entropy (8bit):7.428739607033381
          Encrypted:false
          SSDEEP:6:Xtd203y6yIi6Zhw2LCOJJ9klaBnvOFuf2qyDBIsOVNqtDcoM1inFJguJCp:Xr3y6yIi6ZK2LkQtf2qyDBrOuGxafguA
          MD5:87122475FFC4F9AABC3995E1551B020B
          SHA1:E7E36AE2A9CE3B26D77E9E24FAFE3A504E5259A0
          SHA-256:EBFCEA2F20DFFB8D809B19ACD3954F50836D022BC2617B5B8414E2A68B7C748A
          SHA-512:930613CA6B9FCD13DCC65BF04EF77EBD6740C6E02FBEB304EB5EC1AB563247A8AB9615720DA85F0F47E6410DC33796A635D18751B3C366611E976569CCD02ECD
          Malicious:false
          Preview:...........U]k.0.}.W../......@.....{.isW#i".(...h.).c....s......K.*0Vh....1..k.T.......=.d...H.=....Y...'.0e..l:....N{..l..;.y'$y0.m...B.....B..3.....5...+M*n.....$....Pj...\m~.%.BkG....^.q.Z.....A7 DYp..eZ..J.IP.[$x8h...P.......m.Rg<.=.SQ.k..Z.o.s.U1..Sv..%.\.?]?....B8&;.kAYm..\..q....p.u.1...._`...R.KD...............Q8h..9....4.+,.}.$..9...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 142
          Category:dropped
          Size (bytes):135
          Entropy (8bit):6.232904109747597
          Encrypted:false
          SSDEEP:3:FttDKtoYT6y3tz+T9gG1Ckro8hycfpdo6YjqUNgRbNladrt:Xt82ktz0eGi80qznI0vaD
          MD5:A0BDBAB3FB9186C5B00331897E743318
          SHA1:53022E32208EB83612A7C943F7542F7147A9661C
          SHA-256:B1B8861B2D6483B6323F46855DCA5DCE7FD8EC967DC7E7A2FA3687D22CFB5982
          SHA-512:9BCD59599D8B725A4F50EBA0D351471C55A7943F447832782051C301AF05ADFD0E63E1418CA8651810A6A20819AA37B29B41176F36ABAC857423A4937187424A
          Malicious:false
          Preview:...............Q(K-*...U2.3PRH.K.O..K.U..q.P....J,KDVf.g.od.....X\l....KJM.+...qI...Z.d.`.....\....$3G..(..'..DI.h.>H......[....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1370
          Entropy (8bit):4.6929614130817265
          Encrypted:false
          SSDEEP:24:OP2DkciV89DCP2DkciV89Dy2DkciV89DSC2DkciV89DGwIbj2DkciV89DGKC2Dkf:O24bOO24bOW24bOB24bOqwaj24bOqKC/
          MD5:5C9269EC29CBAFF67C05FE98A56FCC94
          SHA1:132C799030DD384ADF01B6FA17326DF16EB86BC1
          SHA-256:D5E804AFF46F364B3BFBD2CBF6359EDB3509998E1C4DF9DE24715891DFBEE4D1
          SHA-512:1C89227112C23E76080B0E1AFCDF7AA3ECFA8491D3D3F0EFDFDE1D6ADD61A9D7C92743713F0F3810A4DEC6B4B63B06D5D78E8953257EAADE41419A01FD1C159B
          Malicious:false
          Preview:Fixed DRU Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Float DRU Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Long Term Device Creation:..This mode is to make a new Long Term Device for VR-7000 V1.xx..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Long Term Device Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....User Disk(USB) Creation:..This mode is to make a new User Disk(USB) for VR-7000 V1.xx..This mode is to delete all data (Operation History, recording data, VDR configurat
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):3.5479069076840855
          Encrypted:false
          SSDEEP:3:D7M6kEmb:M1xb
          MD5:AA01122337415C2ABDFED96DF3B698D8
          SHA1:7B16DA9DD38695D13A79E0B76CBEC2A3B1E559B9
          SHA-256:53B46971A16FF2716CB86C7561416AEB092D18C299207A10EBFC75A724BC5921
          SHA-512:0E1A64ECF88753DCE1FFF1DC4F8C9FB08D3DD250AD7278066EB6AD5987E07F7287EEE3872B58889FA791CE886D4EB006A6A00FB907EEB85F8AA11ACCF9D170C1
          Malicious:false
          Preview:use_save_area=./data/save/current
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1200418
          Entropy (8bit):4.457764155962315
          Encrypted:false
          SSDEEP:1536:X1mtgbyt80F2vwxtG/AQPKx0jeFIHNmr85SXYVu+lUDqRwv2dTk1O/Ah6LccLGt7:EaA
          MD5:DDC994C447826488D0C14E012D6B1E68
          SHA1:17CB905E26B756CE095247366658B5E09E5AD353
          SHA-256:6B964B6EF677A01D768C28756D0779D432588A75D799887E09B5ECD080D9B665
          SHA-512:6488D0C34FCEA46E3443EB3D2E244B0ED1C7E080EADF2D87D0E0993DC01994DC18B5DEC9B8E4C56375717DE60BACE5F7CFB2342AEEC54E4708D7685C75FB5816
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<config>.. <category id="ImageRecordSetting">.. <data>.. <channel id="1" validity="true">.. <parameter id="1" name="Active" value="true"/>.. <parameter id="2" name="No" value="Radar1"/>.. <parameter id="38" name="Check" value="0"/>.. <parameter id="27" name="Recording method" value="0"/>.. <parameter id="28" name="No.1 Input source" value="1"/>.. <parameter id="29" name="No.2 Input source" value="0"/>.. <parameter id="30" name="No.3 Input source" value="0"/>.. <parameter id="31" name="No.4 Input source" value="0"/>.. <parameter id="39" name="Fixed DRU Recording" value="true"/>.. <parameter id="40" name="Float DRU Recording" value="true"/>.. <parameter id="41" name="Long Term Device Recording" value="true"/>.. <parameter id="46" name="User Disk Recording" value="true"/>.. <parameter id="42" name="Network Output" value="true"/>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):18513
          Entropy (8bit):4.3493132839748805
          Encrypted:false
          SSDEEP:384:7P7IR+d+h+z+Z+pN9Nv3yFw1sRVbdaAZ4BAcn8Mj:7P7IUYkisvTv3yFw1sRVbdaAyicn8Mj
          MD5:19B37A934EAC82C9285AFC46985C599E
          SHA1:784E0C1973CAE492CC51BCB2D00FD2EB7A3CAC6B
          SHA-256:2752DE24F07D23055EF52DC8A9485787A79B552660702E1FC189B9BF01B971E0
          SHA-512:8D5D77F73BE70F584151FA8578CAFA6BA5C6BE37DCD14D54F8DF3425184DF056556FFE381B33088649731F973A24277A13A6C38E8C4118149CFC99A6C2A46433
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<equipment>.. <category id="SPEED LOG">.. <brand id="Furuno">.. <typeNo id="DS-50">.. <dataName id="SPEED LOG" interface="serial">.. <property id="9" value="1"/>.. <property id="8" value="0"/>.. <property id="7" value="8"/>.. <property id="6" value="4800"/>.. <property id="14" value="2"/>.. <property id="5" value="0"/>.. <property id="13" value=""/>.. <property id="4" value="SPEED LOG"/>.. <property id="12" value=""/>.. <property id="11" value="0"/>.. <property id="1" value="true"/>.. <property id="10" value="false"/>.. </dataName>.. </typeNo>.. <typeNo id="DS-30">.. <dataName id="SPEED LOG" interface="serial">.. <property id="9" value="1"/>.. <property id="8" value="0"/>.. <property id="7" value="8"/>.. <property id="6" value="4800"/>.. <pr
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):3.5479069076840855
          Encrypted:false
          SSDEEP:3:D7M6kEmb:M1xb
          MD5:AA01122337415C2ABDFED96DF3B698D8
          SHA1:7B16DA9DD38695D13A79E0B76CBEC2A3B1E559B9
          SHA-256:53B46971A16FF2716CB86C7561416AEB092D18C299207A10EBFC75A724BC5921
          SHA-512:0E1A64ECF88753DCE1FFF1DC4F8C9FB08D3DD250AD7278066EB6AD5987E07F7287EEE3872B58889FA791CE886D4EB006A6A00FB907EEB85F8AA11ACCF9D170C1
          Malicious:false
          Preview:use_save_area=./data/save/current
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1200418
          Entropy (8bit):4.457764155962315
          Encrypted:false
          SSDEEP:1536:X1mtgbyt80F2vwxtG/AQPKx0jeFIHNmr85SXYVu+lUDqRwv2dTk1O/Ah6LccLGt7:EaA
          MD5:DDC994C447826488D0C14E012D6B1E68
          SHA1:17CB905E26B756CE095247366658B5E09E5AD353
          SHA-256:6B964B6EF677A01D768C28756D0779D432588A75D799887E09B5ECD080D9B665
          SHA-512:6488D0C34FCEA46E3443EB3D2E244B0ED1C7E080EADF2D87D0E0993DC01994DC18B5DEC9B8E4C56375717DE60BACE5F7CFB2342AEEC54E4708D7685C75FB5816
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<config>.. <category id="ImageRecordSetting">.. <data>.. <channel id="1" validity="true">.. <parameter id="1" name="Active" value="true"/>.. <parameter id="2" name="No" value="Radar1"/>.. <parameter id="38" name="Check" value="0"/>.. <parameter id="27" name="Recording method" value="0"/>.. <parameter id="28" name="No.1 Input source" value="1"/>.. <parameter id="29" name="No.2 Input source" value="0"/>.. <parameter id="30" name="No.3 Input source" value="0"/>.. <parameter id="31" name="No.4 Input source" value="0"/>.. <parameter id="39" name="Fixed DRU Recording" value="true"/>.. <parameter id="40" name="Float DRU Recording" value="true"/>.. <parameter id="41" name="Long Term Device Recording" value="true"/>.. <parameter id="46" name="User Disk Recording" value="true"/>.. <parameter id="42" name="Network Output" value="true"/>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 142
          Category:dropped
          Size (bytes):135
          Entropy (8bit):6.232904109747597
          Encrypted:false
          SSDEEP:3:FttDKtoYT6y3tz+T9gG1Ckro8hycfpdo6YjqUNgRbNladrt:Xt82ktz0eGi80qznI0vaD
          MD5:A0BDBAB3FB9186C5B00331897E743318
          SHA1:53022E32208EB83612A7C943F7542F7147A9661C
          SHA-256:B1B8861B2D6483B6323F46855DCA5DCE7FD8EC967DC7E7A2FA3687D22CFB5982
          SHA-512:9BCD59599D8B725A4F50EBA0D351471C55A7943F447832782051C301AF05ADFD0E63E1418CA8651810A6A20819AA37B29B41176F36ABAC857423A4937187424A
          Malicious:false
          Preview:...............Q(K-*...U2.3PRH.K.O..K.U..q.P....J,KDVf.g.od.....X\l....KJM.+...qI...Z.d.`.....\....$3G..(..'..DI.h.>H......[....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1370
          Entropy (8bit):4.6929614130817265
          Encrypted:false
          SSDEEP:24:OP2DkciV89DCP2DkciV89Dy2DkciV89DSC2DkciV89DGwIbj2DkciV89DGKC2Dkf:O24bOO24bOW24bOB24bOqwaj24bOqKC/
          MD5:5C9269EC29CBAFF67C05FE98A56FCC94
          SHA1:132C799030DD384ADF01B6FA17326DF16EB86BC1
          SHA-256:D5E804AFF46F364B3BFBD2CBF6359EDB3509998E1C4DF9DE24715891DFBEE4D1
          SHA-512:1C89227112C23E76080B0E1AFCDF7AA3ECFA8491D3D3F0EFDFDE1D6ADD61A9D7C92743713F0F3810A4DEC6B4B63B06D5D78E8953257EAADE41419A01FD1C159B
          Malicious:false
          Preview:Fixed DRU Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Float DRU Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Long Term Device Creation:..This mode is to make a new Long Term Device for VR-7000 V1.xx..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....Long Term Device Initialize:..This mode is to delete all data (Operation History, recording data, VDR configuration data) and so you should backup operating history and VDR configuration data.....User Disk(USB) Creation:..This mode is to make a new User Disk(USB) for VR-7000 V1.xx..This mode is to delete all data (Operation History, recording data, VDR configurat
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1849
          Category:dropped
          Size (bytes):363
          Entropy (8bit):7.428739607033381
          Encrypted:false
          SSDEEP:6:Xtd203y6yIi6Zhw2LCOJJ9klaBnvOFuf2qyDBIsOVNqtDcoM1inFJguJCp:Xr3y6yIi6ZK2LkQtf2qyDBrOuGxafguA
          MD5:87122475FFC4F9AABC3995E1551B020B
          SHA1:E7E36AE2A9CE3B26D77E9E24FAFE3A504E5259A0
          SHA-256:EBFCEA2F20DFFB8D809B19ACD3954F50836D022BC2617B5B8414E2A68B7C748A
          SHA-512:930613CA6B9FCD13DCC65BF04EF77EBD6740C6E02FBEB304EB5EC1AB563247A8AB9615720DA85F0F47E6410DC33796A635D18751B3C366611E976569CCD02ECD
          Malicious:false
          Preview:...........U]k.0.}.W../......@.....{.isW#i".(...h.).c....s......K.*0Vh....1..k.T.......=.d...H.=....Y...'.0e..l:....N{..l..;.y'$y0.m...B.....B..3.....5...+M*n.....$....Pj...\m~.%.BkG....^.q.Z.....A7 DYp..eZ..J.IP.[$x8h...P.......m.Rg<.=.SQ.k..Z.o.s.U1..Sv..%.\.?]?....B8&;.kAYm..\..q....p.u.1...._`...R.KD...............Q8h..9....4.+,.}.$..9...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):18513
          Entropy (8bit):4.3493132839748805
          Encrypted:false
          SSDEEP:384:7P7IR+d+h+z+Z+pN9Nv3yFw1sRVbdaAZ4BAcn8Mj:7P7IUYkisvTv3yFw1sRVbdaAyicn8Mj
          MD5:19B37A934EAC82C9285AFC46985C599E
          SHA1:784E0C1973CAE492CC51BCB2D00FD2EB7A3CAC6B
          SHA-256:2752DE24F07D23055EF52DC8A9485787A79B552660702E1FC189B9BF01B971E0
          SHA-512:8D5D77F73BE70F584151FA8578CAFA6BA5C6BE37DCD14D54F8DF3425184DF056556FFE381B33088649731F973A24277A13A6C38E8C4118149CFC99A6C2A46433
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<equipment>.. <category id="SPEED LOG">.. <brand id="Furuno">.. <typeNo id="DS-50">.. <dataName id="SPEED LOG" interface="serial">.. <property id="9" value="1"/>.. <property id="8" value="0"/>.. <property id="7" value="8"/>.. <property id="6" value="4800"/>.. <property id="14" value="2"/>.. <property id="5" value="0"/>.. <property id="13" value=""/>.. <property id="4" value="SPEED LOG"/>.. <property id="12" value=""/>.. <property id="11" value="0"/>.. <property id="1" value="true"/>.. <property id="10" value="false"/>.. </dataName>.. </typeNo>.. <typeNo id="DS-30">.. <dataName id="SPEED LOG" interface="serial">.. <property id="9" value="1"/>.. <property id="8" value="0"/>.. <property id="7" value="8"/>.. <property id="6" value="4800"/>.. <pr
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):2703
          Entropy (8bit):5.879402274914046
          Encrypted:false
          SSDEEP:48:cBP/g5cGeY2sd/eZcGeY2uWcGeY2u3ueQFtRLcGeY2pGUBG:mg5dEJoj3fQFPF8GWG
          MD5:F2FC9559FCB964E24DBDC5F87DCA37BC
          SHA1:B341D31DFC2EBE000B1A91AA1F1E02C0F64056E9
          SHA-256:B4068299F8FC2D0B7CAB3CAEADE09531FE1257A90FFE95A750869EE82F983246
          SHA-512:9DD6567DCD6D61B5FBCF94A4C32C1843181EF64AF627C973F7878E1F6918109D250531CBFCB6E406B47E708D22D9028DB2515D0B382742269D6CAE64B6BC9F16
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>.. ..ope1..ope2.................................................................XML....................................................-->..<UserAlarmList>.. .............XML.......id...............................7....................... -->..<UserAlarm active="true" id="Alarm-A" name="Alarm-A" buzzer="c:/windows/media/tada.wav">...<OccuurrenceCondition alarmType="analog" channel="Analog001" cond1="10" ope1="1" ope2="3" cond2="20" />...<RecoverCondition alarmType="analog" channel="Analog001" cond1="10" ope1="2" ope2="2" cond2="20" />..</UserAlarm>.... .............XML..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):105
          Entropy (8bit):5.052401000084611
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgC4vIAyCwz1mF3KDEJM8lycy:TMVBdYvyW3YERyR
          MD5:FDE9308F356C5B798A8CC795B5E133F3
          SHA1:D3800C6CF0FE17085D2C64900FFC3977BC95E9CA
          SHA-256:302739211F66760DD450A55D206223C20A9A23DCBA36F4CDE58E5EE650E9932B
          SHA-512:C75248B6E16D9D81C130638F1E41A42AC4EBB05861712862806662D67FC03F90A353F59DAAA53B4C3351254846445B1AF35B945BC3AB92D71ED2C8615523C15F
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="2" display="false">..</UserAlarmList>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):2703
          Entropy (8bit):5.879402274914046
          Encrypted:false
          SSDEEP:48:cBP/g5cGeY2sd/eZcGeY2uWcGeY2u3ueQFtRLcGeY2pGUBG:mg5dEJoj3fQFPF8GWG
          MD5:F2FC9559FCB964E24DBDC5F87DCA37BC
          SHA1:B341D31DFC2EBE000B1A91AA1F1E02C0F64056E9
          SHA-256:B4068299F8FC2D0B7CAB3CAEADE09531FE1257A90FFE95A750869EE82F983246
          SHA-512:9DD6567DCD6D61B5FBCF94A4C32C1843181EF64AF627C973F7878E1F6918109D250531CBFCB6E406B47E708D22D9028DB2515D0B382742269D6CAE64B6BC9F16
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>.. ..ope1..ope2.................................................................XML....................................................-->..<UserAlarmList>.. .............XML.......id...............................7....................... -->..<UserAlarm active="true" id="Alarm-A" name="Alarm-A" buzzer="c:/windows/media/tada.wav">...<OccuurrenceCondition alarmType="analog" channel="Analog001" cond1="10" ope1="1" ope2="3" cond2="20" />...<RecoverCondition alarmType="analog" channel="Analog001" cond1="10" ope1="2" ope2="2" cond2="20" />..</UserAlarm>.... .............XML..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15778
          Entropy (8bit):5.088110386346183
          Encrypted:false
          SSDEEP:384:xrqkUPr9km5r4kEWrrkEzrmkcxQrJk2Brkkcw4rnksI:sVeyiGKhI
          MD5:86EEA51F0044FE09C9E1B64DCF9FC09F
          SHA1:5EE40096FB997FC0DDD809CDFFDF9063EF36A580
          SHA-256:F037F111AC0C70BB66FB0049909B35B5B374C8D18AD79F3F4C61D6921CA606E5
          SHA-512:1802C13B5DB8026AFF97ABD02E246C84676129E9659C3C834EB59E0CDE9D2FF8D9FCA05737059A6AFCC33C60747FACD2F64256DCDB6E3C826418A74919537FCE
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="0" display="true">..<UserAlarm active="false" id="Alarm-A" name="Alarm-A1" buzzer="c:/windows/media/tada.wav">..<OccuurrenceCondition alarmType="analog" channel="AN001" cond1="12.0" ope1="1" ope2="2" cond2="26.0" />..<RecoverCondition alarmType="analog" channel="AN001" cond1="27.0" ope1="3" ope2="0" cond2="" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-B" name="Alarm-B1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="digital" channel="DC001" cond1="1" />..<RecoverCondition alarmType="digital" channel="DC001" cond1="0" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-C" name="Alarm-C1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="1" ope2="1" cond2="20.0" cond3="" />..<RecoverCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="2" ope2="1" cond2="20.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15778
          Entropy (8bit):5.088110386346183
          Encrypted:false
          SSDEEP:384:xrqkUPr9km5r4kEWrrkEzrmkcxQrJk2Brkkcw4rnksI:sVeyiGKhI
          MD5:86EEA51F0044FE09C9E1B64DCF9FC09F
          SHA1:5EE40096FB997FC0DDD809CDFFDF9063EF36A580
          SHA-256:F037F111AC0C70BB66FB0049909B35B5B374C8D18AD79F3F4C61D6921CA606E5
          SHA-512:1802C13B5DB8026AFF97ABD02E246C84676129E9659C3C834EB59E0CDE9D2FF8D9FCA05737059A6AFCC33C60747FACD2F64256DCDB6E3C826418A74919537FCE
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="0" display="true">..<UserAlarm active="false" id="Alarm-A" name="Alarm-A1" buzzer="c:/windows/media/tada.wav">..<OccuurrenceCondition alarmType="analog" channel="AN001" cond1="12.0" ope1="1" ope2="2" cond2="26.0" />..<RecoverCondition alarmType="analog" channel="AN001" cond1="27.0" ope1="3" ope2="0" cond2="" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-B" name="Alarm-B1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="digital" channel="DC001" cond1="1" />..<RecoverCondition alarmType="digital" channel="DC001" cond1="0" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-C" name="Alarm-C1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="1" ope2="1" cond2="20.0" cond3="" />..<RecoverCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="2" ope2="1" cond2="20.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):105
          Entropy (8bit):5.052401000084611
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgC4vIAyCwz1mF3KDEJM8lycy:TMVBdYvyW3YERyR
          MD5:FDE9308F356C5B798A8CC795B5E133F3
          SHA1:D3800C6CF0FE17085D2C64900FFC3977BC95E9CA
          SHA-256:302739211F66760DD450A55D206223C20A9A23DCBA36F4CDE58E5EE650E9932B
          SHA-512:C75248B6E16D9D81C130638F1E41A42AC4EBB05861712862806662D67FC03F90A353F59DAAA53B4C3351254846445B1AF35B945BC3AB92D71ED2C8615523C15F
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="2" display="false">..</UserAlarmList>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):38118
          Entropy (8bit):4.321741164502036
          Encrypted:false
          SSDEEP:384:EBuBcU49pBuBcU49sXtVYU49oB/KOr97tih3hpvMU49EB/Kwr9zHZ4OpiIRsiG06:g5bwnW0W51WEl7Vbe
          MD5:076CB4B126DD51BA6FB3C8F6CB353219
          SHA1:93DE653037611840C10D73EE2D6CAF0FAA7D866B
          SHA-256:4F44D0240E7A914027B5E40088B9544EA2FED854633B664B206E45E814B08B37
          SHA-512:22E5B577A7A1C7FBAE626304B7F90880FDAAC5DC59862DA5F5B75D538033F362C1A18C189784AE0020C67909BD8A7CC1C771E083816DA9282C937C5C05104811
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>Conning</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="data"> .. <void index="0"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="1"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="2"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. </void> .. <void property="flag"> .. <array class
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8247
          Entropy (8bit):4.55942294731948
          Encrypted:false
          SSDEEP:192:o5XYQYF6f6IKHM8grk3adkt16JBdkKgCgH:op/626B74m4es3dZbi
          MD5:4ED526AE7B9E764203550776F8AD9B61
          SHA1:64C4C6AD40980A9027914082418E83F1DFFB2DAE
          SHA-256:B30A49DBDCECA84BE2ED3CF069E1B23849A2BD80F3508681F0B1DAEB26A961EB
          SHA-512:F1ADE776B966404B14E82C91E19014424F9029AC60D00E7C52A4B788A759C7920861800DCE7A3F919863CBC902F15772DF0AFA84ABD7C52DA977F43A9D2F0149
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>FullSetSheet</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.CompassForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.CompassObject</string> .. </void> .. <void property="key"> .. <string>CompassSheet</string> .. </void> .. <void property="x"> .. <int>313</int> .. </void> .. </object> .. </void> .. <void method="put"> .. <string>13</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="key"> ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8247
          Entropy (8bit):4.55942294731948
          Encrypted:false
          SSDEEP:192:o5XYQYF6f6IKHM8grk3adkt16JBdkKgCgH:op/626B74m4es3dZbi
          MD5:4ED526AE7B9E764203550776F8AD9B61
          SHA1:64C4C6AD40980A9027914082418E83F1DFFB2DAE
          SHA-256:B30A49DBDCECA84BE2ED3CF069E1B23849A2BD80F3508681F0B1DAEB26A961EB
          SHA-512:F1ADE776B966404B14E82C91E19014424F9029AC60D00E7C52A4B788A759C7920861800DCE7A3F919863CBC902F15772DF0AFA84ABD7C52DA977F43A9D2F0149
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>FullSetSheet</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.CompassForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.CompassObject</string> .. </void> .. <void property="key"> .. <string>CompassSheet</string> .. </void> .. <void property="x"> .. <int>313</int> .. </void> .. </object> .. </void> .. <void method="put"> .. <string>13</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="key"> ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):38118
          Entropy (8bit):4.321741164502036
          Encrypted:false
          SSDEEP:384:EBuBcU49pBuBcU49sXtVYU49oB/KOr97tih3hpvMU49EB/Kwr9zHZ4OpiIRsiG06:g5bwnW0W51WEl7Vbe
          MD5:076CB4B126DD51BA6FB3C8F6CB353219
          SHA1:93DE653037611840C10D73EE2D6CAF0FAA7D866B
          SHA-256:4F44D0240E7A914027B5E40088B9544EA2FED854633B664B206E45E814B08B37
          SHA-512:22E5B577A7A1C7FBAE626304B7F90880FDAAC5DC59862DA5F5B75D538033F362C1A18C189784AE0020C67909BD8A7CC1C771E083816DA9282C937C5C05104811
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>Conning</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="data"> .. <void index="0"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="1"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="2"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. </void> .. <void property="flag"> .. <array class
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (363), with CRLF line terminators
          Category:dropped
          Size (bytes):149810
          Entropy (8bit):5.440728394068986
          Encrypted:false
          SSDEEP:1536:yPcwlLPcwAzPcwBmPDbYjPDbdcPDbuZPDb09PDb3RPDbalPDbQePDbILPDbGnPau:05HHNlpK2SF8b2jfnJ1b
          MD5:98EF1EA9CB80CE74CABD805DAF5C5232
          SHA1:21BFA9B8D650854681434CB7115FFEA1703C1B3F
          SHA-256:7846246A6303D714FE1A4B35BCA9105E6518FBF29A433AF4AD1325722CC447E2
          SHA-512:44841922EC96D590DAD05A995B44340D78F8AC42D5141E87A229FB37C319DD117D7D57FD6623F1F369C8072EBEB68D9DD52ED09A0C9039E07A8C65354B912410
          Malicious:false
          Preview:.<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Depth(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT....print( #2,"M");..trend(double(#2));..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Offset(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT..print( #3,"M");..trend( double(#3) );..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Range(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with no line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.894918389718543
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgCaOELA/schlA:TMVBd6OjY
          MD5:EDD4E78B0335455E0860E25CC63F56B6
          SHA1:1928DB934894162ADD003053AE0CB1C54A45350F
          SHA-256:7157D1AB6A5F59517FA275798E036570882ABB5815E18C194F0D7EB24A7DC739
          SHA-512:B4C678DAACF67775C252E73ED1903C5788BD02A1CACBF2F848692F60405DCFE3568B1EE8DA4526D74699C28141E7BDDEA064841ADFCA6ACCFF9D4F27CF79311C
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS/>
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (363), with CRLF line terminators
          Category:dropped
          Size (bytes):149810
          Entropy (8bit):5.440728394068986
          Encrypted:false
          SSDEEP:1536:yPcwlLPcwAzPcwBmPDbYjPDbdcPDbuZPDb09PDb3RPDbalPDbQePDbILPDbGnPau:05HHNlpK2SF8b2jfnJ1b
          MD5:98EF1EA9CB80CE74CABD805DAF5C5232
          SHA1:21BFA9B8D650854681434CB7115FFEA1703C1B3F
          SHA-256:7846246A6303D714FE1A4B35BCA9105E6518FBF29A433AF4AD1325722CC447E2
          SHA-512:44841922EC96D590DAD05A995B44340D78F8AC42D5141E87A229FB37C319DD117D7D57FD6623F1F369C8072EBEB68D9DD52ED09A0C9039E07A8C65354B912410
          Malicious:false
          Preview:.<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Depth(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT....print( #2,"M");..trend(double(#2));..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Offset(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT..print( #3,"M");..trend( double(#3) );..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Range(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with no line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.894918389718543
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgCaOELA/schlA:TMVBd6OjY
          MD5:EDD4E78B0335455E0860E25CC63F56B6
          SHA1:1928DB934894162ADD003053AE0CB1C54A45350F
          SHA-256:7157D1AB6A5F59517FA275798E036570882ABB5815E18C194F0D7EB24A7DC739
          SHA-512:B4C678DAACF67775C252E73ED1903C5788BD02A1CACBF2F848692F60405DCFE3568B1EE8DA4526D74699C28141E7BDDEA064841ADFCA6ACCFF9D4F27CF79311C
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS/>
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with very long lines (467), with CRLF line terminators
          Category:dropped
          Size (bytes):4949
          Entropy (8bit):5.289970304199814
          Encrypted:false
          SSDEEP:96:C6ctwrT5oLxL4wCjjRnUlcs7VSkkE4k3oclr:VctwriewCjVnUlcs/kZk3oclr
          MD5:4B86853D7BF2673B52A917859F8EAE44
          SHA1:0093D813529841158F9BCFB67DAA6F1713F47AA8
          SHA-256:1525B54F9DD32AD96A7D74A950502E044E0F890C7D3BAD2BDD81C4587216398D
          SHA-512:D5C269B602219814554CE616ABF57D17C9FFA6B48DA38318C81A58528770005F43BE5D8F86347FD6FC924F0A97EE67B26929BE87D712E50AB5D21D98E8D94B52
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24004..playback-server-port=24003..module_manage_server_port=10110..vlc_manage_server_port=10120....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=0....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..#playback-heartbeat-cycle=2147483647....#Reply ECHO Time-out..#GNPAdmSession.HEAR
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3637
          Entropy (8bit):5.2375778608011405
          Encrypted:false
          SSDEEP:96:h0hct8T5oLVmg54ua8l9lyj+HHBZkn8l8/8DK:hUct8iY3ua8nyanBZkn0gH
          MD5:7A2CDAFCE38EDB8F29DD4A367CEB34B9
          SHA1:E1A6B983982ACF6B46317AE8114C99BC806D459C
          SHA-256:F48165D0DC1BB6462034DD9F4C9F31E37123433794813B16CC99BF3F565F786E
          SHA-512:32C3833A37FB9D5FD25E434A724BB54FCE85CA756A5DE4B4C5773A1DCA160A6217AF9D98A71646F1800154862EDE9034AC73A285B2DE584B4C1683B1D4BFC88D
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....# font size of Numeric Data Display component..font_size_numeric_data_display=18....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24001..playback-server-port=24002..module_manage_server_port=10110..backup-server-port=24006....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=-1....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text
          Category:dropped
          Size (bytes):5572
          Entropy (8bit):4.535836046572228
          Encrypted:false
          SSDEEP:24:2dIlukvg+DM7BvwsCDLB/vwTDdEQ/vCkDsOAOGvTkD4WvUDnEGvxOL1DSP2v8DxU:cIG9O/wtGymkD
          MD5:A71BE58C3D0F810873E17EEAE1341491
          SHA1:E01AA28D7CA07BAC6DA76A86DCF100E58249EA3A
          SHA-256:9B1F353A0CE6CBE93929ED344EB83D3A578055FE3AECDA351BD08FA3FD856D8A
          SHA-512:982CFCB5B9762DBEFDC302BF956D4EAB4C44DCD841CAB0F2CEABBA1005DF2261BC4D63F279AF7748DE4CC32B233E9C882F42E4D82A358B7C64FC06DCEF28DCE2
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?>.<java version="1.7.0_25" class="java.beans.XMLDecoder">. <object class="java.util.HashMap">. <void method="put">. <string>0</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Conning</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.CustomViewer</string>. </void>. <void method="put">. <string>Icon</string>. <null/>. </void>. </object>. </void>. <void method="put">. <string>1</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Serial</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.SerialViewer</string>.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text
          Category:dropped
          Size (bytes):5572
          Entropy (8bit):4.535836046572228
          Encrypted:false
          SSDEEP:24:2dIlukvg+DM7BvwsCDLB/vwTDdEQ/vCkDsOAOGvTkD4WvUDnEGvxOL1DSP2v8DxU:cIG9O/wtGymkD
          MD5:A71BE58C3D0F810873E17EEAE1341491
          SHA1:E01AA28D7CA07BAC6DA76A86DCF100E58249EA3A
          SHA-256:9B1F353A0CE6CBE93929ED344EB83D3A578055FE3AECDA351BD08FA3FD856D8A
          SHA-512:982CFCB5B9762DBEFDC302BF956D4EAB4C44DCD841CAB0F2CEABBA1005DF2261BC4D63F279AF7748DE4CC32B233E9C882F42E4D82A358B7C64FC06DCEF28DCE2
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?>.<java version="1.7.0_25" class="java.beans.XMLDecoder">. <object class="java.util.HashMap">. <void method="put">. <string>0</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Conning</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.CustomViewer</string>. </void>. <void method="put">. <string>Icon</string>. <null/>. </void>. </object>. </void>. <void method="put">. <string>1</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Serial</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.SerialViewer</string>.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with very long lines (467), with CRLF line terminators
          Category:dropped
          Size (bytes):4949
          Entropy (8bit):5.289970304199814
          Encrypted:false
          SSDEEP:96:C6ctwrT5oLxL4wCjjRnUlcs7VSkkE4k3oclr:VctwriewCjVnUlcs/kZk3oclr
          MD5:4B86853D7BF2673B52A917859F8EAE44
          SHA1:0093D813529841158F9BCFB67DAA6F1713F47AA8
          SHA-256:1525B54F9DD32AD96A7D74A950502E044E0F890C7D3BAD2BDD81C4587216398D
          SHA-512:D5C269B602219814554CE616ABF57D17C9FFA6B48DA38318C81A58528770005F43BE5D8F86347FD6FC924F0A97EE67B26929BE87D712E50AB5D21D98E8D94B52
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24004..playback-server-port=24003..module_manage_server_port=10110..vlc_manage_server_port=10120....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=0....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..#playback-heartbeat-cycle=2147483647....#Reply ECHO Time-out..#GNPAdmSession.HEAR
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3637
          Entropy (8bit):5.2375778608011405
          Encrypted:false
          SSDEEP:96:h0hct8T5oLVmg54ua8l9lyj+HHBZkn8l8/8DK:hUct8iY3ua8nyanBZkn0gH
          MD5:7A2CDAFCE38EDB8F29DD4A367CEB34B9
          SHA1:E1A6B983982ACF6B46317AE8114C99BC806D459C
          SHA-256:F48165D0DC1BB6462034DD9F4C9F31E37123433794813B16CC99BF3F565F786E
          SHA-512:32C3833A37FB9D5FD25E434A724BB54FCE85CA756A5DE4B4C5773A1DCA160A6217AF9D98A71646F1800154862EDE9034AC73A285B2DE584B4C1683B1D4BFC88D
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....# font size of Numeric Data Display component..font_size_numeric_data_display=18....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24001..playback-server-port=24002..module_manage_server_port=10110..backup-server-port=24006....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=-1....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):2703
          Entropy (8bit):5.879402274914046
          Encrypted:false
          SSDEEP:48:cBP/g5cGeY2sd/eZcGeY2uWcGeY2u3ueQFtRLcGeY2pGUBG:mg5dEJoj3fQFPF8GWG
          MD5:F2FC9559FCB964E24DBDC5F87DCA37BC
          SHA1:B341D31DFC2EBE000B1A91AA1F1E02C0F64056E9
          SHA-256:B4068299F8FC2D0B7CAB3CAEADE09531FE1257A90FFE95A750869EE82F983246
          SHA-512:9DD6567DCD6D61B5FBCF94A4C32C1843181EF64AF627C973F7878E1F6918109D250531CBFCB6E406B47E708D22D9028DB2515D0B382742269D6CAE64B6BC9F16
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>.. ..ope1..ope2.................................................................XML....................................................-->..<UserAlarmList>.. .............XML.......id...............................7....................... -->..<UserAlarm active="true" id="Alarm-A" name="Alarm-A" buzzer="c:/windows/media/tada.wav">...<OccuurrenceCondition alarmType="analog" channel="Analog001" cond1="10" ope1="1" ope2="3" cond2="20" />...<RecoverCondition alarmType="analog" channel="Analog001" cond1="10" ope1="2" ope2="2" cond2="20" />..</UserAlarm>.... .............XML..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):105
          Entropy (8bit):5.052401000084611
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgC4vIAyCwz1mF3KDEJM8lycy:TMVBdYvyW3YERyR
          MD5:FDE9308F356C5B798A8CC795B5E133F3
          SHA1:D3800C6CF0FE17085D2C64900FFC3977BC95E9CA
          SHA-256:302739211F66760DD450A55D206223C20A9A23DCBA36F4CDE58E5EE650E9932B
          SHA-512:C75248B6E16D9D81C130638F1E41A42AC4EBB05861712862806662D67FC03F90A353F59DAAA53B4C3351254846445B1AF35B945BC3AB92D71ED2C8615523C15F
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="2" display="false">..</UserAlarmList>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15778
          Entropy (8bit):5.088110386346183
          Encrypted:false
          SSDEEP:384:xrqkUPr9km5r4kEWrrkEzrmkcxQrJk2Brkkcw4rnksI:sVeyiGKhI
          MD5:86EEA51F0044FE09C9E1B64DCF9FC09F
          SHA1:5EE40096FB997FC0DDD809CDFFDF9063EF36A580
          SHA-256:F037F111AC0C70BB66FB0049909B35B5B374C8D18AD79F3F4C61D6921CA606E5
          SHA-512:1802C13B5DB8026AFF97ABD02E246C84676129E9659C3C834EB59E0CDE9D2FF8D9FCA05737059A6AFCC33C60747FACD2F64256DCDB6E3C826418A74919537FCE
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="0" display="true">..<UserAlarm active="false" id="Alarm-A" name="Alarm-A1" buzzer="c:/windows/media/tada.wav">..<OccuurrenceCondition alarmType="analog" channel="AN001" cond1="12.0" ope1="1" ope2="2" cond2="26.0" />..<RecoverCondition alarmType="analog" channel="AN001" cond1="27.0" ope1="3" ope2="0" cond2="" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-B" name="Alarm-B1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="digital" channel="DC001" cond1="1" />..<RecoverCondition alarmType="digital" channel="DC001" cond1="0" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-C" name="Alarm-C1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="1" ope2="1" cond2="20.0" cond3="" />..<RecoverCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="2" ope2="1" cond2="20.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):2703
          Entropy (8bit):5.879402274914046
          Encrypted:false
          SSDEEP:48:cBP/g5cGeY2sd/eZcGeY2uWcGeY2u3ueQFtRLcGeY2pGUBG:mg5dEJoj3fQFPF8GWG
          MD5:F2FC9559FCB964E24DBDC5F87DCA37BC
          SHA1:B341D31DFC2EBE000B1A91AA1F1E02C0F64056E9
          SHA-256:B4068299F8FC2D0B7CAB3CAEADE09531FE1257A90FFE95A750869EE82F983246
          SHA-512:9DD6567DCD6D61B5FBCF94A4C32C1843181EF64AF627C973F7878E1F6918109D250531CBFCB6E406B47E708D22D9028DB2515D0B382742269D6CAE64B6BC9F16
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>.. ..ope1..ope2.................................................................XML....................................................-->..<UserAlarmList>.. .............XML.......id...............................7....................... -->..<UserAlarm active="true" id="Alarm-A" name="Alarm-A" buzzer="c:/windows/media/tada.wav">...<OccuurrenceCondition alarmType="analog" channel="Analog001" cond1="10" ope1="1" ope2="3" cond2="20" />...<RecoverCondition alarmType="analog" channel="Analog001" cond1="10" ope1="2" ope2="2" cond2="20" />..</UserAlarm>.... .............XML..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15778
          Entropy (8bit):5.088110386346183
          Encrypted:false
          SSDEEP:384:xrqkUPr9km5r4kEWrrkEzrmkcxQrJk2Brkkcw4rnksI:sVeyiGKhI
          MD5:86EEA51F0044FE09C9E1B64DCF9FC09F
          SHA1:5EE40096FB997FC0DDD809CDFFDF9063EF36A580
          SHA-256:F037F111AC0C70BB66FB0049909B35B5B374C8D18AD79F3F4C61D6921CA606E5
          SHA-512:1802C13B5DB8026AFF97ABD02E246C84676129E9659C3C834EB59E0CDE9D2FF8D9FCA05737059A6AFCC33C60747FACD2F64256DCDB6E3C826418A74919537FCE
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="0" display="true">..<UserAlarm active="false" id="Alarm-A" name="Alarm-A1" buzzer="c:/windows/media/tada.wav">..<OccuurrenceCondition alarmType="analog" channel="AN001" cond1="12.0" ope1="1" ope2="2" cond2="26.0" />..<RecoverCondition alarmType="analog" channel="AN001" cond1="27.0" ope1="3" ope2="0" cond2="" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-B" name="Alarm-B1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="digital" channel="DC001" cond1="1" />..<RecoverCondition alarmType="digital" channel="DC001" cond1="0" />..</UserAlarm>..<UserAlarm active="false" id="Alarm-C" name="Alarm-C1" buzzer="c:/effects/hogehoge.wav">..<OccuurrenceCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="1" ope2="1" cond2="20.0" cond3="" />..<RecoverCondition alarmType="serial" channel="SI01" condMode="Number" decoder="dec1" cond1="10.0" ope1="2" ope2="1" cond2="20.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):105
          Entropy (8bit):5.052401000084611
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgC4vIAyCwz1mF3KDEJM8lycy:TMVBdYvyW3YERyR
          MD5:FDE9308F356C5B798A8CC795B5E133F3
          SHA1:D3800C6CF0FE17085D2C64900FFC3977BC95E9CA
          SHA-256:302739211F66760DD450A55D206223C20A9A23DCBA36F4CDE58E5EE650E9932B
          SHA-512:C75248B6E16D9D81C130638F1E41A42AC4EBB05861712862806662D67FC03F90A353F59DAAA53B4C3351254846445B1AF35B945BC3AB92D71ED2C8615523C15F
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" ?>..<UserAlarmList buzzPlay="2" display="false">..</UserAlarmList>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):38118
          Entropy (8bit):4.321741164502036
          Encrypted:false
          SSDEEP:384:EBuBcU49pBuBcU49sXtVYU49oB/KOr97tih3hpvMU49EB/Kwr9zHZ4OpiIRsiG06:g5bwnW0W51WEl7Vbe
          MD5:076CB4B126DD51BA6FB3C8F6CB353219
          SHA1:93DE653037611840C10D73EE2D6CAF0FAA7D866B
          SHA-256:4F44D0240E7A914027B5E40088B9544EA2FED854633B664B206E45E814B08B37
          SHA-512:22E5B577A7A1C7FBAE626304B7F90880FDAAC5DC59862DA5F5B75D538033F362C1A18C189784AE0020C67909BD8A7CC1C771E083816DA9282C937C5C05104811
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>Conning</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="data"> .. <void index="0"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="1"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="2"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. </void> .. <void property="flag"> .. <array class
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8247
          Entropy (8bit):4.55942294731948
          Encrypted:false
          SSDEEP:192:o5XYQYF6f6IKHM8grk3adkt16JBdkKgCgH:op/626B74m4es3dZbi
          MD5:4ED526AE7B9E764203550776F8AD9B61
          SHA1:64C4C6AD40980A9027914082418E83F1DFFB2DAE
          SHA-256:B30A49DBDCECA84BE2ED3CF069E1B23849A2BD80F3508681F0B1DAEB26A961EB
          SHA-512:F1ADE776B966404B14E82C91E19014424F9029AC60D00E7C52A4B788A759C7920861800DCE7A3F919863CBC902F15772DF0AFA84ABD7C52DA977F43A9D2F0149
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>FullSetSheet</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.CompassForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.CompassObject</string> .. </void> .. <void property="key"> .. <string>CompassSheet</string> .. </void> .. <void property="x"> .. <int>313</int> .. </void> .. </object> .. </void> .. <void method="put"> .. <string>13</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="key"> ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8247
          Entropy (8bit):4.55942294731948
          Encrypted:false
          SSDEEP:192:o5XYQYF6f6IKHM8grk3adkt16JBdkKgCgH:op/626B74m4es3dZbi
          MD5:4ED526AE7B9E764203550776F8AD9B61
          SHA1:64C4C6AD40980A9027914082418E83F1DFFB2DAE
          SHA-256:B30A49DBDCECA84BE2ED3CF069E1B23849A2BD80F3508681F0B1DAEB26A961EB
          SHA-512:F1ADE776B966404B14E82C91E19014424F9029AC60D00E7C52A4B788A759C7920861800DCE7A3F919863CBC902F15772DF0AFA84ABD7C52DA977F43A9D2F0149
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>FullSetSheet</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.CompassForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.CompassObject</string> .. </void> .. <void property="key"> .. <string>CompassSheet</string> .. </void> .. <void property="x"> .. <int>313</int> .. </void> .. </object> .. </void> .. <void method="put"> .. <string>13</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="key"> ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):38118
          Entropy (8bit):4.321741164502036
          Encrypted:false
          SSDEEP:384:EBuBcU49pBuBcU49sXtVYU49oB/KOr97tih3hpvMU49EB/Kwr9zHZ4OpiIRsiG06:g5bwnW0W51WEl7Vbe
          MD5:076CB4B126DD51BA6FB3C8F6CB353219
          SHA1:93DE653037611840C10D73EE2D6CAF0FAA7D866B
          SHA-256:4F44D0240E7A914027B5E40088B9544EA2FED854633B664B206E45E814B08B37
          SHA-512:22E5B577A7A1C7FBAE626304B7F90880FDAAC5DC59862DA5F5B75D538033F362C1A18C189784AE0020C67909BD8A7CC1C771E083816DA9282C937C5C05104811
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?> ..<java version="1.7.0_25" class="java.beans.XMLDecoder"> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>Conning</string> .. <object class="java.util.HashMap"> .. <void method="put"> .. <string>15</string> .. <object class="jp.co.furuno.vdr.ui.viewer.config.property.form.NumericDataDisplayForm"> .. <void property="component"> .. <string>jp.co.furuno.vdr.dooars.component.NumericDataDisplayObject</string> .. </void> .. <void property="data"> .. <void index="0"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="1"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. <void index="2"> .. <void property="mode"> .. <boolean>true</boolean> .. </void> .. </void> .. </void> .. <void property="flag"> .. <array class
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (363), with CRLF line terminators
          Category:dropped
          Size (bytes):149810
          Entropy (8bit):5.440728394068986
          Encrypted:false
          SSDEEP:1536:yPcwlLPcwAzPcwBmPDbYjPDbdcPDbuZPDb09PDb3RPDbalPDbQePDbILPDbGnPau:05HHNlpK2SF8b2jfnJ1b
          MD5:98EF1EA9CB80CE74CABD805DAF5C5232
          SHA1:21BFA9B8D650854681434CB7115FFEA1703C1B3F
          SHA-256:7846246A6303D714FE1A4B35BCA9105E6518FBF29A433AF4AD1325722CC447E2
          SHA-512:44841922EC96D590DAD05A995B44340D78F8AC42D5141E87A229FB37C319DD117D7D57FD6623F1F369C8072EBEB68D9DD52ED09A0C9039E07A8C65354B912410
          Malicious:false
          Preview:.<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Depth(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT....print( #2,"M");..trend(double(#2));..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Offset(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT..print( #3,"M");..trend( double(#3) );..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Range(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with no line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.894918389718543
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgCaOELA/schlA:TMVBd6OjY
          MD5:EDD4E78B0335455E0860E25CC63F56B6
          SHA1:1928DB934894162ADD003053AE0CB1C54A45350F
          SHA-256:7157D1AB6A5F59517FA275798E036570882ABB5815E18C194F0D7EB24A7DC739
          SHA-512:B4C678DAACF67775C252E73ED1903C5788BD02A1CACBF2F848692F60405DCFE3568B1EE8DA4526D74699C28141E7BDDEA064841ADFCA6ACCFF9D4F27CF79311C
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS/>
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with no line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.894918389718543
          Encrypted:false
          SSDEEP:3:vFWWMNHU8LdgCaOELA/schlA:TMVBd6OjY
          MD5:EDD4E78B0335455E0860E25CC63F56B6
          SHA1:1928DB934894162ADD003053AE0CB1C54A45350F
          SHA-256:7157D1AB6A5F59517FA275798E036570882ABB5815E18C194F0D7EB24A7DC739
          SHA-512:B4C678DAACF67775C252E73ED1903C5788BD02A1CACBF2F848692F60405DCFE3568B1EE8DA4526D74699C28141E7BDDEA064841ADFCA6ACCFF9D4F27CF79311C
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS/>
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (363), with CRLF line terminators
          Category:dropped
          Size (bytes):149810
          Entropy (8bit):5.440728394068986
          Encrypted:false
          SSDEEP:1536:yPcwlLPcwAzPcwBmPDbYjPDbdcPDbuZPDb09PDb3RPDbalPDbQePDbILPDbGnPau:05HHNlpK2SF8b2jfnJ1b
          MD5:98EF1EA9CB80CE74CABD805DAF5C5232
          SHA1:21BFA9B8D650854681434CB7115FFEA1703C1B3F
          SHA-256:7846246A6303D714FE1A4B35BCA9105E6518FBF29A433AF4AD1325722CC447E2
          SHA-512:44841922EC96D590DAD05A995B44340D78F8AC42D5141E87A229FB37C319DD117D7D57FD6623F1F369C8072EBEB68D9DD52ED09A0C9039E07A8C65354B912410
          Malicious:false
          Preview:.<?xml version="1.0" encoding="UTF-8" standalone="no"?><DECODERS><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Depth(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT....print( #2,"M");..trend(double(#2));..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Offset(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">Echo sounder\</PROPERTY><PROPERTY name="Description"/><PROPERTY name="DecoderScript">Search for DPT..print( #3,"M");..trend( double(#3) );..</PROPERTY></NMEA-DECODER><NMEA-DECODER Readonly="true" Type="Analog"><PROPERTY name="Title">Range(DPT)</PROPERTY><PROPERTY name="InputType">NMEA</PROPERTY><PROPERTY name="Formatter">DPT</PROPERTY><PROPERTY name="DecoderPath">
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with very long lines (467), with CRLF line terminators
          Category:dropped
          Size (bytes):4949
          Entropy (8bit):5.289970304199814
          Encrypted:false
          SSDEEP:96:C6ctwrT5oLxL4wCjjRnUlcs7VSkkE4k3oclr:VctwriewCjVnUlcs/kZk3oclr
          MD5:4B86853D7BF2673B52A917859F8EAE44
          SHA1:0093D813529841158F9BCFB67DAA6F1713F47AA8
          SHA-256:1525B54F9DD32AD96A7D74A950502E044E0F890C7D3BAD2BDD81C4587216398D
          SHA-512:D5C269B602219814554CE616ABF57D17C9FFA6B48DA38318C81A58528770005F43BE5D8F86347FD6FC924F0A97EE67B26929BE87D712E50AB5D21D98E8D94B52
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24004..playback-server-port=24003..module_manage_server_port=10110..vlc_manage_server_port=10120....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=0....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..#playback-heartbeat-cycle=2147483647....#Reply ECHO Time-out..#GNPAdmSession.HEAR
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3637
          Entropy (8bit):5.2375778608011405
          Encrypted:false
          SSDEEP:96:h0hct8T5oLVmg54ua8l9lyj+HHBZkn8l8/8DK:hUct8iY3ua8nyanBZkn0gH
          MD5:7A2CDAFCE38EDB8F29DD4A367CEB34B9
          SHA1:E1A6B983982ACF6B46317AE8114C99BC806D459C
          SHA-256:F48165D0DC1BB6462034DD9F4C9F31E37123433794813B16CC99BF3F565F786E
          SHA-512:32C3833A37FB9D5FD25E434A724BB54FCE85CA756A5DE4B4C5773A1DCA160A6217AF9D98A71646F1800154862EDE9034AC73A285B2DE584B4C1683B1D4BFC88D
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....# font size of Numeric Data Display component..font_size_numeric_data_display=18....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24001..playback-server-port=24002..module_manage_server_port=10110..backup-server-port=24006....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=-1....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text
          Category:dropped
          Size (bytes):5572
          Entropy (8bit):4.535836046572228
          Encrypted:false
          SSDEEP:24:2dIlukvg+DM7BvwsCDLB/vwTDdEQ/vCkDsOAOGvTkD4WvUDnEGvxOL1DSP2v8DxU:cIG9O/wtGymkD
          MD5:A71BE58C3D0F810873E17EEAE1341491
          SHA1:E01AA28D7CA07BAC6DA76A86DCF100E58249EA3A
          SHA-256:9B1F353A0CE6CBE93929ED344EB83D3A578055FE3AECDA351BD08FA3FD856D8A
          SHA-512:982CFCB5B9762DBEFDC302BF956D4EAB4C44DCD841CAB0F2CEABBA1005DF2261BC4D63F279AF7748DE4CC32B233E9C882F42E4D82A358B7C64FC06DCEF28DCE2
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?>.<java version="1.7.0_25" class="java.beans.XMLDecoder">. <object class="java.util.HashMap">. <void method="put">. <string>0</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Conning</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.CustomViewer</string>. </void>. <void method="put">. <string>Icon</string>. <null/>. </void>. </object>. </void>. <void method="put">. <string>1</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Serial</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.SerialViewer</string>.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text
          Category:dropped
          Size (bytes):5572
          Entropy (8bit):4.535836046572228
          Encrypted:false
          SSDEEP:24:2dIlukvg+DM7BvwsCDLB/vwTDdEQ/vCkDsOAOGvTkD4WvUDnEGvxOL1DSP2v8DxU:cIG9O/wtGymkD
          MD5:A71BE58C3D0F810873E17EEAE1341491
          SHA1:E01AA28D7CA07BAC6DA76A86DCF100E58249EA3A
          SHA-256:9B1F353A0CE6CBE93929ED344EB83D3A578055FE3AECDA351BD08FA3FD856D8A
          SHA-512:982CFCB5B9762DBEFDC302BF956D4EAB4C44DCD841CAB0F2CEABBA1005DF2261BC4D63F279AF7748DE4CC32B233E9C882F42E4D82A358B7C64FC06DCEF28DCE2
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8"?>.<java version="1.7.0_25" class="java.beans.XMLDecoder">. <object class="java.util.HashMap">. <void method="put">. <string>0</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Conning</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.CustomViewer</string>. </void>. <void method="put">. <string>Icon</string>. <null/>. </void>. </object>. </void>. <void method="put">. <string>1</string>. <object class="java.util.HashMap">. <void method="put">. <string>Name</string>. <string>Serial</string>. </void>. <void method="put">. <string>Edit</string>. <string>true</string>. </void>. <void method="put">. <string>Class</string>. <string>jp.co.furuno.vdr.ui.viewer.SerialViewer</string>.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with very long lines (467), with CRLF line terminators
          Category:dropped
          Size (bytes):4949
          Entropy (8bit):5.289970304199814
          Encrypted:false
          SSDEEP:96:C6ctwrT5oLxL4wCjjRnUlcs7VSkkE4k3oclr:VctwriewCjVnUlcs/kZk3oclr
          MD5:4B86853D7BF2673B52A917859F8EAE44
          SHA1:0093D813529841158F9BCFB67DAA6F1713F47AA8
          SHA-256:1525B54F9DD32AD96A7D74A950502E044E0F890C7D3BAD2BDD81C4587216398D
          SHA-512:D5C269B602219814554CE616ABF57D17C9FFA6B48DA38318C81A58528770005F43BE5D8F86347FD6FC924F0A97EE67B26929BE87D712E50AB5D21D98E8D94B52
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24004..playback-server-port=24003..module_manage_server_port=10110..vlc_manage_server_port=10120....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=0....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..#playback-heartbeat-cycle=2147483647....#Reply ECHO Time-out..#GNPAdmSession.HEAR
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3637
          Entropy (8bit):5.2375778608011405
          Encrypted:false
          SSDEEP:96:h0hct8T5oLVmg54ua8l9lyj+HHBZkn8l8/8DK:hUct8iY3ua8nyanBZkn0gH
          MD5:7A2CDAFCE38EDB8F29DD4A367CEB34B9
          SHA1:E1A6B983982ACF6B46317AE8114C99BC806D459C
          SHA-256:F48165D0DC1BB6462034DD9F4C9F31E37123433794813B16CC99BF3F565F786E
          SHA-512:32C3833A37FB9D5FD25E434A724BB54FCE85CA756A5DE4B4C5773A1DCA160A6217AF9D98A71646F1800154862EDE9034AC73A285B2DE584B4C1683B1D4BFC88D
          Malicious:false
          Preview:# default font name..font_name_default=NSimSun....# default font size..font_size_default=12....# font size of Numeric Data Display component..font_size_numeric_data_display=18....#Host Appellation..server-hostname=172.31.16.200..playback-server-hostname=localhost..lastconnect-server-hostname=172.31.16.200....#Port number at connection destination..server-port=24001..playback-server-port=24002..module_manage_server_port=10110..backup-server-port=24006....#Communicator Appellation..communicator-name=DGNPCommunicator....#Trial frequency of initial connection (-1:unrestraint.CThe rest:Specified frequency)..max-connect-trials=1....#Connected return of Trial frequency (-1:unrestraint.CThe rest:Specified frequency)..max-reconnect-trials=-1....#Interval of Connected trial(ms)..trial-interval=5000....#read of Communicator.ECycle of Writing Loop..io-loop-cycle=200....#Time-out of HELLO..reply-hello-timeout=15000....#ECHO Transmission Cycle..heartbeat-cycle=10000..playback-heartbeat-cycle=10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 146
          Category:dropped
          Size (bytes):136
          Entropy (8bit):6.119457396458099
          Encrypted:false
          SSDEEP:3:FttDKtoYT6y3tz+T9g2FvpeBs8hycfp/1X2VgRbBktl3/ln:Xt82ktz0e2pMq80qTdid
          MD5:BBD639890647EA87DE8E6B828ADCF0B4
          SHA1:7B03FF46924D274AB92A9CABBF169ED611566F8C
          SHA-256:281E6329955A6B3D59CAE21869A02C70801C93CD8D9ACD2B1CD496A7608C9F64
          SHA-512:0600BFE1C86B41A723C49BFEDB63DE41BFDE4C494795AE8AC36BC20AFBE42F4BCE1B1FE91F8B611DB179D5B94C2AFB8F57A350EF9DCAF06ADDBCE5CE730FEF0A
          Malicious:false
          Preview:...............Q(K-*...U2.3PRH.K.O..K.U..q.P..S..J,KDVg.g.o`.....X\l....KJM.+...qI...Z...`.....\....$3G..(..'..DI.d.>H....B9.=....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 146
          Category:dropped
          Size (bytes):136
          Entropy (8bit):6.119457396458099
          Encrypted:false
          SSDEEP:3:FttDKtoYT6y3tz+T9g2FvpeBs8hycfp/1X2VgRbBktl3/ln:Xt82ktz0e2pMq80qTdid
          MD5:BBD639890647EA87DE8E6B828ADCF0B4
          SHA1:7B03FF46924D274AB92A9CABBF169ED611566F8C
          SHA-256:281E6329955A6B3D59CAE21869A02C70801C93CD8D9ACD2B1CD496A7608C9F64
          SHA-512:0600BFE1C86B41A723C49BFEDB63DE41BFDE4C494795AE8AC36BC20AFBE42F4BCE1B1FE91F8B611DB179D5B94C2AFB8F57A350EF9DCAF06ADDBCE5CE730FEF0A
          Malicious:false
          Preview:...............Q(K-*...U2.3PRH.K.O..K.U..q.P..S..J,KDVg.g.o`.....X\l....KJM.+...qI...Z...`.....\....$3G..(..'..DI.d.>H....B9.=....
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlJMey:TFeXmfy
          MD5:145995A39403247C48A1294BBD3F24B7
          SHA1:FDE206B8842D5D6DC2C55419FA9132D29BCCDDA9
          SHA-256:8E1E1809D5A615B804ADE5C19320254123200A6A519E2A8EEF7B0195FDFDAD13
          SHA-512:9EA1428CD5C2DC6194578A7FA6C7C7FB8365CC903254B0CD19FCC5DF85191BD9DBF289458BF68A104003F7E504DD69DBF80918595BBCFBEB272CAA9554C1285B
          Malicious:false
          Preview:Search for VDM..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcJMey:TF7fy
          MD5:7C49E7807364975649412DC77DD30551
          SHA1:F8CB158215A90B66A65CB07A7B3873BB7AF84B11
          SHA-256:826A3362A264E57B38103AC2C57FF16D4F49B22F03DB7BE76CA82A9B119B1C5F
          SHA-512:C0CE7A1DD486E87B4FF5FBE13558B1CBF82ADB1B1F3BFBEC6FF23EA9544BBE718BF5BDD94CE5257778CC4057A53C0DC216EC79B644C41B7861EE44046A0BE788
          Malicious:false
          Preview:Search for VDO..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6EK:TFi
          MD5:DF1728A7643081E7A94D07541090BF14
          SHA1:645A91B67B8339EDC946057D0DAB3A97F34922D2
          SHA-256:835E85143CE6D5CB78435763641ABC89D81BEED4C010A7A314F3E27FB8C98EA3
          SHA-512:E31DAF5F1D0C872FEF48A7A146924D10289C84BC5EC388CE3D928885EF61D358625DEAC572B15BB429BDAF5F700C914EB7F9A9FE0413A38BD1FEC84AA752698C
          Malicious:false
          Preview:Search for ALA..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLJMey:TFv9fy
          MD5:88C9E487636A2C623D9B5F05E9FB49FB
          SHA1:192165866308DBDBDD9BB99D02C34879F89D722B
          SHA-256:0E404DE519C37D71714E450710D8ECA3DCE6AF154BEB7925DA9946D542B436A8
          SHA-512:9DCDB5BF2606C6AC3F439D9BD8DF263420CD02F57A510992443FFDCC442ACBFA711AD48EB077662F7ABAD1B553AECA36AC8ECC4E6CE263285C901FB06597E410
          Malicious:false
          Preview:Search for ALR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlFMf:TFLZbK
          MD5:9001A172EA40F02820340531E7188A41
          SHA1:DAA459BCE4ED5638C033AA78879CB220C470A64B
          SHA-256:7CCBCE4B9B81D7584360BB0D4F4D8ABA0DC223789F771B8E9B6F294CE563F85A
          SHA-512:3E090E98D581D96E3C366B6B718CC37213ECB2B7277B3523DF84D686B14E833848DDF32883AB83BA2A656937D9B9F416C9503BE8BBEFD8F90947A6FB2B7F3093
          Malicious:false
          Preview:Search for FIR..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFifn:TFQiPYif
          MD5:9A3F4FC9DA8BAAD941D91AA61CD4F056
          SHA1:A643AC5548ED9EC5EC4454298D6FEE5E3FBD3926
          SHA-256:E257BDE9DE1F6BCBBB09BFEDCB1FE7B7F90E3F8AA9D215337A2153097FEF480C
          SHA-512:C3EEDEB418398A20B370DAC32F0E058C30C1370BD9B504935945BA675432B3BDA017E276EBD3706ADDF89101289251EC05663149B33C083A087F1FC49D12B0FC
          Malicious:false
          Preview:Search for HRM..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNVM3v:TF75VAv
          MD5:80E24D2721BD1B334C125C8EEC3B62C8
          SHA1:F80FD825BF69D54E4CB0E1773FE24D5B25B4EC34
          SHA-256:72F87A34011FD7D1F81B5F5B7DFCBBC4BAA8C00693DD7BF3E848EF7992985DA6
          SHA-512:264537B1A04B0AA67678275E8ED3C2C03A2718E7DFA0DC10AE39C50766174F26233FE31AE13A4E544299676CC53742A6E608B6180E79EC70E54BBCEFA9E4F7F5
          Malicious:false
          Preview:Search for ALF..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.735821149647001
          Encrypted:false
          SSDEEP:6:TF2JF02fIPc+cUIKrbcbbpI+cZOIKrbcbg4DTc/XKrLW:T0JKOIPfbIGYRUGYX81
          MD5:DE149D0B789E7AA0DCAD82FEEB602683
          SHA1:78885B7A60F066101665BCCCE6473BF4A9BA7D48
          SHA-256:5282A47096F5EE76B05FFD54FA2E82307F4188E73A98B1EC828BEB1DC883FD41
          SHA-512:976B828952F84FCBB97B18B2B856D2492F933D5C2E9BC7364F10CECB7337C8DAEBF358DC7C8ECE892EF04A50A5D66582A10DC62FF353293AD56B55DAF2111AC6
          Malicious:false
          Preview:Search for ALC..print(#7, " ", #6, " ", #8, " ");..if (0 == strcmp(#5,"1"))..{.. if (0== strcmp(substr(#9,1,1),"*")).. {.. print(substr(#9,0,0));.. }.. if (0== strcmp(substr(#9,2,2),"*")).. {.. print(substr(#9,0,1));.. }..}..if (0 != strcmp(#5,"1"))..{.. print(#9);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):282
          Entropy (8bit):4.742918596477533
          Encrypted:false
          SSDEEP:6:TFIQazfIPQ+lIKrbkI+FvIKrbXp4DTcTXKrjy:TOhrIPrlIGC+GXK8ey
          MD5:CE59AA836341199C42FC336B910A2F28
          SHA1:A5532D58B2F6D7D850BCCD1CA688B99BF6773B7E
          SHA-256:45ACB69A6C0E0A76C30A7E7716A731EB131697BED19CDD8BD6EA549704AE5268
          SHA-512:38AC244F621720D9F97E3AF2918224CCC6728CDCB2229AE78D161CAE2D5CDA33FFFC2507175C69A3C76A47D756305F00C996345872B69607C93435B1A83744AC
          Malicious:false
          Preview:Search for ALC..print(#43, " ", #42, " ", #44, " ");..if (0 == strcmp(#5,"10"))..{.. if (0== strcmp(substr(#45,1,1),"*")).. {.. print(substr(#45,0,0));.. }.. if (0== strcmp(substr(#45,2,2),"*")).. {.. print(substr(#45,0,1));.. }..}..if (0 != strcmp(#5,"10"))..{.. print(#45);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.7113737109794
          Encrypted:false
          SSDEEP:6:TFwUtzFsKfIPZ+UNjvIKrbUEI+U+kIKrbU8A4DTcMXKrDqe:TPDrIPc6jvIGtPdGD38x
          MD5:F0CEBD8E4DEF2216E6E4AEB384956DC5
          SHA1:4D37F04EA535839E472052091E02772104CB5CEC
          SHA-256:3A066E28039FDC5734B0EB056F6FC1095BC64EFB83666060432E00308CD70938
          SHA-512:F20A662662B36E83006EA174F39DBE0304026117E92597F9D8C3510BB0A7DE5C4BAEFE329102B1453CB99B97616810CADBA1F34CC1D5C81F199B5FE33AAFCA58
          Malicious:false
          Preview:Search for ALC..print(#11, " ", #10, " ", #12, " ");..if (0 == strcmp(#5,"2"))..{.. if (0== strcmp(substr(#13,1,1),"*")).. {.. print(substr(#13,0,0));.. }.. if (0== strcmp(substr(#13,2,2),"*")).. {.. print(substr(#13,0,1));.. }..}..if (0 != strcmp(#5,"2"))..{.. print(#13);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.761977534984806
          Encrypted:false
          SSDEEP:6:TFw0dxLVJfIP8yU+UZIKrbU+bpI+U8avIKrbU+g4DTc8ynXKrDoy:TvdxrIPZQIG3RxG3X8Ty
          MD5:ACF74046391BAA4E7390974E507C5101
          SHA1:8DD10E331F58B2BF9774AEE6F383BBE10B3EF85F
          SHA-256:1D02561491D2A5545551EF971CAB3E4B8D26714E3F903CF7D46D802F046EB73F
          SHA-512:7A020E1ACEAE43049B15C88B4C003E262449496F9926DF8674C866CFFA28B57EF059D373CC683FDB655984DC4DEFE6C2BE0CCBE2BE829D4CCCFA78F839A86000
          Malicious:false
          Preview:Search for ALC..print(#15, " ", #14, " ", #16, " ");..if (0 == strcmp(#5,"3"))..{.. if (0== strcmp(substr(#17,1,1),"*")).. {.. print(substr(#17,0,0));.. }.. if (0== strcmp(substr(#17,2,2),"*")).. {.. print(substr(#17,0,1));.. }..}..if (0 != strcmp(#5,"3"))..{.. print(#17);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.736443532438877
          Encrypted:false
          SSDEEP:6:TFwudzFxKfIPP+bvIKrb2I+jIKrblp4DTcqXKr4:ThdzFMIPGbvIGMsGM8C
          MD5:AA325D1D4B7F35121264E068DEB91197
          SHA1:82D7F05966FFEDB9C26C182A7864B68A81D17960
          SHA-256:F9E3639A513CD07F8E510E95BA3E12BC572899265944E621040D74492DF7312D
          SHA-512:662E48F2909CE956ACC15F25E199E9BEE8A74B8E8A4BF06098F9FFEAEA5E85DF58D70961F5B134CECBD76DB44F59120EAD6AAFBBCFB17A2DB23FDB7075639478
          Malicious:false
          Preview:Search for ALC..print(#19, " ", #18, " ", #20, " ");..if (0 == strcmp(#5,"4"))..{.. if (0== strcmp(substr(#21,1,1),"*")).. {.. print(substr(#21,0,0));.. }.. if (0== strcmp(substr(#21,2,2),"*")).. {.. print(substr(#21,0,1));.. }..}..if (0 != strcmp(#5,"4"))..{.. print(#21);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.7158358044900055
          Encrypted:false
          SSDEEP:6:TFmtfIPQ+1JLIKrbqI+fvIKrbaA4DTcTXKrM:TY1IPrHIGA4Ga38t
          MD5:22F0741BD27F78D768ACF0B401ADCDE8
          SHA1:A9DD8844301C33B89F55DE89747F407B3976B5C7
          SHA-256:253D89D17D8B6803744FE6BD6CC72B1F49471803ADE2FACC7DE8D34440A074B8
          SHA-512:C607E07395D79F2B2B20762971FF99C77BE6660C06BAAB7E496F4FB3B0AD66DDC6A1A62ACCF43D818853B1A37903A24A17BD53C120AEFC7C08C1952BFA762D33
          Malicious:false
          Preview:Search for ALC..print(#23, " ", #22, " ", #24, " ");..if (0 == strcmp(#5,"5"))..{.. if (0== strcmp(substr(#25,1,1),"*")).. {.. print(substr(#25,0,0));.. }.. if (0== strcmp(substr(#25,2,2),"*")).. {.. print(substr(#25,0,1));.. }..}..if (0 != strcmp(#5,"5"))..{.. print(#25);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.769404604106139
          Encrypted:false
          SSDEEP:6:TFGVfIPN+UkIKrbeI+7IKrbb4DTcAXKrRy:TgNIPIUkIGUEGE8Jy
          MD5:438383B219045F831E489048B29EB845
          SHA1:A78C6EA8D2CADD8AFB660734E0A1F5C761EA1804
          SHA-256:338E94B600375A70754D6FAE00A3F9A0F2CD3BEFCE863801E1070B05C7351344
          SHA-512:EDC21AE7EBB638B60B4A76DBC40F2FF30306BF5DBD0198D049CC56976A42E7BD7CDD76F0C28B8C1992717011FED8EE71976A7BBAC87886A36118315CBEC9F046
          Malicious:false
          Preview:Search for ALC..print(#27, " ", #26, " ", #28, " ");..if (0 == strcmp(#5,"6"))..{.. if (0== strcmp(substr(#29,1,1),"*")).. {.. print(substr(#29,0,0));.. }.. if (0== strcmp(substr(#29,2,2),"*")).. {.. print(substr(#29,0,1));.. }..}..if (0 != strcmp(#5,"6"))..{.. print(#29);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.723438807834864
          Encrypted:false
          SSDEEP:6:TFy2PJnNJFOKfIP2+WtvIKrbWEI+WNIKrbW8A4DTchXKrBjV:TwaJFVIPFWtvIGWiWeGW838+jV
          MD5:79D536C07EB516D9870E03A42D5D9E09
          SHA1:F6F49B0EB2C9F505016D934A5213769A9D38EEFF
          SHA-256:ABF3147E1B9D0C60DD27A5E2990F78B249F6C2B6C94FD11C5F3A7E2DB84DDD72
          SHA-512:21CA30952163CCCA296E87D938A553769A1F04688DB332F2F8F14B13CED9540BA504F0E0394B5BAFC17FBD0EE6617EE01BBB8E5B005D4FB33163FAC7848E3D92
          Malicious:false
          Preview:Search for ALC..print(#31, " ", #30, " ", #32, " ");..if (0 == strcmp(#5,"7"))..{.. if (0== strcmp(substr(#33,1,1),"*")).. {.. print(substr(#33,0,0));.. }.. if (0== strcmp(substr(#33,2,2),"*")).. {.. print(substr(#33,0,1));.. }..}..if (0 != strcmp(#5,"7"))..{.. print(#33);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.795187750352116
          Encrypted:false
          SSDEEP:6:TFysrJ9fJnzfIPz+WZIKrbW4I+W6IvIKrbW94DTc+XKrBWLy:TwsnfJrIPiWZIGW2W6GWG8zWLy
          MD5:A334DB2505872573F58D37594AFAEBDF
          SHA1:1C5BB66F46C72B0AEB16C4DB1ECB0176CDE6C4E6
          SHA-256:53FAA76C7D1F324F9E9FFC2E24A2948FE179C3F2537B639518D575B689A2A1D7
          SHA-512:90C4DAAD371F657399BC8207E6CC29EE45C6804BF8CF1118166BE0FE5C2D78F4E1925CB6BFFD143C55AC839AD4D65065A12C2235F638BE1A342E135FE53EDF58
          Malicious:false
          Preview:Search for ALC..print(#35, " ", #34, " ", #36, " ");..if (0 == strcmp(#5,"8"))..{.. if (0== strcmp(substr(#37,1,1),"*")).. {.. print(substr(#37,0,0));.. }.. if (0== strcmp(substr(#37,2,2),"*")).. {.. print(substr(#37,0,1));.. }..}..if (0 != strcmp(#5,"8"))..{.. print(#37);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.775567169733104
          Encrypted:false
          SSDEEP:6:TFyIxJFo9uKfIPGyU+hUIvIKrbYI+hIKrbAA4DTcGynXKrS:Tw2o91IPGy3xvIGWaGA38GyH
          MD5:2F2560F0846E110C120CE810E3752610
          SHA1:0E079F7CB82C0A156CE6D30FB69B9ACAC4411C32
          SHA-256:2DD72E6B1271493DD45D0A6E9FECD84B9F1C7111993AA9BC0BF08A2E5275C300
          SHA-512:D1EC4A0CEB6FFA6814DB6FA44762A8B8A30A7ED7C48B4CD3FFA1715E954DFC706CB8B8EFA683C02AC9F08AD547EDE9269125D7FAD77E648A583DBFC4073E8F20
          Malicious:false
          Preview:Search for ALC..print(#39, " ", #38, " ", #40, " ");..if (0 == strcmp(#5,"9"))..{.. if (0== strcmp(substr(#41,1,1),"*")).. {.. print(substr(#41,0,0));.. }.. if (0== strcmp(substr(#41,2,2),"*")).. {.. print(substr(#41,0,1));.. }..}..if (0 != strcmp(#5,"9"))..{.. print(#41);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6Kfovn:TFlyn
          MD5:7FC3ADEB90AED72F7542EB256D30ABFE
          SHA1:28042ECFB24E33B4D9CFF0496E4910A51E3D9BB1
          SHA-256:85E91F9AB82BCAE4A89CF9EFA4DBB459A38354FFA8AE0AF819A8ADDFBF302CE2
          SHA-512:33EA6AC1DE593588BD41E35D3A59CDEBCFD55DC5D6C751C3BC32B109896A82FD06C10F2492652C1E39AC063FBC03F9C88AD1265B329A846FC9233977E8E28136
          Malicious:false
          Preview:Search for ALA..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):32
          Entropy (8bit):4.601409765557392
          Encrypted:false
          SSDEEP:3:5NFDpLEJn3v:TFAnf
          MD5:F115DCEEF4C93CF8C4FB2663F6B84764
          SHA1:08512C44C65FEB5947D0D6D25D31700DCBB974D7
          SHA-256:52579E2F55AB543493A379A5C9DCF7E62276F8864634FC681F61BCDFB601679E
          SHA-512:0A331B3570985D7AED499B064E74B546C530776C4786321B4DC3362B51C4FDEB9A41807EA2C53CE626E7A700F510611DC34A288CA4D2264F095B0AF957693FDB
          Malicious:false
          Preview:Search for DTM..print(#8,"m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NVJFogv:TFXogVJF/
          MD5:014CB208D01B175CFEB1A8DF1AF2A04D
          SHA1:073BEE6BFD1DA79B9034BC60E6E0FDD13F63170C
          SHA-256:B53330BEB6E18F1A652B357351BC4FADA1C0276B434BE2439A1950A4ED1FDAFB
          SHA-512:28F733486C476B8D1580FAFCDAA303C7E02E9F5DA355E026297FFC7C376B78F1F0FE06C38CB88F81F4FA980C009DDD4B53F142065D556D45F5EB054EB074B8A7
          Malicious:false
          Preview:Search for GGA..print(#10, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDf2plNVJFogv:TFbYVJF/
          MD5:F29BA361323A5F7A9FF63E0133FE76ED
          SHA1:8A21A3E39DC3B083C7F39CE0A1D5B32AC159BB51
          SHA-256:8AF519F7602AF80D6E6029405B06980105D14CC2F3A420D7F370F4BFAD1A106E
          SHA-512:57DFE45BE5C667E76DB8F24E5B2EE8B2D6F66E5E3D9017CDF2D76BD2272B8795DF6AFAA789F2675BDE779AFC20E8E2267A0B3D7459B797DABEB30A283EF5FDC5
          Malicious:false
          Preview:Search for GNS..print(#10, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.39212668463354
          Encrypted:false
          SSDEEP:3:5NFDcclGv:TFI1v
          MD5:B398422890D6B44DE6371998BB906B79
          SHA1:9EA80D69266E0918DBEE3A0941AB4E3E2D09D2BE
          SHA-256:93684712BC62045311266009F77EFCFB851AFF92FBFE7F735BA5127B67EC75A6
          SHA-512:1D80C144EDFAE2AC15DEB0A11F93BA9B2F32D1B06EE32E679A3D03D62D942B7E165D665A3DF661A70681DCEB5D9630F145FEA911141D48F775A48809A8EC74AF
          Malicious:false
          Preview:Search for TRC..print( #7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.39212668463354
          Encrypted:false
          SSDEEP:3:5NFD5KGv:TF1lv
          MD5:B050E06A5A0AFCE12467C1D9CFB087D3
          SHA1:F677E352C8AA84801D4D1A8BC5B8EB555C49E74D
          SHA-256:052EEA304152D8F7809D1D3AE836E70F8C429A564428838E8D2ACBEBCE82E304
          SHA-512:EB54DDC4C862753A15C0B504FB4B3A3BF1736517A0ECA6B97D21B66F50A6F033A1F4C1E664B025EB128E762B21ED3447D794AE9EC9D97E7EA453F7A19AB82A23
          Malicious:false
          Preview:Search for TRD..print( #7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):592
          Entropy (8bit):4.860033044912777
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloAYClopYCGtquYdf8Bloololc6GZ:Z925tjyVCyGCtd0Byoylc6i
          MD5:0872984EBBE74761131D858F84A5CEF0
          SHA1:029A8193AE37EC088252EB50D1A0903AA90F37BD
          SHA-256:3575E154F98A0ADDBB3DEF59EA5826E7C09075751B9ED796DC439DDD3DD35D4A
          SHA-512:BB1E2C4F85D25EB38CBE3B2AAB807C207FABB5928BE7EA3D763FF1699C20FC5E31EC8C5647EDA83EE928B0377D7597800EFB7071C29BAFE50A7155A48F88DE0C
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. .print( #9,".");...trend(double( #9));.. return;..}..if (strcmp(#13,"D")==0){...print( #9,".");...trend(double( #9));.. return;..}..print( "!");...print( #9,".");...trend(double( #9));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFD6b40/ZHBloFDy:TFM7RPYW
          MD5:4B9A028A5729946076CA012760D3D110
          SHA1:625119C8024B69A8EE743480EE7AA09F7BA88F53
          SHA-256:7AB1C77E93C64BFD59027FDC0EE3CB084C34A92C37AA425B63D66C19E2DB63B0
          SHA-512:08B34C801029C3BC4528F52C1F8D8D4A26617E958470E4B4AEFB9D2FC10AD6A922300515D91091109CB215A95735A168B7C6FDCB71232C19B3276FACFC98B37C
          Malicious:false
          Preview:Search for VTG..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFD6b4sfZHBloFifn:TFMnPYif
          MD5:E92F73416A8878299DA905044383B97A
          SHA1:2DAEBF505B3A6F38DB7C7896747D73509B3F2787
          SHA-256:948B6E0C700BC186B855ECDAB1D197F50E5583CF3024EDA8566E97BC4FF7CFE3
          SHA-512:0259D13D9E9C9BCBB19C579D42F7714F1E2C064F82B7993EEB457F1E577AACE68D44C83D5169E24CC63ABBA509776E05579EE9B0A873441DD574190DFACD4934
          Malicious:false
          Preview:Search for VTG..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLKfovn:TF7yyn
          MD5:F423C1F65DED70800300E8AFECF993F2
          SHA1:757337AF85BD8CAAA31FF00B730E589372BE552B
          SHA-256:53CF4F5308E94066E6EA0DBC0548013192B7BBE5B1735CD9F3BA6B8509A44365
          SHA-512:1110DA4E7FA1875C60A0D14B10A8C4DAEC68995605D3348C9D6AD4201B4897CEC25794DD8C316F4061FBE0871E0ACAD529A4168F83B92E0E3FD5D78FD7845E1C
          Malicious:false
          Preview:Search for ALF..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFDzLH2XUXmMJwQwUXVfHYQwUX1L4QwUXE:TFvUUlwjUlfHYjUFL4jU0
          MD5:5C0B309F240036081410AA92DF7076D7
          SHA1:20095BDEC142AF5DCE3B762A0739A5A63E851B59
          SHA-256:DF3B267C5D0F2C982061A4AB0F159025AE938E1B98C2B3ACB96CA622722A8262
          SHA-512:284B55055D3565121D7A96584940A91F02ED04214092F1B5DC8590ADFCD2F7D1D3AC80062D94613401586D3EC4515210557293B879E9E899F639BF2483830FB5
          Malicious:false
          Preview:Search for ALR..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5),".",substr(#2,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulPMf:TF9K
          MD5:FF321DFAE0D8A5030FC249A7F6C5F678
          SHA1:8F628AC1117DF22EF1AE6B0FCFB08D4886941466
          SHA-256:A75484C2BC6FE73D3E73E5F1ECA827B7D537872FB97DE44252E8FEFB0F0173C2
          SHA-512:89281FD3273D0AD877F927FE3623704697B1295925DF33277223EF634E5BF3F8677DF30F6D4A3EA2B370C807D898195A8E3A3DA9F7A508319951A1D0F81F8ACE
          Malicious:false
          Preview:Search for ACM..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6PMf:TFNQK
          MD5:B41312F75583AE3C1D61A1914291ED7C
          SHA1:D03125FB6E4E773C9162EEEA363EB39A014C8E48
          SHA-256:040334504D902D0C7A850439D158FCF8975387DFA4C202B73B1B76CC4363ACC6
          SHA-512:E6BB3118B65359E953ABC4F41FC1990E51B68B379896255AE02AC9EA55189C0C85EFD10BEEBE8EB37B3FCAF028B5664382F2130C0BE24FE087D86784CA7D8E26
          Malicious:false
          Preview:Search for ACN..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLFMf:TF7xK
          MD5:38BB0B8E4C27959F084DFCD3EC02C9CB
          SHA1:FB4CF5B1B7CFC835CF396EE73F77A8DF704FE263
          SHA-256:BF8C9252A0FD961B1C6BD662E08BA44460F752BCF86689CAE74008465F992C52
          SHA-512:7CA5531C02A3AAB4A3A9C33F8A8595E1D2898CBAA84A9670247A53714002339469742B7E7FE136108740667B869328ADB7A0EB52150FF8F3D86ADA796F644BCF
          Malicious:false
          Preview:Search for ALF..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulKfovn:TFoyn
          MD5:A9C7C1ABB3A328E9C2D0293F8CF82BF0
          SHA1:DD64CF4E8302626651D17758F0BF9C5AB00C71DF
          SHA-256:20BBE88D081ABDE5EEC5685ACD183AFC74A1DFF5BDE9108FCDC97ABC8406918D
          SHA-512:9217FF1FEBD9E87F2EC5BDF463C9AC84B35A7B9893880AB3414080A8382BFCEBF335018427B932D097BCDFE25D7C727551C44F4E9CEEBFACDC01792A4F5F81FC
          Malicious:false
          Preview:Search for ACM..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6Kfovn:TFNpyn
          MD5:37D082C0B9E46111035436D10E4D26F2
          SHA1:F211D8942FB301E2492639A806301CAD2DAEAEE2
          SHA-256:F68F3F3B26B3AC3D66D09CE95449CCE47C2A4C40E5DA8FFAC6757600B171C9ED
          SHA-512:8C6F9905C7CA82674E0528C239CCD3E8F3FDD6C998E4D663A3DDC73D2BF6A62042C335242C62E5B9467937EC8C01F75418708830BF88820ECDF05906838C7F89
          Malicious:false
          Preview:Search for ACN..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.730915395146161
          Encrypted:false
          SSDEEP:3:5NFDHFMl0/ZHBloFDy:TFnRPYW
          MD5:9BBAA32C70B631D6F2EC1123BC3F7CB8
          SHA1:8DF235621EE5FF025E48593FFFF6DAF3CCA8C880
          SHA-256:BD46A9E33A2246BB335A8AA04B252193E14625026AFF2C5043D66670D0673962
          SHA-512:443F6D4AAB01814070E618E0368330A5F2172FCD64A8060D0214CD766CE4DF2DA47C318DDDEE3E1DFC542905C43916B352515551ACC352ABCD5481E0C95A0FB9
          Malicious:false
          Preview:Search for HSC..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.730915395146161
          Encrypted:false
          SSDEEP:3:5NFDHFMlsfZHBloFifn:TF7PYif
          MD5:04E5693FF20BBBE70605F7D5ECA497CE
          SHA1:0B8F4304DDB780C96825F536E847260C67849E27
          SHA-256:34CC3E64901E67735E101766350084174FCAEAE693C445F5B4CBA04AC48CA9D2
          SHA-512:32C024BBD8D56ED6AA8ED005C15F6814D4E149BF11DAEA045EAB4B6FC49104FEA986F256A782D4D2E8816C2E0AE9264EA57DB16D4CF6D1B96A09C35FF83E3F34
          Malicious:false
          Preview:Search for HSC..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):57
          Entropy (8bit):4.7491279525714525
          Encrypted:false
          SSDEEP:3:5NFDNliseZHBloFxK:TFGswPYxK
          MD5:616D26A8F1C816E8FFE130104D6237EE
          SHA1:A49CAD6B0CF3DF3466E0F101AD13CEE692778939
          SHA-256:212A268679FECE731A57E7D5C849BA6D7D1C7774F2E5F7B63D58292BBDD03E0B
          SHA-512:3E7B9A99E5FC5D6871B6ACA0D53A997A643A0435609481F68672BAB29EAB52A3892D6A5437EC7F6EE10DD8F06AB17D0FCC2880E9821187742860C4194FA61626
          Malicious:false
          Preview:Search for HTC..print( #11,".");..trend(double( #11));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):57
          Entropy (8bit):4.7491279525714525
          Encrypted:false
          SSDEEP:3:5NFDBVXKiseZHBloFxK:TFt9tswPYxK
          MD5:1A3ED18F18EFD04ACD6FD6D30A1E24A0
          SHA1:088B37B55332BE23DBAA3104C8692472B703F5AA
          SHA-256:6A7A801CB285781DF7B9EA9CDAADC6E994BE64A007F3F5BEAE70C5630244C9B3
          SHA-512:6797F32255C682D70DD73A0895272A536FDCB1CB2ED3CA228D98764CB740938BF10DD5A1F77F7383B17BF157E8276BEAEE18B3857EEE6AC0E9A4DD8C07315C3A
          Malicious:false
          Preview:Search for HTD..print( #11,".");..trend(double( #11));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):62
          Entropy (8bit):4.887438802525302
          Encrypted:false
          SSDEEP:3:5NFDNl3fYovRQHFxiGUm2eov:TF7fYoJSPOmI
          MD5:6E0A62FADCDE084C5C231B29BB9148B0
          SHA1:410BBF6819B1EB36CED8E54E2835CF7407359E93
          SHA-256:EFA8E459F1AABE9F00550585A26248270BB02D441E71954F12700982932CCE4E
          SHA-512:371E8B470118593387DFD729AA957F9CC19C6653E2FC6DF1FF3558040A2B3EE872904AD7C664D020229E5C419726FBA2A8E83C840FE912B3B4DD75C2BC02F908
          Malicious:false
          Preview:Search for HTC..print( #10,"./min");..trend( double(#10) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):62
          Entropy (8bit):4.887438802525302
          Encrypted:false
          SSDEEP:3:5NFDBVXK3fYovRQHFxiGUm2eov:TFt9EfYoJSPOmI
          MD5:57131BE288E84CB6E85C9DCA8F6C8F6F
          SHA1:FF3F65AD631327FB8EC7A2D8A3CA175297CFDCEE
          SHA-256:808BE71E7ED8FD09AF579EEB6CC2DC673A2B45231D35A12D328A96EDE6AA2AD8
          SHA-512:7FC73495A68EFB145327CCE04011D0BFFB95D6E78D81EB32DEEE329F922FA9F7174A3955877F20E7AA2225F609F725A0C21873F89CE67F9D60F5858EFDBF9472
          Malicious:false
          Preview:Search for HTD..print( #10,"./min");..trend( double(#10) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):151
          Entropy (8bit):4.8615919943530495
          Encrypted:false
          SSDEEP:3:5NFDPmX9IsYB3FFErVeym6X9IyYtFFEr+Ov/XKseZHBloFf:TF2WFEr8AWFEr+2BwPYf
          MD5:79A53710647B89D5B8174679E5E2679F
          SHA1:AC64024963491F4BD3B80FC060E9ADA5F468EC7D
          SHA-256:6E77AEFB77632577ED01AB7721B2BD8FB2587039A090D4D02BEFA739744DD7F4
          SHA-512:FAB41A23954DA08B436CF9EB83054E1D1D70E18A8F053EFBD9FB2E4D935B05CAC419F72CB8825302308A3870707A574AA62988C502054FB66FCAA3B5DB843A1F
          Malicious:false
          Preview:Search for HTC..if (strcmp(#4,"L")==0){.. print( "PS ");..}..if (strcmp(#4,"R")==0){.. print( "SB ");..}..print( #3,".");..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):151
          Entropy (8bit):4.8615919943530495
          Encrypted:false
          SSDEEP:3:5NFDBM6X9IsYB3FFErVeym6X9IyYtFFEr+Ov/XKseZHBloFf:TFtMeWFEr8AWFEr+2BwPYf
          MD5:A6A4CB991493ED15D48C9CE6A0F10B67
          SHA1:7F8D950726530F907FFE81E01AB9C60FE574F774
          SHA-256:CF7FA1AC306199ECB6C1DE642FBAEAD1CC3ED258B7CAC5722D4D7EAB6B53B2D4
          SHA-512:2B5381FCDCF6539661972EDF0339523F1212AE6B93DB563B739E54272C6356E189F652FCBEE1EDDBB30451F4727C23D2D2366C3A96BDF28D671131BFF7B369D9
          Malicious:false
          Preview:Search for HTD..if (strcmp(#4,"L")==0){.. print( "PS ");..}..if (strcmp(#4,"R")==0){.. print( "SB ");..}..print( #3,".");..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6LM3vn:TFQAvn
          MD5:1BE0A0A531D7DFE5158294AE79787B4C
          SHA1:C3B62D3A7E7E4EF1BFB3EF9C8FFAF39DFBAC2A4D
          SHA-256:93AC6FCABB3A51A43E7AA35EAAAFDD100D5F97DD500A9932654DA5F1A59E1CD1
          SHA-512:2019EF2D01577DC022F0AF5D3A6976ACE733E55942DA4D63335E3246C5FA24B02AB9181B17C9F5C286DAE5ABBF29B32D0F02F6F04E6CFCA716A62A7300C3D70D
          Malicious:false
          Preview:Search for ALA..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLIK:TFvR
          MD5:67E58223622F809A8496E44223914DC6
          SHA1:DA1B7F9F8B0178FAFBA241563BAE5E6A061482A4
          SHA-256:C853FDAF85B683ED37C3A60298C7C483356180D093E245B9D48452161F9E2618
          SHA-512:63AA886068C43C8BB2E4B844412A4E737BA615D98B36C758B4CC5C045446AA72DF5D900DB7F8B4712843AD0874A0A83702924E251A225C2ED741909E4CF7C5DC
          Malicious:false
          Preview:Search for ALR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlEK:TFLZ/
          MD5:1C51C7119311D3425C80700CE1D18BDA
          SHA1:7072B0900A02819C38BA39E27F3923CAC63E58C2
          SHA-256:E8F5EA64CFC59E0B3143C5F3C4F514299BCE8163A540438F3624EA489AAFB8B4
          SHA-512:599FFCDBDB9B70352D34AAF2727DBA98C35D09102C5ED364DE03B8EFBD3E95EEF97589B5F11B9F6F1F3387F10F68EBDD1ADD4BD3375B9CE7E5F2B54955F8E7BC
          Malicious:false
          Preview:Search for FIR..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJgGm3FFErKW:TFPRugtFErd
          MD5:E0C43B0FA18D0BC53317216BC60D927C
          SHA1:2287EBC17021547317C4BC5AB4F573F32E57BD40
          SHA-256:F1C82A11640ED06A5FFDE403C274130AA9E079729BDCAB2694BDF39D4285EAC2
          SHA-512:09D1FCC202F9FF3A8012C7A3F3880BA981E986AAA694D4959AE7D19C4AA85D0ED9905AB67557A50D2D69949F718DE793C87ECC779C23D851DAE989C610B6DC07
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"E")==0){.. print(#8);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.771286256793215
          Encrypted:false
          SSDEEP:12:TUwlvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:IwVnVeF3VZV8cVg3VoE
          MD5:47A9F6A5D1F674228D239B0269DE4A1D
          SHA1:BFE2C3133336AA2FF10F11320A488EA9C638B131
          SHA-256:DB1932632DD0A3B4E95780E3F6DB263B06E7A3822B6CDE3302B9301DD1C5461A
          SHA-512:0F748002A5E1ED299F0A44CDB24B23D7BE23C8C84A67D0546D4911A599B9E05573E52F0C0A6CFDF6F2CEA8B1BEBF1474D8D0A9AA07EF9762DEA329FF7D0D54D0
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.745088333690341
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9II:TOElilXcIlWsr+lPDlqUllbglWE
          MD5:9693D534176220960AB34C9E62A6941F
          SHA1:6272D757BBFA0675CCAAD2BF5BC16D537FEF55BA
          SHA-256:3AABB0D684B14D6D68260BE831A8DD9F85E37E778FCA6FBF4861CE6E2DC3B539
          SHA-512:87F86D14C1BF4F492FADFC9F59A1858AF5080EBAC5799AFD9D666C3C5397BD40C116B09E0E30478B244670099A85126B8826AE19A2D79C3A0E515120C79F3023
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.75388313954079
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9v:TmkEClilXcIlWsr+lPDlqUllbglWE
          MD5:167FF61C8E1B09020643C1BA7252168A
          SHA1:8E32854A92E08446A8AB56604ABD304A6010B8EA
          SHA-256:5E93F7C1BD6478AB869A90DCE8AC7AC7B2AC2A4088D0D0F3AD70C1CCB82681DA
          SHA-512:4F0B5CF116888D2D4DB6BF1CD17BA9C6109BDAED5076F4EF7596F38914AB656B298C008E6600CD55AA8AE2D045929263D9078967D81B4971EE44C995D77656F3
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.75388313954079
          Encrypted:false
          SSDEEP:6:TFUJLlqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9IFErf:TKlilXcIlWsr+lPDlqUllbglWE
          MD5:E9877D384E5C1168A88FCFADB74A8A18
          SHA1:61C138793961D8934DEB325A3CCF99D1A6F1D1F4
          SHA-256:F1CBB3C4FD45F8A19957164589DAF91F9F0FCD2C27648AA627D8083AD6A1E46B
          SHA-512:7B95E8BBF20E6CB8FA32243900A6AA3311AF7EE2847E6D1C209DAA71CD07F129892F31E017C41E4D6FE9DD4F5488DCF29AB4D201F7C5A9F61CE357DAB1CAB420
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.737515256933273
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9v:TOElZClXcIlWsr+lPDlqUllbglWE
          MD5:322E4C0407390097FEBF059F6809EAE3
          SHA1:87FE7237D7FF62AD7B2611E48DCEEA8D48CE53CA
          SHA-256:5B9AD1CB6CE0B1FBCDF3E3C1E5C3BE3822828C59B35E51850C77C456A2B5D0CD
          SHA-512:32362C709C8A83F0C6282618C2FF0159FDCE18CB41C710D807A3DF0D367CC88C8597C3349A5B486A4E1E28D43BA6FFDF3866D0934611BEF85ABF873DF3964EF5
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.746310062783722
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqglZ:TmkEClZClXcIlWsr+lPDlqUllbglWE
          MD5:AAE538FBCE996A0EAB3A79DC1BF9FA36
          SHA1:9CD79678D18800E0DB990081CE3F3A3E4D930AAB
          SHA-256:8D4C90E3A13725FF246AA9270E4B720E5460A2A05634060FBB617F8B29622F05
          SHA-512:E938C379FDE374D85886981E7D9FECAB898022004DFD5A9B810982F2A4DF259F2F42A9CC07D832B00E16155D23AAF69028B15C0AAA836C8474C2AB6D3A734D2A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.746310062783722
          Encrypted:false
          SSDEEP:6:TFUJLlqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9IFED:TKlZClXcIlWsr+lPDlqUllbglWE
          MD5:4FFECE5AE2BAD9ADD442C1F4232F1C36
          SHA1:3E59F3BC38034C8B056F5361902CA1C0A0929589
          SHA-256:D84C627CA0F5AA8DBE39BEF5A94AC0C8D26DDF41D0ABBFCCBF6F40B3C9234872
          SHA-512:7F9D547D5CDDD889F4D2F8B1D4CA02F74A02A992786D0BB3870AE9AB47BA76889615F94D5946F9A956CDBA9034AE33C2CC25348CE26992F88ECFD1C7FFA4F492
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.780142703932923
          Encrypted:false
          SSDEEP:12:TUjClvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:IjCVnVeF3VZV8cVg3VoE
          MD5:CCA80CBECF84E2C8448F5D368867801F
          SHA1:9751F21CE89CB35F2A58D12DF807415D7682F18C
          SHA-256:8EEF0B37F6C51D9A42C4B7F4AEF01C30D0E4B47EDE8851B19784BCFA8D38F479
          SHA-512:78A36DA62613DAC9E1222FC8EB648F6F8F38917B62EC17780084AB38A8EDB0892A80030DF82CEB51B837F45D123176B3F15128FFDE5C8D33DC0A60A7DEEB4CF6
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.780142703932923
          Encrypted:false
          SSDEEP:12:TU5lvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:I5VnVeF3VZV8cVg3VoE
          MD5:8280077248499F0E05406BAA44C5CD0F
          SHA1:914095E136CED4EC1C91C3AF5F007B838FA85E38
          SHA-256:82564D9EA5527D00E6750C65587B97C05EC72029A43C5299A3A7E60A10BB778A
          SHA-512:38C5001F6DDC75F63B848CF7A085AD6C4BF4B68CFCE21681E87E43DFA702782B8629C2685274F4D44081F971BA39B145685240328C431B62C38BDB143C3F06C7
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNXMf:TF75XK
          MD5:1BBED2288D8ED9454C91FEA05A927F74
          SHA1:2D0F5E8C5CDD77262EC1329704BE1A9C83CF6FC1
          SHA-256:00BEAAC24643F8833944FFE1834426C42C32D3AB8BF4C412A462953E90205E2C
          SHA-512:33411672F40DB0E629E5DCCCACA62BD052096F8CC5D0D13208CF0D6A50EB4CD5173606750B3CD47AB3C776FAF46696FCF1A9DEB5CB64D175788EB4D30EAE9E0B
          Malicious:false
          Preview:Search for ALF..print(#12);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):683
          Entropy (8bit):4.806107560072881
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloCpU4HOUMlo9pU4HOUMGtqUpU4HOUrf8Bloololc6GZ:Z925tjyCpU4HOUMy9pU4HOUMKpU4HOUk
          MD5:C6C3B1CD0CE352EA5AAFAFDCADB0C974
          SHA1:D9B2A07D1EAC50010702A2D51E54C7CFF7A85FEE
          SHA-256:12E2AEE43FAEC05966E6D05E70D468D87D2D8A2F9A1BDCBAFB5435C91F5535BF
          SHA-512:4240C4DEBEE30168454B685842FA208BE27D018B2AD603300B8FF2BEBAD8B8166124C949A28C92D73E447FD9D63541479970CC1312AA8B98E2C7715C7166C43B
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));.. return;..}..if (strcmp(#13,"D")==0){.. print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));.. return;..}..print( "!");..print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):359
          Entropy (8bit):4.761036585101526
          Encrypted:false
          SSDEEP:6:TFHy4WFEr8JlFyaFErFceoIlF21fOFErJlFkFErDAIlFtZVOFEr0GK3IGs:TpyhlFy3JlF21TlF3AIlF13KYGs
          MD5:11608BE88EBA262C9FEC529AA4B7955E
          SHA1:62BCFD7745351E75A2C49F51E1067EC6E3787926
          SHA-256:696D64267C5495F9ED1139A918922CF9F1E5B269FA7A638B5C3E38610DE0E734
          SHA-512:9D5ABC81D299A3C2F6AC3AC47E7B6AB6E80EA12BE47D8007F0146F3754178B756304113C294CFF76D69A135F26D44DBD553B40746C9391CC157828B327DB64C6
          Malicious:false
          Preview:Search for DTM..if (strcmp(#2,"W84")==0){.. print( "WGS84");.. return;..}..if (strcmp(#2,"W72")==0){.. print( "WGS72");.. return;..}..if (strcmp(#2,"S85")==0){.. print( "SGS85");.. return;..}..if (strcmp(#2,"P90")==0){.. print( "PE90");.. return;..}..if (strcmp(#2,"999")==0){.. print( "User defined");.. return;..}..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDpLPMf:TFVK
          MD5:27A2908F51F89EA953C5B849632A95EF
          SHA1:58768D2F54E9F4ACF5BF6BBE57181806FC503824
          SHA-256:1516B976409E722E0FADB46DC88EAEBC27ADCC99D3909F8E25B67D2B84AFA96C
          SHA-512:F17D8E5C0AB122C975644DFE4A0BCBAA379C03A3B1E6036E6B2023A8D7268F356943C1A4FAA684BCED8AF5379A123CA8CA197C50D128DFC09A47F48403568BED
          Malicious:false
          Preview:Search for DTM..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):53
          Entropy (8bit):4.736801114695635
          Encrypted:false
          SSDEEP:3:5NFDMoN6RCRQHBloGXMfyn:TFwoxRSPgK
          MD5:CC45AB9654DA42B75AFD190F2F16E3CF
          SHA1:4C1BC4977EA2CABEBA5991FEA7164E4C3D1BECEE
          SHA-256:56CABE1B0F76EE5DE8465A0157EF927446D5A3D39C20BE824AD59040CF4C732C
          SHA-512:8A920FB65351D14BD1B3EC5AE27379BB97F04050354703368CD5546CD4876096A6C330F9C339B6FE05F2A7945316120EEC16B0029A7658E7AB857E3B72CC9491
          Malicious:false
          Preview:Search for DPT..print( #2,"M");..trend(double(#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.782551202337296
          Encrypted:false
          SSDEEP:6:TFJPDGNjXk1FmFErUd6lqNjBsBmFEra6lqNjDk1FmFErzzIlqNjJR3FErpKyGBkq:TPUjXkPuIlYjI3lYjDkPZElYjPSKyGeq
          MD5:8049B7C7FFC37DFCC65B25CF167A1283
          SHA1:41F07E754FA606761E5BCD49C7BDA9A60939C359
          SHA-256:E80F009AC8F3B85A93549E0E065BDC44C12F611C397D030F260A8FE6C6451111
          SHA-512:C77B800C8F453E73E4A5B92D72279B993CF5B01E62EDDEB89BBDE1B75E01EBEC43A474B642A35766EA5012A2036F2E03B4C7436501DA93CC315EBDCDFECC1FF7
          Malicious:false
          Preview:Search for NSR..if( strcmp(#10, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#10, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#10, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#10, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):239
          Entropy (8bit):4.704716914248863
          Encrypted:false
          SSDEEP:6:TFJPDGNQDsFErvIlqNQTHE1AFErYhlqNQLHMi3FErpKyGBk/y:TPUQ/IlYQCqlYQgiSKyGeq
          MD5:B430A4A044F8E604F3D41A9752DD6F56
          SHA1:221A0036621A739D9636C831ED7561A6E8DBDDE7
          SHA-256:412090C03A7D4C60AF70264F11DC5DBD9A6ACBCD66B3DE81F79FEDA526F95A12
          SHA-512:FA82AD5023848037A127577BD5F999736307A82CEC5830BA53C117A4A9E70C39E29C5B846A37D6B5F46C4AB35B15949CEE6E079F47AB698B6906947B951149A7
          Malicious:false
          Preview:Search for NSR..if( strcmp(#11, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#11, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#11, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJgGm3FFErFM3vFv:TFPRugtFErFAvV
          MD5:B8AEEDC64E02ABC88806B8C721D5100E
          SHA1:6C77EE37C03CE41E0F48542ADEC9C8F9A9348B6A
          SHA-256:C6EA968D3E40BF8880A990FF84285214155E5815D8A3D950912D16C9518D98B7
          SHA-512:C3ACC29CF676F4D4196E09102ABF181B131D55E369DDF6BCA507F66C0063D6B3FBF676F7E2F48DFD6BDBF536B379B684B59C6B97423DC9477E23E2CF87578233
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"E")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.746718472943976
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJ2P3FFErFM3vFv:TFPRu2tFErFAvV
          MD5:6453618412AFEC72B6140D2FF66768D7
          SHA1:45FD618BB7826C8DC893ADA2910F0FFD987A358B
          SHA-256:B8EA611B2225D0D136364BFB52177136BC9C940E8CF0E5BBCB6ADE7418B22C18
          SHA-512:29A858050779F081EA75E855C172C08521336F480997B0E16154374060E2357FF6070E08062F17CBBA5B7650E2FDC38A5DFE377DD93A9E7B956151FF5D6F36E6
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"S")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NRJ96M3v:TFXogRJ96Mf
          MD5:045EE688293BF6CB3FE0556BA5771A06
          SHA1:38F7FDC92569B1374CED20ED30928B6873FCB0F3
          SHA-256:BC0A163B033E4F1671950E83960D4DA95D266E4272FF365A7F0E67E2E80C5050
          SHA-512:0159AEDDD9F6DF75B6CF5724FAE20B970772537064BF8CEB4420A72E17E2A7D2C17A6F77B6C948B62A184DF86CF058DED30FC9A915316D00C88367B0BC15E2BC
          Malicious:false
          Preview:Search for GGA..print(#14, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDf2plNXMf:TFbYXK
          MD5:FA44FD4263F7940EBE4F3211508FF122
          SHA1:B13BE419944B0007863D9715766312B5C5A96DE8
          SHA-256:8FC2D817D80B52DF2BEFD99A88395011AF1418CFE5ACD960FB13A0000FEA0B41
          SHA-512:F5B7243112F9CCBE69E19C7C4E9736E80721FFB5AF087F7E704610D53ED0AB6613A0C32C57AF498ACF12DCB5EDACE1C39BDE6BE49BAE97A1F2220556DFCDA2F7
          Malicious:false
          Preview:Search for GNS..print(#12);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.7951281103782515
          Encrypted:false
          SSDEEP:12:TOElilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:aE4bIEygGeygIVHiygBKeygaf3E
          MD5:527D676855A12CC6E7EE5714D3F74B87
          SHA1:BC04027E3272ADF8480B3EEFC8213C6EC0295362
          SHA-256:F0269D190C07B2F57FCFF71B661994B4BA27FBC2C6B1F1549F0D00CD7481731F
          SHA-512:3218FB546D52760C229465386F1C1A8F4F133211F47A7641C0851F026A12D8487A07CAE24EFA4B0266ECAEC37B4D9B90A161E6852A7B5735B8882D89027D9448
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.798632387108336
          Encrypted:false
          SSDEEP:12:TmkEClilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:qkEC4bIEygGeygIVHiygBKeygaf3E
          MD5:193BF8E52C81F948BF9F89DBBA4CA37F
          SHA1:658947FDB7A2891CB60CAEC90D5D0790F5C1AE91
          SHA-256:4BD6727ED15F15DF866863EB413E88F48B0049A7C36FC95262E039E5FCBB018A
          SHA-512:C7F658B812DCE99463809ACDA6E26AB0E7ACD8B9F05A408C57D84C7536A25863A5492303132F1063AC3B011D7C6899E62B44E847DA82F322721585BBA00DA1EE
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.7967985228466175
          Encrypted:false
          SSDEEP:12:TKlilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:m4bIEygGeygIVHiygBKeygaf3E
          MD5:ADEE5AC22C2DEE0C9F461F0792BBFEE8
          SHA1:D54E801EDA819DC81F378A7E06CCE52A27DAA2F7
          SHA-256:C908DFF94B61E02279A64711C3E9F510C9963325B3C84B02CA01F335A64317BF
          SHA-512:0C6CDF6413C2285D37BE003AAE5438091205F6BFC5D538715779975EBDFF8CE1BD1BF2FA341AF9C611D70FD046B3A3ABA0F8B37756EA4544AD91F04D343F3324
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.796850212260854
          Encrypted:false
          SSDEEP:12:TOElZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:aESbIEygGeygIVHiygBKeygaf3E
          MD5:F2C4E9188E8C7054089831C22544E4C4
          SHA1:3F1C10BBD5A2C825EFB6F51A49C5D53068173897
          SHA-256:4E045B08D95396D619BDAE4B10F2981BA51D6DF80F9281552A600688293BE24E
          SHA-512:FF89F042C8D3F3AE4F818E2EA8EEC7DDD2DAD1CDDB62B06829BCDEF2000502147F7645E59BAFEE48AE5A21DF17E7E756EF4417261F919E8D75065287DE3C005E
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.800354488990939
          Encrypted:false
          SSDEEP:12:TmkEClZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:qkECSbIEygGeygIVHiygBKeygaf3E
          MD5:F8FBC44969B2C7264E441F87F082A313
          SHA1:A75D8C644BA47D8DAFF3259F116C0C77ADB0F01F
          SHA-256:BD107D1C802600B57695A41732034B5EE49FA9A0FDC52C2F8523E4E2C8DDBE34
          SHA-512:D7AC08E24CB04C4E79370FD9F386AD7290FE0D76FA196481F71C117AE6669D5416E1CE23E6036BC55E31F00624DAA63EBD30CCFDEB2638ABC7F6D8080965961C
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.79852062472922
          Encrypted:false
          SSDEEP:12:TKlZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:mSbIEygGeygIVHiygBKeygaf3E
          MD5:0CEF2FB0DD2BB0E0DFC458F23FC54CE4
          SHA1:3CCA4EA3DAF21991794CE6E82B6C3EDA13415A10
          SHA-256:9AF98741E55D0B3FF84588D02653AE1E503399D2F5247FAA18CB167C488B851E
          SHA-512:9951CD42FF12631CB9E8BADA5818A080ACEC091F39D49F3D518D1D4734BA5C2B4495AD6D69D89DA3D9826F593D97D9BAA32DEF4AF21A65A1D29D16E9BBE133C6
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNWfy:TF75qy
          MD5:AA14D734B267DFE193844B7AFD6502F8
          SHA1:6A95B180393B0CD11FA8BE69E60072E8AD279530
          SHA-256:F32CD188D81F8ABF6335AE8B3F40D3C76B49E1CE2159DC0D4C08AAF1D8CC3AC3
          SHA-512:37D4684113A3F5367D1105C09AE497D6AD0F7D8373E56751CD19B6166FC2B2606F1FF6FFD2F4C7B625910D3F8760F45EC5158D3C771BFB670BD3B8F37232B877
          Malicious:false
          Preview:Search for ALF..print(#13);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):79
          Entropy (8bit):4.642282254934298
          Encrypted:false
          SSDEEP:3:5NFDgG6H2XUXmMJwQwUXVfHYQwUXoov:TF9UlwjUlfHYjUFv
          MD5:BDA918175C26FEE73E277324BC9F8242
          SHA1:74CED1AA141FC4D6767D215FAA077E38C4B1645C
          SHA-256:8A486C5AB541B1290F769D93E76F2A2629C87307AD4F6527EA7DD3CAA3F695F1
          SHA-512:B2B919935D772A1D74F88D27B4FAEC9E888FB7EFC872927F248AC31AD1CC2B739A02F9DB46CBC3E80E22D104C9F91328077FE2A16570F8955DCA27DCC2B23BD5
          Malicious:false
          Preview:Search for ALA..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):78
          Entropy (8bit):4.663562559067146
          Encrypted:false
          SSDEEP:3:5NFDLoREWbaIHwQwUWZhJHfHYQwUWfAfov:TFFWbpHwjUWZhJHfHYjUWfdv
          MD5:FB346936BED36B64AC998EF2A53CD3D2
          SHA1:F2AFBA975680B5AA92B14FCA63E921A9123A49EA
          SHA-256:46F582A8DA456A2B6DE6361541224B71B30C686513B85B9CBF735B0F1AC457BE
          SHA-512:83B8A3381784D3D8C834AC1B773A4D85979C0C4CF771CF958D0D7C00FEE43A62E7F307DEA074FA4036C139445EB6F5715377B2FDE2D5EE4F6A6D3D8F71EDFCAA
          Malicious:false
          Preview:Search for DOR..print(substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFDflH2XUXmMJwQwUXVfHYQwUX1L4QwUXE:TF7+UlwjUlfHYjUFL4jU0
          MD5:8B7FD1FC25DBC3B036B77ACF57B96AF6
          SHA1:018FDED4B112FFBFCF080D70242FCFF65F3E2B47
          SHA-256:98D7D8A197B486CAFB3920BF99C3EAE618086D00316603B67D6737C57CDD7BCA
          SHA-512:D557DB5F3015CF74079BDCFB7BC6C6DB7C9741C2C73100C5E734B4B0F3C98222248A6BA8D4465DD95C53A3FC2132054C1B3713F56FCA073D5B8B65B8A16D1DA9
          Malicious:false
          Preview:Search for ETL..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5),".",substr(#2,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFD3QMlH2XUWbaIHwQwUWZhJHfHYQwUWfFHL4QwUWcpf:TFLZ+UWbpHwjUWZhJHfHYjUWfFHL4jUH
          MD5:A8B236A3AE8973CDB1B60B9A29BEDEB6
          SHA1:5F06F670B06F65319ABBE9C98C38A9F1F5E39D97
          SHA-256:418422B73F1BD8F15F84A53E142DE2EFAB09235453CFC486C34680FDA570904F
          SHA-512:C607EA0446D78764DA4665EB3BC71774CA3534BDEA03DFB13199BC3FF698A8FC28E1C4E2065E5286D6E8A2DCE14E475C4C1DA415889BA881B35216A8B177D373
          Malicious:false
          Preview:Search for FIR..print( substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,5),".",substr(#3,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlLM3vn:TFeXkAvn
          MD5:A05893BC7E9C7797C023A0C2EDE88576
          SHA1:551D3191056A71674089D35DB0244B6274AB26D6
          SHA-256:5584C4245BAEF23A62EB9D04B179E7A13A1F5F7581437ABF694028111CBF2669
          SHA-512:222F10223B13A80B621580FA5B321304B7580035A4A71148DF9BE59CAECC0F8A406C856F079839EA9DD2CC606DE3D3A03DAD972893D7020DEFAFDA8779F625D9
          Malicious:false
          Preview:Search for VDM..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcLM3vn:TF5Avn
          MD5:7CD218B684DB45B17EE11A6E0598DD7F
          SHA1:AF0396EA51591E53AAE819C879C047805F54D47F
          SHA-256:050AF8A13B3605276415B043AC80790A6663DF6C463D5FCAE073BEE3D579D117
          SHA-512:D25BA1095C4BD33B15641245272E89E41D298D437D4EEEED88B9BFCF4B2D86F75A8A70F4FED793484456573225620D25143327BBBA98F980006BA709F1C27723
          Malicious:false
          Preview:Search for VDO..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFD38WoOJgGm3FFErFM3vFv:TFL8ugtFErFAvV
          MD5:2FF37557A174A3041F504F9333E25F9D
          SHA1:06AD34B44D76A3E21A48ADE6497B2329E99F7980
          SHA-256:D5193FC489C2D135A42890575D4B801283D054CB12B89FD2723C879F3A855498
          SHA-512:AC1DF089468DC847A37046B9058BC255D5D4A17EEF150AA3B8E363CFEACC308E026DD0D38BC617657C0E0DA8D2644652FDB92EE781882CBBA2DC26C5D2C5BFAD
          Malicious:false
          Preview:Search for FIR..if(strcmp(#2,"E")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6OK:TFd8
          MD5:9A98221B75E04495B57FD940FB905F52
          SHA1:E16E96ED4EEF6073A2AC0CD55B90D374ECB04CBD
          SHA-256:481CC45BC31A6C2165623D338F0F0E8AAD5E8B35DC31F4D0D1A5D7BF831910A5
          SHA-512:BCDADD853FC22A76FB8D538A0390BFF0902E99FEA0F5C3242EE03D5D0E4DF984D57862D95CC7EFF0C4F3EE9C51346AD66FF5987CE75BAFEC74B58BE30DED7CEF
          Malicious:false
          Preview:Search for GEN..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLJMey:TFhfy
          MD5:2D20F88549C5829DEDE2C95CEB94A4BE
          SHA1:FA8D11388086B160207445CF25EBAD46F4147130
          SHA-256:5F9A8DCB5EEBD14C48114274DEEAC9B104562C834DF91F43D63DCB09F0C8DAC8
          SHA-512:97C36A220C29FAD2737D77539715EBD31719B6005814C1690C2C0C7D83BE7C703EEFFF823A354769F5171F68900DD82B7B35493F1E36579BF8C63325456436DB
          Malicious:false
          Preview:Search for DOR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlJMey:TFLZXfy
          MD5:A663D17B1C29CF1172A35534BA35C61F
          SHA1:C1EF2DFE397146A26E41FD0E92075E67EC32856B
          SHA-256:57249D438D62E2EDC67DD0C2CF1965325D78001E9F98F5F335EF74CFCE60E3DF
          SHA-512:029078E235BA19882AA6CA8E5B27655EB8C3B2D4B5DE799306A84B8949898B9E5A7D156D1823DD8A90021B7E812EFBDA544A0705D15C0A1278A596E1F42F4BC5
          Malicious:false
          Preview:Search for FIR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRJMey:TFfcXfy
          MD5:E5104FE97581BEF75F2F57EF92B45E72
          SHA1:0614F5E5E1ED319462782F2C22833028F12777AC
          SHA-256:1CAD7906E681EA601DE2D981B44B094B478389624CFFBF052FCC4051CCF430FE
          SHA-512:ECF89F84DA248D9B4D5F01028CBEF82E3303FDF16519CD284ABC47EF5EE4CC8CA96EA4CE9809C5633E87DB138FB36A41786B58B3C2CC642517C79E9C0D9C7CF8
          Malicious:false
          Preview:Search for WAT..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):4.5262170368431915
          Encrypted:false
          SSDEEP:3:5NFDFDGRzbWYY4FFErLM3o+3AfqRzKliaFFErLM3o+3AGXKgOLHfL:TF8FbWWFErLhlqFkFErLhGBk/L
          MD5:51ACECCC92F86A969A0D3176CC996C4F
          SHA1:564EE1D5D8F811321AAE70EE45F4B056D7F18142
          SHA-256:FCEC5EC3E0777F509D046E6D63990034F50B6CDCAFBD73CF7481114AAC6A512A
          SHA-512:A3EFC33ECAE71C983D0E607B61AD70E2FF7DD9D43B40520CB7564117C4AFB4F3FBBAC91556D8A3960A5EE45588432A04C873F67E485023FF5FB439350B896981
          Malicious:false
          Preview:Search for TRC..if( strcmp(#9, "R" )==0){.. print(#9);.. return;..}..if( strcmp(#9, "C" )==0){.. print(#9);.. return;..}..print("unknown");.. ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NXJZv:TFXogXJR
          MD5:ADC7822BCB7DA6F130C18FE1D9457049
          SHA1:C4CE03E919564C5D36C1F5974CD2268C7C4DACFF
          SHA-256:6DF23B4D69BF9ED2131D96B5135EA8029D037C925F61988779AD7DE617EDBDD6
          SHA-512:3B978498329EC86AB9E9855A8998F152371F52F0048AC3D073C177E5D5D5BD804212324FB95BE0A0ADCD9D36BF29C4D54F9746556B206CA03E0B2E2A12BC7614
          Malicious:false
          Preview:Search for GGA..print(#12, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.51364592935837
          Encrypted:false
          SSDEEP:3:5NFDf2plNUkgv:TFbYe
          MD5:41AC3657E10721B2C08C463DE2B9FAC1
          SHA1:9C140F8D2119D55E52E7F34D7930476992C38146
          SHA-256:C35B2FA855C59579C853C589BCAB8EADADA0F3A3CB55262ADBA75D835638AC80
          SHA-512:EF8F1C4844ACCFB9D2D93C2329BA6924809CC819FEB9AF3FA521DAD080DE3648FD39ADA90389041B481D60823B03338D8BDA84507E4C60C3B2F7EC58491D8289
          Malicious:false
          Preview:Search for GNS..print(#11, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):4.513794876803092
          Encrypted:false
          SSDEEP:3:5NFDWkov4FJqs3v:TFXooJdf
          MD5:455D0135D897C5650D699A71E6878DC9
          SHA1:E1EC5F4FE50F050733AE47E07E6E351359757229
          SHA-256:38FFAFD8AC7D4AC6F64060BFBA8B73EFC1A0CCDDA41B0E844A85F9870D144EF6
          SHA-512:F416C8573112A36278BDE6BC9F958E84F624D8FB65FAF084C5FFB7DD3A30207AB0065DC97184A09963F23CED50B08C0DF3579881E6C4D0D74B2DC3451617B2FF
          Malicious:false
          Preview:Search for GGA..print(#9, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):4.513794876803092
          Encrypted:false
          SSDEEP:3:5NFDf2plFJqs3v:TFbQJdf
          MD5:4D0EF61907E761F6F31306E0D4F1869C
          SHA1:4E30EF303B5FE6DD1E1DEEA64F0984CA60036FD2
          SHA-256:0721DDB5FB79CDEE797F937623AB2CC5244443394EEBD6313D98F4A75302EB6F
          SHA-512:ADA0859F196FF6761A09DD618FF7524DD5047760ED6B79C1C00F1401349C74BED8C2B658A1A5A6760E4CE618E3D341187798DAE94AAD53ED32A7752A76F24F1D
          Malicious:false
          Preview:Search for GNS..print(#9, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGyVk1FmFErUd6lqyDsBmFEra6lqyBk1FmFErzzIlqyLR3FErpKyGBk/y:TPpkPuIlG3lRkPZEltSKyGeq
          MD5:4D390F3AFAF20423C562CA6ECC426AA7
          SHA1:874995D14DE9CF15996F8C923B4095B9D64BC63D
          SHA-256:818BF5E9EF0D4C3A23C05EFDCE4C8B1A47A9C72B9ECF77FAEBF849402ABD3C41
          SHA-512:766E80C0BADC51C359D92748EE636C0A388E34DAC3D69B40C74CE209A4CD4BE1B7115779DDA63557BB07AC4749816AC82B366291B011EA40B1DCEE2379380B56
          Malicious:false
          Preview:Search for NSR..if( strcmp(#2, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#2, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#2, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#2, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDBlsfZHBloFifn:TFiPYif
          MD5:1CD30B0EA309136ED8775947F136352A
          SHA1:1080CF9335DBC22409406EAC6DB1CCCFEB63DEDB
          SHA-256:1867198A606B9FF3081E6BD98E60023F878157E220119092E529DD9134C3B831
          SHA-512:695CC1513A982DC44D3ABAB76175D6435487886B1DBD482650D9F9747364366ABB3E5DA2C15374F9336A90723386317500D310912118D8E6628761F0149A5CC4
          Malicious:false
          Preview:Search for HDG..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGPnsFErvIlqPfk1AFErYhlqPHsi3FErpKyGBk/y:TPOIlJqlBiSKyGeq
          MD5:4E78BB7594763C54A3B66442930229A7
          SHA1:D06049A799E7117A8FFE20F4735E056208041AFF
          SHA-256:D71DC6C724AE232903F3ED16FF66007A8109F7C1CD23C4CE712997F3F1E132C1
          SHA-512:D766EC7A3BC645BF8EB616C15F3DEAD95574A82A2F664EDDD6A3A2918C1709DDC4ABED9D87EF0A9CFB3BFFB3C49571205759220BD1C8D926AFB8673016F224ED
          Malicious:false
          Preview:Search for NSR..if( strcmp(#3, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#3, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#3, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDB9KRsfZHBloFifn:TFN9lPYif
          MD5:3EFFBACDD60F7332FEB020A732349A0B
          SHA1:83D8E79196137D49BF2CAC30EF6946879EF293FA
          SHA-256:3E46C33790B6702B23DFA43946A7A571D30DB08C559F4C879750BB085E6FE3EE
          SHA-512:D9BE39A0CC32BF77158462C40888F1B557E793B465F2BEF4C172FD56B156B17F665BC48529D7726BCB4BF13D330A6E806DD2409B8EBBB72CFDCDA7E492442848
          Malicious:false
          Preview:Search for HDT..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):311
          Entropy (8bit):4.666462569330563
          Encrypted:false
          SSDEEP:6:TFqV9HNFErV2g/IGtHUK2e3FErgW+6lqQFEro+lqGFEr2UF6GRPOy:TA3y2ggGtD8Bl8lpc6GZ
          MD5:DA22728E3D1D46EA91514300438D559A
          SHA1:B5C864132F6AE32F3F934874712DF15CE7E099D6
          SHA-256:289DE3F2A076FA65F1431BA82A0E91EBD61720AE9B1FD5C4290ECFE6F152E07E
          SHA-512:D479C56A46CDF62AEF1A5665F2C45F6A1219216CD533C8ABBB3EF792CAB7DBA5318391C49B44F2B79EACFDC9E8FF52A8449B0D3DB1C19815DBDEBA92564C8401
          Malicious:false
          Preview:Search for THS..if (strcmp(#3,"V")==0){.. print( "Data invalid");.. return;..}..print(#2, ".");..if (strcmp(#3,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#3,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#3,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulIK:TFf
          MD5:ED9557BB7966F9C4CA1E0A1BB2F0A44F
          SHA1:01FDB7930D12E01EDAFBCFE3A3FDA2A5DC72EF2C
          SHA-256:BFCB8B66EC3CC42A684D2D19E343A8FFADE3BB76D4D409B1A4AC560EB9EFDE2B
          SHA-512:3CC9E376BFA328EB75369F30A157F49179EE82E06A0049E15EE40AF09EE5230DE732D8B549C2F685F1CFF4E8C0DB4C826C058EA5B1ACF907B1D49FC214BFB9A4
          Malicious:false
          Preview:Search for ACM..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6IK:TFNa
          MD5:7C8BB037A13C27C2676A8B98A43C5992
          SHA1:2BA118514051A83ED81A155E4308F147737832DB
          SHA-256:488C7638851251026522A1178C9E6449B243AEF5FD00A710031CA80154F65587
          SHA-512:0F99A4FDAF50B755FBE73C22CE991CF0EA00B512747F970A96FCEF8A7FAF44CBB395C2FC6546BC815DEE95E3754731C38FC5A1C8D3C83212756025ABAC2A3879
          Malicious:false
          Preview:Search for ACN..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKRIK:TFZK
          MD5:CC69E07B345FEA80CF67553AD5E160C2
          SHA1:797039A1055B15A6E483EFC832D18974E2378869
          SHA-256:3EA60E7DD7F3EB02B465E20A045625C2A5758AD5714A833899E4F6CC9E05C188
          SHA-512:03E3113629C4D83A7BA3BA8C8A5D302A8594380466A80039ED1096B5C8EA5A254CBB9871F6F3D78ACBDB5DC403404A8D1B5D7FF08058C9D0D1CD842F3B6F1549
          Malicious:false
          Preview:Search for HBT..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulJMey:TF7fy
          MD5:0E8FC319562A6CB26EFAD5578BFE306A
          SHA1:BBF84B058CD3492BE004758E8D6DE312666F6A05
          SHA-256:DFA855D64D2351148C39D661B0D3D039E9088E9B888A080DF616A5AA064D3FAA
          SHA-512:F16BC4699D80D44125545FBA4AEE10BA92A7568C7997C1D2003FE7E8D33F8FDBAA63693EA7142FB0EFD97E1E6ECD975D16DED8B416D40DC3836509276E408388
          Malicious:false
          Preview:Search for ACM..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6JMey:TFNWfy
          MD5:9E5ECD43941F88F92A142DB5628D84DE
          SHA1:19C65CC84050AC1A11C37C8DF1DDE5B86E9E747F
          SHA-256:7CCB217CD6CF840A4E3651CA14A6393C0719233E3A074933C307EEB2EDA3EEA0
          SHA-512:23BA3547A10AF3E51D841D923E52D6ABAFD4290B8CC0564ED95263142C0DEF9DB3A38223D43D4EEE3A42ED9CC7EC9EAA7F09C4E970CD267CBA6A44EC9C172F47
          Malicious:false
          Preview:Search for ACN..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDnLNUAv:TF75J
          MD5:7E4879C3AA70E0D00C5047CA8BF34B8E
          SHA1:93F273EB08973D3853E33EECF1EACE58BF5B9728
          SHA-256:4DDD4CE4DF30E8435674B5133721BD641789A35FEE3724DC6B6DA2830581E945
          SHA-512:DFD7C80F71C6BDAEDBA8539AEBB8B5E74D566C0F44A7E27952C8030F26477EDEC4B5BD7577439C9ABE325B4249138475F95BBEEA0FCB71D785A8E90CB9A3DE2F
          Malicious:false
          Preview:Search for ALF..print(#11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6JMey:TFSfy
          MD5:B038662C5BB55C5264D07363EA7D704F
          SHA1:09E82DEEAC2AB2BAE4B98716B8BDA5C307CF5A39
          SHA-256:1F87F61EE2A1613EFF7F9E69CA37847B8BBB882BEEC5F76FE076613E4D35BD07
          SHA-512:3CEAA2A39688FC0A74A053F992CFE50CAE645B86325F72BEE26C4F179DE2D930E64C7B97BEDE1AD97B686FF2BB600799A9F9C41840132E82E8D126360FAB9A53
          Malicious:false
          Preview:Search for ALA..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKROK:TFZs
          MD5:C03D8C934E2F06F3BFB88E7C5F69644C
          SHA1:295C8595C19DDA731186D8C25F4524793EB930F5
          SHA-256:29CFA759D3BB168B4C159465C380D5345EABBAC22ABD93CF56A424F477E931EC
          SHA-512:970371F9FD66CDADF79771A92F10DA5C3E1ABA904DE82B1115B951E8B36B1DF159EDDC4CD54D0C532460F71D08B918AD6FDB156873EC4A3CFB8EC825B4D281FC
          Malicious:false
          Preview:Search for HBT..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLJMey:TF79fy
          MD5:F8E47A12FDAFD813A4C474559DEFB2BB
          SHA1:9EEAF0625C7CECC62672D016C68591416B57949D
          SHA-256:D90C6DAE455B2A8EDE5F43328086EC99C823FE19FFCF7924AA7FEBCF7FC1EE16
          SHA-512:1732881E68E7B76A15B479CDF8AD46271C93F19D2ABF90DF41256A7B2A28F8FCC2711134BCF6F1B6133AFE2398ED0D1D7CCAE3627768C2131E98CD47760FF72D
          Malicious:false
          Preview:Search for ALF..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.7040511288482865
          Encrypted:false
          SSDEEP:3:5NFDpL5FT93vRQHFxiFDy:TFLFFJSPmW
          MD5:F66A022F2F14FF2894733169A4D04BF2
          SHA1:91DDAED0BAA309CB78DE3F541A5E2D950B8B4A08
          SHA-256:0E67203156C7BB28BC4E13003CACC6DD336B942AB20F3D013C8106C158EC820D
          SHA-512:91896D5324DF2412BA6931341EFC612E97F39CBEA2A5FF78372BBD09EE88F64DB1D053C8C0627E5F2A7B1757B899DA5BD5C04FB3C270BDE5AE67B4163225F66A
          Malicious:false
          Preview:Search for DTM..print( #5," ",#4, "min");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1408
          Entropy (8bit):5.038433372570456
          Encrypted:false
          SSDEEP:24:cS2RXjUWN+WVhNh2jUWN+WVhERjUWN+WVh++2jUWN+WVhpmLjUWN+WVhaC0mjUWv:crdjU5oL2jU5oUjU5o6jU5ocjU5oaC0O
          MD5:F0C6309B8F09C6AABC18A3C35C04A3B0
          SHA1:49ADB95902B14885E3C9E2415433BCA330D6A73B
          SHA-256:760715AAF73C02921CCF96EED146FAB312A0CB724B75D875B7F5172AA34CEEB1
          SHA-512:DC80D06AE980D9B5A498A95CEA8EEA9AF8717EB34A6754DD46E4294DC281975CB4BAD845A3D075CEDE437EC3FFCE47D7A307AE96457BEF40E76B0F15CB817476
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"1")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "2" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"2")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "3" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"3")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "4" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"4")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..} ..//if #7 = "5" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"5")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):222
          Entropy (8bit):5.087745028346076
          Encrypted:false
          SSDEEP:6:TFZ4RJYlFErQWY2Y8sHFLesQvWJAUln9VbMWylK4Pmif:TvsmFLes6WJAUdYrl1m0
          MD5:546A3559488C8BD7648DEFC94F917932
          SHA1:CDEEA1642425F1989406D24F953DE723F03D774D
          SHA-256:B478FA523D717F723BD4570E296457AC89AB536D01354E36A51FAF0730DFBACE
          SHA-512:A39F2EC78942CAF6C45A7006A17C63A855E0D44E60829C8E68C33C51F79BD0699513C56C5A9866F994EC88F0B74EC595729C9EF76E0800D5E125B2B0C055282A
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #3 " " #2 1:2 "." #2 3:6 F00.000..print( #3," ",substr(#2,0,1),".",fmt("%5.3f",double(substr(#2,2,7))));..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1415
          Entropy (8bit):5.060161669319466
          Encrypted:false
          SSDEEP:24:Zu2ssnjUWN+WVh7OjUWN+WVh3KjUWN+WVhtMjUWN+WVhxwjUWN+WVhaC0mjUWN+X:JdjU5oqjU5o6jU5oejU5o2jU5oaC0mj2
          MD5:CAE67BACB192EA2B30B99817F27C6CD3
          SHA1:7E2CEBC95F5C4C97B9771C59984B89C614E5452C
          SHA-256:DB9ED45668236293B7158AA0FA701240A083789C38F2DC4D1DE4346E82221882
          SHA-512:9BB1B520E1437A59FE1FDBFFB1EA717BC604E9CB633883436067180BF1A50F0CF1D8A27EB179A50BC087BE6F9B31BF5F3EEA6B1C3027D97D4A8D13942F9B9C44
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"A")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "D" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"D")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "P" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"P")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "R" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"R")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "F" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"F")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. retur
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):692
          Entropy (8bit):4.958200302568717
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloIFiU3YrPDhloZFiU3YrPDhGtq6FiU3YrPD4f8Bloololc6GZ:Z925tjyxUu7hy+Uu7hpUu740Byoylc6i
          MD5:C74E39B4F2A8EC56E195BC72444C3905
          SHA1:BDE6FCB3B9A5B93C36F0CBD036A92623AE955E81
          SHA-256:93D36316EC95210B2DC1F942CA9CBDF77BC6B283B51ECF7C9835A835050E8FF2
          SHA-512:93CB4BE9396A8524AACC192BCA45E615E08303DC7BBD350611D051A583DFA5C97B07E7C4FD17AD94794062C72EB6E1C4287E8E0A12C719E870BE29EDF825D607
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));.. return;..}..if (strcmp(#13,"D")==0){.. print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));.. return;..}..print( "!");..print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.59445640611102
          Encrypted:false
          SSDEEP:3:5NFDmkplSR3y:TFupy
          MD5:D658C8FB3A97174BB9C31122DCD8FCA7
          SHA1:090525535062538656775110C2DDACA2D03E0723
          SHA-256:7F3F1464B96675B1DB3EFACE0457462EA5E46C6501B6EC5DD7F5D9963992D3B3
          SHA-512:1F74CD3D3601D7846D8182F399C8926FBDBF174D103C05976887D39B0FD08CF4B1CD651404909B3AABF854EF5A2EB19501A6047C470813A235D1232344DE3A63
          Malicious:false
          Preview:Search for ZDA..print( #6,":",#7 );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.323161167392161
          Encrypted:false
          SSDEEP:3:5NFD1W6Rv:TFJN
          MD5:7D76484CB9ABD382DF414D9C975AAE4A
          SHA1:FD8EC1320FDD32B45BC18517DF680CD72A44BBA6
          SHA-256:BFEF15238F02F2C6A9B41E5AD2D7D58824E622B2D1B4BBFFC341C7EC6FC44ACA
          SHA-512:64CD59CA52E363912B82D4B290E0E9D9688F1641FDCD35405F8F51F7819DFDD630BCC752F74619A804C7FDF53F36515C88EA5AFC0A350526F6EB3618395F22C8
          Malicious:false
          Preview:Search for ROR..print( #6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.7040511288482865
          Encrypted:false
          SSDEEP:3:5NFDpLYG3vRQHFxiFWv:TF+mJSPmo
          MD5:A88ADBA379C4C840CF16D7F88FEBF317
          SHA1:388496120BFF200E40A4D62613BDA72D583E8C94
          SHA-256:86E247ECB9D4469BF17208FD80647E0B5E7475D6833110458E17379A7C4ABC13
          SHA-512:E85E030A4E28F65CEF08F88AE524B697ABA657799C77C1FBC7144132674AACB4A4CAC222D8DE8E3561EDC6763A67E63A36F3E63CE60171E3C77BE7515C1BFF2F
          Malicious:false
          Preview:Search for DTM..print( #7," ",#6, "min");..trend( double( #6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1410
          Entropy (8bit):5.044294068122479
          Encrypted:false
          SSDEEP:24:cS24X8UsihUXm2UsihxX2Usih+TX/UsihfXAUsihfXsGUsiZxe3TBsoRc6i:cr4X8UsihUXm2UsihxX2UsihSX/UsihQ
          MD5:57E9FA9E28F39969316E1EC751353C10
          SHA1:A5967B1F2660309061C61231C6BE5548755B6C89
          SHA-256:835706390F3CB5465C2037FBE276A3587B11D9F852118A32925BBE1D2E6D0D92
          SHA-512:9E859AF9F4F9E43DB66DC10C9EC3594E47C2538D411AC07BDF8FEAAA51B36D749E9690D21E1EC79EAED5E5C7BD9271057AD2C6C15911DDE4BC683BF59412E3AD
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"1")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "2" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"2")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "3" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"3")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "4" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"4")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "5" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"5")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. retu
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):224
          Entropy (8bit):5.099125025909878
          Encrypted:false
          SSDEEP:6:TFZ4RJYlFErQWY2Y8S6AKFUFiUNaVVbMWymwK4Pms:TvsS61FUFiU8Yrd1ms
          MD5:EBD87D58F7D0A0DFE57DEEA4C8202964
          SHA1:8A9A2835CD9F828BBDB9EED2A3F0C5A7697E8981
          SHA-256:16E9BAB5D0137FABEDD3992A69EF48103D9CE6264478D058031CB227A17DD1B8
          SHA-512:7B576629A126E635E4A916B7D25BB451761C0138A51A83ECB8689005865B50CD3514B40838D119422CF1A41880AADFFA0C281D99520AA4863C2EE89C69DE9D77
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #5 " " #4 1:3 "." #4 4:6 F00.000 ..print( #5," ",substr(#4,0,2),".",fmt("%5.3f",double(substr(#4,3,8))));..trend( double( #4) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1347
          Entropy (8bit):5.029132232087029
          Encrypted:false
          SSDEEP:24:Zu2s5XyUsihiXVUsihuXrUsih0XXUsihYXBUsihfXsGUsiMBCPc6n:JoXyUsihiXVUsihuXrUsih0XXUsihYXf
          MD5:A9172424F6D4242F2E4642E0E11CEDF7
          SHA1:7EF2C9558E42B620B641AF6FE4C11A377820FBBA
          SHA-256:6C8C79B2F3D96DCBF1BF3DA1FA60F8DA8069B6FF7978D1885679A3BE6AB560EA
          SHA-512:0AF1CE0F2BEAE090E38C0D87D3281EE2C1AE30E8768CEFB61AE0BC3AFADD5AFC04AD324CA81FC300F1A43343AD82431AF4AD6CE447B4C9D77C025E0B832B3B5B
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"A")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "D" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"D")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "P" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"P")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "R" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"R")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "F" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"F")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):761
          Entropy (8bit):4.995326481306636
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloTUKpYrAeOUlolUKpYrAeOUGtqZUKpYrAe1jf8Bloololc6GZ:Z925tjyTUKUvbylUKUvbLUKUvF0Byoyk
          MD5:228C694325AB9DE579D0CDF03188493C
          SHA1:78BB3BFF585B4618441EC458E2F13A47FDCB537B
          SHA-256:931ABACD29450C3C7C82E57D3561CDD21F0F4762CC59D7E2216C52DBB307FC6B
          SHA-512:1D951B04137FBBF6BD6B98A0066D56FE6EF5DD23D667E69ED137429D8F321B917CE2F699DA95B86D07DC35BAE9F7CE3F1DE595DB44F54A8B870B2426F829B69F
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));...trend( double(#6) );.. return;..}..if (strcmp(#13,"D")==0){.. .print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));...trend( double(#6) );.. return;..}..print( "!");..print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));..trend( double(#6) );..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.4968985554505645
          Encrypted:false
          SSDEEP:3:5NFDBl89Yeyn:TFgyn
          MD5:F602950FE072F1CBF8A5AE02B3DB0A2E
          SHA1:5A062BE2DAD4AFC2B40F5CC3DDA58AC24E707529
          SHA-256:BF4EB8D280C7BA0359E177D842CC0A7F60E5C72C183C4A50BAE078AFDE6988F5
          SHA-512:AE8822F491AD5530F32D08D56E55E78E2BDD4B31227B80399D0855B9C50B81313406C35ED504211105D6A555C7BD8FFCEFDF3CFD87A18883823B90414AB1C0E7
          Malicious:false
          Preview:Search for HDG..print( #4, " ",#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):38
          Entropy (8bit):4.45148902643068
          Encrypted:false
          SSDEEP:3:5NFDBlQlw3v:TFgl8v
          MD5:045D7D9A42FD731DBBCD9B80D243597C
          SHA1:CD8F08F8AEB6895990F8F215802598A18B843AC5
          SHA-256:ABED1A53898E81035E095B31F7B219CAE2C396DAF3426A68F46EFCCD78EDEE26
          SHA-512:0D0348129259272924785D3BA72D19F6CF07DE3C4A3FAF5C7EAB81649F1E16E44D8C9D054A4582274690246C6231985DF8B949E121659077C037761DFD2CC49C
          Malicious:false
          Preview:Search for HDG..print( #6, " ", #5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.446439344671014
          Encrypted:false
          SSDEEP:3:5NFD3fN63FpuMey:TFL12FVey
          MD5:2BB372B7E8492E7FEAAC268ADA2AD868
          SHA1:69FC162A1056F8DB0AFE36B0C180121928D4D3E7
          SHA-256:A98D3BD218DAC4F7CA1513AF80DA5ADFD3DAA0C63154F7A2043F4B089B87EDF8
          SHA-512:E489CC09534F55B16F151B697CC90C1CEFDC37ED96FCEB7DF46AC1D6B8B8F8ABCDBB0795DB2AB92C4A1B8A9487150BBE7A768BEE60B711DABF306FBA3E451038
          Malicious:false
          Preview:Search for RMC..print( #12, " ", #11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1492
          Entropy (8bit):4.621895151006009
          Encrypted:false
          SSDEEP:24:3sYdYe20p8zBAtNnZNGYT4X6Hvny+QWrnflnquBcC1lBV:35i1MznBd/BV
          MD5:7CB9E0DEC493FB5079E3FB46E808434E
          SHA1:5DAB211100CA075D364DC8C2583374AD1C8EADDE
          SHA-256:DF5EEE715527B64D28220AECE5B8466EE06CD2079681E0F7C5890F19D5A7C626
          SHA-512:1AD27AD80ECE736D2856A45268366146A52507CE2D75260DE68280C40A06DD6313B5EDE8E0287716D5038986DEBC11575B3E9435EA2F547869E264F0EAC12610
          Malicious:false
          Preview:Search for XDR..if( strcmp(#2,"C")==0){.. if( strcmp(#4,"C")==0){...print(#3,".C");.. return;.. }..}..if( strcmp(#2,"A")==0){.. if( strcmp(#4,"D")==0){...print(#3,".");.. return;.. }..}..if( strcmp(#2,"B")==0){.. if( strcmp(#4,"K")==0){...print(#3,"kg/m3");.. return;.. }..}..if( strcmp(#2,"D")==0){.. if( strcmp(#4,"M")==0){...print(#3,"m");.. return;.. }..}..if( strcmp(#2,"F")==0){.. if( strcmp(#4,"H")==0){...print(#3,"Hz");.. return;.. }..}..if( strcmp(#2,"L")==0){.. if( strcmp(#4,"S")==0){...print(#3,"ppt");.. return;.. }..}..if( strcmp(#2,"N")==0){.. if( strcmp(#4,"N")==0){...print(#3,"N");.. return;.. }..}..if( strcmp(#2,"P")==0){.. if( strcmp(#4,"P")==0){...print(#3,"Pa");.. return;.. }..}..if( strcmp(#2,"R")==0){.. if( strcmp(#4,"I")==0){...print(#3,"l/s");.. return;.. }..}..if( strcmp(#2,"T")==0){.. if( strcmp(#4,"H")==0){...print(#3,"rpm");.. return;.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDz4PMf:TFHqK
          MD5:D0E0AD37929DCCB878628533F0B3B540
          SHA1:C43241D4ABD8DF413F30B7773452557C9E5F6192
          SHA-256:CF2E6F978624642C121F5F95B5A2E180C0E3A06B74D9010316A9817B3C76CCCC
          SHA-512:5605176FA7EF9B939444C1629E9DED71AF3471DD959415A681D6F8F6FCCD0B0631E9356738DC7CED3A12E20C5784AD94CFB313E47F61849D8DDCEA57B7A29C5E
          Malicious:false
          Preview:Search for XDR..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):96
          Entropy (8bit):4.807888696044131
          Encrypted:false
          SSDEEP:3:5NFD3vMkWoI8FB3HFFErCEWEBI+3AGXKOK:TF7/1lFErCEWEBIGs
          MD5:21FD97C54ED97789301D038FDB6F4316
          SHA1:8CE9D0B80915F920407EE8B70288A472B8D058EF
          SHA-256:84FA9A77788254A6D3A827AD177BA2688A6CC76ED50349E116F96095ABDDCE28
          SHA-512:C2149F0B686E4A7D36A28902D9B559E19245E99645C5A306DD933F640892FBE5095EB030B4755497B595A4ABD6418918C5DFFFF8DDB0642036A54A7A2C1BFD6E
          Malicious:false
          Preview:Search for HSS..if(strcmp(#4,"A")!=0){.. print("Data Invalid");.. return;..}..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):96
          Entropy (8bit):4.807888696044131
          Encrypted:false
          SSDEEP:3:5NFD3vMkWoI8FB3HFFErCEWEBI+3AGXKPMf:TF7/1lFErCEWEBIGgK
          MD5:95B2A60CBA859364E20C9BD9E1CC6914
          SHA1:BA6467C3EBCC82D6EE702B05C490F37504679319
          SHA-256:76AACBA2B593DA1AC10A10D1326E8FDD074515027617BE3CB0527012562545E8
          SHA-512:51FDB70D5253CB037B48AA0F58B2433BBF0C90BEB9482E78BB243BEFB48BEE6EF07ECC0EA238A92A49713027D0D0DC83D4440A400B0549047C483C9190EBFBC2
          Malicious:false
          Preview:Search for HSS..if(strcmp(#4,"A")!=0){.. print("Data Invalid");.. return;..}..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLOK:TFT
          MD5:540D6DC826FB7E96A7FCF4DC424A4585
          SHA1:D65FD3E4773304CD60090FE505888DD7C9542025
          SHA-256:2822BA1F63E0BEF6423B212BCBB37A96AB9DC3ED930098F0B0BA47097F3F5CC5
          SHA-512:162D4EC7DB96501A1BD7B898BA588389F7F0A83A3563AB93F335719EC79823385A19BDB52AC20F34640E42E54413E57E3A31435FF548691D42AB7B1FF7CE1EF3
          Malicious:false
          Preview:Search for DOR..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDflPMf:TF7RK
          MD5:9EBBA5E4945E2912F4BA1156579DAEBA
          SHA1:F22DF7A4FA1D9B58485F7D0AED3C84C3648D7D63
          SHA-256:C283203C6E4CFAC37C905597E7DDADB9EE21C6FFD1AC58C7887C611AFC3B2681
          SHA-512:B3CF03DEE954AD9D6E482DEAA18260D969E63DEA3FC58121AE5A3E306AAD7D031351CD648FA0E9E3CF9F7099C5C62F94F0D75138FDCC8D17AD371636E2C965EE
          Malicious:false
          Preview:Search for ETL..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlOK:TFLZd
          MD5:C8D5CBF313458D5E441B99E3EA43F20C
          SHA1:564029CD28EFCE342BDD017F6FE6D6F96306837A
          SHA-256:FE60C981B5080B7B1A711F8192CC74361364D3FEFA224FDF7F398741D112BCC0
          SHA-512:214EE131AC19AFA257D040150C6C6BBB2CFBF452F6373C8F07DC0434BCD32A6732978658A0037F5A2B312B5FA81D7EC051E079208FD37F1B6C9FC2D0156D66E1
          Malicious:false
          Preview:Search for FIR..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLROK:TFfcd
          MD5:48437D98D2234EC715C98AC7BCA13826
          SHA1:5AE24DF193D3A0F8B15F92079EE212C8FB26A7EF
          SHA-256:DF300D966C82F12090C9B269012860C1795E7BEEC728FD120C295ED77FFDE894
          SHA-512:2425455478A743E92842B2FBB0F9A7CD5AA70F2A463F3712CE77B90F549B136D6D6845BB6974BB1D017A7BB2E58730DCE91251DCC86412D0659291897BAE7A88
          Malicious:false
          Preview:Search for WAT..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDdGvVXKEK:TFZ4VXG
          MD5:185AB46A21A31E480DDB265B6C0E7A5F
          SHA1:8B2CF04C397FFFC3A3CF63993E0A2AF2C36E446E
          SHA-256:E22354C80C82AC56D8BE37711FAE0E46970DAC1800F802337ACEA655F483A121
          SHA-512:E4320F30CD428CE08FE22655F67D157AC13B69F739262BD3C5C713F9B2A9323C04E592532247ED2D9BD47EE9B1798E15EC151827EB1A0878858206EDA08F53C6
          Malicious:false
          Preview:Search for GLL..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551767
          Encrypted:false
          SSDEEP:3:5NFDf2plLM3vn:TFbeAvn
          MD5:AD6EE5DA600F068849CCCD330D139F09
          SHA1:8734A25F0A4686F7216D2F4C9075F7E9E0E517DE
          SHA-256:B567B833B6B6297869DC5AEB40DFAF66CA22A722D7E5A6FA19CA0A01D2F1CD5C
          SHA-512:A1BF4E60741E5E3D4272FAC42DDDEE16A265662CE87CD4FB4F98FBC0A173A06976936120F30B9AC34A7647826847B49A8C49A722C3D5F91FB49FC4B95DF47638
          Malicious:false
          Preview:Search for GNS..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLIK:TFN
          MD5:373EE063D70945C4FCBFDD3D0B0D6D99
          SHA1:5E865BB2D4BD1C9A3141FA74D92BA9B4EE52C299
          SHA-256:41DADCB9E2AA3C563100FBC18AF7AB43DC45E22403FAD0D438E5EB4C4CC3462C
          SHA-512:F369D374F2C73AEB6BC4B7795EC9234D761A63D664B89FCA9C3237A0B5BD53CCD2C4E4649B25A8C14786DB4507F6415E31521803564C678BFC1BDBA618EE3174
          Malicious:false
          Preview:Search for DOR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.701649204701856
          Encrypted:false
          SSDEEP:3:5NFDMoN6RnRQHFxiGWEovn:TFwoURSPMBvn
          MD5:14A2BD450B44058474EBA3793E1BB278
          SHA1:10F5A2945BFB2E69C3E389FE09622C37CC3C24DD
          SHA-256:3F90F83BDEF9817589E1384E5BE0ACC1F0A57EA6223C6F520DAC186646DDA174
          SHA-512:160ECCCE42C8B4D6B2F9B58D52472F5C1E5BAA4A2DABE6DB1FCF3E1EC05ED862BB2A8DA18AA50667813F02E158A9233A63B24A53C28FC944FF831DB0213973AF
          Malicious:false
          Preview:Search for DPT..print( #3,"M");..trend( double(#3) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLLM3vn:TFjAvn
          MD5:ADD54C2AD039D3819F17D4A255771A77
          SHA1:DF832CA778BB31BF8735BB1469BA4A8B6EC57790
          SHA-256:26430E301504D413136CF3CC53FA4212B4DDC7089FC034F4FA869D6B8A48840C
          SHA-512:1DD6E60A96AC5E358607E42A238426CECA264D1AD2DC798411BD7A4980DA54CB3ADAFE15D9E819B2B93011E849ECDE1C271E8A99F1804E5ADE49EAC2B87079EB
          Malicious:false
          Preview:Search for DOR..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):447
          Entropy (8bit):4.766661871794292
          Encrypted:false
          SSDEEP:6:TFBHxHFErebAIlvNMF1FIFErcr+lv25FErohwlvmsiHFErqqq4lvg5FErHgqglvj:TXRcIlvNMFPsr+lvZlv8UllvgcglvoGB
          MD5:89E0A61E88C29B92F0081CC035FF9157
          SHA1:757D2BA2F277A2FF685039241E059F351AC90AA9
          SHA-256:668DFB154D41F522DC930E28AF69B0CF596E56A584430CB182B85681C0C898BE
          SHA-512:035C117598F0F97013708683E6C8ED5BFE711C8F21C1F62AAA95E6A38604FCC9E0896C9574F49F6D4914CA9E71281221A462909C917C0C46F58EC92B2E6A7567
          Malicious:false
          Preview:Search for TRC..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRFMf:TFfcbK
          MD5:B323567D9FB0EB882E600C52DFEC526A
          SHA1:C22161DB9AB0CEA0D4A2F82300338255A37EDEAD
          SHA-256:3B375F025B537C8D1CE821D877CD549C9F7C9B1EAB372A15E37A52899CCB4798
          SHA-512:4C867D6469551A7419CB42D5A4287B67E06DF6AEBFD41284BD4D20C6F4CA5B1043460911D59E362C3888EDB4648A8BA855A777437F104C599DF3EC9973DC9A65
          Malicious:false
          Preview:Search for WAT..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6IK:TFda
          MD5:B5FD55809DCB2ACE715944A1B05D8268
          SHA1:1B6EAD168F7EDD133644522A77681A8A953E2B09
          SHA-256:8AB84776194EDDDE62E064C0BA994EA06C9B5700EB80D24FEB254170209CAE2E
          SHA-512:44BD4F6D8C67817F5A7BA5AF96CBC9EB9FF42E0EC3AD4937C5CD3C754AD841B7E34DC3E00BD985274985DAECE2D9D636AFA6BE1AADCE190C4D493342D6BE11A2
          Malicious:false
          Preview:Search for GEN..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6JMey:TFdWfy
          MD5:1B4B2960306A45519E5E11852A869284
          SHA1:7AF8439C3D682570B1C4B79533A9B08CA2564046
          SHA-256:449EF17819C0B49A9532442197BE043D66D26CAE169F59FFBC4DCCAA5BFA55B1
          SHA-512:45D8D52B0A22D81E62C06558F8A80B76FD2560B3DB6B14D2669D3BFB7C4C8495737E53B4F483B93DE0CD3092F2FC0B1278CD82DF5C2A5E96131E89842F03E1B3
          Malicious:false
          Preview:Search for GEN..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6Kfovn:TFdpyn
          MD5:DD191062060590C0D600716C0000584F
          SHA1:FB43EED97C406A516B047A92AA14018EA551BAFD
          SHA-256:B165AB96689DB86DE9A3A64126C12CD7891F60C4CFD4F4A4834A37399E508B36
          SHA-512:C5B280224A29D1E1BE9E09768B2713B1D3E4EC75F91732C6CB68CF195AA6E6D8D8A57E116975896AD01854CD328021AC973072E2DE0ED660C5E8EB5FF456FA8C
          Malicious:false
          Preview:Search for GEN..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6LM3vn:TFdUAvn
          MD5:733E6AC73E44C6ED593098929168C4F5
          SHA1:DFE7D28DEC8DC26F3D041A7626FE2D868F361308
          SHA-256:4239163C34F8072F7E5BC83A33EAA0C6CC69F61F7BA5E85997263D9D041669ED
          SHA-512:F62F15C0EC237307D09D0DB08BFE635EEBBBA03D7D4184959F33A1DBA987C40C33186D9CDF9330A6AF31F1E79C54F9B848B356615B741046503BD0AAF8000721
          Malicious:false
          Preview:Search for GEN..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6EK:TFdW
          MD5:61A2C7A8666697FEEC54D6314A6CB83B
          SHA1:A343380DB8444F715880340AA541644B989F30DB
          SHA-256:A809C0BB40081049726DD6D08CDB591F933A35CA3195B64C0584B65D188F5299
          SHA-512:9C81E2FFE5A2627D0E7141A55927DB50F1819E2A644F8EFAF3566C2D67CE1CB0240096B24F91A29C42272AB329F4B37957B2BE21927533C23725A212549447C9
          Malicious:false
          Preview:Search for GEN..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6FMf:TFdaK
          MD5:23D45B511DBC703285E353196E84E73A
          SHA1:1A84BE9B85848411AD5EED0E455700E5B92A3A55
          SHA-256:87E41B664AB8F30D34520258680FEB4303429A2319911C4563EC939F98DB3FD4
          SHA-512:921013BC766CDC890F924C33E20035ACC65EE628764C055BD780D4E1E6AF2F994C82E838FA1C53F641166767A0BB8E0FB3AF4B65E75265395E565B97DF4E710B
          Malicious:false
          Preview:Search for GEN..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDUq6NVM3v:TFdSVAv
          MD5:429EF79A0415B51D154FD230503D0862
          SHA1:DA7CC58CB541C387756F12562DD467E4B11E376E
          SHA-256:564EABD16CDDCEB66094B1855A8BD290EAD32602B6D9E3831CBE86816EDBB533
          SHA-512:90A3ED08023B093502CF1D0845891D1885EF2DBD87A06B26475AAB4AEEF2FA5724496E505DFBE36A2A0DA9A8A7C8BA05FC4B770C2079406D0009EDA077C6F8BF
          Malicious:false
          Preview:Search for GEN..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDUq6NUAv:TFdSJ
          MD5:617749B1BD5871A5B249FF70A9058361
          SHA1:2DEDAB8DE8F802F1A71612953DEE579B5DE07DE1
          SHA-256:87FB54199E318D10EF1D5A292632982C73A8AACA64E19463A366875760662CA3
          SHA-512:552FFB707ABDE69159DFEDD65D7F435433D954DB140A07D721D685CABAB6B4A65C67D287A1D1A6C8B16640CC675B45436680BF4C667E7A583163765F24E11506
          Malicious:false
          Preview:Search for GEN..print(#11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.8451834689284174
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TsT2ggl0GjVONYcKEUhGu
          MD5:35685D095FBCAB305FA3A0352AD5589E
          SHA1:E0EEC1D76748418FE494CA4DF75D3F423D0EFAC6
          SHA-256:34D05B420C46C068E72B145157E3FE6D43EAFAF9AAB868B0052DBEAC5A5EC3E0
          SHA-512:722727ED9C54B664C41097F37AFE491D7869613D63D165D2AE21B3B23C5BAE5059AD204145CA6CE2F15FA8814C8BA8351AEE5BE1E3BFB24E3BADC84A9F8A0D96
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.8451834689284174
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TsT2ggl0GjVONYcKEUhGu
          MD5:35685D095FBCAB305FA3A0352AD5589E
          SHA1:E0EEC1D76748418FE494CA4DF75D3F423D0EFAC6
          SHA-256:34D05B420C46C068E72B145157E3FE6D43EAFAF9AAB868B0052DBEAC5A5EC3E0
          SHA-512:722727ED9C54B664C41097F37AFE491D7869613D63D165D2AE21B3B23C5BAE5059AD204145CA6CE2F15FA8814C8BA8351AEE5BE1E3BFB24E3BADC84A9F8A0D96
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.85046698502259
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEbIAlFEraGDHK:TsT2ggl0GjVONYcKEbF/GbK
          MD5:A10463C3C0842E133ABC4347213F87A6
          SHA1:7D9D2E6058BC7F7BFAC4DB03DE62C170F88FF9D0
          SHA-256:07C6EC49AA759925B2D88816388E14B323CCD1DEA2A7388961FDCCB96C40F9E5
          SHA-512:8485FA3F62F26BCACA2C8B6FEA63E517B2E8D7B5A49B0FBD1E8CA6F716FC253FA3D4F9A2793983BAAC88A015EFF7A4391FAE49B6109267DA157AFAD64398BC3A
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.820807398788273
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TsT2ggl4GjVOQ/dYcKEUhGu
          MD5:6BE808A74CE47B0528B9CBCC39C3ED7A
          SHA1:ACD322442B017D1964C418A0AEAC83F78860541B
          SHA-256:8D578061B5B6849E2512A11121806370C8204C5731FD85998D5281644FAFB2C5
          SHA-512:B05C0979DBCD9D312BCB61D745CDAE1B2ACCA20F852994737F05375E7B81C3913F898C1E83D66E6B635B3246BD0275286F08F3E6170666CBA6CEDC6AC6C6D7A9
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.820807398788273
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TsT2ggl4GjVOQ/dYcKEUhGu
          MD5:6BE808A74CE47B0528B9CBCC39C3ED7A
          SHA1:ACD322442B017D1964C418A0AEAC83F78860541B
          SHA-256:8D578061B5B6849E2512A11121806370C8204C5731FD85998D5281644FAFB2C5
          SHA-512:B05C0979DBCD9D312BCB61D745CDAE1B2ACCA20F852994737F05375E7B81C3913F898C1E83D66E6B635B3246BD0275286F08F3E6170666CBA6CEDC6AC6C6D7A9
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.826179438139153
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEbIAlFEraGDHK:TsT2ggl4GjVOQ/dYcKEbF/GbK
          MD5:E721D25F232CE982F09B71FD82E96FDC
          SHA1:3676273D51B69E515D066A5ECA7ED76069E0B8E8
          SHA-256:DD318DAC5932ED2B1F72E67A59872DEB46EFB353FB8C3D05541AAE08623D69D0
          SHA-512:B6B0704F3772C48D823AC94AA7D5744A432F82270C6CB83316689FB046134F4CAE684FC31FAFBC65C9A24690F007CF46C706364BEF5402D05249E0B43B61FB16
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.917504567714332
          Encrypted:false
          SSDEEP:6:TFCwxXluJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TUwlJT2gglrGjVeAYnF+
          MD5:2855C5098977A178F249B784541FCE6F
          SHA1:F1964F1C477F94FB0C04A82F0CA4DE650F34E0E1
          SHA-256:8B5C7D6F416880206E131D510F57602FECAD20D1294FB40B23A9B314D6957F6E
          SHA-512:3CEA1DCB690DCFDDE109B686C100E4DC5B2388003E5221FA1E71CA2EB7DA8F16E206C4E53B8EF9D06BBB1215D4D4FCE37A537306194D1466BC487E786F925A68
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.928927480608119
          Encrypted:false
          SSDEEP:6:TFCjCluJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TUjClJT2gglrGjVeAYnF+
          MD5:077300DC689235E2DFB2379F6A3EE612
          SHA1:4BA6CBBB2733DB5488EB6AF12202BD5142B87CEC
          SHA-256:930C1906031841A9AD7130462F33E6B2037234ABFD91220359B625191614B0F4
          SHA-512:DA83DFCC2480DDA1D626E7E6E7A97D9913F24C755822C8C8C32D631CF1B4D91BC783FAA1999A69351526E123312466BB5F9A2D1C8499CE56F6A9B37EFED7AA19
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.922598366684069
          Encrypted:false
          SSDEEP:6:TFC5luJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TU5lJT2gglrGjVeAYnF+
          MD5:48E045B698B3C5A89BD43B84A1796718
          SHA1:00AF88050006E6E8C660DA93782CF0D51F55F150
          SHA-256:BAA07B446084825D7BC18DD3FCB740D659C5AD818AE0C3615834CBCE5DDF87E7
          SHA-512:EF355A531DBD0C749A99DE0FC2C005EE279040665FB34AA6D38055FD5B8DBA65EDF20802DA3F4225E4227B68EE8FC586820252D8C7431747FD8373F5FD6C01E1
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.895832548462717
          Encrypted:false
          SSDEEP:6:TFCwxXluJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TUwlJT2gglvGjVeb/dYnF+
          MD5:637A504659642736DE8C2AAF3D7FB765
          SHA1:014495C70DE3217CD793DFE9EE4794845D8DA50F
          SHA-256:D2A06CA634D6F7C2FF0C68B32F4A114E433143047DF6ADA772864F52454DB311
          SHA-512:B0E921AEAF57CC65D0DBA82579907EC59C8C06873F5934216C7A887634E33572590E6590932ED88FE9734AF9CD35B97FEF0B894033A43912925DCE29370A764D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.90729172457204
          Encrypted:false
          SSDEEP:6:TFCjCluJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TUjClJT2gglvGjVeb/dYnF+
          MD5:5560BB9958F5EDE8F5FC8273B94FB46F
          SHA1:9F4524DE875719188222D92EB890C9FB8B29E214
          SHA-256:50D8F09435C7BA95DE260872C5DDE6AE67610A51FE74BDC060BDE394E2A9938E
          SHA-512:186C129D6ACF0A09216D5074EE6C787C480F3993577F8A1A27B94F5551973EEBAF39F2C9CB2716B767C41F2A4E1BC5A1BBB92934C9E622C9EA8B346725FF82B8
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.900942518222834
          Encrypted:false
          SSDEEP:6:TFC5luJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TU5lJT2gglvGjVeb/dYnF+
          MD5:018DFA70A2067AFCB8E5A459962633B8
          SHA1:B6642CC950572DC86C42D3823BBCC26471166D5F
          SHA-256:52A397989997B5553BB128CCF388DFF44E9DB60128B3054842CA37B84C44ED3A
          SHA-512:ED007CF4489DCCA94CA07892DB05AB6AF811E0AC443A575FF2EA7936977FE2AA77CDC9295266D645FA567537D95EB5FD3ACF073609916835257848BD56A9DA2D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.813534671515546
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TNT2ggl4GjVOQ/dYcKEUhGu
          MD5:F0A90FD1E7848040D7C63B7690AA4A24
          SHA1:12C11780B8A53CB619E039CD4ED64004A53621CF
          SHA-256:558B339F75292DCEED13BCFB78F110C61E29EFBF1F46C9D7445A8FD5FD85A307
          SHA-512:38987CFA0888F9968A40BA836D1420EB7F5168923BB9D37248C2547AB8E08FB63C40A06C229FCE735AA805B9FA9BF7A5415A929531E4CB2709ED57BDFCA6E360
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.835201992471304
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TNT2ggl0GjVONYcKEUhGu
          MD5:E9CE55A0DADA85DB6F8198B58489880B
          SHA1:0E52C0EE4D784BBF5A6CE9181F3D7066EB0CBABE
          SHA-256:BA4C9E117A396B445DB20E82EC4AAD5A70BBD5EC203E29693EC11966B6AD7C7A
          SHA-512:465C6725B6D30537E31B30E09FE45DD8451841F669420FC7D499722D18DC9380A9BCEC25D4D0937FEE3F4413141D6B9B5D9F9E5CB9170AA116F94D7514044B08
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.835201992471304
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TNT2ggl0GjVONYcKEUhGu
          MD5:E9CE55A0DADA85DB6F8198B58489880B
          SHA1:0E52C0EE4D784BBF5A6CE9181F3D7066EB0CBABE
          SHA-256:BA4C9E117A396B445DB20E82EC4AAD5A70BBD5EC203E29693EC11966B6AD7C7A
          SHA-512:465C6725B6D30537E31B30E09FE45DD8451841F669420FC7D499722D18DC9380A9BCEC25D4D0937FEE3F4413141D6B9B5D9F9E5CB9170AA116F94D7514044B08
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.840521542776512
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEbIAlFEraGDHK:TNT2ggl0GjVONYcKEbF/GbK
          MD5:CA7B69D1559F2609B53E860BF0B0A292
          SHA1:EB13B6343D3D30301D081F99FD28C088109E2B91
          SHA-256:44BF74E05DCD9029CB2181C60D415EA1904E8955A72E529264712617A63272F1
          SHA-512:CE508FF3793457F32C9D1BFB0E93C2797A33F9A5DDBCADAA11136588537920BD97C7833EBD518861FC5BD1E0937258862D93279079DAFA95EBA6A6AEB173032B
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.813534671515546
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TNT2ggl4GjVOQ/dYcKEUhGu
          MD5:F0A90FD1E7848040D7C63B7690AA4A24
          SHA1:12C11780B8A53CB619E039CD4ED64004A53621CF
          SHA-256:558B339F75292DCEED13BCFB78F110C61E29EFBF1F46C9D7445A8FD5FD85A307
          SHA-512:38987CFA0888F9968A40BA836D1420EB7F5168923BB9D37248C2547AB8E08FB63C40A06C229FCE735AA805B9FA9BF7A5415A929531E4CB2709ED57BDFCA6E360
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.818933061327559
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEbIAlFEraGDHK:TNT2ggl4GjVOQ/dYcKEbF/GbK
          MD5:232109F58F88675F382E0A35B0BD4BC3
          SHA1:99077499373C99DBF85B41BAE81FEF907CB40B16
          SHA-256:DB086F56E76AD8A506C8322CDEDF753243A069E855D7E42E72F16FCB36518757
          SHA-512:2FF2B30F5ABD48C595040894EC182C8F505D78D1C484AEFF9AE42307853CB5EF91E57BDD47C6DEFB83C9711023A43689A8A61DF45E6A7F9DDA5F92D3D5D140AD
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGVF1FmFErUd6lq9mFEra6lq5F1FmFErzzIlqu3FErpKyGBk/y:TPsPuIl83l0PZEl7SKyGeq
          MD5:00EEB44C24F8B3A601DA1427DA198314
          SHA1:1960DC100D3F1CB40AEEAE99ED99483FF91DEC7E
          SHA-256:FD74DFC0A5156280D67064FC17769ACE390A29681C278279ED6967864D2DB92D
          SHA-512:1D975BA149325FBB00C07F37518EA8CD50A0E7662FBE8A6DBB20771D1A5E2831876C268EDB26C3A48497D0AEA57BAB241A92BAD3F3539E0740ACCC42A1AE683A
          Malicious:false
          Preview:Search for NSR..if( strcmp(#4, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#4, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#4, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#4, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGJsFErvIlqJvE1AFErYhlqJnx3FErpKyGBk/y:TPQrIlc2qlcxSKyGeq
          MD5:3D4CBE7AEDD94C56EF4379BB8D6850AD
          SHA1:45F1268A0D729945AC52A781E12404686A3680AF
          SHA-256:7E21EC51BFF36A23212FBEAED9A4674A1E06EF9F38B8F62B8175849BFD8216AA
          SHA-512:2B53AD41FEB1E9CB40B65C02E75E7A5766BB45F0DD60D55612A567177FB90B0914EADAC89AAEFF85FE512E57179A1577FC482F5C1A55B90D2AEF5035D2208883
          Malicious:false
          Preview:Search for NSR..if( strcmp(#5, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#5, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#5, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLLM3vn:TF7/Avn
          MD5:1C2E063C6BCD44C523D9E78D999C3756
          SHA1:B5AC52FF3473F990224327CC5658120EC28103DC
          SHA-256:A46DE7EB623F4C9474D017EA92207FAC23FDF70F96BAE6E51F1B03082D96953C
          SHA-512:1793118BBF4146B72223239F190940C9B2EC2D4A59476013CD6C93E54221EA827F7CEBD143F64B82B33ADAAA3F73DC58F6FCCF5CD360D6E49A023A48DE2E7C2D
          Malicious:false
          Preview:Search for ALF..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):305
          Entropy (8bit):5.105414684205305
          Encrypted:false
          SSDEEP:6:TFapx4LR32g/pMsbB7Hejq6KVBe5P02KEZGLRTMYJDfy:TAbA2ggjSVBed02KESFNK
          MD5:778381A083D5887876AB1D9889236DF5
          SHA1:4A27E00C833CEAFF8711DDFB730FC83996B75BED
          SHA-256:CC69BF3894102B7AADCB29897165B1135E36100C1912862157D4C84573AD89EE
          SHA-512:5507557CC05F1695D7F386CEAB734556C0DEE3EA830FC5926F06989F2ED5D6AC1BE973CFACBF9C2FD8CCE96989E558C7CAAFFB1FB66FBC18A4E9F02F2618E519
          Malicious:false
          Preview:Search for RPM..//If (#6 &lt;&gt; "A") {..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "0"..if (strcmp(#3,"0")!=0){...return;..}..print( fmt("%2.1f",double(#5))) ;..print("%");..trend(double(#5));..if( double(#5) < 0){...print( "Ast" );...return;..}..print( "Fwd" );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):5.122427451057994
          Encrypted:false
          SSDEEP:6:TFad5EIeLR32g/pMsbBzVFejq6KGTHf5PYedYsgKEZGLRcYe:TAzJy2gQjSQ/dYYYzKEae
          MD5:1732654AA51D4F339C214AE0DA902CB0
          SHA1:A33D9049BEE4F2246A33FA506973CB42A665C967
          SHA-256:6A66FA7528E1E5C0CE4889CDAE20808EA618596AD21C77D7A6C0BD40BEB4A96D
          SHA-512:8B70E26F95B467F3634EBA3E795AD1797507E7AFE3214445EE7A58C9EA74BA59EABF8F1703F2FAA4374EB172E8BC7822F6C81FB848D240D6C995A66B8E5E3073
          Malicious:false
          Preview:Search for RPM..//If #6 &lt;&gt; "A"..if (strcmp(#6,"A")!= 0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "2"..if (strcmp(#3,"2")!=0){...return;..}..print( fmt("%2.1f",double(#5))); ..print ("%");..trend(double( #5 ));..//If #5 &lt; 0..if (double(#5) < 0){...print("Ast");...return;..}..print("Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.895840154756691
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TOT2gglmGjVXv/dYJIhdNu
          MD5:CF43C3C7BD49EAAB06248A5406A9DE63
          SHA1:CB83A5508051208D73DA310D9D53093584760459
          SHA-256:ABA5CB312F72847FE14F09D8CD4956B31A672311DDAC002B53773BDC81B255D0
          SHA-512:94CF6D3ED4685A31C7A36E9DC416AC02954CE97D1169358DBEECC99E09B07D1C7A7F5FD9F6D060F1C7FFCEEAAB12B4F4B9B4AA4874094038FE923DDE07AF1C1E
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.895840154756691
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TOT2gglmGjVXv/dYJIhdNu
          MD5:CF43C3C7BD49EAAB06248A5406A9DE63
          SHA1:CB83A5508051208D73DA310D9D53093584760459
          SHA-256:ABA5CB312F72847FE14F09D8CD4956B31A672311DDAC002B53773BDC81B255D0
          SHA-512:94CF6D3ED4685A31C7A36E9DC416AC02954CE97D1169358DBEECC99E09B07D1C7A7F5FD9F6D060F1C7FFCEEAAB12B4F4B9B4AA4874094038FE923DDE07AF1C1E
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.827863787639069
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMslFEraSHK:TOT2gglmGjVXv/dYJI5/0K
          MD5:E93CB4326D3E1EC3542BCB01B275BE60
          SHA1:181F2387F4F545CF15102745F49D287AFF42EDEE
          SHA-256:58B77674FA851A3F1EB11D9AD3AA92CBF256FE2CBC0FE5CB75A01F7B44C6A865
          SHA-512:455A5783EC046A34CAD1C7832BFEFC70842B4B70F52678ACDE717B9E7EB6AD101601706CE87A1284F66251D6073846EB223CC2B5086B0E3FCD7231F2A74E3BF6
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}.....print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.835071091497352
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TOT2gglAXGjVXu50YJIhqhGu
          MD5:67005C1C0178201B347CE2E5C7898FE1
          SHA1:CC2E151F13347C5B5DBDFC330CAC9125B149634A
          SHA-256:E7BAE12903468E1B1155B7A5C5B300261EAD1AC4ADC2B5C06451E41AE99784D8
          SHA-512:653695A8C3D08A34AE323D459103FB81FAEACD9817B11688E3F3AA39A6190A7A3C08F3E6B9A18670E43720A3AEF683557A938E14A6710DD992AE498318ED5568
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.835071091497352
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TOT2gglAXGjVXu50YJIhqhGu
          MD5:67005C1C0178201B347CE2E5C7898FE1
          SHA1:CC2E151F13347C5B5DBDFC330CAC9125B149634A
          SHA-256:E7BAE12903468E1B1155B7A5C5B300261EAD1AC4ADC2B5C06451E41AE99784D8
          SHA-512:653695A8C3D08A34AE323D459103FB81FAEACD9817B11688E3F3AA39A6190A7A3C08F3E6B9A18670E43720A3AEF683557A938E14A6710DD992AE498318ED5568
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):278
          Entropy (8bit):4.840390712476405
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMslFEraGDHK:TOT2gglAXGjVXu50YJI5/GbK
          MD5:4B6A35EDACC70CCE8BB95F9FC555F63B
          SHA1:5CD5507C2ED6C0BA9BF51D4E0217671FFBD3F8F5
          SHA-256:9DC5727C88CD850AFEDF98CC7E9D1B1AED6CE8CF84233A1F1E940D4F89E125C7
          SHA-512:16956530D29DED12CBDB10BE879241F39AABB2C0C8B1E1511F261DF7F5E0A573762B31C605455D367E45A09752D5A8D1080C5260C75AB1404DDB96E9992C16F7
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.782390539923682
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9Peco+3AGXKc31+CQHFxx:TFaoEFcrV2g/Itge9vfqeXGfkCSPmW
          MD5:98D1D4C295FADEAFB12E6F168FCD9237
          SHA1:77C7B7665CEC7C095301DB80D57F8C2660440838
          SHA-256:AFF41DF2DCD3054B991920CA632DFB13F63175502F6CA812D70789516E8E3E3C
          SHA-512:E558E5F2BB2F78FCF54B6BF0595BF5C7E40F7437969169A01244EEB87D33CF1D258ED5AE886E7588FB8864ADF70F11525D25A42715A9D4BA3181A923DA8B7AAE
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"0") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.885530604025141
          Encrypted:false
          SSDEEP:6:TFCwxXls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TUwls8T2gglsQGjV0Bb/dYd4M+
          MD5:79036DDB917F184548AE33BBDDC030BF
          SHA1:FB173A6E057A9582BF153F60E35FDE29C5DEF4AA
          SHA-256:C23FD1A6F7BAEB32883E5FD740953A62616AFFE5FEDBA580199ED6D19DFC1DEF
          SHA-512:8056EE7F4D727E6C4EA92BCBB179398D850EE633A1A153D6DE9EE20F1DBDB04500B4AD5BDBE2E7B984B18C1CA4526950D354423379B13F0A1574318D4A5B904D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.896989780134464
          Encrypted:false
          SSDEEP:6:TFCjCls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TUjCls8T2gglsQGjV0Bb/dYd4M+
          MD5:72C5D166C12972873F980F557419F829
          SHA1:E3FCA300B735B406F3DBEB351C18BE4B6BE21C74
          SHA-256:E2CE0F7F214E886C207887EC94B9B74DBDAB83E864834E345F675FB9375B3704
          SHA-512:B3317538495F838FD03E8A3D42B830D3B2265A73E99C298932E116F0F7A40EC369F0C086A054D30891182C1B3BA27919FA62DFE73B20DA81D11AC20DA18A973A
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.890640573785258
          Encrypted:false
          SSDEEP:6:TFC5ls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TU5ls8T2gglsQGjV0Bb/dYd4M+
          MD5:CC0DCCF7D856C09226307E643DE76305
          SHA1:7DBC9846AB12E144424603FC38B5A4393EFA85DE
          SHA-256:3FF791F5DF797F7D2840960CC389C543E9A1E7F2B96343A5D146FB8B99CCEFB5
          SHA-512:22CD718C9CC08F3EA4C33A675262F2969839AA72503FD7842BD1FDF198FAA70B2EA9CB5AB737F8571768CD1C1B836F49B3070EA1EABD703A8FEB1F338B04CEED
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.907508515861056
          Encrypted:false
          SSDEEP:6:TFCwxXls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TUwls8T2ggls2GjV0B650Yd4M+
          MD5:5AE61942177BC1E17E8CB148F706AB18
          SHA1:2B9B46E110EEFB0632B7D98871543008506A1036
          SHA-256:C3962CC40C125B15E64F6231A707319F9F898B60789FB86977C7A5E82C919C1E
          SHA-512:2581E512B6A680C106BBBE64FCB23902646467D0EDAD10D3BDA915CC83D473A7EBDD91432CA7D15C6423FF9D6B366BD1700C5EE04C58307914483B803F2B711D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.918895394329311
          Encrypted:false
          SSDEEP:6:TFCjCls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TUjCls8T2ggls2GjV0B650Yd4M+
          MD5:C158877E9F70A03033A28157E1BE60BB
          SHA1:4E259E51F4F5CBD9BAD10198CA724D53D3993FF6
          SHA-256:004EACDB36E02A78A6D51E673D151FB356FB8BF473F8BB447105CE07F661519F
          SHA-512:A4481DFFE421FBF812463F3C36C0FA7F21863E0B8330E1FF7C82D512A962CFB0C57CAEA4D75B780B67F6FF0E98909F0366F9E8BF3647D39F059720F6DF3B10B2
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.912586246064327
          Encrypted:false
          SSDEEP:6:TFC5ls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TU5ls8T2ggls2GjV0B650Yd4M+
          MD5:B8430B79CE251F89B1534B98418498BC
          SHA1:8A292670591AA78C62A87D51E6E41DD787B0A27E
          SHA-256:C3E96DD2524A7E5415D61980AC213DB59963313A11ABFE5A5B0442E3B32A3C25
          SHA-512:4D89BF1BB1295C527B78A5F3A6C6AE0A991C380FA91B5F2665445CE40163BB4D76C7D92A4D6C885BD8EDC8B6BE3AA6B2FE1C7AA4501006833A2045B829AA613E
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.788075985119281
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9PS+to+3AGXKc31+CQHFL:TFaoEFcrV2g/Itge9vfqjCGfkCSPmW
          MD5:ED512594A6B1D055E41D4CFAC5FA8CAF
          SHA1:F326D38EDA978FCED24FE6CBC86E06403D9163D0
          SHA-256:2F0F977108A9734B7CCBDAEDD65CC7B8FBE9048404C9E0542C1AA8B4065426C3
          SHA-512:CC9255CAB2AC7838084175B678A8C78BAB755FCE04EF5FE7E3526BA7AAF57255915E8020E4F3E05C5E76CACB37BD06D7A7933AD4B79BC97269F33A880ADB268A
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"2") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.778943565027957
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9PS+to+3AGXKc31+CQHFL:TFaoEFcrV2g/It2e9vfqjCGfkCSPmW
          MD5:88E1B4B292F87F83F482E5C26F9BEABC
          SHA1:5F59935A09B59E777292C46EBD0E1F7B1C1F3FED
          SHA-256:1E9374F7D33BC20C485DAA4929CA60945691E9051E37F78228F7D8CBCA2838BA
          SHA-512:34802ABA470D375E6D657DF8386FFEBF773D43A28826D040943B737A1DB4BCD83F151BAB22CD143D0749285B5A20E18DE58D3813DBE7F1603140F3658329F3ED
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"2") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.888405210518773
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TPT2gglmGjVXv/dYJIhdNu
          MD5:2B6A2E4669C06EC60E2DFA766585A701
          SHA1:14960057EB91A9DC6093BB1A8CA47D320230BD15
          SHA-256:F95961BBBEB9530FC34B559885AA08770986014D1D17292B9F4D9B2EB324F441
          SHA-512:139A2B6CECEE0DE8859F85867E4AB8FD962CF82C6C0B0D9DF0D1C50A6B72A3B435480454B49D0D854F9F8FC28AC372C5346EF13DC98A75113A35637B52BD5554
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.888405210518773
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TPT2gglmGjVXv/dYJIhdNu
          MD5:2B6A2E4669C06EC60E2DFA766585A701
          SHA1:14960057EB91A9DC6093BB1A8CA47D320230BD15
          SHA-256:F95961BBBEB9530FC34B559885AA08770986014D1D17292B9F4D9B2EB324F441
          SHA-512:139A2B6CECEE0DE8859F85867E4AB8FD962CF82C6C0B0D9DF0D1C50A6B72A3B435480454B49D0D854F9F8FC28AC372C5346EF13DC98A75113A35637B52BD5554
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.820695328857707
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMslFEraSHK:TPT2gglmGjVXv/dYJI5/0K
          MD5:00D0C1AA23541567F7D27A9C4694C5C0
          SHA1:62E0CC2DB021F8A854659287FB36A857F43B2F4D
          SHA-256:83E355D7F49A7FEFB1892709E44285151C7E7A022EA1CF2B94096ECE4A7AD7DA
          SHA-512:390351EBD5A01A1F6F34B57E4F8C3A89589721A671B539D95E143A544CF16F3BCB16F44AE8A67224127E200C691F739DC236BB4CC9B6898AF141490E3FE6044D
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}.....print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.8278508748908555
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TPT2gglAXGjVXu50YJIhqhGu
          MD5:995E52AB6AD1D2A7C3793A3E6F513BFA
          SHA1:8B962E4C6F76E2D164299FD30A6E5B7F6042CD8A
          SHA-256:4959AE465C17A30F1A8DF980DDD64690DF07BF83BE96B4E59B464E5CA48986A8
          SHA-512:7C999E6C6A271C55229F7042AC9A6E88F014759EA465F5D24ADA9E33877395B9E0132A766E6A94916F5545BC1C3EAC6F345D33D1616C5C8A42E8ED1C21A48698
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.8278508748908555
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TPT2gglAXGjVXu50YJIhqhGu
          MD5:995E52AB6AD1D2A7C3793A3E6F513BFA
          SHA1:8B962E4C6F76E2D164299FD30A6E5B7F6042CD8A
          SHA-256:4959AE465C17A30F1A8DF980DDD64690DF07BF83BE96B4E59B464E5CA48986A8
          SHA-512:7C999E6C6A271C55229F7042AC9A6E88F014759EA465F5D24ADA9E33877395B9E0132A766E6A94916F5545BC1C3EAC6F345D33D1616C5C8A42E8ED1C21A48698
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):278
          Entropy (8bit):4.833196467872089
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMslFEraGDHK:TPT2gglAXGjVXu50YJI5/GbK
          MD5:DCBB8966C598445E9E7E9047EBA61301
          SHA1:24AD81B8350ACF000AB9298CF58585778638D8BA
          SHA-256:A269FA98F93ADB6E40020104D7CF45345ADF5347426EB7B5AE2BC7FB1716F009
          SHA-512:27BD8711D405B288FCC5A6E9BE6F4D38F4C49C49447B910D385A0E845DF36123E6C3AACD820913B6784F8862CEAED6C7EAD9EC7508559787B1FB07FA32201A9F
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.797208405210606
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9PMMco+3AGXKc31+CQHFL:TFaoEFcrV2g/Itge9vfq5GfkCSPmW
          MD5:907BE00AD69828BFAFC26D4634EE73C5
          SHA1:017B1E0D8527780664D4A0C7E362742146AF3FF2
          SHA-256:EE954B4AA9CBCE49BE03A298E3BE24993CF503ECC655364986AA6B3A401470CB
          SHA-512:B691A5868CAB244F2B0F8AD8862E52ACF13A17E681A9C6E47C54FA3CE13941C520746A11195D985B8C1245B7289D392E63A3CE02646B074D101B0FC4825D8156
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"1") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.788075985119281
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9PMMco+3AGXKc31+CQHFL:TFaoEFcrV2g/It2e9vfq5GfkCSPmW
          MD5:1F0EACFA3C4DECA6E43B4D7E8985292C
          SHA1:42309AD550D90C8146B4E8C05702D969A61367D3
          SHA-256:7ECA65CF1D25A6477A8BEA0171B2833A1CCC1F5974AFF8E1AD86CEE0D4126E59
          SHA-512:325274795B4F84694D1B262FAC2F5CB4544EA952A1C0E2891DF2A1DD6BA9490C18283AEDEBBBFF0E6CC8961E33DAF5D8A6A670A133ED3EE1CD0B76FE53923C94
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"1") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773258119832358
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9Peco+3AGXKc31+CQHFxx:TFaoEFcrV2g/It2e9vfqeXGfkCSPmW
          MD5:12427EC22AC35F74D8BAB06D46C3B4A5
          SHA1:69B92FBEDBEEF6CA2179BB8BDB85CC0A081877FB
          SHA-256:3809C1D2ACA043DD79413D1025000C917FF0E677D6CA7BF2DC59C929CE402330
          SHA-512:CE9D9126C4C1403338FFB442BF400ACECFF5BD5392C215BCB0A6E92AAF1460F5FF65D079B7488A364AA294B585023C8199BDC497916FFC8482FB46FEE9C84C74
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"0") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlKfovn:TFeXZyn
          MD5:5C8DCD9179885FE6D742799CAFFA63F0
          SHA1:5BC1F7D2B8876BCCC21371DEEC4218A74590E6A6
          SHA-256:E6DED4BC055FDEB2B480E6CBDF8FED365B6797B5434BE6E5D2B37BCD036229F8
          SHA-512:1C9AB517A20526BCD34D53981A838F90E9401FB117FF9E52A767137BCE7D289CAFCC6D6F92B0B8D6ABC7DAC67A483D0EC410A88D3A7A6A45970038E150BC3E1B
          Malicious:false
          Preview:Search for VDM..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcKfovn:TFoyn
          MD5:05BB90FA5D5E4616B9D935D418A08574
          SHA1:1E08D8209AC1C44A92B6550FF7B5FB941D6CCC7D
          SHA-256:62AD1D580F42EB1890EF1CD15F2DA204472613B1C6F274EC6D1249E89762F2DB
          SHA-512:C1D7224EA9277C26E4E0F20D3626812013871D1D6E5C747D2868007B216DEF14E4642EE577A4DF2EFF3B4B9131773746CFF27C961E8B0B0C502C8E41C378ADB7
          Malicious:false
          Preview:Search for VDO..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):51
          Entropy (8bit):4.547247342260632
          Encrypted:false
          SSDEEP:3:5NFDMoN6RfvGHFxiGRMAv:TFwoIAP4K
          MD5:EFC4BA968837B93D46FCDB3080554045
          SHA1:F8917DAD98FE6F5CB65872C1FAAF8ADF688E4E7F
          SHA-256:8EFDC48C1B9FF679C502F03928EF01B0739128FDA0D4FB10F164E1F600F9F253
          SHA-512:B41BA7889F78655C0F7E8DBE3EE951283A838DD19971C80DF9B1B0D29EF4A2CDA6F2DD19291BDCC50141EE1CCDD10784187AB46E4C259D658B1A195625EF46F0
          Malicious:false
          Preview:Search for DPT..print( #4 );..trend( double(#4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):123
          Entropy (8bit):5.054077384236297
          Encrypted:false
          SSDEEP:3:5NFD1dWX9PqCeLR32g/pUAGXKOJfKpovRQHBlgNpMfn:TFJs3eLR32g/pYvfKpoJSPIif
          MD5:11515FB148E97C90EEAF15E57471B18E
          SHA1:3369BC47ED0ABF75B6ECCDD3693F61275A7EAB39
          SHA-256:838BC3047172309AFCA3E8848E7F6A1384070DB849DE7349B400BEEBD8E94A43
          SHA-512:D6F6E7D178C281C3548EF75CE0C08934061BF96932D7D2F56E96943A83044F86B1CA1D8AC44F5B5B07268A9E3D7534F64DA629363BE13EC985DB24B9DA0AF160
          Malicious:false
          Preview:Search for ROT..if (strcmp(#3,"A")!= 0){...print( "Data invalid");...return;..}..print(#2,"./min");..trend(double (#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):294
          Entropy (8bit):4.7880691031424485
          Encrypted:false
          SSDEEP:6:TFiQHMWFEr8JlgzNFErFceoIlgufOFErJlg7aFErDAIGBk/y:TMStlgz6JlguTlg7VAIGeq
          MD5:B708EA3E73CBF55FF166942B01052100
          SHA1:1DBE8982035D989E1E215D3E653CA84FE436C73B
          SHA-256:0714474B8A3A21A367D5E81AA714FE6C668DB8BF5883F29E3B8E077EFD7D4852
          SHA-512:E88567E971B1109BE1D7D1E589A8471FE43E2FBD73C18A02087CA7952A095E91AF815E2652AF51CFB9F290D8AD0658F1FE88BF4E0346F2A2FD072386C78739BD
          Malicious:false
          Preview:Search for DTM..if (strcmp(#9,"W84")==0){.. print( "WGS84");.. return;..}..if (strcmp(#9,"W72")==0){.. print( "WGS72");.. return;..}..if (strcmp(#9,"S85")==0){.. print( "SGS85");.. return;..}..if (strcmp(#9,"P90")==0){.. print( "PE90");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRELr6Mfn:TFmHr6Mfn
          MD5:B3FD817269C8C96FA68A5701FE307F54
          SHA1:30BC7D02FBF9527CE0BE9E9D274EAFEBE04505EE
          SHA-256:D857547E1B9124579116F2422BF1FAA0D93F8B0BDA6A236FBC4D3547AE3CC9B5
          SHA-512:2B5FA78893ACC04BCB53447DAAAA0B823275E0C3B2F21BD7FBBA9345A36AA47791F21C0F483EC5FBCB0B879A2C2797E5458FEEADD8B95F212371CC399D69ECE3
          Malicious:false
          Preview:Search for VLW..print(#8, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRIz8sfn:TFmIsfn
          MD5:3039D1981F5D297111DB324EAAF6B756
          SHA1:E7479A5AA7884C57DAC04D19E43FAE161F924193
          SHA-256:208DA161B12CDA3506A5419418A748630A041ACD450CE2C652012BFC0292291D
          SHA-512:26469E329C0FEC98AF0A64E0E7457DD977846FEA3DCFAA2CCDA00D95FE3F44754198B6FCD92DC30E24D6509BADAF702DC5ACB33D1969D0E936E31C01A8D46D38
          Malicious:false
          Preview:Search for VLW..print(#4, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFf:TFQiPYf
          MD5:DAB5ADEE0D5F624790F29D4A70E421B1
          SHA1:C6E5FF51255A8F40140E586049BB6E90C3E5C9F4
          SHA-256:F3486E5CC545C222D3C3ECC2D8A1C2B61F6EB9B7BAA7AFBD4976D8E381ABDFB6
          SHA-512:2B04D2D16459EE24382588440CBFCE07502D96D3724E40B89ABF6F0E3C20507F3413377501EDBD332BA9B86FF97B34E58D301CB4E2BC5CB811D3814CA8D8980C
          Malicious:false
          Preview:Search for HRM..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFDy:TFQiPYW
          MD5:B3D38B9D6483A209DFEE908D7D21C6FD
          SHA1:9D48D47956B29C829D56A520CB4879F9C5168678
          SHA-256:90A07A943F0ACFBCA43BE1747C94C84F1A9E4479F4F397B013BBFEE11C2EF563
          SHA-512:8BE68DE74D1E0A170BFA96CD3F7C6D5F749C45D04BA46A6DC3B20A76C95632F1D8979638A09E74EE750229153FBAEFB48876F8031ADA73ECD4F5CF4714ECE71A
          Malicious:false
          Preview:Search for HRM..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFsy:TFQiPYsy
          MD5:658DABF5C8BACCB231D0589555F60A4A
          SHA1:E29F03A77E73112C591E092EB6E2667470E5C07F
          SHA-256:1DF09B4831F0082B4956E4B23181C9329F326078AE891A0B3BAA2FD270762174
          SHA-512:D2F80DF5E24CE19C96B005E06B77658C2EF12EE754AE5F99295A220B45F9DA726B76D7623007580980AB16CE55C29185F5EE87BCB479E354A3CA43A0CF5BC0BB
          Malicious:false
          Preview:Search for HRM..trend(double( #5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPD2kcrV2g/I9eMFEr+1FeCFErNqwPmif:TXE2gg9P1F4jm0
          MD5:6131F5912D888B83F4BEC2E1D90AD5FE
          SHA1:ADD0060450D1B884DFDF48C8B54BA897F50E8BBA
          SHA-256:ED5E2131D942E1C14249A30192654AD6B48535CA7836C33B61ADCAF842CADFC1
          SHA-512:1408E8422FE1FB95A87BC33270AA7F513045229B35BBDB12E6DE8A9B200315CBB8A3007126A8ED41BB3BE5618F139B2FDA839D5A30118183F9E4BE19E008B65A
          Malicious:false
          Preview:Search for ROR..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVTkcrV2g/I9eMFEr+1FeCFErNqwPmif:Tz2gg9P1F4jm0
          MD5:C26B9D0CE5EA6FCFC72F9C6A1C6CC555
          SHA1:E6CE74625BE91C88564BC46960F8D289AFF50DA1
          SHA-256:6BFBF38963369154353C9C11C6AADBE694D674B958B74E7A24D82D80AAD20DBD
          SHA-512:7A0FAC80933E672E99230CB87B042B489355B11CCDB5F85B286B1272599CBD1B4FA88C7C898F4CED562312812D04DA564D312FC9E1AD8E128C974FB3E14F58CD
          Malicious:false
          Preview:Search for RSA..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPDwkcrV2g/I94MFEr+1F4CFErNPUwPmW:TXwX2gg9461F47VmW
          MD5:EC6177B83046D6EFB48F26746C652833
          SHA1:F2ACFF365D80311FD2B528B65822498995D5676E
          SHA-256:890EF13CC022F2BC4A42EFD68FA8CEF8DFEB242F9AEDF19629E44D78FBB868B9
          SHA-512:A50FF6CC380C8FDD5AC3916924F85A93EF909CD0907B9434B8B255F71CAC297B62F79BD86C5BEEA5979359FDF1873C75045DC1D172140B103B19D87EFFD3E536
          Malicious:false
          Preview:Search for ROR..if (strcmp(#5,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#4) > 0){.. print( "SB ");..}..if (double(#4) < 0){.. print( "PS ");..}..print( #4 ,".");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVVkcrV2g/I94MFEr+1F4CFErNPUwPmW:TFX2gg9461F47VmW
          MD5:54111E4B678A5D098A495B48673B9FDD
          SHA1:E92BE2EB743137A11DAA5DA02D11533478A95E77
          SHA-256:FA7342FA849DBF3491DE8B6718348940902E89D72A36F337D769B1CC477BBB35
          SHA-512:42D61B2185E834A8B8A2CD674037F61EA184FB590B964ABA86BD083714E788B9366E9486C43E2141E64411FA565A987D1369B2D6A55E988F7134340F400EDC74
          Malicious:false
          Preview:Search for RSA..if (strcmp(#5,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#4) > 0){.. print( "SB ");..}..if (double(#4) < 0){.. print( "PS ");..}..print( #4 ,".");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPD2kcrV2g/I9eMFEr+1FeCFErNqwPmif:TXE2gg9P1F4jm0
          MD5:6131F5912D888B83F4BEC2E1D90AD5FE
          SHA1:ADD0060450D1B884DFDF48C8B54BA897F50E8BBA
          SHA-256:ED5E2131D942E1C14249A30192654AD6B48535CA7836C33B61ADCAF842CADFC1
          SHA-512:1408E8422FE1FB95A87BC33270AA7F513045229B35BBDB12E6DE8A9B200315CBB8A3007126A8ED41BB3BE5618F139B2FDA839D5A30118183F9E4BE19E008B65A
          Malicious:false
          Preview:Search for ROR..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVTkcrV2g/I9eMFEr+1FeCFErNqwPmif:Tz2gg9P1F4jm0
          MD5:C26B9D0CE5EA6FCFC72F9C6A1C6CC555
          SHA1:E6CE74625BE91C88564BC46960F8D289AFF50DA1
          SHA-256:6BFBF38963369154353C9C11C6AADBE694D674B958B74E7A24D82D80AAD20DBD
          SHA-512:7A0FAC80933E672E99230CB87B042B489355B11CCDB5F85B286B1272599CBD1B4FA88C7C898F4CED562312812D04DA564D312FC9E1AD8E128C974FB3E14F58CD
          Malicious:false
          Preview:Search for RSA..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):5.124816335558512
          Encrypted:false
          SSDEEP:6:TFad5EIeLR32g/pMsbBzV9Aejq6KGTHf5PYedYsgKEZGLRcYe:TAzJy2gPjSQ/dYYYzKEae
          MD5:9EBB4B5C98D682A6FF7CB88C82737EA8
          SHA1:311D639BAF7FD13ADCE90359F4C227C65FFE58D5
          SHA-256:DE2E0B0A72C77E11AA89F9F015DE9F855457DDFD55FEAEB6450A80F8BD2A4172
          SHA-512:A818B70734C1C4A1E38D30D5DE8AD2566EE8ADC42B5F3BE442FE2AFC117A8E92C0EFA920AAE89E5D25F8A5DED0EE6B0540F935C21BAF8FB314CDEF49DADF6F5E
          Malicious:false
          Preview:Search for RPM..//If #6 &lt;&gt; "A"..if (strcmp(#6,"A")!= 0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "2"..if (strcmp(#3,"1")!=0){...return;..}..print( fmt("%2.1f",double(#5))); ..print ("%");..trend(double( #5 ));..//If #5 &lt; 0..if (double(#5) < 0){...print("Ast");...return;..}..print("Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):58
          Entropy (8bit):4.671877762033242
          Encrypted:false
          SSDEEP:3:5NFD6b4Sl3vGHFxiGTMFK:TFMBlwPCFK
          MD5:BEA259EDFC463A9EC43FBDC4E207ED2E
          SHA1:C1601AC8E182A9D4551F27B8BCE4CB0F63976837
          SHA-256:91532963896577B118F6F6BC8B1F0C7219F0339FB79D0B6E06017C63480F7F76
          SHA-512:ADBB482FA9220796C8EF06E364B6C101D664D9299412C22C670F4D28EDECD4FFB6D61AEE1FEDFB79B2418173CC5337920672D8B229B3A23B39004A72B8D1A0C7
          Malicious:false
          Preview:Search for VTG..print( #6," knt");..trend( double(#6) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGAVk1FmFErUd6lqAD6mFEra6lqABk1FmFErzzIlqALsi3FErpKyGBk/y:TPDkPuIlQ3lbkPZEl3SKyGeq
          MD5:627D3AEF5A8A52B7DCF30426B8083B8E
          SHA1:083449D0C619F9E22C87F12EFC276BDFF7D5566C
          SHA-256:7308972A4068637EF8AA827922C38FCBB41B71B31E7A1CAB71571F5BD1C0732E
          SHA-512:F4677E0AAF838613B94717EFDE2920209C9B1FBE9A45EE072F45E83A829F1270445324FDCBFA318612B600AD83D616D88C0F80DCA64E7077BDDFAC8B44161727
          Malicious:false
          Preview:Search for NSR..if( strcmp(#8, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#8, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#8, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#8, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGFsFErvIlqFfsF1AFErYhlqFHR3FErpKyGBk/y:TPcrIlQU7qlQxSKyGeq
          MD5:1099F9D77704C38755C4E0E9257561CC
          SHA1:E3A5EC8B5A09666EEAA6F5E3FEB7677CD8A3C6AB
          SHA-256:0F33ABE013C74A3136164DA66CEC2BEF7285AD88165AE5E2615FA90FDBD63272
          SHA-512:0469708CD802E0A1784E7DA7E1A77CF4E8B91A2E2F1E11F07D2CF7949C2C2B4AEA55D6C3369BF790E73479C5CF263B87D1E27F89918D1EC6926460246D02046A
          Malicious:false
          Preview:Search for NSR..if( strcmp(#9, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#9, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#9, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.77613097283397
          Encrypted:false
          SSDEEP:3:5NFD6b4v9HfZHFxiGdM5yn:TFMuf5PsIn
          MD5:F5068C709E83311C9DD93AAFF147BD09
          SHA1:37A17F759519906131602B0C72804BC66CA3F8F4
          SHA-256:57C71F0DD2C4CFF99FF66FDB578BE6E4FD1835647D7A453C29FE2E079E724AF3
          SHA-512:A12EC7243EF4E5BE9EA8819070ACC8AB46ABD57E9B3E3561A16F9D5E8CAC5EA6B3D4FF0C5756935C409FE553E995E7C41D32ADCADB19478762BACF047BA9060A
          Malicious:false
          Preview:Search for VTG..print( #8," km/h");..trend( double(#8) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.958034016114698
          Encrypted:false
          SSDEEP:6:TFWJ0LR32g/p3FKEbIOFErWq6KVFrSj4FKEZAFErWq6KVFrSjkWV4iP0B:TJ2glFKEbLSVLFKEwSVlW2E0B
          MD5:46A9AE915CD2B1027977A2F11036B524
          SHA1:D4199CF94EC0CC502A99DFBCC3BBD0A0DA4CD65D
          SHA-256:00DC2C6834C7DE23CD0FAB276748A2F3903C961BD4E8FDC293BB995B8F0E26E8
          SHA-512:49167AFFE268C59D4C4D0A2AD54B2F48B227606CFACA15D62331ACA5D31C0CA54C6ABF7B35D91BB1723EF47AA54D0E0FF0B9D4F6D840689BEBD99375D4F3A412
          Malicious:false
          Preview:Search for VBW..if (strcmp(#7,"A") !=0){...print( "Data invalid");...return;..}..if (double(#5) >=0 ){.. print( fmt("%2.1f",double(#5))) ;.. print(" knt Fwd");..}..if (double(#5) < 0 ){.. print( fmt("%2.1f",double(#5))) ;.. print(" knt Ast");..}..trend(double(#5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):58
          Entropy (8bit):4.671877762033242
          Encrypted:false
          SSDEEP:3:5NFD6b4Sl3vGHFxiGTMFK:TFMBlwPCFK
          MD5:BEA259EDFC463A9EC43FBDC4E207ED2E
          SHA1:C1601AC8E182A9D4551F27B8BCE4CB0F63976837
          SHA-256:91532963896577B118F6F6BC8B1F0C7219F0339FB79D0B6E06017C63480F7F76
          SHA-512:ADBB482FA9220796C8EF06E364B6C101D664D9299412C22C670F4D28EDECD4FFB6D61AEE1FEDFB79B2418173CC5337920672D8B229B3A23B39004A72B8D1A0C7
          Malicious:false
          Preview:Search for VTG..print( #6," knt");..trend( double(#6) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFWJ0LR32g/p3FCF8mFErWq6CXMrSj2rFCFjOFErWq6CXMrSjviP8K:TJ2glFiUUFKEURER
          MD5:5A1D625F892928ECBD91AEA70C898980
          SHA1:F8740C0E494EC1DB4C7D3CA270CF5530CB3D86EA
          SHA-256:AAF34D34210DA91821AD182645B146C6209B88F5E4A056BAE3830A210D4F8EC4
          SHA-512:4A3048B94FE8D7E7592430B2256263509582EAD85DB3E0DD4522A929B2C3B3EC2160D43B47F796119EC890B1277164FA8EA0FC9AB80DA417BE7F6081B37D9904
          Malicious:false
          Preview:Search for VBW..if (strcmp(#7,"A") !=0){...print( "Data invalid");...return;..}..if (double(#6) >=0 ){.. print( fmt("%2.1f",double(#6))) ;.. print(" knt SB");..}..if (double(#6) < 0 ){.. print( fmt("%2.1f",double(#6))) ;.. print(" knt PS");..}..trend(double(#6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.7261033495736084
          Encrypted:false
          SSDEEP:3:5NFDmB6RK6O3vGHBloGTMMf:TFoZwP8K
          MD5:73F8A302CC3C78B4261A50EEF951C167
          SHA1:FD6EEAC1F239C10B59DE6DED07CE080C43EB0DE9
          SHA-256:2688E08E0294A745DA91E029C564D67DC4CD21776CA4834EF3C637C2764CBEDE
          SHA-512:094459E956BC92567F100902FCD687AFB233530B4C97C09DD873AD9F7002E4AD8F8306C58510BA669707A7B87EDAA4620BBAE9EF7F758035422799E849B3FFE3
          Malicious:false
          Preview:Search for VHW..print(#6," knt");..trend(double(#6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGfF1FmFErUd6lqLmFEra6lqjF1FmFErzzIlqE3FErpKyGBk/y:TPyPuIlq3l6PZElpSKyGeq
          MD5:D45BF2B23FC219CFE1E53490B14C1B57
          SHA1:91D9CAED7E5A60870C2C82EDD7A7056C895A7D6A
          SHA-256:2EA166883665B1B41FA0473935DC5FFCD67A3D0AFD0F0A74B7CF389FFDB7FC06
          SHA-512:A63E95AD266321DF8CFF811F927B7BD55151085783D87ECF2C40483B30D54A4DF8A21A145EA9D5C06DAFDB3AFA1D8A71DB8DC63A9409EFFCB75E5A958872659C
          Malicious:false
          Preview:Search for NSR..if( strcmp(#6, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#6, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#6, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#6, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.936378661347794
          Encrypted:false
          SSDEEP:6:TFQLR32g/p3Fe6FOFErWq6e8rSj4FeUFErWq6e8rSjkWV4iPgK:Ty2glFHFEPF9RW2EN
          MD5:C10509CFFD8B49DF4E1692D33936FFBD
          SHA1:3F76CB5AED22423D637568F4C20620C8C0F41357
          SHA-256:1165850372C4BF50F5A3133EE7A6E02DF660728987E7C39E8B61BEB5A80B5D9D
          SHA-512:72388FA50648D6D8AA0C21C8612157CCC36AF5BDC0D7AE79B03731520C24886329A91CAE7B31B262B63EA846F94F3EE7270D87505097E974343A7B7376BE4B33
          Malicious:false
          Preview:Search for VBW..if (strcmp(#4,"A") !=0){...print( "Data invalid");...return;..}..if (double(#2) >=0 ){.. print( fmt("%2.1f",double(#2))) ;.. print(" knt Fwd");..}..if (double(#2) < 0 ){.. print( fmt("%2.1f",double(#2))) ;.. print(" knt Ast");..}..trend(double(#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):335
          Entropy (8bit):4.848546118228948
          Encrypted:false
          SSDEEP:6:TFJPDGNZF1BmFErQBeyglqNZFvsFErvyglqNZFsFEr1JlqE3FErpKyGBk/y:TPUxIeJlYLTJlYHlpSKyGeq
          MD5:F0082F8B93998C20DFAE09D908FEEACC
          SHA1:4D667ED0366AC156C853852CAD0E8CFD8E8A56C8
          SHA-256:E065EEB1841342576E9310B55E6748A4DEE302BCEBB4EB12D7D7F43A5E843D8A
          SHA-512:E097BE83C46A5525941A9DF3206F1112FEA6F0CCD63D7E8DC3CFDB5CAAD8A4BAAC1017002E54A4BD2992ECA93701F153A9C4A8DAC7C43A91D948E865444B7B1D
          Malicious:false
          Preview:Search for NSR..if( strcmp(#12, "W") == 0 ){.. print("WATER REFERENCE");.. return;..}..if( strcmp(#12, "E") == 0 ){.. print("NON WATER REFECENCE");.. return;..}..if( strcmp(#12, "M") == 0 ){.. print("MANUAL");.. return;..}..if( strcmp(#6, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGLLHoFErvIlqLLHo1AFErYhlqLLHd3FErpKyGBk/y:TPu/IlCCqlC9SKyGeq
          MD5:303D0D2F4C32C22534533881243D5267
          SHA1:A13171CC51C9350A9164A04BB81DB05561C4BDC9
          SHA-256:CCC23DE69153FDAF2E8E624193C3273ED32C1735B2B05C698518024B9C022A3F
          SHA-512:593BDD59B7286C1A41E036FA9C63A19BBAD74DCA76C920DEA271C318A5F3F8027E06051C8A17F87C3DD281A22D4B70E2E59D581BDE5F51F173191C911CD4DD4E
          Malicious:false
          Preview:Search for NSR..if( strcmp(#7, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#7, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#7, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFQLR32g/p3FM6FErWq6MeOrSj2rFMg4FErWq6MeOrSjviPyMy:Ty2glF/7WFh27fEi
          MD5:43D922357AA1E841BAFFE7EAC7C3B85B
          SHA1:3492AF3DB18683C09F0593DC55B5173478E5511F
          SHA-256:2706E6405583564C001DE50314807E030FE92F9397661CA24A1273F826096913
          SHA-512:D486102B6F4C56D298DF511344968AC44512DF7C33B53F20D354F7C71FC23AEE75A72F9032D30C4686D5356FABDC842594458493029227F532E3A97AC7321A59
          Malicious:false
          Preview:Search for VBW..if (strcmp(#4,"A") !=0){...print( "Data invalid");...return;..}..if (double(#3) >=0 ){.. print( fmt("%2.1f",double(#3))) ;.. print(" knt SB");..}..if (double(#3) < 0 ){.. print( fmt("%2.1f",double(#3))) ;.. print(" knt PS");..}..trend(double(#3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLKfovn:TFGyn
          MD5:DCD024731D315ACF2429111647974FD3
          SHA1:EDB4FAE8971B8305B21B3F6C52FC009E2E40CE8E
          SHA-256:6930C0F5CEDF590B8B11A78DDD1F13BA5F73907F674C19302A3C92428CB36F4E
          SHA-512:205E4C1AE87AEE661E35FA0C83DA8DF864C5B81B0A35AAE5EE7D463D14FA44DC0E4ECF1E081D4ED1245C77F7B1F035580FC808DA8B97877429B650C5AEB77776
          Malicious:false
          Preview:Search for DOR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlKfovn:TFLZ0yn
          MD5:153BE4B716EF953E78A1A2FB9E68A2BF
          SHA1:444815C287BA6A4CBA6A4051100720AB3A511742
          SHA-256:ECDBE6942C3D434A9FC62DCA2E2EDBF39367C9E4FAEBBF5540C615BC131E15E8
          SHA-512:7D999C101700C0E518A2BBADFC5AF004B8AEEFC76F7EEE4BA4D41A6CB7AA953A31A9F4CCB0251A8F63AF29DF5C88C709FFED7EE9830403CE9316ECFBB170C303
          Malicious:false
          Preview:Search for FIR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRKfovn:TFfc0yn
          MD5:6291E0C418465725AA8DC0596F72D89D
          SHA1:3C25D40E1469C1D09A5447F336A6708FF1A3F3D6
          SHA-256:4DDEC872E951445E2C3F4A6AC01DECDC065717BB52B31BAEFDBA28B1E497BEC3
          SHA-512:92E709D888AAE0DFB747CBBF77FC3E8F90672EBDE40522590C5BA6D2B8079C9DF806228AF59AB5659A75315576E6F759AB072F0ED47B5ECCF5BA3F678D686060
          Malicious:false
          Preview:Search for WAT..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.806183542158471
          Encrypted:false
          SSDEEP:6:TFkQFErjjsGFEr53shFErhKms1FErpmsjFEr6BwHW:T6/svsSsimszi2
          MD5:32A1DC8B3652E59ADD74501D5A8B64A5
          SHA1:91A0DE499177B94B410B3EECF47B05FE9274F2A0
          SHA-256:05F653DBCF9ED799116AED812386656207D7941AD30FB453248A27CC7DF30FEA
          SHA-512:961CA9FFB5DBA87661BBE6B94CD5BD0EB77A3C39015D025AD93D6E9CDADC3C23905BAAA70C0CE021ED15D055ED7640477F093D77FA0AE716ED9BE8BA233B1A1B
          Malicious:false
          Preview:Search for HTC..if (strcmp(#5,"M")==0){.. print( "Manual");..}..if (strcmp(#5,"S")==0){.. print( "Stand-Alone");..}..if (strcmp(#5,"H")==0){.. print( "Heading");..}..if (strcmp(#5,"T")==0){.. print( "Track");..}..if (strcmp(#5,"R")==0){.. print( "Rudder");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.806183542158471
          Encrypted:false
          SSDEEP:6:TFtMsQFErjjsGFEr53shFErhKms1FErpmsjFEr6BwHW:TT/svsSsimszi2
          MD5:2AB5032736D63DAB0B66B76D0A16E8CB
          SHA1:8CC8734D81A410A45B2980D5EDCBCE2A67C809B8
          SHA-256:EB57C7FCF5C6B65246203EEED07EFD504945D8E82A7755614943F283FA9C3896
          SHA-512:C60F5DCE92723A6BA593E3D62029740274404D4EEC695E3BC93F044E8423F6E4EE431578F455DDCE4952589488841ADAE37A95B27F2654869A06A1FE17CE4B8D
          Malicious:false
          Preview:Search for HTD..if (strcmp(#5,"M")==0){.. print( "Manual");..}..if (strcmp(#5,"S")==0){.. print( "Stand-Alone");..}..if (strcmp(#5,"H")==0){.. print( "Heading");..}..if (strcmp(#5,"T")==0){.. print( "Track");..}..if (strcmp(#5,"R")==0){.. print( "Rudder");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDiLPJK2fyn:TFyJxfyn
          MD5:BEEC164D879B76B8CEF36CF65E5BD193
          SHA1:31147658B8AABF30E8116B4A75D88C4135E1A733
          SHA-256:89A2A2D05574C50E23C202297EF8F324C67CE3D797E1A85DEA66FAA1BF0BA16C
          SHA-512:1452122D38BB9D21A696D513CE1D01125DFB31A1B96098C0C84C89F68F74AA74A3E65D7813172F9C60EBB08922FC86E9B70D6C090A0AA461FEF4D5F74B9BB851
          Malicious:false
          Preview:Search for ALC..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDnLPJK2fyn:TF77Jxfyn
          MD5:8E1B99A19EFCD62F7EB311B674E77503
          SHA1:EF31D30BB09E3D5C59655FD12C8BA30B57E7C16F
          SHA-256:8C275429A39FA842B1011EF688D1A9CF64D1B176B57A5BD2F30273E3C2AC1780
          SHA-512:4236CDAA60778D18B833774A0E56F3C9880A3C0D6BD32B502F9CBDF587CF0117C6DAD12B990025E629A560FE0F7118F4C0FFDBBAC111FAD00494B40E02D4FDB5
          Malicious:false
          Preview:Search for ALF..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDqPXMlPJK2fyn:TFeXgJxfyn
          MD5:311CF8DF24955815B91CD1393F535F79
          SHA1:931F4E48C02352D819E96762301180AEA5DEABCE
          SHA-256:6FC07E0BCE5A643DE730468BBEE08A4786D4AA4FFCEE8AF6BEFF553A878FE03D
          SHA-512:BCAD90CE973F2D4C2D22A82B01CC8120D1F28113E696796512411D09613211A2443B2634DFADA668E07538F32E3594965FFD06653DF42CDEEE4DCD50C1AF0A48
          Malicious:false
          Preview:Search for VDM..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDqcPJK2fyn:TF9Jxfyn
          MD5:3DA47AE3CC1B63DBB0E5F9350F8784BF
          SHA1:76416146643BB0CF86AEFC8B16E2B4E54587DBCB
          SHA-256:6DC4CF4218FB43B8AB9A84D0B76AAA04BB46B5F543269D4E82FDC9DCF70DC935
          SHA-512:7B3C2AEFFC0E1565C0B2AE29CA376A87A59A907065F14B9BA7A8F5722D00459A4FA99277BE4F063D0F2500732745EBA849A13D3F1220980E4E0C00E5144DFAD3
          Malicious:false
          Preview:Search for VDO..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDiLIK:TFY
          MD5:9CB7C3DF11E3C07CE792D7CD9698DB1B
          SHA1:AF6267D61A07420348B8EAA6F6485A6F83FA7B43
          SHA-256:8470802DD4CC21ABA24100A2EBF6BB7C5E5EF1F3A86AA29E5FD440B7DFD52D60
          SHA-512:49E9E762B70CDC137DA4BA16E28CBF2459A55C3DA5AC8CA50C1F3891D5193B99028F620477EF1CC3BFF3780ED54666DCE7FCB86E11CC8BC1A5183B632EA23AFD
          Malicious:false
          Preview:Search for ALC..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLIK:TF7R
          MD5:EB99A7F3B37578E7415C92E9BD17EBDA
          SHA1:8E3FCD81FAE1A843490899E10FA2D5B046FD22EA
          SHA-256:F08D607372A08BACE7F7F8109F50E2DE63C57642120249DD10554F9841CB453A
          SHA-512:7EB56E2F8CCF7D5BFFE779AD0C7B9F3C81C37F4CC40BA4FEFD736AE54298F334CB69305F790ADF70C233B9D62A0026279B89B4BE1D87C0D3F856E173C4E42E6D
          Malicious:false
          Preview:Search for ALF..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlIK:TFeXK
          MD5:106F6AF804F815B13FC1EDDCC7105C18
          SHA1:5BB342EBD10D48BECCECFAE3E9C784F73E930DA6
          SHA-256:9BFEC9C5321E993AA678460F6C390A2C327A76251DB924A62F91D2DD41407D51
          SHA-512:4083EF6198B813D263E6CDE4D9B0198FF595AEDCCAA5449B745EC4DAEBAFA78F3A49903C435D313CC1C878A7F498CC807A2BD1FEF0F731E1001F28EC58B84663
          Malicious:false
          Preview:Search for VDM..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcIK:TFf
          MD5:3F300171A267CC1409DC682342E080C9
          SHA1:5FB50EFF809496DA8E79183E7EF88D0F5A65D0A5
          SHA-256:9BAA017CD4543ECD5703D5897E949DD4E0F2BB6534A965A4D0D66F78A1002EC3
          SHA-512:8C9E69B069820D213EEFCDBC07388D39C07103BD38E89B5B5E914BB6B03D25A42282D5A701C7E0270AABCDA0ED47DD9B676251AB0525665696EEC9A40C27C394
          Malicious:false
          Preview:Search for VDO..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):594
          Entropy (8bit):4.8312639140233395
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloAYRlo5YRGtqmYIf8Bloololc6GZ:Z925tjyVRy2RNI0Byoylc6i
          MD5:FA41B00F6D1F8D9286BC72DEF5F2F28B
          SHA1:AA8C347E287153E8C1D8EE47766B1FA01EBE2A88
          SHA-256:84EE43A66BC7208FB0A06C535407CC492E141E57B325C869F899F5089FE152B7
          SHA-512:1DC69BD27BD88C023A197320B4243A5D1E4EE6EB590D5A92AA740E55D31C8060CFA7B50A05ECC35A669A583EFB8003BFDE36C78BAE944D2F4AA25040A95546D9
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){...print( #8," knt");...trend(double( #8));.. return;..}..if (strcmp(#13,"D")==0){...print( #8," knt");...trend(double( #8));.. return;..}..print( "!");...print( #8," knt");...trend(double( #8));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLEK:TF79
          MD5:9976EE3E20704DD69F942997FE05C470
          SHA1:723E846ADADA1CC7B0D24FE96CE970ABAB562D34
          SHA-256:8F1335A61072B2C426A4990EE39B1AFDCD56875D980A1270ADC898BC84260301
          SHA-512:7EFE1E24ADF7BDE14068E56731F9097F2D82620BCCD54DACB5728D4E808126DAC2CD1F9200BE11C59B36748DD7473740D2A2E95657E363A26EF12A2EE1E0691E
          Malicious:false
          Preview:Search for ALF..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDWkov4NQKn:TFXogdn
          MD5:DFA5A32BCB6104366D1A27C0BA4615C5
          SHA1:B1EC35FDEF5B30D7F8DF219D3FAA0E6CA67972A6
          SHA-256:908B5C6BACD5839305A8ED38504286F3860D53A334DC670F8C2D7532CBF5B542
          SHA-512:2B85AAB7558EEF5E89D93EFC3A9A7C164BB2DBBCC7CB7CB66C36C5594BDC3E417874E2379023FB8F3FDC87AC1ABB9F3A33FBC8DCC32959915CA5FF159CBF39D8
          Malicious:false
          Preview:Search for GGA..print(#15);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDf2plNWfy:TFbYqy
          MD5:8C1A5A9E9F42D951B259BE2A08DC8A74
          SHA1:CDF3E78ACFA578CA6FB5DC61818B70B3B18DC992
          SHA-256:ED5D5931D4509F2FFD5497FE5EF5FB560C9D6B4F12F863F22AE2DA4BCD263D0B
          SHA-512:9C4EA0C975179D17A3D8293678C996E92FF46ECBD28B07DEFD124DE6FB99FEFCD73A89B493769F2121FD95BD30BAB0E76278B6904100EDE80E1659FB20FC4BB1
          Malicious:false
          Preview:Search for GNS..print(#13);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLEK:TFh
          MD5:7AEE1F49FF9CD9CFC3813827D5686343
          SHA1:75330E372345037B5B280E029775D0B8E333C0D9
          SHA-256:F9E3D63084FFDF00A2B73944D3F3169FBD050E344E5258E7E0A8DC9C2F510F20
          SHA-512:5947F7325551EC499BF4524F7697AE9AC348005B80EC013DC30899D4B77F3277A9FD20EAF2F194ADBB58972A3C4557E15CD336DEBF79E1843761F6EE97994FBB
          Malicious:false
          Preview:Search for DOR..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKRPMf:TFZgK
          MD5:E95C5993F098E886BD6C41E43A693F2A
          SHA1:4AA814B4535550101591080384619CBF80B00B8B
          SHA-256:ED1FAD38356DC3708A188DD03BE161B4137A59F92ABBEDEC40BE8E9B6E1E6F1F
          SHA-512:9E45CF10AC8DFE603BDD90DDA30F41C935EF1F24CCA5A70B81EC37BEEB07471BF7CF01AA9FA581666546DC0070C17852181D915BDA868914F93BB9CD7EA0805A
          Malicious:false
          Preview:Search for HBT..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):160
          Entropy (8bit):4.916832398504472
          Encrypted:false
          SSDEEP:3:5NFDiX9KdY7vFuLrVJJSiYgaQ9KwVKXMLrVWEBiYg3sLrX9fLy:TFpYryrVqi3oKrVWEBi33qrBe
          MD5:9383C4474395637C879AC50FDFB42160
          SHA1:D184B1A8926F6764190D97D01644998907ABB5ED
          SHA-256:2470E62B8A609575A955AC7D404C265AAC73830A2BA469CB611DC4D280790683
          SHA-512:1DA884932ED46FB6E25A7F597F1BA00547CDC8FD388962809ABEC991407C43B3001B9812CB827F3B9723B461D15560B099D75D3BAD7AE73690CE5AE50E8D6DD6
          Malicious:false
          Preview:Search for HRM..if (strcmp(#6,"A")==0) {.. print( "Data Valid");..}..else if (strcmp(#6,"V")==0){.. print( "Data Invalid");..}..else {.. print( "Unknown");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):283
          Entropy (8bit):4.926593677728287
          Encrypted:false
          SSDEEP:6:TFQSkXLR32g/p3FOmhIOFErWq6Om8rSj2rFOmjAFErWq6Om8rSjviPwmK:Tml2glFO9EW/FOKuWcEwT
          MD5:85BC2149799AFA3B2385521B3552C44D
          SHA1:DBB19E140D682C1614EF65B220D1A6327DD538FB
          SHA-256:5C66CC331BE38A2C573AF61BA0F5CF87EC8270385B2E315A3191AE2218608B68
          SHA-512:56773DF5B4E4DE02F0E3A34C7A06AE26550D76F8A99EFC31376057ECB1636394783D1718AA1C8B146B721BFE9F8E0CF64EE8C0C1AF1BFBF1FE08FB2519A75BD5
          Malicious:false
          Preview:Search for VBW..if (strcmp(#11,"A") !=0){...print( "Data invalid");...return;..}..if (double(#10) >=0 ){.. print( fmt("%2.1f",double(#10))) ;.. print(" knt SB");..}..if (double(#10) < 0 ){.. print( fmt("%2.1f",double(#10))) ;.. print(" knt PS");..}..trend(double(#10));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFYSLR32g/p3Fs64FErWq6s8rSj2rFsUFErWq6s8rSjviPSK:Tuu2glFsVkEFsCkBESK
          MD5:5A81B150E09A0F9F93F3A4DEB6DB92BD
          SHA1:175364DA54063685E292EDC910723E41649C1835
          SHA-256:5EF8606077590791B4FCDDC4A302D8D9810B9BD23DED5EACA67A8A8F733DD19B
          SHA-512:1C06CCD27BF59FC69E19535F01EFC78B4C53DC54121389CC481AA033E275AB8AEC36AB367699BD08CDAF991DABCCC7E00D195D34FD1AE6A774C858ADAF6D9CCE
          Malicious:false
          Preview:Search for VBW..if (strcmp(#9,"A") !=0){...print( "Data invalid");...return;..}..if (double(#8) >=0 ){.. print( fmt("%2.1f",double(#8))) ;.. print(" knt SB");..}..if (double(#8) < 0 ){.. print( fmt("%2.1f",double(#8))) ;.. print(" knt PS");..}..trend(double(#8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6IK:TFO
          MD5:9982D3476BA740B1E79F71D354F83DFE
          SHA1:BF7D761844B4847B22B2ADCADC5A20C4FB5A1A9B
          SHA-256:68DDA0C77DB9134AAA8FA8BCDB40EA52A755E422A272AAFE39970A037BA81899
          SHA-512:A50896B7AAAD236198639C0E39DF3D3C18BD93C9D09E4F56B254471375EDDCE14050472CBB5B6768643E30AD068CDAD5B05B380EB0C93E9C3444E988760CD122
          Malicious:false
          Preview:Search for ALA..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.796709424428437
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TOElilsAPlsKeEUhlsj4K7qgE
          MD5:0B0334E19C27A5058CA4696C373603C5
          SHA1:E7B44214BE0A1C4433A9D50C98129FFAF45D1429
          SHA-256:A8BF5E7C2B9D9CB4330F8CFF3DA6DE3135A6E5417CCFDAE8CE9D9EFFB6588A37
          SHA-512:C39C7B055990B9167FE62CD862FBDBA447FF25B158D346CE043EF601D8426EA17F4651FC9F2A14676A6A7A7B7B31EF68332A0BE53C2390C08D26EEA126578398
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.804764599629013
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TmkEClilsAPlsKeEUhlsj4K7qgE
          MD5:642F5F9D503FC5674D17A60D6C8F4F16
          SHA1:368EB9DCD9BAEE628A3378DF165D2240ACB98C06
          SHA-256:19CE82AB8217AA350FD6F0FF6E3898EBBB1CF1FFD5BAF3F1D04207C64CD5D5CF
          SHA-512:EA94407BF291FAD2201E97DB62595903CDA6E22075B47B8057D40E888C430D57A6A90F8A5319D7779EE9D838CB31175B36DDEE586B3BBE9EADBF571AD5802C2E
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.811134026380605
          Encrypted:false
          SSDEEP:6:TFUJLlqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TKlilsAPlsKeEUhlsj4K7qgE
          MD5:E7781A5164D29E882DAF04DC07B819BF
          SHA1:3478FC4D51CC905411A0D8D4A4586012800A5277
          SHA-256:199BED5349856E4E8CFBA77D53C88B6BF37DEAF8610FAF5D606E99AC9BC03C94
          SHA-512:ABABA3C51B51E940CF01A04C33A39AC6F637856D5C06C7AB4BC75E8709DF37159FF2FD203743072B9B0A3334654F0546879C04CE1D663EB0DB3C172C84F80A4A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.80307885118003
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TOElZClsAPlsKeEUhlsj4K7qgE
          MD5:9A49C5363B3F147F5CA5D397FB2AAA1C
          SHA1:DDE4105F41E0F57BC8FC6CCC8621B1342F9EAED9
          SHA-256:5F95A7F3FB33CDC23D9E4F5A296CED223BD5CE65A7F0E4D92820777874E6ACE4
          SHA-512:4CA5C341EC0C440E7E1630069C50B6163C7FD99F769E919EEBC69A8EDF27531116692F879DDBA982B2F2C2A4F6FC4CA1920AAC2001D0AFE52A4C6581673E1FE1
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.811134026380605
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TmkEClZClsAPlsKeEUhlsj4K7qgE
          MD5:0C622F398B7FC462BC237C62E7A47E6D
          SHA1:998126C4F016459F3641852B5F37FDCCF647A8F2
          SHA-256:AFF6FA8ACB4E7815654ACB4031BEC577489691C4FE4C8CF46A1371E5EB6D3B29
          SHA-512:B7B1B57C6911631BD3D5E757B82D82ECC6518F7C25B718684826E108F7BA4080F4D72B2EA302564FB30C5CF661D1CE0EF3F4E87B86782680EBBFBD3F34AEB415
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.817503453132198
          Encrypted:false
          SSDEEP:6:TFUJLlqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TKlZClsAPlsKeEUhlsj4K7qgE
          MD5:B6EF21247E9C10DFA344FE31BA228D1B
          SHA1:45B28D423810630D17A299AE08A9F2A007FD3E7D
          SHA-256:4FA769729185DA8D6385EC4726ECA7F5007854C3FD80A7C899630E24D108A960
          SHA-512:F75351F6A8E37E26F84F6BDAF48FF211D8D85D574270A115B75302BB27A626F1226DE1639B3C1473DFC5660EEA33C808BC9CC2089CC0C20D4161CF9E1739B61A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLFMf:TFtK
          MD5:062FEB1C571A7332BC08415042F275FB
          SHA1:AF8AD4EAD43F3205E04D47823821DED5DC29990E
          SHA-256:83204B37378371B4D8633E1CECB21C4BD73C435650D98BA76FF3B962D041B01C
          SHA-512:CAACB1B55E1DB8C8A250BF8C8613B3C31A46B3F68E7E59AF17B772EEC54019149BF8B7B0B2E04B1CC9714291C4DE1A381CAE31FBB7497F626A26823380413B9F
          Malicious:false
          Preview:Search for DOR..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6PMf:TFUK
          MD5:E014B68BD9F230E5F1CD664E6F4AE950
          SHA1:479BCC713D8443B949BB1C264ECED98EBED95226
          SHA-256:9BF47AF00D28043F2F9F30C1A6DAA5DEF77F87F694A828FEB3D05F8DE0734064
          SHA-512:FF167C4369BFC390B759321ADDB6EC7B0B96BCE506EE4EFC8D5246FD724AD0A9FE8454F48FEB4EA7E59AC900425D61C6DD204A054921901A25EE2B12794F8217
          Malicious:false
          Preview:Search for ALA..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlIK:TFLZj
          MD5:4FA0E6DBD6C83092E9E357AA1655AC38
          SHA1:AC4E86F67BB423A486ED92DEBDA1C427F9585AA9
          SHA-256:09C86C919F4F2218117710D555280EB0B4E920581F57A3A6273E3D069764A70E
          SHA-512:8FE18F3FC4135E494162D3EEB8840C6981709067A14E9AAE3B23AEB7E51E5B7BCA34DC3312C7CB2AB216EBF519CF42A43977E5DADEF7B2361E97AEFBA30F2C6F
          Malicious:false
          Preview:Search for FIR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRIK:TFfcj
          MD5:153B2B9B02A864DD4D86C6B54E52F5B7
          SHA1:DF94C228F0FF99E05F005B1D24648E29A7B41BA2
          SHA-256:7E92C542E0DD6396EDDB300578F50B64387B03C79BC0AE0F164379D759610C0F
          SHA-512:E8BE14938F26FBA21F4B86E4F7F2ED9D0B01F57D6DECE5503DEE407123293B1C1DAAC1519507D815EA47D3751A970F49425837FBB7DE09950B203DEAC7850155
          Malicious:false
          Preview:Search for WAT..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.905169351698
          Encrypted:false
          SSDEEP:6:TFCwxXlqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TUwlk2ggGjVW/dYLZ+
          MD5:0B6EB7BF695BBD06EFF4874EEE463599
          SHA1:78847119463DFB851E9394F01437759FBF1E9B97
          SHA-256:BB923AB81B9A95FD216613DD31E15A6C897EB3B3FB0C7C4555610603EDCCD97A
          SHA-512:891FA578BC6851F2CFE81CE8F8DB7718D3336802ED91E8A088630CBDC0D928743B11165599C77B72EA4576119C8E509953251DB37D9D73F40F4642AA07F50BFD
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.905169351698
          Encrypted:false
          SSDEEP:6:TFCjClqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TUjClk2ggGjVW/dYLZ+
          MD5:A8E34DFBBCBC0348865279E4E1A659FC
          SHA1:9D01AA19F6D08540E6AA23D6010949604B9B58DF
          SHA-256:64C4D4C12800B710AD1AF52A215DD759A257490914E85284C8E2F6FC301CFF3A
          SHA-512:E85E1BAE64DD0F0902F32DCC21A93A6F8015FCC2F263A250BFA122F4EBCC242D684EEF67175464A3952022FC7B99CDE56F4A255B295EBCF83111F2A977966E6F
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.90974697117534
          Encrypted:false
          SSDEEP:6:TFC5lqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TU5lk2ggGjVW/dYLZ+
          MD5:507B4F77086B1C66594A122C2FA9A615
          SHA1:A02B83F06CB01673A464482FA59B8DD7FEDD18AE
          SHA-256:B413A64A383DF97962916B8D87CA28F6830BD9F029BB9DA6802CE6D709B00A0B
          SHA-512:D85E57E73F730579C9493F5A6FD9ED0C371918A2C0D419783288EA49BB31EDD359ECEE806316BDFC650037F3DEB2D958EB72EFC43966613C0548CFDE72F98200
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6FMf:TFeK
          MD5:DAF2BEB67F4121F51E890D9979FA2179
          SHA1:CD4BBA849DE3ECD537D3DF560F422BCEF08F3329
          SHA-256:55F389FD218D71EFF9BAAF45EB771411C55424E4E9322E8B5F783BE5763C9992
          SHA-512:A410D094141B292822955C6B4E4190778726EC9CC540F17808F2FB3F4038E2FBB85F1C359A438771FB4184F7DC9AAFB57DCB8498D7BE360D672CC64B82A89974
          Malicious:false
          Preview:Search for ALA..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNRMeyn:TF75Rfyn
          MD5:965237C363756B49BC20C985615F4425
          SHA1:35DA31333BF9F73F40892F97455E0FA334D03341
          SHA-256:E843FF7436F5F339928D0C2F1ACC667EEF8426A6A89AB9516BBB77098FAAA819
          SHA-512:48F00AD7615B940CDA2E82B42A1B16583129B4072A6F41FA721BF16160F4F1B07F16DAE1B4443BF4715F968C76E9C2FD344D81A68A6DE052C98EF166FFC9380A
          Malicious:false
          Preview:Search for ALF..print(#14);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLKfovn:TFvyyn
          MD5:A6D29947E6D1CCD1A80D7B498DEC57BD
          SHA1:6A4732289382E2D3ECCC008C9143382DE9DA07B0
          SHA-256:EB697D5E0B8899152BFB76B218ED20B7CE82E2FC4B3B726568FA1CB12B57522A
          SHA-512:73B7131ACC17CDE1413F4F31DC501BA03A38F0BA7574976FE67F4559FDE6BB1783D468E29769E9A8BCA8460F48DFFF0D6F3CEE877B3A518A2B1D4A670E3BAFB6
          Malicious:false
          Preview:Search for ALR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDLNVM3v:TFlVAv
          MD5:8F3A409F27D0EBDB6121DE1190AA2A0A
          SHA1:2F9031550CF93A7E318899919C018840E178EC39
          SHA-256:10054F2F458EC23770F85238708D0137AFA553E5B1853935559C12A27D81768F
          SHA-512:62EA7E67E5A7B0405730396E2EB757A752660AC65B5B3BB604CE01091059A6C49402AA05D4971F794A6A17D427DE95CA278AAD4E94AC96F716D07FDF96613448
          Malicious:false
          Preview:Search for DOR..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFD3QMlNVM3v:TFLZTVAv
          MD5:852A3F8597B0F63B366EDAD6C1296769
          SHA1:E3F0BFF85CECD26D4A661DF26278B676E5065721
          SHA-256:D4627E9E620E008682365F9D797BE677C70B3588D28F30ADD2341657D96D68A3
          SHA-512:3C862EF24BD158B3478C38963D8297C0925C2006F47E76499B267E34BABB66BEAF470CC783358354C0F22ACE886AAEE13677D00F5C51B0B01FE83229A73E13F8
          Malicious:false
          Preview:Search for FIR..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRNVM3v:TFfcTVAv
          MD5:1091EAD6B82E5FD88C464BBD61CF97C4
          SHA1:222DE85BC4C17C273B19605376198918743FFFEF
          SHA-256:4EEBE6BF27E678E4CCBC42F4FDA2051BEB2E461AC98AF469B765C7A3C8F617B6
          SHA-512:ED33010C64A2152C865FA8867689F3917D5C3869C6F1E76628CAFCBBFAA17FE2ED034AC35D8CC25259830C2262C88A0C871FFE8E30C709D04DC3B06BC0565D5A
          Malicious:false
          Preview:Search for WAT..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):164
          Entropy (8bit):4.705744211903336
          Encrypted:false
          SSDEEP:3:5NFDFDmX9OJea4FFErQJF6+3Af6X9OJ0YdFFEro4HM3vg+3AGXKd9fy:TFrtIFErQJF6lF0YHFEroXYGMy
          MD5:592C445498BE858292019E01B1EFEEB5
          SHA1:026393944C0C5698E62C2B454D7DDFF778DB5DE5
          SHA-256:CFA5E8FDFC58649D89E252ABDABE22404F86D5B5C05C01B1B9070F12B3A94F11
          SHA-512:7BEB281F511CF59539B0B856FA56D628068A83E6774C69076240EEA3CE837215B24181F152BFF87E131D9E00C823FD238AC1751AF96F2403070363DAA48070C2
          Malicious:false
          Preview:Search for TRC..if (strcmp(#2,"1") == 0){.. print( "BOW");.. return;..}..if (strcmp(#2,"2") == 0){.. print( "STERN");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):164
          Entropy (8bit):4.705744211903336
          Encrypted:false
          SSDEEP:3:5NFDvX9OJea4FFErQJF6+3Af6X9OJ0YdFFEro4HM3vg+3AGXKd9fy:TFqtIFErQJF6lF0YHFEroXYGMy
          MD5:2715FF2911BA3A29D21249D405C0E5DB
          SHA1:590F19DA5DBBB40241C612206FB99702C7E1939B
          SHA-256:BBF9BA7EEB2C08053285249143E42358FD08B009EE95B808ECA6D05DAAE356D6
          SHA-512:8F874F1C34286A399C11E9707591AE9A8C2254FDBB731E25320BE07365A99EABFE7A4ACF8DFB478E5FB94FBB6C09E47E60883B3851E35A57B2106F1FEB8F41B3
          Malicious:false
          Preview:Search for TRD..if (strcmp(#2,"1") == 0){.. print( "BOW");.. return;..}..if (strcmp(#2,"2") == 0){.. print( "STERN");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulOK:TFR
          MD5:7D94B9C5EA25EC1CB6C4862EC031EC88
          SHA1:98A56F51EEC86E6E3AF0E5FAC1415248B58F93B7
          SHA-256:6BFF98AFFF0A207E9EECD61BAFA34F34A613D16355B939C6FD28402F952929C1
          SHA-512:EF0620E31EB2BD9785704964180149200C1B1973F6BA8DA6254721CEBF1B89024BE6320A58AF777B93D5E4B87A7B6EBCDADD3AA62BCDBC8E607AA343A1AE2937
          Malicious:false
          Preview:Search for ACM..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6OK:TFN8
          MD5:FCE46D2B885C1E263E7D8E838956812E
          SHA1:4EBF47ADFEB4151CE0DA698C2A112B2AAD8B2812
          SHA-256:941809195BB7AF5D78937CB4FDB05EA0C4700A78F508A9639FF8456A800CBA01
          SHA-512:7B93C087551A23FE8DDAC0A170B45796FFA0684EACFC71159CFD92D2ECC1754A22BA65C4CDBC9365623B34B88C8A26B6F5A57B71403DC361FF047C9DB113B143
          Malicious:false
          Preview:Search for ACN..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.807867658033499
          Encrypted:false
          SSDEEP:6:TFJPDGN51FmFErUd6lqNnmFEra6lqNt1FmFErzzIlqNti3FErpKyGBk/y:TPU5PuIlYn3lYtPZElYtiSKyGeq
          MD5:B4A8BE95942B1B265F754B6476BF004C
          SHA1:35B5BFB03E9DBFB446A35280AE4882EC21FA1C1E
          SHA-256:3DC66CB6BA3EA3C4931860BD6BA09B6B3B2828F60E0C496AB4055A7059BCA289
          SHA-512:FA0CCE4F924B4A5AE4DB4C6D0D6EA8AD786A4CD5329BC03A0CF50D9395E196B77398ECC373D59C7A7A6B7A112841110510942CBE6DF3AA191A7A383395178860
          Malicious:false
          Preview:Search for NSR..if( strcmp(#13, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#13, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#13, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#13, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):239
          Entropy (8bit):4.729821516759323
          Encrypted:false
          SSDEEP:6:TFJPDGNv9OVFErvIlqNv9YF1AFErYhlqNv9d3FErpKyGBk/y:TPUv9OEIlYv9iqlYv9dSKyGeq
          MD5:280B6AF1185F7B8B63C0ECE4DC27DCC5
          SHA1:F751FCDFB4D18B805590A04C4CD895F40C0A6D14
          SHA-256:F5FB506983D2B5E2E429812CF07ACB541C0D106548AFE19DED29E907869D48C1
          SHA-512:8DDE452FE3E6F32F0077477B6556F4D2CE80E9612718A137764F0941EFA1F3F9A04A679038545E6C35E0B8B6ECDF37338310A3EA8CF53AD57E523B6944C19426
          Malicious:false
          Preview:Search for NSR..if( strcmp(#14, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#14, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#14, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):82
          Entropy (8bit):4.650073120857778
          Encrypted:false
          SSDEEP:3:5NFDUq6oREWbaIF/HijUWZhJFHXjUWfAfov:TFd2WbpF/HijUWZhJFHXjUWfdv
          MD5:E1C8B31DC814B8417E03327B267B78AB
          SHA1:1729AC087E35A8AD1B9A36D3A1313CBF8D0B6160
          SHA-256:D38DCFDBABA423DEC7FB95E044D72379B2DAC1755CEFFF729D80BD37FE9985B1
          SHA-512:344F64E6695143268D216C8467DBB690D84D9614EAA59C49107F3A3DFA122E73240F8F65168C70394C4CDCADC8C02BA5442371C00B668B6141AE5E784F041A9F
          Malicious:false
          Preview:Search for GEN..print(substr(#3,0,1), ":", substr(#3,2,3), ";", substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):79
          Entropy (8bit):4.667598710630501
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRH2XUWbaIHwQwUWZhJHfHYQwUWfAfov:TFfc+UWbpHwjUWZhJHfHYjUWfdv
          MD5:B31884CF90E9155D19E84B74595827C0
          SHA1:5ED62284A45E9D7242D369509CA25DC81018F29F
          SHA-256:0C58A0BB916EA381666F33839C4267EE8EC4B53FB3BCD8CB6497E44894F0204F
          SHA-512:49E90D1BB40D467F9923C27A19AC20D7FDEABF8C8957D11FBF03624F665073EFB0BF6E7F4DEAD5A6222D87697022D51A153CF4126CD2A31BD252D5B791720AAE
          Malicious:false
          Preview:Search for WAT..print( substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRKnfn:TFmVfn
          MD5:3B2BA0673BAB6674DE41AB3D2731903F
          SHA1:049A104E14502D3EAFC05224B7B535E0343890AB
          SHA-256:C23E826935E7ECB53AE95445F788305C50DE77C746D279A1C521D40759E85875
          SHA-512:EC89B57BF325726DF0C50307031B132D052BBD976B2DDF4132B1F638AD6AFEC056E441620D3C7A7CA71459665BA895015B62AF331E0EB594F98180E8117E152C
          Malicious:false
          Preview:Search for VLW..print(#6, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLROLrnfn:TFmtrnfn
          MD5:C1C3E489BDFCB595936BEE9F23E07AB9
          SHA1:4943D56DFF09417E7556F046B21D0DE5502C4233
          SHA-256:AD6AAE11EDDF445AF7D2BC6374D739BC5201920F22DBE7605E2A90CED19CF27F
          SHA-512:DDA5098873EB253144154B00F6BE89AA634174EF4186480C2E7427A082B729328ACFA11F5FCAE81988E1683A14436272B430C946864AECC740CBDD69A776250B
          Malicious:false
          Preview:Search for VLW..print(#2, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDz4JMey:TFHsfy
          MD5:BC9416D7232024B3BD181FA9850DE070
          SHA1:C4480DF352811AD113342F14C1A2DE8ED5B7F5DA
          SHA-256:226627ACB824A4598BA288EDE98E7BA3CE8D829BDE59467CF0406F1A790ABAA0
          SHA-512:6907865D6B415D42D77B5DC3A4B30F5D28B0A3C143D4B29727BEA87F49084A899C34AF140DD5750A88984FE060820DF198B337AB1D9CB2FD02415A2673DB778F
          Malicious:false
          Preview:Search for XDR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):4.499227541723358
          Encrypted:false
          SSDEEP:3:5NFDmkplPJLCGZ3v:TFTJLFtv
          MD5:30169015BD79435EFB5472B352C1A643
          SHA1:AD5961DEE451BDE3711DE8EECC2F5D5B4BEC4018
          SHA-256:8697BEA61BDB37FB7187D2F630A84B7015028D652F01AA4AC4E628EACE730DF8
          SHA-512:E3D117FE0E106A7126C73F7FE5833FC3E2FDAE5066682B9C614C0D4B95C95D354C651A976428A2D99638B8A1C8703709A1FC587521846D90D9A9D8DD7FAFF914
          Malicious:false
          Preview:Search for ZDA..print(#3," ",#4," ",#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1255
          Entropy (8bit):4.823382565856403
          Encrypted:false
          SSDEEP:24:cS2hUEUEUFy3UEUEUFYUEUEUF+pUEUEUFsUEUEUFQ+UEUEU/HhIoS6F:criEUEUFykEUEUFDEUEUF5EUEUFnEUEL
          MD5:1E2B0B5C9B045D48E0157B70A99520CE
          SHA1:A56B170163D810456FE82F8AEC6E058130136F30
          SHA-256:3C724229D3EA1AC5E5368BF402C793C216A87B3C1B5729E7DA4A285BB0EE99EF
          SHA-512:BAAAD857AE11B3C598F4548E034770995662DF78AD1938502F875B4406DFCA071D1A8CB4F2AF6F3254B8B9C5C24EDC5409C5B2F19C0682358AC590A545C2E7B8
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"1")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "2" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"2")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "3" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"3")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "4" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"4")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "5" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"5")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!" );..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):184
          Entropy (8bit):4.97019263177749
          Encrypted:false
          SSDEEP:3:5NFDdGvM6X9LJE3HFFErQireJ+3A01XK8afX9lGYfPGef4vuLRoRETt7wQwUT3lo:TFZ4RJYlFErQWY2Y8UX9cy+AiurRwjU2
          MD5:0EFE37AC4B0C82A7546AE47F8AB7AEEB
          SHA1:931F675C695AE4F4B0605CFDA09166D2A2F652AB
          SHA-256:B4E864C01FC97691D3265B620016CE8F7496FB8192915FDA5143D95360F07E5D
          SHA-512:B2859CD939F1BF3ABCC85D1840993FC0845D2E311E315ADE5C546F41DACAD1BB6E770650C6238EED3EEC058576144CD738577DF21ED4599EC60CD01EA1900AF6
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #6 1:2 ":" #6 3:2 ":" #6 5:2..print(substr(#6,0,1),":",substr(#6,2,3),":",substr(#6,4,5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1252
          Entropy (8bit):4.842878802818841
          Encrypted:false
          SSDEEP:24:Zu2suUEUEUFSUEUEUFqUEUEUF6UEUEUFyUEUEUFQ+UEUEUcHhaw6Z:JiEUEUF5EUEUFhEUEUFxEUEUFZEUEUFc
          MD5:BFEADA53FE747FCADD84927E46E9E775
          SHA1:964F8E04A96EBB4C9FDFEA5E6A94482EFC552408
          SHA-256:7136AA01BB2349F5289836E792741789AE71BAD599DDE9F3971AB49A79B0C7A4
          SHA-512:86610580D35636DF840A2976B10355707B540BBE89727AE468125B66AB4EDBABC7147746B821E0414FA62964ADE12F989617A7C3E199C312F9BE456C3CF544EB
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"A")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "D" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"D")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "P" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"P")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "R" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"R")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "F" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"F")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!" );..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):662
          Entropy (8bit):4.846183953911797
          Encrypted:false
          SSDEEP:12:Tp392ggljjjlolUCjUCjUFlowUCjUCjUFGtqHUCjUCjU0f8Bloololc6GZ:Z925tjylUEUEUFywUEUEUFtUEUEU00B5
          MD5:367334065DF2A8F7557657163167B21D
          SHA1:4147CBF561874E173E39B2EF6C69EDFA2C7F3958
          SHA-256:81FB55F1857E7877CBDB722267D9DC4C995E5DE3730C71FD498634BB2E50BB92
          SHA-512:311F3991E319712C120E5F901DDF89DF9A4DBD514D6B2686CECC467B28D9715D4DA751DE54F8E6E90C2AC00BA5A6B4255A4E955879AB906D40313252826E2200
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..if (strcmp(#13,"D")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!");..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):117
          Entropy (8bit):4.652894470837179
          Encrypted:false
          SSDEEP:3:5NFDmksclFL/lG49dG2LRH2XUXmMJwQwUXVfHYQwUXW:TFRFL/c4u2+UlwjUlfHYjUG
          MD5:2BCCACE120AD02E4628F72D6B54D3204
          SHA1:4D9DE5A38555F5A558799CBBDA0A0FF25D7A3A2A
          SHA-256:5F19B6A38311C0D1F3B21A3E2F83A3D859D5C14DB50068437BE43752EE3972FD
          SHA-512:E3D5C70C47E8C505954DFDD8C5CFD5B50157B2A44125E349A2FB0F061795A008E6C1862F09AC27AFE5789474ACC03F3A13CE4A54DF5F3BA08CD53427712A0AD0
          Malicious:false
          Preview:Search for ZDA..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLPMf:TFv7K
          MD5:E12A2F5C0E84A3C995FAEAE318CA5462
          SHA1:EB1A76F1519E803BFF8552AE0A43F0154EBF9FF1
          SHA-256:F0F1B7D2132B715C5725F4DC21CB986CD769B8FC2325FFE67059F8EA1F71D169
          SHA-512:6E25ED61F33D9845D119F78AD4FC62F4DBE56B09AF57863DA5823B792A6639ED2F0D638314A2BCBA8FD011A60D6AD6E9D129A72A785720F615FB824C1545C142
          Malicious:false
          Preview:Search for ALR..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDWkov4EK:TFXo0
          MD5:9144A00B8E011154BABD1F2F5F3E2CC7
          SHA1:BB00596141A253C22DAC710FE386FF7F64592BAB
          SHA-256:2F2E531D5B52600A1233F75B00671479F7E60D98D9D578D253FF07C71541F47F
          SHA-512:95A37F16933EE6C8B911453DE5573E22AFB3D549645CC45B0705458648539605F3A89C67F97B11F78F8F156F3F89C8426B45B4E8CF020C1EBCFB0D4B77D1CDF9
          Malicious:false
          Preview:Search for GGA..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551767
          Encrypted:false
          SSDEEP:3:5NFDf2plEK:TFb8
          MD5:1F6CD70375F87FF3A350C92AE34D4FF0
          SHA1:43E2817BE54621E72E39252B8049741E290A9AC8
          SHA-256:D4817EFCF6988298DC58C4DBCA8E8649958412E71AEA2186F96C1D101BD9DD3C
          SHA-512:8B7ABAC7C2182415531F186EDC970A3752B8FEDB89E56E146702D8AC0AAECEE13EF9CA588E797FC1882DC3840A99900CF5C3F4E0D1D95672F6AE5B601AD7CF37
          Malicious:false
          Preview:Search for GNS..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDVNXK0/ZHBloFDy:TFbNRPYW
          MD5:93EB038726D9AC6C83B85412B6256DEB
          SHA1:D51BED1D681BF12BB1F6C99FB3C101EB963A00A8
          SHA-256:630DB7A0D42E4223DF7ED891B830766E93EFCEDFCCE61363A64E9949D5B056C1
          SHA-512:E86FDB8C52B34E876BF13F9D4C2A95D7B05C98BB16CFC06BAA7501990D4196CD28FADD8126657A2DCE2FEDA7474CA6F7C8B89593E71513095A63686C145A0904
          Malicious:false
          Preview:Search for MWD..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):5.045714737535048
          Encrypted:false
          SSDEEP:3:5NFDjUZNWX9KdFyLR32g/pUAf6X9P5HM2+AGXKsfZHBloFifn:TFI4LR32g/p3q5HqlPYif
          MD5:AFF3559A01746013C2191B049B2366B8
          SHA1:488684B9A290DCEFADDF1F5E7B9A35E5B2AD4C2A
          SHA-256:A7DEA449A7F1831B57AFFCD868B042C77DF67CD980746ADFD9904EC595BED66C
          SHA-512:E5D6DAD586447EFBE7CEE7A9E6AF4C02DB46206A2A2D7A7BDC4EE0AFC3719AB7DC12B4722E0E6D4C2F926E04A1C47A465F602DF54C856E510F0D6B0E7AEF09CB
          Malicious:false
          Preview:Search for MWV..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..if (strcmp(#3,"R") !=0){...return;..}..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDVNXKsfZHBloFifn:TFbVPYif
          MD5:7BA784A590B079A52A765FF68F8B86F5
          SHA1:93FE08FFE5C5835DBBE8399C4FAF6F7EFB2CCFC7
          SHA-256:F573F57FA6FEC193C21899BC44B3BDA9CC399874535E1B595DC034716C93E001
          SHA-512:F0491621750438C19FB2C21B852CD7F8BF2E41948F9CA64EBB2C863B40A30CD0C2E3162E36F540E629D0088E3BB5B32036F8A1A40E1092C85FA071137535E47A
          Malicious:false
          Preview:Search for MWD..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):5.045714737535048
          Encrypted:false
          SSDEEP:3:5NFDjUZNWX9KdFyLR32g/pUAf6X9P/Ht1+AGXKsfZHBloFifn:TFI4LR32g/p3q/HtclPYif
          MD5:ED7D3B7DA5B88EDF32992DAD50BBFFFB
          SHA1:2D7D393E234CBE13725BF681D28EB4879AEC1CE9
          SHA-256:A8DC01D6D35DEE41723DD228174A899CCE6DDFEF466BA80999A9D957DF7E59FC
          SHA-512:2F09B997EB5B5E5E42C80AFED8641F77335019B40AFCA7CD268C37F246AD72C1FF5351D1886C498AD7BBC9E07828B2CF395FF50223DB3B5F6E806A2085F0EEE7
          Malicious:false
          Preview:Search for MWV..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..if (strcmp(#3,"T") !=0){...return;..}..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):56
          Entropy (8bit):4.712993984287172
          Encrypted:false
          SSDEEP:3:5NFDVNXKSOlgvGHBloFWv:TFbXOfPYo
          MD5:8A2C9B039CDBFFE8AD9AB28EA521E3EC
          SHA1:F26BB27B63231742AD316AD9E7C3C98438FF2288
          SHA-256:AC61D0772173E6853DEE105BA02B6B42C91EB5A9A7A3BCC99A677F71ADB7C9FD
          SHA-512:5DB3CC9604B9586F81081A56C803EA4F10E211D6A1D33888BEABAEC438D4BD43A012E6B72796D579BE48079C63C21B92B9D8F7F7137136A94E358922A5EEFE1F
          Malicious:false
          Preview:Search for MWD..print( #6,"knt");..trend(double( #6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):436
          Entropy (8bit):4.773758506889757
          Encrypted:false
          SSDEEP:6:TF/VE1lFErV2g/Ilq5HzlFQGz5PYLs+FErh6lsQFErQlsHFErj6lsGFErvT6G7:T5Vv2gglukGJYLsGlsolsLls9mG7
          MD5:9F2F2434AAD7E8DF20D6B23A6486C01F
          SHA1:ADDD6F5DA83DA0021DCB93FA96E1EE5227301F64
          SHA-256:3874E202B057A89954250C4F8A29B48A6C83E2A2D200758162D09899E8DD7FB0
          SHA-512:5709B0B0C6B63DF25D67A0B63A6005237892AF569F0ECE3689A113D1593550D0FCB4B315AEDFF5DC465CDF0EA4F2A31F08125E6B43FCC70E7794FE57C51673A8
          Malicious:false
          Preview:Search for MWV....if (strcmp(#6,"A")!=0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"R")!=0){.. return;..}..print( #4);..trend(double( #4));..if (strcmp(#5,"K")==0){.. print( "Km/h");.. return;..}..if (strcmp(#5,"M")==0){.. print( "m/s");.. return;..}..if (strcmp(#5,"N")==0){.. print( "knt");.. return;..}..if (strcmp(#5,"S")==0){.. print("miles/h");.. return;..}..print( "Unknown unit");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):436
          Entropy (8bit):4.773758506889757
          Encrypted:false
          SSDEEP:6:TF/VE1lFErV2g/Ilq/HzlFQGz5PYLs+FErh6lsQFErQlsHFErj6lsGFErvT6G7:T5Vv2gglaEGJYLsGlsolsLls9mG7
          MD5:4A500E7EAD5CC1B71D81F02771140D4E
          SHA1:A10DECD19848CA94FC2443AEC3FE23F1FB5FFE17
          SHA-256:A4538F68FF01A2689271F79C472CEDCB07B24F8B7BCD9F67C3744BF095891D54
          SHA-512:EF247AFEF9E6E5189F0C0E6F52CC7E36131397335FA27052D46E8A24BCF53DE023FA500B4855EF6F4300A13D4596A59FD3F3680657C49B9DE3CCAC381B2A8EC8
          Malicious:false
          Preview:Search for MWV....if (strcmp(#6,"A")!=0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"T")!=0){.. return;..}..print( #4);..trend(double( #4));..if (strcmp(#5,"K")==0){.. print( "Km/h");.. return;..}..if (strcmp(#5,"M")==0){.. print( "m/s");.. return;..}..if (strcmp(#5,"N")==0){.. print( "knt");.. return;..}..if (strcmp(#5,"S")==0){.. print("miles/h");.. return;..}..print( "Unknown unit");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):56
          Entropy (8bit):4.811382823650154
          Encrypted:false
          SSDEEP:3:5NFDVNXKnseCQHBloFcfn:TFb1SPYcf
          MD5:54D1E096C3D62A6CA3A191BCD140B7B8
          SHA1:158AA8B50D5EA7339890FB39DA6D31B11A573195
          SHA-256:48CD274A46DAA8EDE920889CD4FD04BE1789855BA1534DE433958A908D329211
          SHA-512:698D1D11801C825ECED2899E9E8F86595BE0ED3C08AD380642F8BBC253009054F65E2C39A7E4F55A831776D6F50A00EAA61C7EA661D248178F15E0C55751E841
          Malicious:false
          Preview:Search for MWD..print( #8,"m/s");..trend(double( #8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):123
          Entropy (8bit):5.054077384236297
          Encrypted:false
          SSDEEP:3:5NFD1dWX9PqCeLR32g/pUAGXKOJfKpovRQHBlgNpMfn:TFJs3eLR32g/pYvfKpoJSPIif
          MD5:11515FB148E97C90EEAF15E57471B18E
          SHA1:3369BC47ED0ABF75B6ECCDD3693F61275A7EAB39
          SHA-256:838BC3047172309AFCA3E8848E7F6A1384070DB849DE7349B400BEEBD8E94A43
          SHA-512:D6F6E7D178C281C3548EF75CE0C08934061BF96932D7D2F56E96943A83044F86B1CA1D8AC44F5B5B07268A9E3D7534F64DA629363BE13EC985DB24B9DA0AF160
          Malicious:false
          Preview:Search for ROT..if (strcmp(#3,"A")!= 0){...print( "Data invalid");...return;..}..print(#2,"./min");..trend(double (#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6OK:TFN8
          MD5:FCE46D2B885C1E263E7D8E838956812E
          SHA1:4EBF47ADFEB4151CE0DA698C2A112B2AAD8B2812
          SHA-256:941809195BB7AF5D78937CB4FDB05EA0C4700A78F508A9639FF8456A800CBA01
          SHA-512:7B93C087551A23FE8DDAC0A170B45796FFA0684EACFC71159CFD92D2ECC1754A22BA65C4CDBC9365623B34B88C8A26B6F5A57B71403DC361FF047C9DB113B143
          Malicious:false
          Preview:Search for ACN..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.820695328857707
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMslFEraSHK:TPT2gglmGjVXv/dYJI5/0K
          MD5:00D0C1AA23541567F7D27A9C4694C5C0
          SHA1:62E0CC2DB021F8A854659287FB36A857F43B2F4D
          SHA-256:83E355D7F49A7FEFB1892709E44285151C7E7A022EA1CF2B94096ECE4A7AD7DA
          SHA-512:390351EBD5A01A1F6F34B57E4F8C3A89589721A671B539D95E143A544CF16F3BCB16F44AE8A67224127E200C691F739DC236BB4CC9B6898AF141490E3FE6044D
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}.....print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulOK:TFR
          MD5:7D94B9C5EA25EC1CB6C4862EC031EC88
          SHA1:98A56F51EEC86E6E3AF0E5FAC1415248B58F93B7
          SHA-256:6BFF98AFFF0A207E9EECD61BAFA34F34A613D16355B939C6FD28402F952929C1
          SHA-512:EF0620E31EB2BD9785704964180149200C1B1973F6BA8DA6254721CEBF1B89024BE6320A58AF777B93D5E4B87A7B6EBCDADD3AA62BCDBC8E607AA343A1AE2937
          Malicious:false
          Preview:Search for ACM..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6JMey:TFdWfy
          MD5:1B4B2960306A45519E5E11852A869284
          SHA1:7AF8439C3D682570B1C4B79533A9B08CA2564046
          SHA-256:449EF17819C0B49A9532442197BE043D66D26CAE169F59FFBC4DCCAA5BFA55B1
          SHA-512:45D8D52B0A22D81E62C06558F8A80B76FD2560B3DB6B14D2669D3BFB7C4C8495737E53B4F483B93DE0CD3092F2FC0B1278CD82DF5C2A5E96131E89842F03E1B3
          Malicious:false
          Preview:Search for GEN..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPDwkcrV2g/I94MFEr+1F4CFErNPUwPmW:TXwX2gg9461F47VmW
          MD5:EC6177B83046D6EFB48F26746C652833
          SHA1:F2ACFF365D80311FD2B528B65822498995D5676E
          SHA-256:890EF13CC022F2BC4A42EFD68FA8CEF8DFEB242F9AEDF19629E44D78FBB868B9
          SHA-512:A50FF6CC380C8FDD5AC3916924F85A93EF909CD0907B9434B8B255F71CAC297B62F79BD86C5BEEA5979359FDF1873C75045DC1D172140B103B19D87EFFD3E536
          Malicious:false
          Preview:Search for ROR..if (strcmp(#5,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#4) > 0){.. print( "SB ");..}..if (double(#4) < 0){.. print( "PS ");..}..print( #4 ,".");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):32
          Entropy (8bit):4.601409765557392
          Encrypted:false
          SSDEEP:3:5NFDpLEJn3v:TFAnf
          MD5:F115DCEEF4C93CF8C4FB2663F6B84764
          SHA1:08512C44C65FEB5947D0D6D25D31700DCBB974D7
          SHA-256:52579E2F55AB543493A379A5C9DCF7E62276F8864634FC681F61BCDFB601679E
          SHA-512:0A331B3570985D7AED499B064E74B546C530776C4786321B4DC3362B51C4FDEB9A41807EA2C53CE626E7A700F510611DC34A288CA4D2264F095B0AF957693FDB
          Malicious:false
          Preview:Search for DTM..print(#8,"m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6PMf:TFUK
          MD5:E014B68BD9F230E5F1CD664E6F4AE950
          SHA1:479BCC713D8443B949BB1C264ECED98EBED95226
          SHA-256:9BF47AF00D28043F2F9F30C1A6DAA5DEF77F87F694A828FEB3D05F8DE0734064
          SHA-512:FF167C4369BFC390B759321ADDB6EC7B0B96BCE506EE4EFC8D5246FD724AD0A9FE8454F48FEB4EA7E59AC900425D61C6DD204A054921901A25EE2B12794F8217
          Malicious:false
          Preview:Search for ALA..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NXJZv:TFXogXJR
          MD5:ADC7822BCB7DA6F130C18FE1D9457049
          SHA1:C4CE03E919564C5D36C1F5974CD2268C7C4DACFF
          SHA-256:6DF23B4D69BF9ED2131D96B5135EA8029D037C925F61988779AD7DE617EDBDD6
          SHA-512:3B978498329EC86AB9E9855A8998F152371F52F0048AC3D073C177E5D5D5BD804212324FB95BE0A0ADCD9D36BF29C4D54F9746556B206CA03E0B2E2A12BC7614
          Malicious:false
          Preview:Search for GGA..print(#12, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRIz8sfn:TFmIsfn
          MD5:3039D1981F5D297111DB324EAAF6B756
          SHA1:E7479A5AA7884C57DAC04D19E43FAE161F924193
          SHA-256:208DA161B12CDA3506A5419418A748630A041ACD450CE2C652012BFC0292291D
          SHA-512:26469E329C0FEC98AF0A64E0E7457DD977846FEA3DCFAA2CCDA00D95FE3F44754198B6FCD92DC30E24D6509BADAF702DC5ACB33D1969D0E936E31C01A8D46D38
          Malicious:false
          Preview:Search for VLW..print(#4, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDVNXKsfZHBloFifn:TFbVPYif
          MD5:7BA784A590B079A52A765FF68F8B86F5
          SHA1:93FE08FFE5C5835DBBE8399C4FAF6F7EFB2CCFC7
          SHA-256:F573F57FA6FEC193C21899BC44B3BDA9CC399874535E1B595DC034716C93E001
          SHA-512:F0491621750438C19FB2C21B852CD7F8BF2E41948F9CA64EBB2C863B40A30CD0C2E3162E36F540E629D0088E3BB5B32036F8A1A40E1092C85FA071137535E47A
          Malicious:false
          Preview:Search for MWD..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.323161167392161
          Encrypted:false
          SSDEEP:3:5NFD1W6Rv:TFJN
          MD5:7D76484CB9ABD382DF414D9C975AAE4A
          SHA1:FD8EC1320FDD32B45BC18517DF680CD72A44BBA6
          SHA-256:BFEF15238F02F2C6A9B41E5AD2D7D58824E622B2D1B4BBFFC341C7EC6FC44ACA
          SHA-512:64CD59CA52E363912B82D4B290E0E9D9688F1641FDCD35405F8F51F7819DFDD630BCC752F74619A804C7FDF53F36515C88EA5AFC0A350526F6EB3618395F22C8
          Malicious:false
          Preview:Search for ROR..print( #6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDWkov4NQKn:TFXogdn
          MD5:DFA5A32BCB6104366D1A27C0BA4615C5
          SHA1:B1EC35FDEF5B30D7F8DF219D3FAA0E6CA67972A6
          SHA-256:908B5C6BACD5839305A8ED38504286F3860D53A334DC670F8C2D7532CBF5B542
          SHA-512:2B85AAB7558EEF5E89D93EFC3A9A7C164BB2DBBCC7CB7CB66C36C5594BDC3E417874E2379023FB8F3FDC87AC1ABB9F3A33FBC8DCC32959915CA5FF159CBF39D8
          Malicious:false
          Preview:Search for GGA..print(#15);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.8278508748908555
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TPT2gglAXGjVXu50YJIhqhGu
          MD5:995E52AB6AD1D2A7C3793A3E6F513BFA
          SHA1:8B962E4C6F76E2D164299FD30A6E5B7F6042CD8A
          SHA-256:4959AE465C17A30F1A8DF980DDD64690DF07BF83BE96B4E59B464E5CA48986A8
          SHA-512:7C999E6C6A271C55229F7042AC9A6E88F014759EA465F5D24ADA9E33877395B9E0132A766E6A94916F5545BC1C3EAC6F345D33D1616C5C8A42E8ED1C21A48698
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.888405210518773
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TPT2gglmGjVXv/dYJIhdNu
          MD5:2B6A2E4669C06EC60E2DFA766585A701
          SHA1:14960057EB91A9DC6093BB1A8CA47D320230BD15
          SHA-256:F95961BBBEB9530FC34B559885AA08770986014D1D17292B9F4D9B2EB324F441
          SHA-512:139A2B6CECEE0DE8859F85867E4AB8FD962CF82C6C0B0D9DF0D1C50A6B72A3B435480454B49D0D854F9F8FC28AC372C5346EF13DC98A75113A35637B52BD5554
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGAVk1FmFErUd6lqAD6mFEra6lqABk1FmFErzzIlqALsi3FErpKyGBk/y:TPDkPuIlQ3lbkPZEl3SKyGeq
          MD5:627D3AEF5A8A52B7DCF30426B8083B8E
          SHA1:083449D0C619F9E22C87F12EFC276BDFF7D5566C
          SHA-256:7308972A4068637EF8AA827922C38FCBB41B71B31E7A1CAB71571F5BD1C0732E
          SHA-512:F4677E0AAF838613B94717EFDE2920209C9B1FBE9A45EE072F45E83A829F1270445324FDCBFA318612B600AD83D616D88C0F80DCA64E7077BDDFAC8B44161727
          Malicious:false
          Preview:Search for NSR..if( strcmp(#8, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#8, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#8, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#8, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.905169351698
          Encrypted:false
          SSDEEP:6:TFCwxXlqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TUwlk2ggGjVW/dYLZ+
          MD5:0B6EB7BF695BBD06EFF4874EEE463599
          SHA1:78847119463DFB851E9394F01437759FBF1E9B97
          SHA-256:BB923AB81B9A95FD216613DD31E15A6C897EB3B3FB0C7C4555610603EDCCD97A
          SHA-512:891FA578BC6851F2CFE81CE8F8DB7718D3336802ED91E8A088630CBDC0D928743B11165599C77B72EA4576119C8E509953251DB37D9D73F40F4642AA07F50BFD
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.907508515861056
          Encrypted:false
          SSDEEP:6:TFCwxXls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TUwls8T2ggls2GjV0B650Yd4M+
          MD5:5AE61942177BC1E17E8CB148F706AB18
          SHA1:2B9B46E110EEFB0632B7D98871543008506A1036
          SHA-256:C3962CC40C125B15E64F6231A707319F9F898B60789FB86977C7A5E82C919C1E
          SHA-512:2581E512B6A680C106BBBE64FCB23902646467D0EDAD10D3BDA915CC83D473A7EBDD91432CA7D15C6423FF9D6B366BD1700C5EE04C58307914483B803F2B711D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFDy:TFQiPYW
          MD5:B3D38B9D6483A209DFEE908D7D21C6FD
          SHA1:9D48D47956B29C829D56A520CB4879F9C5168678
          SHA-256:90A07A943F0ACFBCA43BE1747C94C84F1A9E4479F4F397B013BBFEE11C2EF563
          SHA-512:8BE68DE74D1E0A170BFA96CD3F7C6D5F749C45D04BA46A6DC3B20A76C95632F1D8979638A09E74EE750229153FBAEFB48876F8031ADA73ECD4F5CF4714ECE71A
          Malicious:false
          Preview:Search for HRM..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGPnsFErvIlqPfk1AFErYhlqPHsi3FErpKyGBk/y:TPOIlJqlBiSKyGeq
          MD5:4E78BB7594763C54A3B66442930229A7
          SHA1:D06049A799E7117A8FFE20F4735E056208041AFF
          SHA-256:D71DC6C724AE232903F3ED16FF66007A8109F7C1CD23C4CE712997F3F1E132C1
          SHA-512:D766EC7A3BC645BF8EB616C15F3DEAD95574A82A2F664EDDD6A3A2918C1709DDC4ABED9D87EF0A9CFB3BFFB3C49571205759220BD1C8D926AFB8673016F224ED
          Malicious:false
          Preview:Search for NSR..if( strcmp(#3, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#3, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#3, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.835071091497352
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TOT2gglAXGjVXu50YJIhqhGu
          MD5:67005C1C0178201B347CE2E5C7898FE1
          SHA1:CC2E151F13347C5B5DBDFC330CAC9125B149634A
          SHA-256:E7BAE12903468E1B1155B7A5C5B300261EAD1AC4ADC2B5C06451E41AE99784D8
          SHA-512:653695A8C3D08A34AE323D459103FB81FAEACD9817B11688E3F3AA39A6190A7A3C08F3E6B9A18670E43720A3AEF683557A938E14A6710DD992AE498318ED5568
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.804764599629013
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TmkEClilsAPlsKeEUhlsj4K7qgE
          MD5:642F5F9D503FC5674D17A60D6C8F4F16
          SHA1:368EB9DCD9BAEE628A3378DF165D2240ACB98C06
          SHA-256:19CE82AB8217AA350FD6F0FF6E3898EBBB1CF1FFD5BAF3F1D04207C64CD5D5CF
          SHA-512:EA94407BF291FAD2201E97DB62595903CDA6E22075B47B8057D40E888C430D57A6A90F8A5319D7779EE9D838CB31175B36DDEE586B3BBE9EADBF571AD5802C2E
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):761
          Entropy (8bit):4.995326481306636
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloTUKpYrAeOUlolUKpYrAeOUGtqZUKpYrAe1jf8Bloololc6GZ:Z925tjyTUKUvbylUKUvbLUKUvF0Byoyk
          MD5:228C694325AB9DE579D0CDF03188493C
          SHA1:78BB3BFF585B4618441EC458E2F13A47FDCB537B
          SHA-256:931ABACD29450C3C7C82E57D3561CDD21F0F4762CC59D7E2216C52DBB307FC6B
          SHA-512:1D951B04137FBBF6BD6B98A0066D56FE6EF5DD23D667E69ED137429D8F321B917CE2F699DA95B86D07DC35BAE9F7CE3F1DE595DB44F54A8B870B2426F829B69F
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));...trend( double(#6) );.. return;..}..if (strcmp(#13,"D")==0){.. .print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));...trend( double(#6) );.. return;..}..print( "!");..print( #7," ",substr(#6,0,2),".",fmt("%5.3f",double(substr(#6,3,8))));..trend( double(#6) );..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.795187750352116
          Encrypted:false
          SSDEEP:6:TFysrJ9fJnzfIPz+WZIKrbW4I+W6IvIKrbW94DTc+XKrBWLy:TwsnfJrIPiWZIGW2W6GWG8zWLy
          MD5:A334DB2505872573F58D37594AFAEBDF
          SHA1:1C5BB66F46C72B0AEB16C4DB1ECB0176CDE6C4E6
          SHA-256:53FAA76C7D1F324F9E9FFC2E24A2948FE179C3F2537B639518D575B689A2A1D7
          SHA-512:90C4DAAD371F657399BC8207E6CC29EE45C6804BF8CF1118166BE0FE5C2D78F4E1925CB6BFFD143C55AC839AD4D65065A12C2235F638BE1A342E135FE53EDF58
          Malicious:false
          Preview:Search for ALC..print(#35, " ", #34, " ", #36, " ");..if (0 == strcmp(#5,"8"))..{.. if (0== strcmp(substr(#37,1,1),"*")).. {.. print(substr(#37,0,0));.. }.. if (0== strcmp(substr(#37,2,2),"*")).. {.. print(substr(#37,0,1));.. }..}..if (0 != strcmp(#5,"8"))..{.. print(#37);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.788075985119281
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9PS+to+3AGXKc31+CQHFL:TFaoEFcrV2g/Itge9vfqjCGfkCSPmW
          MD5:ED512594A6B1D055E41D4CFAC5FA8CAF
          SHA1:F326D38EDA978FCED24FE6CBC86E06403D9163D0
          SHA-256:2F0F977108A9734B7CCBDAEDD65CC7B8FBE9048404C9E0542C1AA8B4065426C3
          SHA-512:CC9255CAB2AC7838084175B678A8C78BAB755FCE04EF5FE7E3526BA7AAF57255915E8020E4F3E05C5E76CACB37BD06D7A7933AD4B79BC97269F33A880ADB268A
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"2") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRKnfn:TFmVfn
          MD5:3B2BA0673BAB6674DE41AB3D2731903F
          SHA1:049A104E14502D3EAFC05224B7B535E0343890AB
          SHA-256:C23E826935E7ECB53AE95445F788305C50DE77C746D279A1C521D40759E85875
          SHA-512:EC89B57BF325726DF0C50307031B132D052BBD976B2DDF4132B1F638AD6AFEC056E441620D3C7A7CA71459665BA895015B62AF331E0EB594F98180E8117E152C
          Malicious:false
          Preview:Search for VLW..print(#6, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773258119832358
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9Peco+3AGXKc31+CQHFxx:TFaoEFcrV2g/It2e9vfqeXGfkCSPmW
          MD5:12427EC22AC35F74D8BAB06D46C3B4A5
          SHA1:69B92FBEDBEEF6CA2179BB8BDB85CC0A081877FB
          SHA-256:3809C1D2ACA043DD79413D1025000C917FF0E677D6CA7BF2DC59C929CE402330
          SHA-512:CE9D9126C4C1403338FFB442BF400ACECFF5BD5392C215BCB0A6E92AAF1460F5FF65D079B7488A364AA294B585023C8199BDC497916FFC8482FB46FEE9C84C74
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"0") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):662
          Entropy (8bit):4.846183953911797
          Encrypted:false
          SSDEEP:12:Tp392ggljjjlolUCjUCjUFlowUCjUCjUFGtqHUCjUCjU0f8Bloololc6GZ:Z925tjylUEUEUFywUEUEUFtUEUEU00B5
          MD5:367334065DF2A8F7557657163167B21D
          SHA1:4147CBF561874E173E39B2EF6C69EDFA2C7F3958
          SHA-256:81FB55F1857E7877CBDB722267D9DC4C995E5DE3730C71FD498634BB2E50BB92
          SHA-512:311F3991E319712C120E5F901DDF89DF9A4DBD514D6B2686CECC467B28D9715D4DA751DE54F8E6E90C2AC00BA5A6B4255A4E955879AB906D40313252826E2200
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..if (strcmp(#13,"D")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!");..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6JMey:TFSfy
          MD5:B038662C5BB55C5264D07363EA7D704F
          SHA1:09E82DEEAC2AB2BAE4B98716B8BDA5C307CF5A39
          SHA-256:1F87F61EE2A1613EFF7F9E69CA37847B8BBB882BEEC5F76FE076613E4D35BD07
          SHA-512:3CEAA2A39688FC0A74A053F992CFE50CAE645B86325F72BEE26C4F179DE2D930E64C7B97BEDE1AD97B686FF2BB600799A9F9C41840132E82E8D126360FAB9A53
          Malicious:false
          Preview:Search for ALA..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):447
          Entropy (8bit):4.766661871794292
          Encrypted:false
          SSDEEP:6:TFBHxHFErebAIlvNMF1FIFErcr+lv25FErohwlvmsiHFErqqq4lvg5FErHgqglvj:TXRcIlvNMFPsr+lvZlv8UllvgcglvoGB
          MD5:89E0A61E88C29B92F0081CC035FF9157
          SHA1:757D2BA2F277A2FF685039241E059F351AC90AA9
          SHA-256:668DFB154D41F522DC930E28AF69B0CF596E56A584430CB182B85681C0C898BE
          SHA-512:035C117598F0F97013708683E6C8ED5BFE711C8F21C1F62AAA95E6A38604FCC9E0896C9574F49F6D4914CA9E71281221A462909C917C0C46F58EC92B2E6A7567
          Malicious:false
          Preview:Search for TRC..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFsy:TFQiPYsy
          MD5:658DABF5C8BACCB231D0589555F60A4A
          SHA1:E29F03A77E73112C591E092EB6E2667470E5C07F
          SHA-256:1DF09B4831F0082B4956E4B23181C9329F326078AE891A0B3BAA2FD270762174
          SHA-512:D2F80DF5E24CE19C96B005E06B77658C2EF12EE754AE5F99295A220B45F9DA726B76D7623007580980AB16CE55C29185F5EE87BCB479E354A3CA43A0CF5BC0BB
          Malicious:false
          Preview:Search for HRM..trend(double( #5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.7158358044900055
          Encrypted:false
          SSDEEP:6:TFmtfIPQ+1JLIKrbqI+fvIKrbaA4DTcTXKrM:TY1IPrHIGA4Ga38t
          MD5:22F0741BD27F78D768ACF0B401ADCDE8
          SHA1:A9DD8844301C33B89F55DE89747F407B3976B5C7
          SHA-256:253D89D17D8B6803744FE6BD6CC72B1F49471803ADE2FACC7DE8D34440A074B8
          SHA-512:C607E07395D79F2B2B20762971FF99C77BE6660C06BAAB7E496F4FB3B0AD66DDC6A1A62ACCF43D818853B1A37903A24A17BD53C120AEFC7C08C1952BFA762D33
          Malicious:false
          Preview:Search for ALC..print(#23, " ", #22, " ", #24, " ");..if (0 == strcmp(#5,"5"))..{.. if (0== strcmp(substr(#25,1,1),"*")).. {.. print(substr(#25,0,0));.. }.. if (0== strcmp(substr(#25,2,2),"*")).. {.. print(substr(#25,0,1));.. }..}..if (0 != strcmp(#5,"5"))..{.. print(#25);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):294
          Entropy (8bit):4.7880691031424485
          Encrypted:false
          SSDEEP:6:TFiQHMWFEr8JlgzNFErFceoIlgufOFErJlg7aFErDAIGBk/y:TMStlgz6JlguTlg7VAIGeq
          MD5:B708EA3E73CBF55FF166942B01052100
          SHA1:1DBE8982035D989E1E215D3E653CA84FE436C73B
          SHA-256:0714474B8A3A21A367D5E81AA714FE6C668DB8BF5883F29E3B8E077EFD7D4852
          SHA-512:E88567E971B1109BE1D7D1E589A8471FE43E2FBD73C18A02087CA7952A095E91AF815E2652AF51CFB9F290D8AD0658F1FE88BF4E0346F2A2FD072386C78739BD
          Malicious:false
          Preview:Search for DTM..if (strcmp(#9,"W84")==0){.. print( "WGS84");.. return;..}..if (strcmp(#9,"W72")==0){.. print( "WGS72");.. return;..}..if (strcmp(#9,"S85")==0){.. print( "SGS85");.. return;..}..if (strcmp(#9,"P90")==0){.. print( "PE90");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.735821149647001
          Encrypted:false
          SSDEEP:6:TF2JF02fIPc+cUIKrbcbbpI+cZOIKrbcbg4DTc/XKrLW:T0JKOIPfbIGYRUGYX81
          MD5:DE149D0B789E7AA0DCAD82FEEB602683
          SHA1:78885B7A60F066101665BCCCE6473BF4A9BA7D48
          SHA-256:5282A47096F5EE76B05FFD54FA2E82307F4188E73A98B1EC828BEB1DC883FD41
          SHA-512:976B828952F84FCBB97B18B2B856D2492F933D5C2E9BC7364F10CECB7337C8DAEBF358DC7C8ECE892EF04A50A5D66582A10DC62FF353293AD56B55DAF2111AC6
          Malicious:false
          Preview:Search for ALC..print(#7, " ", #6, " ", #8, " ");..if (0 == strcmp(#5,"1"))..{.. if (0== strcmp(substr(#9,1,1),"*")).. {.. print(substr(#9,0,0));.. }.. if (0== strcmp(substr(#9,2,2),"*")).. {.. print(substr(#9,0,1));.. }..}..if (0 != strcmp(#5,"1"))..{.. print(#9);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.7040511288482865
          Encrypted:false
          SSDEEP:3:5NFDpLYG3vRQHFxiFWv:TF+mJSPmo
          MD5:A88ADBA379C4C840CF16D7F88FEBF317
          SHA1:388496120BFF200E40A4D62613BDA72D583E8C94
          SHA-256:86E247ECB9D4469BF17208FD80647E0B5E7475D6833110458E17379A7C4ABC13
          SHA-512:E85E030A4E28F65CEF08F88AE524B697ABA657799C77C1FBC7144132674AACB4A4CAC222D8DE8E3561EDC6763A67E63A36F3E63CE60171E3C77BE7515C1BFF2F
          Malicious:false
          Preview:Search for DTM..print( #7," ",#6, "min");..trend( double( #6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNVM3v:TF75VAv
          MD5:80E24D2721BD1B334C125C8EEC3B62C8
          SHA1:F80FD825BF69D54E4CB0E1773FE24D5B25B4EC34
          SHA-256:72F87A34011FD7D1F81B5F5B7DFCBBC4BAA8C00693DD7BF3E848EF7992985DA6
          SHA-512:264537B1A04B0AA67678275E8ED3C2C03A2718E7DFA0DC10AE39C50766174F26233FE31AE13A4E544299676CC53742A6E608B6180E79EC70E54BBCEFA9E4F7F5
          Malicious:false
          Preview:Search for ALF..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.905169351698
          Encrypted:false
          SSDEEP:6:TFCjClqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TUjClk2ggGjVW/dYLZ+
          MD5:A8E34DFBBCBC0348865279E4E1A659FC
          SHA1:9D01AA19F6D08540E6AA23D6010949604B9B58DF
          SHA-256:64C4D4C12800B710AD1AF52A215DD759A257490914E85284C8E2F6FC301CFF3A
          SHA-512:E85E1BAE64DD0F0902F32DCC21A93A6F8015FCC2F263A250BFA122F4EBCC242D684EEF67175464A3952022FC7B99CDE56F4A255B295EBCF83111F2A977966E6F
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):5.045714737535048
          Encrypted:false
          SSDEEP:3:5NFDjUZNWX9KdFyLR32g/pUAf6X9P5HM2+AGXKsfZHBloFifn:TFI4LR32g/p3q5HqlPYif
          MD5:AFF3559A01746013C2191B049B2366B8
          SHA1:488684B9A290DCEFADDF1F5E7B9A35E5B2AD4C2A
          SHA-256:A7DEA449A7F1831B57AFFCD868B042C77DF67CD980746ADFD9904EC595BED66C
          SHA-512:E5D6DAD586447EFBE7CEE7A9E6AF4C02DB46206A2A2D7A7BDC4EE0AFC3719AB7DC12B4722E0E6D4C2F926E04A1C47A465F602DF54C856E510F0D6B0E7AEF09CB
          Malicious:false
          Preview:Search for MWV..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..if (strcmp(#3,"R") !=0){...return;..}..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFD3QMlNVM3v:TFLZTVAv
          MD5:852A3F8597B0F63B366EDAD6C1296769
          SHA1:E3F0BFF85CECD26D4A661DF26278B676E5065721
          SHA-256:D4627E9E620E008682365F9D797BE677C70B3588D28F30ADD2341657D96D68A3
          SHA-512:3C862EF24BD158B3478C38963D8297C0925C2006F47E76499B267E34BABB66BEAF470CC783358354C0F22ACE886AAEE13677D00F5C51B0B01FE83229A73E13F8
          Malicious:false
          Preview:Search for FIR..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.896989780134464
          Encrypted:false
          SSDEEP:6:TFCjCls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TUjCls8T2gglsQGjV0Bb/dYd4M+
          MD5:72C5D166C12972873F980F557419F829
          SHA1:E3FCA300B735B406F3DBEB351C18BE4B6BE21C74
          SHA-256:E2CE0F7F214E886C207887EC94B9B74DBDAB83E864834E345F675FB9375B3704
          SHA-512:B3317538495F838FD03E8A3D42B830D3B2265A73E99C298932E116F0F7A40EC369F0C086A054D30891182C1B3BA27919FA62DFE73B20DA81D11AC20DA18A973A
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlEK:TFLZ/
          MD5:1C51C7119311D3425C80700CE1D18BDA
          SHA1:7072B0900A02819C38BA39E27F3923CAC63E58C2
          SHA-256:E8F5EA64CFC59E0B3143C5F3C4F514299BCE8163A540438F3624EA489AAFB8B4
          SHA-512:599FFCDBDB9B70352D34AAF2727DBA98C35D09102C5ED364DE03B8EFBD3E95EEF97589B5F11B9F6F1F3387F10F68EBDD1ADD4BD3375B9CE7E5F2B54955F8E7BC
          Malicious:false
          Preview:Search for FIR..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.918895394329311
          Encrypted:false
          SSDEEP:6:TFCjCls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TUjCls8T2ggls2GjV0B650Yd4M+
          MD5:C158877E9F70A03033A28157E1BE60BB
          SHA1:4E259E51F4F5CBD9BAD10198CA724D53D3993FF6
          SHA-256:004EACDB36E02A78A6D51E673D151FB356FB8BF473F8BB447105CE07F661519F
          SHA-512:A4481DFFE421FBF812463F3C36C0FA7F21863E0B8330E1FF7C82D512A962CFB0C57CAEA4D75B780B67F6FF0E98909F0366F9E8BF3647D39F059720F6DF3B10B2
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551767
          Encrypted:false
          SSDEEP:3:5NFDf2plEK:TFb8
          MD5:1F6CD70375F87FF3A350C92AE34D4FF0
          SHA1:43E2817BE54621E72E39252B8049741E290A9AC8
          SHA-256:D4817EFCF6988298DC58C4DBCA8E8649958412E71AEA2186F96C1D101BD9DD3C
          SHA-512:8B7ABAC7C2182415531F186EDC970A3752B8FEDB89E56E146702D8AC0AAECEE13EF9CA588E797FC1882DC3840A99900CF5C3F4E0D1D95672F6AE5B601AD7CF37
          Malicious:false
          Preview:Search for GNS..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLKfovn:TF7yyn
          MD5:F423C1F65DED70800300E8AFECF993F2
          SHA1:757337AF85BD8CAAA31FF00B730E589372BE552B
          SHA-256:53CF4F5308E94066E6EA0DBC0548013192B7BBE5B1735CD9F3BA6B8509A44365
          SHA-512:1110DA4E7FA1875C60A0D14B10A8C4DAEC68995605D3348C9D6AD4201B4897CEC25794DD8C316F4061FBE0871E0ACAD529A4168F83B92E0E3FD5D78FD7845E1C
          Malicious:false
          Preview:Search for ALF..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):151
          Entropy (8bit):4.8615919943530495
          Encrypted:false
          SSDEEP:3:5NFDPmX9IsYB3FFErVeym6X9IyYtFFEr+Ov/XKseZHBloFf:TF2WFEr8AWFEr+2BwPYf
          MD5:79A53710647B89D5B8174679E5E2679F
          SHA1:AC64024963491F4BD3B80FC060E9ADA5F468EC7D
          SHA-256:6E77AEFB77632577ED01AB7721B2BD8FB2587039A090D4D02BEFA739744DD7F4
          SHA-512:FAB41A23954DA08B436CF9EB83054E1D1D70E18A8F053EFBD9FB2E4D935B05CAC419F72CB8825302308A3870707A574AA62988C502054FB66FCAA3B5DB843A1F
          Malicious:false
          Preview:Search for HTC..if (strcmp(#4,"L")==0){.. print( "PS ");..}..if (strcmp(#4,"R")==0){.. print( "SB ");..}..print( #3,".");..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NVJFogv:TFXogVJF/
          MD5:014CB208D01B175CFEB1A8DF1AF2A04D
          SHA1:073BEE6BFD1DA79B9034BC60E6E0FDD13F63170C
          SHA-256:B53330BEB6E18F1A652B357351BC4FADA1C0276B434BE2439A1950A4ED1FDAFB
          SHA-512:28F733486C476B8D1580FAFCDAA303C7E02E9F5DA355E026297FFC7C376B78F1F0FE06C38CB88F81F4FA980C009DDD4B53F142065D556D45F5EB054EB074B8A7
          Malicious:false
          Preview:Search for GGA..print(#10, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.39212668463354
          Encrypted:false
          SSDEEP:3:5NFDcclGv:TFI1v
          MD5:B398422890D6B44DE6371998BB906B79
          SHA1:9EA80D69266E0918DBEE3A0941AB4E3E2D09D2BE
          SHA-256:93684712BC62045311266009F77EFCFB851AFF92FBFE7F735BA5127B67EC75A6
          SHA-512:1D80C144EDFAE2AC15DEB0A11F93BA9B2F32D1B06EE32E679A3D03D62D942B7E165D665A3DF661A70681DCEB5D9630F145FEA911141D48F775A48809A8EC74AF
          Malicious:false
          Preview:Search for TRC..print( #7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):436
          Entropy (8bit):4.773758506889757
          Encrypted:false
          SSDEEP:6:TF/VE1lFErV2g/Ilq/HzlFQGz5PYLs+FErh6lsQFErQlsHFErj6lsGFErvT6G7:T5Vv2gglaEGJYLsGlsolsLls9mG7
          MD5:4A500E7EAD5CC1B71D81F02771140D4E
          SHA1:A10DECD19848CA94FC2443AEC3FE23F1FB5FFE17
          SHA-256:A4538F68FF01A2689271F79C472CEDCB07B24F8B7BCD9F67C3744BF095891D54
          SHA-512:EF247AFEF9E6E5189F0C0E6F52CC7E36131397335FA27052D46E8A24BCF53DE023FA500B4855EF6F4300A13D4596A59FD3F3680657C49B9DE3CCAC381B2A8EC8
          Malicious:false
          Preview:Search for MWV....if (strcmp(#6,"A")!=0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"T")!=0){.. return;..}..print( #4);..trend(double( #4));..if (strcmp(#5,"K")==0){.. print( "Km/h");.. return;..}..if (strcmp(#5,"M")==0){.. print( "m/s");.. return;..}..if (strcmp(#5,"N")==0){.. print( "knt");.. return;..}..if (strcmp(#5,"S")==0){.. print("miles/h");.. return;..}..print( "Unknown unit");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):4.5262170368431915
          Encrypted:false
          SSDEEP:3:5NFDFDGRzbWYY4FFErLM3o+3AfqRzKliaFFErLM3o+3AGXKgOLHfL:TF8FbWWFErLhlqFkFErLhGBk/L
          MD5:51ACECCC92F86A969A0D3176CC996C4F
          SHA1:564EE1D5D8F811321AAE70EE45F4B056D7F18142
          SHA-256:FCEC5EC3E0777F509D046E6D63990034F50B6CDCAFBD73CF7481114AAC6A512A
          SHA-512:A3EFC33ECAE71C983D0E607B61AD70E2FF7DD9D43B40520CB7564117C4AFB4F3FBBAC91556D8A3960A5EE45588432A04C873F67E485023FF5FB439350B896981
          Malicious:false
          Preview:Search for TRC..if( strcmp(#9, "R" )==0){.. print(#9);.. return;..}..if( strcmp(#9, "C" )==0){.. print(#9);.. return;..}..print("unknown");.. ..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcIK:TFf
          MD5:3F300171A267CC1409DC682342E080C9
          SHA1:5FB50EFF809496DA8E79183E7EF88D0F5A65D0A5
          SHA-256:9BAA017CD4543ECD5703D5897E949DD4E0F2BB6534A965A4D0D66F78A1002EC3
          SHA-512:8C9E69B069820D213EEFCDBC07388D39C07103BD38E89B5B5E914BB6B03D25A42282D5A701C7E0270AABCDA0ED47DD9B676251AB0525665696EEC9A40C27C394
          Malicious:false
          Preview:Search for VDO..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):317
          Entropy (8bit):4.912586246064327
          Encrypted:false
          SSDEEP:6:TFC5ls8mFErV2g/Ils2Gjq0px4BvyeCSPYd4qLR1MY+:TU5ls8T2ggls2GjV0B650Yd4M+
          MD5:B8430B79CE251F89B1534B98418498BC
          SHA1:8A292670591AA78C62A87D51E6E41DD787B0A27E
          SHA-256:C3E96DD2524A7E5415D61980AC213DB59963313A11ABFE5A5B0442E3B32A3C25
          SHA-512:4D89BF1BB1295C527B78A5F3A6C6AE0A991C380FA91B5F2665445CE40163BB4D76C7D92A4D6C885BD8EDC8B6BE3AA6B2FE1C7AA4501006833A2045B829AA613E
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("RPM");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNXMf:TF75XK
          MD5:1BBED2288D8ED9454C91FEA05A927F74
          SHA1:2D0F5E8C5CDD77262EC1329704BE1A9C83CF6FC1
          SHA-256:00BEAAC24643F8833944FFE1834426C42C32D3AB8BF4C412A462953E90205E2C
          SHA-512:33411672F40DB0E629E5DCCCACA62BD052096F8CC5D0D13208CF0D6A50EB4CD5173606750B3CD47AB3C776FAF46696FCF1A9DEB5CB64D175788EB4D30EAE9E0B
          Malicious:false
          Preview:Search for ALF..print(#12);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLIK:TFvR
          MD5:67E58223622F809A8496E44223914DC6
          SHA1:DA1B7F9F8B0178FAFBA241563BAE5E6A061482A4
          SHA-256:C853FDAF85B683ED37C3A60298C7C483356180D093E245B9D48452161F9E2618
          SHA-512:63AA886068C43C8BB2E4B844412A4E737BA615D98B36C758B4CC5C045446AA72DF5D900DB7F8B4712843AD0874A0A83702924E251A225C2ED741909E4CF7C5DC
          Malicious:false
          Preview:Search for ALR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLRELr6Mfn:TFmHr6Mfn
          MD5:B3FD817269C8C96FA68A5701FE307F54
          SHA1:30BC7D02FBF9527CE0BE9E9D274EAFEBE04505EE
          SHA-256:D857547E1B9124579116F2422BF1FAA0D93F8B0BDA6A236FBC4D3547AE3CC9B5
          SHA-512:2B5FA78893ACC04BCB53447DAAAA0B823275E0C3B2F21BD7FBBA9345A36AA47791F21C0F483EC5FBCB0B879A2C2797E5458FEEADD8B95F212371CC399D69ECE3
          Malicious:false
          Preview:Search for VLW..print(#8, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6JMey:TFNWfy
          MD5:9E5ECD43941F88F92A142DB5628D84DE
          SHA1:19C65CC84050AC1A11C37C8DF1DDE5B86E9E747F
          SHA-256:7CCB217CD6CF840A4E3651CA14A6393C0719233E3A074933C307EEB2EDA3EEA0
          SHA-512:23BA3547A10AF3E51D841D923E52D6ABAFD4290B8CC0564ED95263142C0DEF9DB3A38223D43D4EEE3A42ED9CC7EC9EAA7F09C4E970CD267CBA6A44EC9C172F47
          Malicious:false
          Preview:Search for ACN..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPD2kcrV2g/I9eMFEr+1FeCFErNqwPmif:TXE2gg9P1F4jm0
          MD5:6131F5912D888B83F4BEC2E1D90AD5FE
          SHA1:ADD0060450D1B884DFDF48C8B54BA897F50E8BBA
          SHA-256:ED5E2131D942E1C14249A30192654AD6B48535CA7836C33B61ADCAF842CADFC1
          SHA-512:1408E8422FE1FB95A87BC33270AA7F513045229B35BBDB12E6DE8A9B200315CBB8A3007126A8ED41BB3BE5618F139B2FDA839D5A30118183F9E4BE19E008B65A
          Malicious:false
          Preview:Search for ROR..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKRIK:TFZK
          MD5:CC69E07B345FEA80CF67553AD5E160C2
          SHA1:797039A1055B15A6E483EFC832D18974E2378869
          SHA-256:3EA60E7DD7F3EB02B465E20A045625C2A5758AD5714A833899E4F6CC9E05C188
          SHA-512:03E3113629C4D83A7BA3BA8C8A5D302A8594380466A80039ED1096B5C8EA5A254CBB9871F6F3D78ACBDB5DC403404A8D1B5D7FF08058C9D0D1CD842F3B6F1549
          Malicious:false
          Preview:Search for HBT..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.835071091497352
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TOT2gglAXGjVXu50YJIhqhGu
          MD5:67005C1C0178201B347CE2E5C7898FE1
          SHA1:CC2E151F13347C5B5DBDFC330CAC9125B149634A
          SHA-256:E7BAE12903468E1B1155B7A5C5B300261EAD1AC4ADC2B5C06451E41AE99784D8
          SHA-512:653695A8C3D08A34AE323D459103FB81FAEACD9817B11688E3F3AA39A6190A7A3C08F3E6B9A18670E43720A3AEF683557A938E14A6710DD992AE498318ED5568
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulKfovn:TFoyn
          MD5:A9C7C1ABB3A328E9C2D0293F8CF82BF0
          SHA1:DD64CF4E8302626651D17758F0BF9C5AB00C71DF
          SHA-256:20BBE88D081ABDE5EEC5685ACD183AFC74A1DFF5BDE9108FCDC97ABC8406918D
          SHA-512:9217FF1FEBD9E87F2EC5BDF463C9AC84B35A7B9893880AB3414080A8382BFCEBF335018427B932D097BCDFE25D7C727551C44F4E9CEEBFACDC01792A4F5F81FC
          Malicious:false
          Preview:Search for ACM..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFD6b4sfZHBloFifn:TFMnPYif
          MD5:E92F73416A8878299DA905044383B97A
          SHA1:2DAEBF505B3A6F38DB7C7896747D73509B3F2787
          SHA-256:948B6E0C700BC186B855ECDAB1D197F50E5583CF3024EDA8566E97BC4FF7CFE3
          SHA-512:0259D13D9E9C9BCBB19C579D42F7714F1E2C064F82B7993EEB457F1E577AACE68D44C83D5169E24CC63ABBA509776E05579EE9B0A873441DD574190DFACD4934
          Malicious:false
          Preview:Search for VTG..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGfF1FmFErUd6lqLmFEra6lqjF1FmFErzzIlqE3FErpKyGBk/y:TPyPuIlq3l6PZElpSKyGeq
          MD5:D45BF2B23FC219CFE1E53490B14C1B57
          SHA1:91D9CAED7E5A60870C2C82EDD7A7056C895A7D6A
          SHA-256:2EA166883665B1B41FA0473935DC5FFCD67A3D0AFD0F0A74B7CF389FFDB7FC06
          SHA-512:A63E95AD266321DF8CFF811F927B7BD55151085783D87ECF2C40483B30D54A4DF8A21A145EA9D5C06DAFDB3AFA1D8A71DB8DC63A9409EFFCB75E5A958872659C
          Malicious:false
          Preview:Search for NSR..if( strcmp(#6, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#6, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#6, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#6, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFD3QMlH2XUWbaIHwQwUWZhJHfHYQwUWfFHL4QwUWcpf:TFLZ+UWbpHwjUWZhJHfHYjUWfFHL4jUH
          MD5:A8B236A3AE8973CDB1B60B9A29BEDEB6
          SHA1:5F06F670B06F65319ABBE9C98C38A9F1F5E39D97
          SHA-256:418422B73F1BD8F15F84A53E142DE2EFAB09235453CFC486C34680FDA570904F
          SHA-512:C607EA0446D78764DA4665EB3BC71774CA3534BDEA03DFB13199BC3FF698A8FC28E1C4E2065E5286D6E8A2DCE14E475C4C1DA415889BA881B35216A8B177D373
          Malicious:false
          Preview:Search for FIR..print( substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,5),".",substr(#3,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.922598366684069
          Encrypted:false
          SSDEEP:6:TFC5luJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TU5lJT2gglrGjVeAYnF+
          MD5:48E045B698B3C5A89BD43B84A1796718
          SHA1:00AF88050006E6E8C660DA93782CF0D51F55F150
          SHA-256:BAA07B446084825D7BC18DD3FCB740D659C5AD818AE0C3615834CBCE5DDF87E7
          SHA-512:EF355A531DBD0C749A99DE0FC2C005EE279040665FB34AA6D38055FD5B8DBA65EDF20802DA3F4225E4227B68EE8FC586820252D8C7431747FD8373F5FD6C01E1
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.796709424428437
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TOElilsAPlsKeEUhlsj4K7qgE
          MD5:0B0334E19C27A5058CA4696C373603C5
          SHA1:E7B44214BE0A1C4433A9D50C98129FFAF45D1429
          SHA-256:A8BF5E7C2B9D9CB4330F8CFF3DA6DE3135A6E5417CCFDAE8CE9D9EFFB6588A37
          SHA-512:C39C7B055990B9167FE62CD862FBDBA447FF25B158D346CE043EF601D8426EA17F4651FC9F2A14676A6A7A7B7B31EF68332A0BE53C2390C08D26EEA126578398
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFD38WoOJgGm3FFErFM3vFv:TFL8ugtFErFAvV
          MD5:2FF37557A174A3041F504F9333E25F9D
          SHA1:06AD34B44D76A3E21A48ADE6497B2329E99F7980
          SHA-256:D5193FC489C2D135A42890575D4B801283D054CB12B89FD2723C879F3A855498
          SHA-512:AC1DF089468DC847A37046B9058BC255D5D4A17EEF150AA3B8E363CFEACC308E026DD0D38BC617657C0E0DA8D2644652FDB92EE781882CBBA2DC26C5D2C5BFAD
          Malicious:false
          Preview:Search for FIR..if(strcmp(#2,"E")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDnLNUAv:TF75J
          MD5:7E4879C3AA70E0D00C5047CA8BF34B8E
          SHA1:93F273EB08973D3853E33EECF1EACE58BF5B9728
          SHA-256:4DDD4CE4DF30E8435674B5133721BD641789A35FEE3724DC6B6DA2830581E945
          SHA-512:DFD7C80F71C6BDAEDBA8539AEBB8B5E74D566C0F44A7E27952C8030F26477EDEC4B5BD7577439C9ABE325B4249138475F95BBEEA0FCB71D785A8E90CB9A3DE2F
          Malicious:false
          Preview:Search for ALF..print(#11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDUq6NVM3v:TFdSVAv
          MD5:429EF79A0415B51D154FD230503D0862
          SHA1:DA7CC58CB541C387756F12562DD467E4B11E376E
          SHA-256:564EABD16CDDCEB66094B1855A8BD290EAD32602B6D9E3831CBE86816EDBB533
          SHA-512:90A3ED08023B093502CF1D0845891D1885EF2DBD87A06B26475AAB4AEEF2FA5724496E505DFBE36A2A0DA9A8A7C8BA05FC4B770C2079406D0009EDA077C6F8BF
          Malicious:false
          Preview:Search for GEN..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLOK:TFT
          MD5:540D6DC826FB7E96A7FCF4DC424A4585
          SHA1:D65FD3E4773304CD60090FE505888DD7C9542025
          SHA-256:2822BA1F63E0BEF6423B212BCBB37A96AB9DC3ED930098F0B0BA47097F3F5CC5
          SHA-512:162D4EC7DB96501A1BD7B898BA588389F7F0A83A3563AB93F335719EC79823385A19BDB52AC20F34640E42E54413E57E3A31435FF548691D42AB7B1FF7CE1EF3
          Malicious:false
          Preview:Search for DOR..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.773679354006836
          Encrypted:false
          SSDEEP:6:TFJPD2kcrV2g/I9eMFEr+1FeCFErNqwPmif:TXE2gg9P1F4jm0
          MD5:6131F5912D888B83F4BEC2E1D90AD5FE
          SHA1:ADD0060450D1B884DFDF48C8B54BA897F50E8BBA
          SHA-256:ED5E2131D942E1C14249A30192654AD6B48535CA7836C33B61ADCAF842CADFC1
          SHA-512:1408E8422FE1FB95A87BC33270AA7F513045229B35BBDB12E6DE8A9B200315CBB8A3007126A8ED41BB3BE5618F139B2FDA839D5A30118183F9E4BE19E008B65A
          Malicious:false
          Preview:Search for ROR..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):96
          Entropy (8bit):4.807888696044131
          Encrypted:false
          SSDEEP:3:5NFD3vMkWoI8FB3HFFErCEWEBI+3AGXKOK:TF7/1lFErCEWEBIGs
          MD5:21FD97C54ED97789301D038FDB6F4316
          SHA1:8CE9D0B80915F920407EE8B70288A472B8D058EF
          SHA-256:84FA9A77788254A6D3A827AD177BA2688A6CC76ED50349E116F96095ABDDCE28
          SHA-512:C2149F0B686E4A7D36A28902D9B559E19245E99645C5A306DD933F640892FBE5095EB030B4755497B595A4ABD6418918C5DFFFF8DDB0642036A54A7A2C1BFD6E
          Malicious:false
          Preview:Search for HSS..if(strcmp(#4,"A")!=0){.. print("Data Invalid");.. return;..}..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):278
          Entropy (8bit):4.833196467872089
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMslFEraGDHK:TPT2gglAXGjVXu50YJI5/GbK
          MD5:DCBB8966C598445E9E7E9047EBA61301
          SHA1:24AD81B8350ACF000AB9298CF58585778638D8BA
          SHA-256:A269FA98F93ADB6E40020104D7CF45345ADF5347426EB7B5AE2BC7FB1716F009
          SHA-512:27BD8711D405B288FCC5A6E9BE6F4D38F4C49C49447B910D385A0E845DF36123E6C3AACD820913B6784F8862CEAED6C7EAD9EC7508559787B1FB07FA32201A9F
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6Kfovn:TFlyn
          MD5:7FC3ADEB90AED72F7542EB256D30ABFE
          SHA1:28042ECFB24E33B4D9CFF0496E4910A51E3D9BB1
          SHA-256:85E91F9AB82BCAE4A89CF9EFA4DBB459A38354FFA8AE0AF819A8ADDFBF302CE2
          SHA-512:33EA6AC1DE593588BD41E35D3A59CDEBCFD55DC5D6C751C3BC32B109896A82FD06C10F2492652C1E39AC063FBC03F9C88AD1265B329A846FC9233977E8E28136
          Malicious:false
          Preview:Search for ALA..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.75388313954079
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9v:TmkEClilXcIlWsr+lPDlqUllbglWE
          MD5:167FF61C8E1B09020643C1BA7252168A
          SHA1:8E32854A92E08446A8AB56604ABD304A6010B8EA
          SHA-256:5E93F7C1BD6478AB869A90DCE8AC7AC7B2AC2A4088D0D0F3AD70C1CCB82681DA
          SHA-512:4F0B5CF116888D2D4DB6BF1CD17BA9C6109BDAED5076F4EF7596F38914AB656B298C008E6600CD55AA8AE2D045929263D9078967D81B4971EE44C995D77656F3
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.796850212260854
          Encrypted:false
          SSDEEP:12:TOElZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:aESbIEygGeygIVHiygBKeygaf3E
          MD5:F2C4E9188E8C7054089831C22544E4C4
          SHA1:3F1C10BBD5A2C825EFB6F51A49C5D53068173897
          SHA-256:4E045B08D95396D619BDAE4B10F2981BA51D6DF80F9281552A600688293BE24E
          SHA-512:FF89F042C8D3F3AE4F818E2EA8EEC7DDD2DAD1CDDB62B06829BCDEF2000502147F7645E59BAFEE48AE5A21DF17E7E756EF4417261F919E8D75065287DE3C005E
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.746310062783722
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqglZ:TmkEClZClXcIlWsr+lPDlqUllbglWE
          MD5:AAE538FBCE996A0EAB3A79DC1BF9FA36
          SHA1:9CD79678D18800E0DB990081CE3F3A3E4D930AAB
          SHA-256:8D4C90E3A13725FF246AA9270E4B720E5460A2A05634060FBB617F8B29622F05
          SHA-512:E938C379FDE374D85886981E7D9FECAB898022004DFD5A9B810982F2A4DF259F2F42A9CC07D832B00E16155D23AAF69028B15C0AAA836C8474C2AB6D3A734D2A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):51
          Entropy (8bit):4.547247342260632
          Encrypted:false
          SSDEEP:3:5NFDMoN6RfvGHFxiGRMAv:TFwoIAP4K
          MD5:EFC4BA968837B93D46FCDB3080554045
          SHA1:F8917DAD98FE6F5CB65872C1FAAF8ADF688E4E7F
          SHA-256:8EFDC48C1B9FF679C502F03928EF01B0739128FDA0D4FB10F164E1F600F9F253
          SHA-512:B41BA7889F78655C0F7E8DBE3EE951283A838DD19971C80DF9B1B0D29EF4A2CDA6F2DD19291BDCC50141EE1CCDD10784187AB46E4C259D658B1A195625EF46F0
          Malicious:false
          Preview:Search for DPT..print( #4 );..trend( double(#4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):53
          Entropy (8bit):4.736801114695635
          Encrypted:false
          SSDEEP:3:5NFDMoN6RCRQHBloGXMfyn:TFwoxRSPgK
          MD5:CC45AB9654DA42B75AFD190F2F16E3CF
          SHA1:4C1BC4977EA2CABEBA5991FEA7164E4C3D1BECEE
          SHA-256:56CABE1B0F76EE5DE8465A0157EF927446D5A3D39C20BE824AD59040CF4C732C
          SHA-512:8A920FB65351D14BD1B3EC5AE27379BB97F04050354703368CD5546CD4876096A6C330F9C339B6FE05F2A7945316120EEC16B0029A7658E7AB857E3B72CC9491
          Malicious:false
          Preview:Search for DPT..print( #2,"M");..trend(double(#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNRMeyn:TF75Rfyn
          MD5:965237C363756B49BC20C985615F4425
          SHA1:35DA31333BF9F73F40892F97455E0FA334D03341
          SHA-256:E843FF7436F5F339928D0C2F1ACC667EEF8426A6A89AB9516BBB77098FAAA819
          SHA-512:48F00AD7615B940CDA2E82B42A1B16583129B4072A6F41FA721BF16160F4F1B07F16DAE1B4443BF4715F968C76E9C2FD344D81A68A6DE052C98EF166FFC9380A
          Malicious:false
          Preview:Search for ALF..print(#14);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulJMey:TF7fy
          MD5:0E8FC319562A6CB26EFAD5578BFE306A
          SHA1:BBF84B058CD3492BE004758E8D6DE312666F6A05
          SHA-256:DFA855D64D2351148C39D661B0D3D039E9088E9B888A080DF616A5AA064D3FAA
          SHA-512:F16BC4699D80D44125545FBA4AEE10BA92A7568C7997C1D2003FE7E8D33F8FDBAA63693EA7142FB0EFD97E1E6ECD975D16DED8B416D40DC3836509276E408388
          Malicious:false
          Preview:Search for ACM..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFWJ0LR32g/p3FCF8mFErWq6CXMrSj2rFCFjOFErWq6CXMrSjviP8K:TJ2glFiUUFKEURER
          MD5:5A1D625F892928ECBD91AEA70C898980
          SHA1:F8740C0E494EC1DB4C7D3CA270CF5530CB3D86EA
          SHA-256:AAF34D34210DA91821AD182645B146C6209B88F5E4A056BAE3830A210D4F8EC4
          SHA-512:4A3048B94FE8D7E7592430B2256263509582EAD85DB3E0DD4522A929B2C3B3EC2160D43B47F796119EC890B1277164FA8EA0FC9AB80DA417BE7F6081B37D9904
          Malicious:false
          Preview:Search for VBW..if (strcmp(#7,"A") !=0){...print( "Data invalid");...return;..}..if (double(#6) >=0 ){.. print( fmt("%2.1f",double(#6))) ;.. print(" knt SB");..}..if (double(#6) < 0 ){.. print( fmt("%2.1f",double(#6))) ;.. print(" knt PS");..}..trend(double(#6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):79
          Entropy (8bit):4.667598710630501
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRH2XUWbaIHwQwUWZhJHfHYQwUWfAfov:TFfc+UWbpHwjUWZhJHfHYjUWfdv
          MD5:B31884CF90E9155D19E84B74595827C0
          SHA1:5ED62284A45E9D7242D369509CA25DC81018F29F
          SHA-256:0C58A0BB916EA381666F33839C4267EE8EC4B53FB3BCD8CB6497E44894F0204F
          SHA-512:49E90D1BB40D467F9923C27A19AC20D7FDEABF8C8957D11FBF03624F665073EFB0BF6E7F4DEAD5A6222D87697022D51A153CF4126CD2A31BD252D5B791720AAE
          Malicious:false
          Preview:Search for WAT..print( substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLROK:TFfcd
          MD5:48437D98D2234EC715C98AC7BCA13826
          SHA1:5AE24DF193D3A0F8B15F92079EE212C8FB26A7EF
          SHA-256:DF300D966C82F12090C9B269012860C1795E7BEEC728FD120C295ED77FFDE894
          SHA-512:2425455478A743E92842B2FBB0F9A7CD5AA70F2A463F3712CE77B90F549B136D6D6845BB6974BB1D017A7BB2E58730DCE91251DCC86412D0659291897BAE7A88
          Malicious:false
          Preview:Search for WAT..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.798632387108336
          Encrypted:false
          SSDEEP:12:TmkEClilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:qkEC4bIEygGeygIVHiygBKeygaf3E
          MD5:193BF8E52C81F948BF9F89DBBA4CA37F
          SHA1:658947FDB7A2891CB60CAEC90D5D0790F5C1AE91
          SHA-256:4BD6727ED15F15DF866863EB413E88F48B0049A7C36FC95262E039E5FCBB018A
          SHA-512:C7F658B812DCE99463809ACDA6E26AB0E7ACD8B9F05A408C57D84C7536A25863A5492303132F1063AC3B011D7C6899E62B44E847DA82F322721585BBA00DA1EE
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.813534671515546
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TNT2ggl4GjVOQ/dYcKEUhGu
          MD5:F0A90FD1E7848040D7C63B7690AA4A24
          SHA1:12C11780B8A53CB619E039CD4ED64004A53621CF
          SHA-256:558B339F75292DCEED13BCFB78F110C61E29EFBF1F46C9D7445A8FD5FD85A307
          SHA-512:38987CFA0888F9968A40BA836D1420EB7F5168923BB9D37248C2547AB8E08FB63C40A06C229FCE735AA805B9FA9BF7A5415A929531E4CB2709ED57BDFCA6E360
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.59445640611102
          Encrypted:false
          SSDEEP:3:5NFDmkplSR3y:TFupy
          MD5:D658C8FB3A97174BB9C31122DCD8FCA7
          SHA1:090525535062538656775110C2DDACA2D03E0723
          SHA-256:7F3F1464B96675B1DB3EFACE0457462EA5E46C6501B6EC5DD7F5D9963992D3B3
          SHA-512:1F74CD3D3601D7846D8182F399C8926FBDBF174D103C05976887D39B0FD08CF4B1CD651404909B3AABF854EF5A2EB19501A6047C470813A235D1232344DE3A63
          Malicious:false
          Preview:Search for ZDA..print( #6,":",#7 );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.77613097283397
          Encrypted:false
          SSDEEP:3:5NFD6b4v9HfZHFxiGdM5yn:TFMuf5PsIn
          MD5:F5068C709E83311C9DD93AAFF147BD09
          SHA1:37A17F759519906131602B0C72804BC66CA3F8F4
          SHA-256:57C71F0DD2C4CFF99FF66FDB578BE6E4FD1835647D7A453C29FE2E079E724AF3
          SHA-512:A12EC7243EF4E5BE9EA8819070ACC8AB46ABD57E9B3E3561A16F9D5E8CAC5EA6B3D4FF0C5756935C409FE553E995E7C41D32ADCADB19478762BACF047BA9060A
          Malicious:false
          Preview:Search for VTG..print( #8," km/h");..trend( double(#8) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVTkcrV2g/I9eMFEr+1FeCFErNqwPmif:Tz2gg9P1F4jm0
          MD5:C26B9D0CE5EA6FCFC72F9C6A1C6CC555
          SHA1:E6CE74625BE91C88564BC46960F8D289AFF50DA1
          SHA-256:6BFBF38963369154353C9C11C6AADBE694D674B958B74E7A24D82D80AAD20DBD
          SHA-512:7A0FAC80933E672E99230CB87B042B489355B11CCDB5F85B286B1272599CBD1B4FA88C7C898F4CED562312812D04DA564D312FC9E1AD8E128C974FB3E14F58CD
          Malicious:false
          Preview:Search for RSA..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRIK:TFfcj
          MD5:153B2B9B02A864DD4D86C6B54E52F5B7
          SHA1:DF94C228F0FF99E05F005B1D24648E29A7B41BA2
          SHA-256:7E92C542E0DD6396EDDB300578F50B64387B03C79BC0AE0F164379D759610C0F
          SHA-512:E8BE14938F26FBA21F4B86E4F7F2ED9D0B01F57D6DECE5503DEE407123293B1C1DAAC1519507D815EA47D3751A970F49425837FBB7DE09950B203DEAC7850155
          Malicious:false
          Preview:Search for WAT..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6FMf:TFdaK
          MD5:23D45B511DBC703285E353196E84E73A
          SHA1:1A84BE9B85848411AD5EED0E455700E5B92A3A55
          SHA-256:87E41B664AB8F30D34520258680FEB4303429A2319911C4563EC939F98DB3FD4
          SHA-512:921013BC766CDC890F924C33E20035ACC65EE628764C055BD780D4E1E6AF2F994C82E838FA1C53F641166767A0BB8E0FB3AF4B65E75265395E565B97DF4E710B
          Malicious:false
          Preview:Search for GEN..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):5.122427451057994
          Encrypted:false
          SSDEEP:6:TFad5EIeLR32g/pMsbBzVFejq6KGTHf5PYedYsgKEZGLRcYe:TAzJy2gQjSQ/dYYYzKEae
          MD5:1732654AA51D4F339C214AE0DA902CB0
          SHA1:A33D9049BEE4F2246A33FA506973CB42A665C967
          SHA-256:6A66FA7528E1E5C0CE4889CDAE20808EA618596AD21C77D7A6C0BD40BEB4A96D
          SHA-512:8B70E26F95B467F3634EBA3E795AD1797507E7AFE3214445EE7A58C9EA74BA59EABF8F1703F2FAA4374EB172E8BC7822F6C81FB848D240D6C995A66B8E5E3073
          Malicious:false
          Preview:Search for RPM..//If #6 &lt;&gt; "A"..if (strcmp(#6,"A")!= 0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "2"..if (strcmp(#3,"2")!=0){...return;..}..print( fmt("%2.1f",double(#5))); ..print ("%");..trend(double( #5 ));..//If #5 &lt; 0..if (double(#5) < 0){...print("Ast");...return;..}..print("Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.811134026380605
          Encrypted:false
          SSDEEP:6:TFUJLlqJlsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TKlilsAPlsKeEUhlsj4K7qgE
          MD5:E7781A5164D29E882DAF04DC07B819BF
          SHA1:3478FC4D51CC905411A0D8D4A4586012800A5277
          SHA-256:199BED5349856E4E8CFBA77D53C88B6BF37DEAF8610FAF5D606E99AC9BC03C94
          SHA-512:ABABA3C51B51E940CF01A04C33A39AC6F637856D5C06C7AB4BC75E8709DF37159FF2FD203743072B9B0A3334654F0546879C04CE1D663EB0DB3C172C84F80A4A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDnLNWfy:TF75qy
          MD5:AA14D734B267DFE193844B7AFD6502F8
          SHA1:6A95B180393B0CD11FA8BE69E60072E8AD279530
          SHA-256:F32CD188D81F8ABF6335AE8B3F40D3C76B49E1CE2159DC0D4C08AAF1D8CC3AC3
          SHA-512:37D4684113A3F5367D1105C09AE497D6AD0F7D8373E56751CD19B6166FC2B2606F1FF6FFD2F4C7B625910D3F8760F45EC5158D3C771BFB670BD3B8F37232B877
          Malicious:false
          Preview:Search for ALF..print(#13);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.806183542158471
          Encrypted:false
          SSDEEP:6:TFtMsQFErjjsGFEr53shFErhKms1FErpmsjFEr6BwHW:TT/svsSsimszi2
          MD5:2AB5032736D63DAB0B66B76D0A16E8CB
          SHA1:8CC8734D81A410A45B2980D5EDCBCE2A67C809B8
          SHA-256:EB57C7FCF5C6B65246203EEED07EFD504945D8E82A7755614943F283FA9C3896
          SHA-512:C60F5DCE92723A6BA593E3D62029740274404D4EEC695E3BC93F044E8423F6E4EE431578F455DDCE4952589488841ADAE37A95B27F2654869A06A1FE17CE4B8D
          Malicious:false
          Preview:Search for HTD..if (strcmp(#5,"M")==0){.. print( "Manual");..}..if (strcmp(#5,"S")==0){.. print( "Stand-Alone");..}..if (strcmp(#5,"H")==0){.. print( "Heading");..}..if (strcmp(#5,"T")==0){.. print( "Track");..}..if (strcmp(#5,"R")==0){.. print( "Rudder");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRFMf:TFfcbK
          MD5:B323567D9FB0EB882E600C52DFEC526A
          SHA1:C22161DB9AB0CEA0D4A2F82300338255A37EDEAD
          SHA-256:3B375F025B537C8D1CE821D877CD549C9F7C9B1EAB372A15E37A52899CCB4798
          SHA-512:4C867D6469551A7419CB42D5A4287B67E06DF6AEBFD41284BD4D20C6F4CA5B1043460911D59E362C3888EDB4648A8BA855A777437F104C599DF3EC9973DC9A65
          Malicious:false
          Preview:Search for WAT..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.811134026380605
          Encrypted:false
          SSDEEP:6:TFUJXHEEClqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TmkEClZClsAPlsKeEUhlsj4K7qgE
          MD5:0C622F398B7FC462BC237C62E7A47E6D
          SHA1:998126C4F016459F3641852B5F37FDCCF647A8F2
          SHA-256:AFF6FA8ACB4E7815654ACB4031BEC577489691C4FE4C8CF46A1371E5EB6D3B29
          SHA-512:B7B1B57C6911631BD3D5E757B82D82ECC6518F7C25B718684826E108F7BA4080F4D72B2EA302564FB30C5CF661D1CE0EF3F4E87B86782680EBBFBD3F34AEB415
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):82
          Entropy (8bit):4.650073120857778
          Encrypted:false
          SSDEEP:3:5NFDUq6oREWbaIF/HijUWZhJFHXjUWfAfov:TFd2WbpF/HijUWZhJFHXjUWfdv
          MD5:E1C8B31DC814B8417E03327B267B78AB
          SHA1:1729AC087E35A8AD1B9A36D3A1313CBF8D0B6160
          SHA-256:D38DCFDBABA423DEC7FB95E044D72379B2DAC1755CEFFF729D80BD37FE9985B1
          SHA-512:344F64E6695143268D216C8467DBB690D84D9614EAA59C49107F3A3DFA122E73240F8F65168C70394C4CDCADC8C02BA5442371C00B668B6141AE5E784F041A9F
          Malicious:false
          Preview:Search for GEN..print(substr(#3,0,1), ":", substr(#3,2,3), ";", substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):117
          Entropy (8bit):4.652894470837179
          Encrypted:false
          SSDEEP:3:5NFDmksclFL/lG49dG2LRH2XUXmMJwQwUXVfHYQwUXW:TFRFL/c4u2+UlwjUlfHYjUG
          MD5:2BCCACE120AD02E4628F72D6B54D3204
          SHA1:4D9DE5A38555F5A558799CBBDA0A0FF25D7A3A2A
          SHA-256:5F19B6A38311C0D1F3B21A3E2F83A3D859D5C14DB50068437BE43752EE3972FD
          SHA-512:E3D5C70C47E8C505954DFDD8C5CFD5B50157B2A44125E349A2FB0F061795A008E6C1862F09AC27AFE5789474ACC03F3A13CE4A54DF5F3BA08CD53427712A0AD0
          Malicious:false
          Preview:Search for ZDA..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.723438807834864
          Encrypted:false
          SSDEEP:6:TFy2PJnNJFOKfIP2+WtvIKrbWEI+WNIKrbW8A4DTchXKrBjV:TwaJFVIPFWtvIGWiWeGW838+jV
          MD5:79D536C07EB516D9870E03A42D5D9E09
          SHA1:F6F49B0EB2C9F505016D934A5213769A9D38EEFF
          SHA-256:ABF3147E1B9D0C60DD27A5E2990F78B249F6C2B6C94FD11C5F3A7E2DB84DDD72
          SHA-512:21CA30952163CCCA296E87D938A553769A1F04688DB332F2F8F14B13CED9540BA504F0E0394B5BAFC17FBD0EE6617EE01BBB8E5B005D4FB33163FAC7848E3D92
          Malicious:false
          Preview:Search for ALC..print(#31, " ", #30, " ", #32, " ");..if (0 == strcmp(#5,"7"))..{.. if (0== strcmp(substr(#33,1,1),"*")).. {.. print(substr(#33,0,0));.. }.. if (0== strcmp(substr(#33,2,2),"*")).. {.. print(substr(#33,0,1));.. }..}..if (0 != strcmp(#5,"7"))..{.. print(#33);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlKfovn:TFeXZyn
          MD5:5C8DCD9179885FE6D742799CAFFA63F0
          SHA1:5BC1F7D2B8876BCCC21371DEEC4218A74590E6A6
          SHA-256:E6DED4BC055FDEB2B480E6CBDF8FED365B6797B5434BE6E5D2B37BCD036229F8
          SHA-512:1C9AB517A20526BCD34D53981A838F90E9401FB117FF9E52A767137BCE7D289CAFCC6D6F92B0B8D6ABC7DAC67A483D0EC410A88D3A7A6A45970038E150BC3E1B
          Malicious:false
          Preview:Search for VDM..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDf2plNVJFogv:TFbYVJF/
          MD5:F29BA361323A5F7A9FF63E0133FE76ED
          SHA1:8A21A3E39DC3B083C7F39CE0A1D5B32AC159BB51
          SHA-256:8AF519F7602AF80D6E6029405B06980105D14CC2F3A420D7F370F4BFAD1A106E
          SHA-512:57DFE45BE5C667E76DB8F24E5B2EE8B2D6F66E5E3D9017CDF2D76BD2272B8795DF6AFAA789F2675BDE779AFC20E8E2267A0B3D7459B797DABEB30A283EF5FDC5
          Malicious:false
          Preview:Search for GNS..print(#10, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):62
          Entropy (8bit):4.887438802525302
          Encrypted:false
          SSDEEP:3:5NFDBVXK3fYovRQHFxiGUm2eov:TFt9EfYoJSPOmI
          MD5:57131BE288E84CB6E85C9DCA8F6C8F6F
          SHA1:FF3F65AD631327FB8EC7A2D8A3CA175297CFDCEE
          SHA-256:808BE71E7ED8FD09AF579EEB6CC2DC673A2B45231D35A12D328A96EDE6AA2AD8
          SHA-512:7FC73495A68EFB145327CCE04011D0BFFB95D6E78D81EB32DEEE329F922FA9F7174A3955877F20E7AA2225F609F725A0C21873F89CE67F9D60F5858EFDBF9472
          Malicious:false
          Preview:Search for HTD..print( #10,"./min");..trend( double(#10) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulIK:TFf
          MD5:ED9557BB7966F9C4CA1E0A1BB2F0A44F
          SHA1:01FDB7930D12E01EDAFBCFE3A3FDA2A5DC72EF2C
          SHA-256:BFCB8B66EC3CC42A684D2D19E343A8FFADE3BB76D4D409B1A4AC560EB9EFDE2B
          SHA-512:3CC9E376BFA328EB75369F30A157F49179EE82E06A0049E15EE40AF09EE5230DE732D8B549C2F685F1CFF4E8C0DB4C826C058EA5B1ACF907B1D49FC214BFB9A4
          Malicious:false
          Preview:Search for ACM..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFf:TFQiPYf
          MD5:DAB5ADEE0D5F624790F29D4A70E421B1
          SHA1:C6E5FF51255A8F40140E586049BB6E90C3E5C9F4
          SHA-256:F3486E5CC545C222D3C3ECC2D8A1C2B61F6EB9B7BAA7AFBD4976D8E381ABDFB6
          SHA-512:2B04D2D16459EE24382588440CBFCE07502D96D3724E40B89ABF6F0E3C20507F3413377501EDBD332BA9B86FF97B34E58D301CB4E2BC5CB811D3814CA8D8980C
          Malicious:false
          Preview:Search for HRM..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.736443532438877
          Encrypted:false
          SSDEEP:6:TFwudzFxKfIPP+bvIKrb2I+jIKrblp4DTcqXKr4:ThdzFMIPGbvIGMsGM8C
          MD5:AA325D1D4B7F35121264E068DEB91197
          SHA1:82D7F05966FFEDB9C26C182A7864B68A81D17960
          SHA-256:F9E3639A513CD07F8E510E95BA3E12BC572899265944E621040D74492DF7312D
          SHA-512:662E48F2909CE956ACC15F25E199E9BEE8A74B8E8A4BF06098F9FFEAEA5E85DF58D70961F5B134CECBD76DB44F59120EAD6AAFBBCFB17A2DB23FDB7075639478
          Malicious:false
          Preview:Search for ALC..print(#19, " ", #18, " ", #20, " ");..if (0 == strcmp(#5,"4"))..{.. if (0== strcmp(substr(#21,1,1),"*")).. {.. print(substr(#21,0,0));.. }.. if (0== strcmp(substr(#21,2,2),"*")).. {.. print(substr(#21,0,1));.. }..}..if (0 != strcmp(#5,"4"))..{.. print(#21);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.888405210518773
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TPT2gglmGjVXv/dYJIhdNu
          MD5:2B6A2E4669C06EC60E2DFA766585A701
          SHA1:14960057EB91A9DC6093BB1A8CA47D320230BD15
          SHA-256:F95961BBBEB9530FC34B559885AA08770986014D1D17292B9F4D9B2EB324F441
          SHA-512:139A2B6CECEE0DE8859F85867E4AB8FD962CF82C6C0B0D9DF0D1C50A6B72A3B435480454B49D0D854F9F8FC28AC372C5346EF13DC98A75113A35637B52BD5554
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.813534671515546
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TNT2ggl4GjVOQ/dYcKEUhGu
          MD5:F0A90FD1E7848040D7C63B7690AA4A24
          SHA1:12C11780B8A53CB619E039CD4ED64004A53621CF
          SHA-256:558B339F75292DCEED13BCFB78F110C61E29EFBF1F46C9D7445A8FD5FD85A307
          SHA-512:38987CFA0888F9968A40BA836D1420EB7F5168923BB9D37248C2547AB8E08FB63C40A06C229FCE735AA805B9FA9BF7A5415A929531E4CB2709ED57BDFCA6E360
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDVNXK0/ZHBloFDy:TFbNRPYW
          MD5:93EB038726D9AC6C83B85412B6256DEB
          SHA1:D51BED1D681BF12BB1F6C99FB3C101EB963A00A8
          SHA-256:630DB7A0D42E4223DF7ED891B830766E93EFCEDFCCE61363A64E9949D5B056C1
          SHA-512:E86FDB8C52B34E876BF13F9D4C2A95D7B05C98BB16CFC06BAA7501990D4196CD28FADD8126657A2DCE2FEDA7474CA6F7C8B89593E71513095A63686C145A0904
          Malicious:false
          Preview:Search for MWD..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.730915395146161
          Encrypted:false
          SSDEEP:3:5NFDHFMl0/ZHBloFDy:TFnRPYW
          MD5:9BBAA32C70B631D6F2EC1123BC3F7CB8
          SHA1:8DF235621EE5FF025E48593FFFF6DAF3CCA8C880
          SHA-256:BD46A9E33A2246BB335A8AA04B252193E14625026AFF2C5043D66670D0673962
          SHA-512:443F6D4AAB01814070E618E0368330A5F2172FCD64A8060D0214CD766CE4DF2DA47C318DDDEE3E1DFC542905C43916B352515551ACC352ABCD5481E0C95A0FB9
          Malicious:false
          Preview:Search for HSC..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.771286256793215
          Encrypted:false
          SSDEEP:12:TUwlvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:IwVnVeF3VZV8cVg3VoE
          MD5:47A9F6A5D1F674228D239B0269DE4A1D
          SHA1:BFE2C3133336AA2FF10F11320A488EA9C638B131
          SHA-256:DB1932632DD0A3B4E95780E3F6DB263B06E7A3822B6CDE3302B9301DD1C5461A
          SHA-512:0F748002A5E1ED299F0A44CDB24B23D7BE23C8C84A67D0546D4911A599B9E05573E52F0C0A6CFDF6F2CEA8B1BEBF1474D8D0A9AA07EF9762DEA329FF7D0D54D0
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlLM3vn:TFeXkAvn
          MD5:A05893BC7E9C7797C023A0C2EDE88576
          SHA1:551D3191056A71674089D35DB0244B6274AB26D6
          SHA-256:5584C4245BAEF23A62EB9D04B179E7A13A1F5F7581437ABF694028111CBF2669
          SHA-512:222F10223B13A80B621580FA5B321304B7580035A4A71148DF9BE59CAECC0F8A406C856F079839EA9DD2CC606DE3D3A03DAD972893D7020DEFAFDA8779F625D9
          Malicious:false
          Preview:Search for VDM..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlJMey:TFeXmfy
          MD5:145995A39403247C48A1294BBD3F24B7
          SHA1:FDE206B8842D5D6DC2C55419FA9132D29BCCDDA9
          SHA-256:8E1E1809D5A615B804ADE5C19320254123200A6A519E2A8EEF7B0195FDFDAD13
          SHA-512:9EA1428CD5C2DC6194578A7FA6C7C7FB8365CC903254B0CD19FCC5DF85191BD9DBF289458BF68A104003F7E504DD69DBF80918595BBCFBEB272CAA9554C1285B
          Malicious:false
          Preview:Search for VDM..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlIK:TFLZj
          MD5:4FA0E6DBD6C83092E9E357AA1655AC38
          SHA1:AC4E86F67BB423A486ED92DEBDA1C427F9585AA9
          SHA-256:09C86C919F4F2218117710D555280EB0B4E920581F57A3A6273E3D069764A70E
          SHA-512:8FE18F3FC4135E494162D3EEB8840C6981709067A14E9AAE3B23AEB7E51E5B7BCA34DC3312C7CB2AB216EBF519CF42A43977E5DADEF7B2361E97AEFBA30F2C6F
          Malicious:false
          Preview:Search for FIR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):164
          Entropy (8bit):4.705744211903336
          Encrypted:false
          SSDEEP:3:5NFDFDmX9OJea4FFErQJF6+3Af6X9OJ0YdFFEro4HM3vg+3AGXKd9fy:TFrtIFErQJF6lF0YHFEroXYGMy
          MD5:592C445498BE858292019E01B1EFEEB5
          SHA1:026393944C0C5698E62C2B454D7DDFF778DB5DE5
          SHA-256:CFA5E8FDFC58649D89E252ABDABE22404F86D5B5C05C01B1B9070F12B3A94F11
          SHA-512:7BEB281F511CF59539B0B856FA56D628068A83E6774C69076240EEA3CE837215B24181F152BFF87E131D9E00C823FD238AC1751AF96F2403070363DAA48070C2
          Malicious:false
          Preview:Search for TRC..if (strcmp(#2,"1") == 0){.. print( "BOW");.. return;..}..if (strcmp(#2,"2") == 0){.. print( "STERN");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):151
          Entropy (8bit):4.8615919943530495
          Encrypted:false
          SSDEEP:3:5NFDBM6X9IsYB3FFErVeym6X9IyYtFFEr+Ov/XKseZHBloFf:TFtMeWFEr8AWFEr+2BwPYf
          MD5:A6A4CB991493ED15D48C9CE6A0F10B67
          SHA1:7F8D950726530F907FFE81E01AB9C60FE574F774
          SHA-256:CF7FA1AC306199ECB6C1DE642FBAEAD1CC3ED258B7CAC5722D4D7EAB6B53B2D4
          SHA-512:2B5381FCDCF6539661972EDF0339523F1212AE6B93DB563B739E54272C6356E189F652FCBEE1EDDBB30451F4727C23D2D2366C3A96BDF28D671131BFF7B369D9
          Malicious:false
          Preview:Search for HTD..if (strcmp(#4,"L")==0){.. print( "PS ");..}..if (strcmp(#4,"R")==0){.. print( "SB ");..}..print( #3,".");..trend(double( #3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):57
          Entropy (8bit):4.7491279525714525
          Encrypted:false
          SSDEEP:3:5NFDBVXKiseZHBloFxK:TFt9tswPYxK
          MD5:1A3ED18F18EFD04ACD6FD6D30A1E24A0
          SHA1:088B37B55332BE23DBAA3104C8692472B703F5AA
          SHA-256:6A7A801CB285781DF7B9EA9CDAADC6E994BE64A007F3F5BEAE70C5630244C9B3
          SHA-512:6797F32255C682D70DD73A0895272A536FDCB1CB2ED3CA228D98764CB740938BF10DD5A1F77F7383B17BF157E8276BEAEE18B3857EEE6AC0E9A4DD8C07315C3A
          Malicious:false
          Preview:Search for HTD..print( #11,".");..trend(double( #11));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):305
          Entropy (8bit):5.105414684205305
          Encrypted:false
          SSDEEP:6:TFapx4LR32g/pMsbB7Hejq6KVBe5P02KEZGLRTMYJDfy:TAbA2ggjSVBed02KESFNK
          MD5:778381A083D5887876AB1D9889236DF5
          SHA1:4A27E00C833CEAFF8711DDFB730FC83996B75BED
          SHA-256:CC69BF3894102B7AADCB29897165B1135E36100C1912862157D4C84573AD89EE
          SHA-512:5507557CC05F1695D7F386CEAB734556C0DEE3EA830FC5926F06989F2ED5D6AC1BE973CFACBF9C2FD8CCE96989E558C7CAAFFB1FB66FBC18A4E9F02F2618E519
          Malicious:false
          Preview:Search for RPM..//If (#6 &lt;&gt; "A") {..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "0"..if (strcmp(#3,"0")!=0){...return;..}..print( fmt("%2.1f",double(#5))) ;..print("%");..trend(double(#5));..if( double(#5) < 0){...print( "Ast" );...return;..}..print( "Fwd" );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551767
          Encrypted:false
          SSDEEP:3:5NFDf2plLM3vn:TFbeAvn
          MD5:AD6EE5DA600F068849CCCD330D139F09
          SHA1:8734A25F0A4686F7216D2F4C9075F7E9E0E517DE
          SHA-256:B567B833B6B6297869DC5AEB40DFAF66CA22A722D7E5A6FA19CA0A01D2F1CD5C
          SHA-512:A1BF4E60741E5E3D4272FAC42DDDEE16A265662CE87CD4FB4F98FBC0A173A06976936120F30B9AC34A7647826847B49A8C49A722C3D5F91FB49FC4B95DF47638
          Malicious:false
          Preview:Search for GNS..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6IK:TFO
          MD5:9982D3476BA740B1E79F71D354F83DFE
          SHA1:BF7D761844B4847B22B2ADCADC5A20C4FB5A1A9B
          SHA-256:68DDA0C77DB9134AAA8FA8BCDB40EA52A755E422A272AAFE39970A037BA81899
          SHA-512:A50896B7AAAD236198639C0E39DF3D3C18BD93C9D09E4F56B254471375EDDCE14050472CBB5B6768643E30AD068CDAD5B05B380EB0C93E9C3444E988760CD122
          Malicious:false
          Preview:Search for ALA..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDdGvVXKEK:TFZ4VXG
          MD5:185AB46A21A31E480DDB265B6C0E7A5F
          SHA1:8B2CF04C397FFFC3A3CF63993E0A2AF2C36E446E
          SHA-256:E22354C80C82AC56D8BE37711FAE0E46970DAC1800F802337ACEA655F483A121
          SHA-512:E4320F30CD428CE08FE22655F67D157AC13B69F739262BD3C5C713F9B2A9323C04E592532247ED2D9BD47EE9B1798E15EC151827EB1A0878858206EDA08F53C6
          Malicious:false
          Preview:Search for GLL..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.958034016114698
          Encrypted:false
          SSDEEP:6:TFWJ0LR32g/p3FKEbIOFErWq6KVFrSj4FKEZAFErWq6KVFrSjkWV4iP0B:TJ2glFKEbLSVLFKEwSVlW2E0B
          MD5:46A9AE915CD2B1027977A2F11036B524
          SHA1:D4199CF94EC0CC502A99DFBCC3BBD0A0DA4CD65D
          SHA-256:00DC2C6834C7DE23CD0FAB276748A2F3903C961BD4E8FDC293BB995B8F0E26E8
          SHA-512:49167AFFE268C59D4C4D0A2AD54B2F48B227606CFACA15D62331ACA5D31C0CA54C6ABF7B35D91BB1723EF47AA54D0E0FF0B9D4F6D840689BEBD99375D4F3A412
          Malicious:false
          Preview:Search for VBW..if (strcmp(#7,"A") !=0){...print( "Data invalid");...return;..}..if (double(#5) >=0 ){.. print( fmt("%2.1f",double(#5))) ;.. print(" knt Fwd");..}..if (double(#5) < 0 ){.. print( fmt("%2.1f",double(#5))) ;.. print(" knt Ast");..}..trend(double(#5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLFMf:TFtK
          MD5:062FEB1C571A7332BC08415042F275FB
          SHA1:AF8AD4EAD43F3205E04D47823821DED5DC29990E
          SHA-256:83204B37378371B4D8633E1CECB21C4BD73C435650D98BA76FF3B962D041B01C
          SHA-512:CAACB1B55E1DB8C8A250BF8C8613B3C31A46B3F68E7E59AF17B772EEC54019149BF8B7B0B2E04B1CC9714291C4DE1A381CAE31FBB7497F626A26823380413B9F
          Malicious:false
          Preview:Search for DOR..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLEK:TF79
          MD5:9976EE3E20704DD69F942997FE05C470
          SHA1:723E846ADADA1CC7B0D24FE96CE970ABAB562D34
          SHA-256:8F1335A61072B2C426A4990EE39B1AFDCD56875D980A1270ADC898BC84260301
          SHA-512:7EFE1E24ADF7BDE14068E56731F9097F2D82620BCCD54DACB5728D4E808126DAC2CD1F9200BE11C59B36748DD7473740D2A2E95657E363A26EF12A2EE1E0691E
          Malicious:false
          Preview:Search for ALF..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.780142703932923
          Encrypted:false
          SSDEEP:12:TU5lvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:I5VnVeF3VZV8cVg3VoE
          MD5:8280077248499F0E05406BAA44C5CD0F
          SHA1:914095E136CED4EC1C91C3AF5F007B838FA85E38
          SHA-256:82564D9EA5527D00E6750C65587B97C05EC72029A43C5299A3A7E60A10BB778A
          SHA-512:38C5001F6DDC75F63B848CF7A085AD6C4BF4B68CFCE21681E87E43DFA702782B8629C2685274F4D44081F971BA39B145685240328C431B62C38BDB143C3F06C7
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1252
          Entropy (8bit):4.842878802818841
          Encrypted:false
          SSDEEP:24:Zu2suUEUEUFSUEUEUFqUEUEUF6UEUEUFyUEUEUFQ+UEUEUcHhaw6Z:JiEUEUF5EUEUFhEUEUFxEUEUFZEUEUFc
          MD5:BFEADA53FE747FCADD84927E46E9E775
          SHA1:964F8E04A96EBB4C9FDFEA5E6A94482EFC552408
          SHA-256:7136AA01BB2349F5289836E792741789AE71BAD599DDE9F3971AB49A79B0C7A4
          SHA-512:86610580D35636DF840A2976B10355707B540BBE89727AE468125B66AB4EDBABC7147746B821E0414FA62964ADE12F989617A7C3E199C312F9BE456C3CF544EB
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"A")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "D" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"D")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "P" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"P")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "R" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"R")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "F" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"F")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!" );..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.820807398788273
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TsT2ggl4GjVOQ/dYcKEUhGu
          MD5:6BE808A74CE47B0528B9CBCC39C3ED7A
          SHA1:ACD322442B017D1964C418A0AEAC83F78860541B
          SHA-256:8D578061B5B6849E2512A11121806370C8204C5731FD85998D5281644FAFB2C5
          SHA-512:B05C0979DBCD9D312BCB61D745CDAE1B2ACCA20F852994737F05375E7B81C3913F898C1E83D66E6B635B3246BD0275286F08F3E6170666CBA6CEDC6AC6C6D7A9
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):5.124816335558512
          Encrypted:false
          SSDEEP:6:TFad5EIeLR32g/pMsbBzV9Aejq6KGTHf5PYedYsgKEZGLRcYe:TAzJy2gPjSQ/dYYYzKEae
          MD5:9EBB4B5C98D682A6FF7CB88C82737EA8
          SHA1:311D639BAF7FD13ADCE90359F4C227C65FFE58D5
          SHA-256:DE2E0B0A72C77E11AA89F9F015DE9F855457DDFD55FEAEB6450A80F8BD2A4172
          SHA-512:A818B70734C1C4A1E38D30D5DE8AD2566EE8ADC42B5F3BE442FE2AFC117A8E92C0EFA920AAE89E5D25F8A5DED0EE6B0540F935C21BAF8FB314CDEF49DADF6F5E
          Malicious:false
          Preview:Search for RPM..//If #6 &lt;&gt; "A"..if (strcmp(#6,"A")!= 0){...print( "Data invalid");...return;..}..//If #3 &lt;&gt; "2"..if (strcmp(#3,"1")!=0){...return;..}..print( fmt("%2.1f",double(#5))); ..print ("%");..trend(double( #5 ));..//If #5 &lt; 0..if (double(#5) < 0){...print("Ast");...return;..}..print("Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.746310062783722
          Encrypted:false
          SSDEEP:6:TFUJLlqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9IFED:TKlZClXcIlWsr+lPDlqUllbglWE
          MD5:4FFECE5AE2BAD9ADD442C1F4232F1C36
          SHA1:3E59F3BC38034C8B056F5361902CA1C0A0929589
          SHA-256:D84C627CA0F5AA8DBE39BEF5A94AC0C8D26DDF41D0ABBFCCBF6F40B3C9234872
          SHA-512:7F9D547D5CDDD889F4D2F8B1D4CA02F74A02A992786D0BB3870AE9AB47BA76889615F94D5946F9A956CDBA9034AE33C2CC25348CE26992F88ECFD1C7FFA4F492
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDnLPJK2fyn:TF77Jxfyn
          MD5:8E1B99A19EFCD62F7EB311B674E77503
          SHA1:EF31D30BB09E3D5C59655FD12C8BA30B57E7C16F
          SHA-256:8C275429A39FA842B1011EF688D1A9CF64D1B176B57A5BD2F30273E3C2AC1780
          SHA-512:4236CDAA60778D18B833774A0E56F3C9880A3C0D6BD32B502F9CBDF587CF0117C6DAD12B990025E629A560FE0F7118F4C0FFDBBAC111FAD00494B40E02D4FDB5
          Malicious:false
          Preview:Search for ALF..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFYSLR32g/p3Fs64FErWq6s8rSj2rFsUFErWq6s8rSjviPSK:Tuu2glFsVkEFsCkBESK
          MD5:5A81B150E09A0F9F93F3A4DEB6DB92BD
          SHA1:175364DA54063685E292EDC910723E41649C1835
          SHA-256:5EF8606077590791B4FCDDC4A302D8D9810B9BD23DED5EACA67A8A8F733DD19B
          SHA-512:1C06CCD27BF59FC69E19535F01EFC78B4C53DC54121389CC481AA033E275AB8AEC36AB367699BD08CDAF991DABCCC7E00D195D34FD1AE6A774C858ADAF6D9CCE
          Malicious:false
          Preview:Search for VBW..if (strcmp(#9,"A") !=0){...print( "Data invalid");...return;..}..if (double(#8) >=0 ){.. print( fmt("%2.1f",double(#8))) ;.. print(" knt SB");..}..if (double(#8) < 0 ){.. print( fmt("%2.1f",double(#8))) ;.. print(" knt PS");..}..trend(double(#8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.761977534984806
          Encrypted:false
          SSDEEP:6:TFw0dxLVJfIP8yU+UZIKrbU+bpI+U8avIKrbU+g4DTc8ynXKrDoy:TvdxrIPZQIG3RxG3X8Ty
          MD5:ACF74046391BAA4E7390974E507C5101
          SHA1:8DD10E331F58B2BF9774AEE6F383BBE10B3EF85F
          SHA-256:1D02561491D2A5545551EF971CAB3E4B8D26714E3F903CF7D46D802F046EB73F
          SHA-512:7A020E1ACEAE43049B15C88B4C003E262449496F9926DF8674C866CFFA28B57EF059D373CC683FDB655984DC4DEFE6C2BE0CCBE2BE829D4CCCFA78F839A86000
          Malicious:false
          Preview:Search for ALC..print(#15, " ", #14, " ", #16, " ");..if (0 == strcmp(#5,"3"))..{.. if (0== strcmp(substr(#17,1,1),"*")).. {.. print(substr(#17,0,0));.. }.. if (0== strcmp(substr(#17,2,2),"*")).. {.. print(substr(#17,0,1));.. }..}..if (0 != strcmp(#5,"3"))..{.. print(#17);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLLM3vn:TF7/Avn
          MD5:1C2E063C6BCD44C523D9E78D999C3756
          SHA1:B5AC52FF3473F990224327CC5658120EC28103DC
          SHA-256:A46DE7EB623F4C9474D017EA92207FAC23FDF70F96BAE6E51F1B03082D96953C
          SHA-512:1793118BBF4146B72223239F190940C9B2EC2D4A59476013CD6C93E54221EA827F7CEBD143F64B82B33ADAAA3F73DC58F6FCCF5CD360D6E49A023A48DE2E7C2D
          Malicious:false
          Preview:Search for ALF..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):58
          Entropy (8bit):4.671877762033242
          Encrypted:false
          SSDEEP:3:5NFD6b4Sl3vGHFxiGTMFK:TFMBlwPCFK
          MD5:BEA259EDFC463A9EC43FBDC4E207ED2E
          SHA1:C1601AC8E182A9D4551F27B8BCE4CB0F63976837
          SHA-256:91532963896577B118F6F6BC8B1F0C7219F0339FB79D0B6E06017C63480F7F76
          SHA-512:ADBB482FA9220796C8EF06E364B6C101D664D9299412C22C670F4D28EDECD4FFB6D61AEE1FEDFB79B2418173CC5337920672D8B229B3A23B39004A72B8D1A0C7
          Malicious:false
          Preview:Search for VTG..print( #6," knt");..trend( double(#6) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):78
          Entropy (8bit):4.663562559067146
          Encrypted:false
          SSDEEP:3:5NFDLoREWbaIHwQwUWZhJHfHYQwUWfAfov:TFFWbpHwjUWZhJHfHYjUWfdv
          MD5:FB346936BED36B64AC998EF2A53CD3D2
          SHA1:F2AFBA975680B5AA92B14FCA63E921A9123A49EA
          SHA-256:46F582A8DA456A2B6DE6361541224B71B30C686513B85B9CBF735B0F1AC457BE
          SHA-512:83B8A3381784D3D8C834AC1B773A4D85979C0C4CF771CF958D0D7C00FEE43A62E7F307DEA074FA4036C139445EB6F5715377B2FDE2D5EE4F6A6D3D8F71EDFCAA
          Malicious:false
          Preview:Search for DOR..print(substr(#3,0,1),":",substr(#3,2,3),":",substr(#3,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDqPXMlPJK2fyn:TFeXgJxfyn
          MD5:311CF8DF24955815B91CD1393F535F79
          SHA1:931F4E48C02352D819E96762301180AEA5DEABCE
          SHA-256:6FC07E0BCE5A643DE730468BBEE08A4786D4AA4FFCEE8AF6BEFF553A878FE03D
          SHA-512:BCAD90CE973F2D4C2D22A82B01CC8120D1F28113E696796512411D09613211A2443B2634DFADA668E07538F32E3594965FFD06653DF42CDEEE4DCD50C1AF0A48
          Malicious:false
          Preview:Search for VDM..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6Kfovn:TFNpyn
          MD5:37D082C0B9E46111035436D10E4D26F2
          SHA1:F211D8942FB301E2492639A806301CAD2DAEAEE2
          SHA-256:F68F3F3B26B3AC3D66D09CE95449CCE47C2A4C40E5DA8FFAC6757600B171C9ED
          SHA-512:8C6F9905C7CA82674E0528C239CCD3E8F3FDD6C998E4D663A3DDC73D2BF6A62042C335242C62E5B9467937EC8C01F75418708830BF88820ECDF05906838C7F89
          Malicious:false
          Preview:Search for ACN..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.75388313954079
          Encrypted:false
          SSDEEP:6:TFUJLlqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9IFErf:TKlilXcIlWsr+lPDlqUllbglWE
          MD5:E9877D384E5C1168A88FCFADB74A8A18
          SHA1:61C138793961D8934DEB325A3CCF99D1A6F1D1F4
          SHA-256:F1CBB3C4FD45F8A19957164589DAF91F9F0FCD2C27648AA627D8083AD6A1E46B
          SHA-512:7B95E8BBF20E6CB8FA32243900A6AA3311AF7EE2847E6D1C209DAA71CD07F129892F31E017C41E4D6FE9DD4F5488DCF29AB4D201F7C5A9F61CE357DAB1CAB420
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.745088333690341
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqJl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9II:TOElilXcIlWsr+lPDlqUllbglWE
          MD5:9693D534176220960AB34C9E62A6941F
          SHA1:6272D757BBFA0675CCAAD2BF5BC16D537FEF55BA
          SHA-256:3AABB0D684B14D6D68260BE831A8DD9F85E37E778FCA6FBF4861CE6E2DC3B539
          SHA-512:87F86D14C1BF4F492FADFC9F59A1858AF5080EBAC5799AFD9D666C3C5397BD40C116B09E0E30478B244670099A85126B8826AE19A2D79C3A0E515120C79F3023
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):275
          Entropy (8bit):4.820807398788273
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEZmFEruHhGu:TsT2ggl4GjVOQ/dYcKEUhGu
          MD5:6BE808A74CE47B0528B9CBCC39C3ED7A
          SHA1:ACD322442B017D1964C418A0AEAC83F78860541B
          SHA-256:8D578061B5B6849E2512A11121806370C8204C5731FD85998D5281644FAFB2C5
          SHA-512:B05C0979DBCD9D312BCB61D745CDAE1B2ACCA20F852994737F05375E7B81C3913F898C1E83D66E6B635B3246BD0275286F08F3E6170666CBA6CEDC6AC6C6D7A9
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):272
          Entropy (8bit):4.90974697117534
          Encrypted:false
          SSDEEP:6:TFC5lqFrV2g/IGjq0pxeZTHf5PYq4eqLR1MY+:TU5lk2ggGjVW/dYLZ+
          MD5:507B4F77086B1C66594A122C2FA9A615
          SHA1:A02B83F06CB01673A464482FA59B8DD7FEDD18AE
          SHA-256:B413A64A383DF97962916B8D87CA28F6830BD9F029BB9DA6802CE6D709B00A0B
          SHA-512:D85E57E73F730579C9493F5A6FD9ED0C371918A2C0D419783288EA49BB31EDD359ECEE806316BDFC650037F3DEB2D958EB72EFC43966613C0548CFDE72F98200
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. print( "Data invalid");.. return;..}..print( fmt("%4.1f",double(#2))); ..print ("%");..trend(double( #2 ));..if (double(#2) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLIK:TFN
          MD5:373EE063D70945C4FCBFDD3D0B0D6D99
          SHA1:5E865BB2D4BD1C9A3141FA74D92BA9B4EE52C299
          SHA-256:41DADCB9E2AA3C563100FBC18AF7AB43DC45E22403FAD0D438E5EB4C4CC3462C
          SHA-512:F369D374F2C73AEB6BC4B7795EC9234D761A63D664B89FCA9C3237A0B5BD53CCD2C4E4649B25A8C14786DB4507F6415E31521803564C678BFC1BDBA618EE3174
          Malicious:false
          Preview:Search for DOR..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1408
          Entropy (8bit):5.038433372570456
          Encrypted:false
          SSDEEP:24:cS2RXjUWN+WVhNh2jUWN+WVhERjUWN+WVh++2jUWN+WVhpmLjUWN+WVhaC0mjUWv:crdjU5oL2jU5oUjU5o6jU5ocjU5oaC0O
          MD5:F0C6309B8F09C6AABC18A3C35C04A3B0
          SHA1:49ADB95902B14885E3C9E2415433BCA330D6A73B
          SHA-256:760715AAF73C02921CCF96EED146FAB312A0CB724B75D875B7F5172AA34CEEB1
          SHA-512:DC80D06AE980D9B5A498A95CEA8EEA9AF8717EB34A6754DD46E4294DC281975CB4BAD845A3D075CEDE437EC3FFCE47D7A307AE96457BEF40E76B0F15CB817476
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"1")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "2" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"2")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "3" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"3")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "4" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"4")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..} ..//if #7 = "5" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"5")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):4.513794876803092
          Encrypted:false
          SSDEEP:3:5NFDWkov4FJqs3v:TFXooJdf
          MD5:455D0135D897C5650D699A71E6878DC9
          SHA1:E1EC5F4FE50F050733AE47E07E6E351359757229
          SHA-256:38FFAFD8AC7D4AC6F64060BFBA8B73EFC1A0CCDDA41B0E844A85F9870D144EF6
          SHA-512:F416C8573112A36278BDE6BC9F958E84F624D8FB65FAF084C5FFB7DD3A30207AB0065DC97184A09963F23CED50B08C0DF3579881E6C4D0D74B2DC3451617B2FF
          Malicious:false
          Preview:Search for GGA..print(#9, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.85046698502259
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEbIAlFEraGDHK:TsT2ggl0GjVONYcKEbF/GbK
          MD5:A10463C3C0842E133ABC4347213F87A6
          SHA1:7D9D2E6058BC7F7BFAC4DB03DE62C170F88FF9D0
          SHA-256:07C6EC49AA759925B2D88816388E14B323CCD1DEA2A7388961FDCCB96C40F9E5
          SHA-512:8485FA3F62F26BCACA2C8B6FEA63E517B2E8D7B5A49B0FBD1E8CA6F716FC253FA3D4F9A2793983BAAC88A015EFF7A4391FAE49B6109267DA157AFAD64398BC3A
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.7951281103782515
          Encrypted:false
          SSDEEP:12:TOElilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:aE4bIEygGeygIVHiygBKeygaf3E
          MD5:527D676855A12CC6E7EE5714D3F74B87
          SHA1:BC04027E3272ADF8480B3EEFC8213C6EC0295362
          SHA-256:F0269D190C07B2F57FCFF71B661994B4BA27FBC2C6B1F1549F0D00CD7481731F
          SHA-512:3218FB546D52760C229465386F1C1A8F4F133211F47A7641C0851F026A12D8487A07CAE24EFA4B0266ECAEC37B4D9B90A161E6852A7B5735B8882D89027D9448
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLIK:TF7R
          MD5:EB99A7F3B37578E7415C92E9BD17EBDA
          SHA1:8E3FCD81FAE1A843490899E10FA2D5B046FD22EA
          SHA-256:F08D607372A08BACE7F7F8109F50E2DE63C57642120249DD10554F9841CB453A
          SHA-512:7EB56E2F8CCF7D5BFFE779AD0C7B9F3C81C37F4CC40BA4FEFD736AE54298F334CB69305F790ADF70C233B9D62A0026279B89B4BE1D87C0D3F856E173C4E42E6D
          Malicious:false
          Preview:Search for ALF..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFDzLH2XUXmMJwQwUXVfHYQwUX1L4QwUXE:TFvUUlwjUlfHYjUFL4jU0
          MD5:5C0B309F240036081410AA92DF7076D7
          SHA1:20095BDEC142AF5DCE3B762A0739A5A63E851B59
          SHA-256:DF3B267C5D0F2C982061A4AB0F159025AE938E1B98C2B3ACB96CA622722A8262
          SHA-512:284B55055D3565121D7A96584940A91F02ED04214092F1B5DC8590ADFCD2F7D1D3AC80062D94613401586D3EC4515210557293B879E9E899F639BF2483830FB5
          Malicious:false
          Preview:Search for ALR..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5),".",substr(#2,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDqcPJK2fyn:TF9Jxfyn
          MD5:3DA47AE3CC1B63DBB0E5F9350F8784BF
          SHA1:76416146643BB0CF86AEFC8B16E2B4E54587DBCB
          SHA-256:6DC4CF4218FB43B8AB9A84D0B76AAA04BB46B5F543269D4E82FDC9DCF70DC935
          SHA-512:7B3C2AEFFC0E1565C0B2AE29CA376A87A59A907065F14B9BA7A8F5722D00459A4FA99277BE4F063D0F2500732745EBA849A13D3F1220980E4E0C00E5144DFAD3
          Malicious:false
          Preview:Search for VDO..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLJMey:TFhfy
          MD5:2D20F88549C5829DEDE2C95CEB94A4BE
          SHA1:FA8D11388086B160207445CF25EBAD46F4147130
          SHA-256:5F9A8DCB5EEBD14C48114274DEEAC9B104562C834DF91F43D63DCB09F0C8DAC8
          SHA-512:97C36A220C29FAD2737D77539715EBD31719B6005814C1690C2C0C7D83BE7C703EEFFF823A354769F5171F68900DD82B7B35493F1E36579BF8C63325456436DB
          Malicious:false
          Preview:Search for DOR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKRPMf:TFZgK
          MD5:E95C5993F098E886BD6C41E43A693F2A
          SHA1:4AA814B4535550101591080384619CBF80B00B8B
          SHA-256:ED1FAD38356DC3708A188DD03BE161B4137A59F92ABBEDEC40BE8E9B6E1E6F1F
          SHA-512:9E45CF10AC8DFE603BDD90DDA30F41C935EF1F24CCA5A70B81EC37BEEB07471BF7CF01AA9FA581666546DC0070C17852181D915BDA868914F93BB9CD7EA0805A
          Malicious:false
          Preview:Search for HBT..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.840521542776512
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEbIAlFEraGDHK:TNT2ggl0GjVONYcKEbF/GbK
          MD5:CA7B69D1559F2609B53E860BF0B0A292
          SHA1:EB13B6343D3D30301D081F99FD28C088109E2B91
          SHA-256:44BF74E05DCD9029CB2181C60D415EA1904E8955A72E529264712617A63272F1
          SHA-512:CE508FF3793457F32C9D1BFB0E93C2797A33F9A5DDBCADAA11136588537920BD97C7833EBD518861FC5BD1E0937258862D93279079DAFA95EBA6A6AEB173032B
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.769404604106139
          Encrypted:false
          SSDEEP:6:TFGVfIPN+UkIKrbeI+7IKrbb4DTcAXKrRy:TgNIPIUkIGUEGE8Jy
          MD5:438383B219045F831E489048B29EB845
          SHA1:A78C6EA8D2CADD8AFB660734E0A1F5C761EA1804
          SHA-256:338E94B600375A70754D6FAE00A3F9A0F2CD3BEFCE863801E1070B05C7351344
          SHA-512:EDC21AE7EBB638B60B4A76DBC40F2FF30306BF5DBD0198D049CC56976A42E7BD7CDD76F0C28B8C1992717011FED8EE71976A7BBAC87886A36118315CBEC9F046
          Malicious:false
          Preview:Search for ALC..print(#27, " ", #26, " ", #28, " ");..if (0 == strcmp(#5,"6"))..{.. if (0== strcmp(substr(#29,1,1),"*")).. {.. print(substr(#29,0,0));.. }.. if (0== strcmp(substr(#29,2,2),"*")).. {.. print(substr(#29,0,1));.. }..}..if (0 != strcmp(#5,"6"))..{.. print(#29);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):283
          Entropy (8bit):4.926593677728287
          Encrypted:false
          SSDEEP:6:TFQSkXLR32g/p3FOmhIOFErWq6Om8rSj2rFOmjAFErWq6Om8rSjviPwmK:Tml2glFO9EW/FOKuWcEwT
          MD5:85BC2149799AFA3B2385521B3552C44D
          SHA1:DBB19E140D682C1614EF65B220D1A6327DD538FB
          SHA-256:5C66CC331BE38A2C573AF61BA0F5CF87EC8270385B2E315A3191AE2218608B68
          SHA-512:56773DF5B4E4DE02F0E3A34C7A06AE26550D76F8A99EFC31376057ECB1636394783D1718AA1C8B146B721BFE9F8E0CF64EE8C0C1AF1BFBF1FE08FB2519A75BD5
          Malicious:false
          Preview:Search for VBW..if (strcmp(#11,"A") !=0){...print( "Data invalid");...return;..}..if (double(#10) >=0 ){.. print( fmt("%2.1f",double(#10))) ;.. print(" knt SB");..}..if (double(#10) < 0 ){.. print( fmt("%2.1f",double(#10))) ;.. print(" knt PS");..}..trend(double(#10));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.949310848764217
          Encrypted:false
          SSDEEP:6:TFQLR32g/p3FM6FErWq6MeOrSj2rFMg4FErWq6MeOrSjviPyMy:Ty2glF/7WFh27fEi
          MD5:43D922357AA1E841BAFFE7EAC7C3B85B
          SHA1:3492AF3DB18683C09F0593DC55B5173478E5511F
          SHA-256:2706E6405583564C001DE50314807E030FE92F9397661CA24A1273F826096913
          SHA-512:D486102B6F4C56D298DF511344968AC44512DF7C33B53F20D354F7C71FC23AEE75A72F9032D30C4686D5356FABDC842594458493029227F532E3A97AC7321A59
          Malicious:false
          Preview:Search for VBW..if (strcmp(#4,"A") !=0){...print( "Data invalid");...return;..}..if (double(#3) >=0 ){.. print( fmt("%2.1f",double(#3))) ;.. print(" knt SB");..}..if (double(#3) < 0 ){.. print( fmt("%2.1f",double(#3))) ;.. print(" knt PS");..}..trend(double(#3));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):335
          Entropy (8bit):4.848546118228948
          Encrypted:false
          SSDEEP:6:TFJPDGNZF1BmFErQBeyglqNZFvsFErvyglqNZFsFEr1JlqE3FErpKyGBk/y:TPUxIeJlYLTJlYHlpSKyGeq
          MD5:F0082F8B93998C20DFAE09D908FEEACC
          SHA1:4D667ED0366AC156C853852CAD0E8CFD8E8A56C8
          SHA-256:E065EEB1841342576E9310B55E6748A4DEE302BCEBB4EB12D7D7F43A5E843D8A
          SHA-512:E097BE83C46A5525941A9DF3206F1112FEA6F0CCD63D7E8DC3CFDB5CAAD8A4BAAC1017002E54A4BD2992ECA93701F153A9C4A8DAC7C43A91D948E865444B7B1D
          Malicious:false
          Preview:Search for NSR..if( strcmp(#12, "W") == 0 ){.. print("WATER REFERENCE");.. return;..}..if( strcmp(#12, "E") == 0 ){.. print("NON WATER REFECENCE");.. return;..}..if( strcmp(#12, "M") == 0 ){.. print("MANUAL");.. return;..}..if( strcmp(#6, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):164
          Entropy (8bit):4.705744211903336
          Encrypted:false
          SSDEEP:3:5NFDvX9OJea4FFErQJF6+3Af6X9OJ0YdFFEro4HM3vg+3AGXKd9fy:TFqtIFErQJF6lF0YHFEroXYGMy
          MD5:2715FF2911BA3A29D21249D405C0E5DB
          SHA1:590F19DA5DBBB40241C612206FB99702C7E1939B
          SHA-256:BBF9BA7EEB2C08053285249143E42358FD08B009EE95B808ECA6D05DAAE356D6
          SHA-512:8F874F1C34286A399C11E9707591AE9A8C2254FDBB731E25320BE07365A99EABFE7A4ACF8DFB478E5FB94FBB6C09E47E60883B3851E35A57B2106F1FEB8F41B3
          Malicious:false
          Preview:Search for TRD..if (strcmp(#2,"1") == 0){.. print( "BOW");.. return;..}..if (strcmp(#2,"2") == 0){.. print( "STERN");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDz4PMf:TFHqK
          MD5:D0E0AD37929DCCB878628533F0B3B540
          SHA1:C43241D4ABD8DF413F30B7773452557C9E5F6192
          SHA-256:CF2E6F978624642C121F5F95B5A2E180C0E3A06B74D9010316A9817B3C76CCCC
          SHA-512:5605176FA7EF9B939444C1629E9DED71AF3471DD959415A681D6F8F6FCCD0B0631E9356738DC7CED3A12E20C5784AD94CFB313E47F61849D8DDCEA57B7A29C5E
          Malicious:false
          Preview:Search for XDR..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.895832548462717
          Encrypted:false
          SSDEEP:6:TFCwxXluJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TUwlJT2gglvGjVeb/dYnF+
          MD5:637A504659642736DE8C2AAF3D7FB765
          SHA1:014495C70DE3217CD793DFE9EE4794845D8DA50F
          SHA-256:D2A06CA634D6F7C2FF0C68B32F4A114E433143047DF6ADA772864F52454DB311
          SHA-512:B0E921AEAF57CC65D0DBA82579907EC59C8C06873F5934216C7A887634E33572590E6590932ED88FE9734AF9CD35B97FEF0B894033A43912925DCE29370A764D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.8451834689284174
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TsT2ggl0GjVONYcKEUhGu
          MD5:35685D095FBCAB305FA3A0352AD5589E
          SHA1:E0EEC1D76748418FE494CA4DF75D3F423D0EFAC6
          SHA-256:34D05B420C46C068E72B145157E3FE6D43EAFAF9AAB868B0052DBEAC5A5EC3E0
          SHA-512:722727ED9C54B664C41097F37AFE491D7869613D63D165D2AE21B3B23C5BAE5059AD204145CA6CE2F15FA8814C8BA8351AEE5BE1E3BFB24E3BADC84A9F8A0D96
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.826179438139153
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlWXGjq0pxKGTHf5PYcKEbIAlFEraGDHK:TsT2ggl4GjVOQ/dYcKEbF/GbK
          MD5:E721D25F232CE982F09B71FD82E96FDC
          SHA1:3676273D51B69E515D066A5ECA7ED76069E0B8E8
          SHA-256:DD318DAC5932ED2B1F72E67A59872DEB46EFB353FB8C3D05541AAE08623D69D0
          SHA-512:B6B0704F3772C48D823AC94AA7D5744A432F82270C6CB83316689FB046134F4CAE684FC31FAFBC65C9A24690F007CF46C706364BEF5402D05249E0B43B61FB16
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.701649204701856
          Encrypted:false
          SSDEEP:3:5NFDMoN6RnRQHFxiGWEovn:TFwoURSPMBvn
          MD5:14A2BD450B44058474EBA3793E1BB278
          SHA1:10F5A2945BFB2E69C3E389FE09622C37CC3C24DD
          SHA-256:3F90F83BDEF9817589E1384E5BE0ACC1F0A57EA6223C6F520DAC186646DDA174
          SHA-512:160ECCCE42C8B4D6B2F9B58D52472F5C1E5BAA4A2DABE6DB1FCF3E1EC05ED862BB2A8DA18AA50667813F02E158A9233A63B24A53C28FC944FF831DB0213973AF
          Malicious:false
          Preview:Search for DPT..print( #3,"M");..trend( double(#3) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcKfovn:TFoyn
          MD5:05BB90FA5D5E4616B9D935D418A08574
          SHA1:1E08D8209AC1C44A92B6550FF7B5FB941D6CCC7D
          SHA-256:62AD1D580F42EB1890EF1CD15F2DA204472613B1C6F274EC6D1249E89762F2DB
          SHA-512:C1D7224EA9277C26E4E0F20D3626812013871D1D6E5C747D2868007B216DEF14E4642EE577A4DF2EFF3B4B9131773746CFF27C961E8B0B0C502C8E41C378ADB7
          Malicious:false
          Preview:Search for VDO..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJgGm3FFErFM3vFv:TFPRugtFErFAvV
          MD5:B8AEEDC64E02ABC88806B8C721D5100E
          SHA1:6C77EE37C03CE41E0F48542ADEC9C8F9A9348B6A
          SHA-256:C6EA968D3E40BF8880A990FF84285214155E5815D8A3D950912D16C9518D98B7
          SHA-512:C3ACC29CF676F4D4196E09102ABF181B131D55E369DDF6BCA507F66C0063D6B3FBF676F7E2F48DFD6BDBF536B379B684B59C6B97423DC9477E23E2CF87578233
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"E")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):56
          Entropy (8bit):4.712993984287172
          Encrypted:false
          SSDEEP:3:5NFDVNXKSOlgvGHBloFWv:TFbXOfPYo
          MD5:8A2C9B039CDBFFE8AD9AB28EA521E3EC
          SHA1:F26BB27B63231742AD316AD9E7C3C98438FF2288
          SHA-256:AC61D0772173E6853DEE105BA02B6B42C91EB5A9A7A3BCC99A677F71ADB7C9FD
          SHA-512:5DB3CC9604B9586F81081A56C803EA4F10E211D6A1D33888BEABAEC438D4BD43A012E6B72796D579BE48079C63C21B92B9D8F7F7137136A94E358922A5EEFE1F
          Malicious:false
          Preview:Search for MWD..print( #6,"knt");..trend(double( #6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.8451834689284174
          Encrypted:false
          SSDEEP:6:TF6mFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TsT2ggl0GjVONYcKEUhGu
          MD5:35685D095FBCAB305FA3A0352AD5589E
          SHA1:E0EEC1D76748418FE494CA4DF75D3F423D0EFAC6
          SHA-256:34D05B420C46C068E72B145157E3FE6D43EAFAF9AAB868B0052DBEAC5A5EC3E0
          SHA-512:722727ED9C54B664C41097F37AFE491D7869613D63D165D2AE21B3B23C5BAE5059AD204145CA6CE2F15FA8814C8BA8351AEE5BE1E3BFB24E3BADC84A9F8A0D96
          Malicious:false
          Preview:Search for TRC..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLJMey:TF79fy
          MD5:F8E47A12FDAFD813A4C474559DEFB2BB
          SHA1:9EEAF0625C7CECC62672D016C68591416B57949D
          SHA-256:D90C6DAE455B2A8EDE5F43328086EC99C823FE19FFCF7924AA7FEBCF7FC1EE16
          SHA-512:1732881E68E7B76A15B479CDF8AD46271C93F19D2ABF90DF41256A7B2A28F8FCC2711134BCF6F1B6133AFE2398ED0D1D7CCAE3627768C2131E98CD47760FF72D
          Malicious:false
          Preview:Search for ALF..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLKfovn:TFvyyn
          MD5:A6D29947E6D1CCD1A80D7B498DEC57BD
          SHA1:6A4732289382E2D3ECCC008C9143382DE9DA07B0
          SHA-256:EB697D5E0B8899152BFB76B218ED20B7CE82E2FC4B3B726568FA1CB12B57522A
          SHA-512:73B7131ACC17CDE1413F4F31DC501BA03A38F0BA7574976FE67F4559FDE6BB1783D468E29769E9A8BCA8460F48DFFF0D6F3CEE877B3A518A2B1D4A670E3BAFB6
          Malicious:false
          Preview:Search for ALR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6EK:TFdW
          MD5:61A2C7A8666697FEEC54D6314A6CB83B
          SHA1:A343380DB8444F715880340AA541644B989F30DB
          SHA-256:A809C0BB40081049726DD6D08CDB591F933A35CA3195B64C0584B65D188F5299
          SHA-512:9C81E2FFE5A2627D0E7141A55927DB50F1819E2A644F8EFAF3566C2D67CE1CB0240096B24F91A29C42272AB329F4B37957B2BE21927533C23725A212549447C9
          Malicious:false
          Preview:Search for GEN..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.446439344671014
          Encrypted:false
          SSDEEP:3:5NFD3fN63FpuMey:TFL12FVey
          MD5:2BB372B7E8492E7FEAAC268ADA2AD868
          SHA1:69FC162A1056F8DB0AFE36B0C180121928D4D3E7
          SHA-256:A98D3BD218DAC4F7CA1513AF80DA5ADFD3DAA0C63154F7A2043F4B089B87EDF8
          SHA-512:E489CC09534F55B16F151B697CC90C1CEFDC37ED96FCEB7DF46AC1D6B8B8F8ABCDBB0795DB2AB92C4A1B8A9487150BBE7A768BEE60B711DABF306FBA3E451038
          Malicious:false
          Preview:Search for RMC..print( #12, " ", #11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLJMey:TFv9fy
          MD5:88C9E487636A2C623D9B5F05E9FB49FB
          SHA1:192165866308DBDBDD9BB99D02C34879F89D722B
          SHA-256:0E404DE519C37D71714E450710D8ECA3DCE6AF154BEB7925DA9946D542B436A8
          SHA-512:9DCDB5BF2606C6AC3F439D9BD8DF263420CD02F57A510992443FFDCC442ACBFA711AD48EB077662F7ABAD1B553AECA36AC8ECC4E6CE263285C901FB06597E410
          Malicious:false
          Preview:Search for ALR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.39212668463354
          Encrypted:false
          SSDEEP:3:5NFD5KGv:TF1lv
          MD5:B050E06A5A0AFCE12467C1D9CFB087D3
          SHA1:F677E352C8AA84801D4D1A8BC5B8EB555C49E74D
          SHA-256:052EEA304152D8F7809D1D3AE836E70F8C429A564428838E8D2ACBEBCE82E304
          SHA-512:EB54DDC4C862753A15C0B504FB4B3A3BF1736517A0ECA6B97D21B66F50A6F033A1F4C1E664B025EB128E762B21ED3447D794AE9EC9D97E7EA453F7A19AB82A23
          Malicious:false
          Preview:Search for TRD..print( #7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.780616778028722
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJgGm3FFErKW:TFPRugtFErd
          MD5:E0C43B0FA18D0BC53317216BC60D927C
          SHA1:2287EBC17021547317C4BC5AB4F573F32E57BD40
          SHA-256:F1C82A11640ED06A5FFDE403C274130AA9E079729BDCAB2694BDF39D4285EAC2
          SHA-512:09D1FCC202F9FF3A8012C7A3F3880BA981E986AAA694D4959AE7D19C4AA85D0ED9905AB67557A50D2D69949F718DE793C87ECC779C23D851DAE989C610B6DC07
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"E")==0){.. print(#8);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqPXMlIK:TFeXK
          MD5:106F6AF804F815B13FC1EDDCC7105C18
          SHA1:5BB342EBD10D48BECCECFAE3E9C784F73E930DA6
          SHA-256:9BFEC9C5321E993AA678460F6C390A2C327A76251DB924A62F91D2DD41407D51
          SHA-512:4083EF6198B813D263E6CDE4D9B0198FF595AEDCCAA5449B745EC4DAEBAFA78F3A49903C435D313CC1C878A7F498CC807A2BD1FEF0F731E1001F28EC58B84663
          Malicious:false
          Preview:Search for VDM..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGJsFErvIlqJvE1AFErYhlqJnx3FErpKyGBk/y:TPQrIlc2qlcxSKyGeq
          MD5:3D4CBE7AEDD94C56EF4379BB8D6850AD
          SHA1:45F1268A0D729945AC52A781E12404686A3680AF
          SHA-256:7E21EC51BFF36A23212FBEAED9A4674A1E06EF9F38B8F62B8175849BFD8216AA
          SHA-512:2B53AD41FEB1E9CB40B65C02E75E7A5766BB45F0DD60D55612A567177FB90B0914EADAC89AAEFF85FE512E57179A1577FC482F5C1A55B90D2AEF5035D2208883
          Malicious:false
          Preview:Search for NSR..if( strcmp(#5, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#5, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#5, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.51364592935837
          Encrypted:false
          SSDEEP:3:5NFDf2plNUkgv:TFbYe
          MD5:41AC3657E10721B2C08C463DE2B9FAC1
          SHA1:9C140F8D2119D55E52E7F34D7930476992C38146
          SHA-256:C35B2FA855C59579C853C589BCAB8EADADA0F3A3CB55262ADBA75D835638AC80
          SHA-512:EF8F1C4844ACCFB9D2D93C2329BA6924809CC819FEB9AF3FA521DAD080DE3648FD39ADA90389041B481D60823B03338D8BDA84507E4C60C3B2F7EC58491D8289
          Malicious:false
          Preview:Search for GNS..print(#11, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.835201992471304
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TNT2ggl0GjVONYcKEUhGu
          MD5:E9CE55A0DADA85DB6F8198B58489880B
          SHA1:0E52C0EE4D784BBF5A6CE9181F3D7066EB0CBABE
          SHA-256:BA4C9E117A396B445DB20E82EC4AAD5A70BBD5EC203E29693EC11966B6AD7C7A
          SHA-512:465C6725B6D30537E31B30E09FE45DD8451841F669420FC7D499722D18DC9380A9BCEC25D4D0937FEE3F4413141D6B9B5D9F9E5CB9170AA116F94D7514044B08
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.800354488990939
          Encrypted:false
          SSDEEP:12:TmkEClZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:qkECSbIEygGeygIVHiygBKeygaf3E
          MD5:F8FBC44969B2C7264E441F87F082A313
          SHA1:A75D8C644BA47D8DAFF3259F116C0C77ADB0F01F
          SHA-256:BD107D1C802600B57695A41732034B5EE49FA9A0FDC52C2F8523E4E2C8DDBE34
          SHA-512:D7AC08E24CB04C4E79370FD9F386AD7290FE0D76FA196481F71C117AE6669D5416E1CE23E6036BC55E31F00624DAA63EBD30CCFDEB2638ABC7F6D8080965961C
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"2") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):38
          Entropy (8bit):4.45148902643068
          Encrypted:false
          SSDEEP:3:5NFDBlQlw3v:TFgl8v
          MD5:045D7D9A42FD731DBBCD9B80D243597C
          SHA1:CD8F08F8AEB6895990F8F215802598A18B843AC5
          SHA-256:ABED1A53898E81035E095B31F7B219CAE2C396DAF3426A68F46EFCCD78EDEE26
          SHA-512:0D0348129259272924785D3BA72D19F6CF07DE3C4A3FAF5C7EAB81649F1E16E44D8C9D054A4582274690246C6231985DF8B949E121659077C037761DFD2CC49C
          Malicious:false
          Preview:Search for HDG..print( #6, " ", #5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):239
          Entropy (8bit):4.729821516759323
          Encrypted:false
          SSDEEP:6:TFJPDGNv9OVFErvIlqNv9YF1AFErYhlqNv9d3FErpKyGBk/y:TPUv9OEIlYv9iqlYv9dSKyGeq
          MD5:280B6AF1185F7B8B63C0ECE4DC27DCC5
          SHA1:F751FCDFB4D18B805590A04C4CD895F40C0A6D14
          SHA-256:F5FB506983D2B5E2E429812CF07ACB541C0D106548AFE19DED29E907869D48C1
          SHA-512:8DDE452FE3E6F32F0077477B6556F4D2CE80E9612718A137764F0941EFA1F3F9A04A679038545E6C35E0B8B6ECDF37338310A3EA8CF53AD57E523B6944C19426
          Malicious:false
          Preview:Search for NSR..if( strcmp(#14, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#14, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#14, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):40
          Entropy (8bit):4.465311532225101
          Encrypted:false
          SSDEEP:3:5NFDiLPJK2fyn:TFyJxfyn
          MD5:BEEC164D879B76B8CEF36CF65E5BD193
          SHA1:31147658B8AABF30E8116B4A75D88C4135E1A733
          SHA-256:89A2A2D05574C50E23C202297EF8F324C67CE3D797E1A85DEA66FAA1BF0BA16C
          SHA-512:1452122D38BB9D21A696D513CE1D01125DFB31A1B96098C0C84C89F68F74AA74A3E65D7813172F9C60EBB08922FC86E9B70D6C090A0AA461FEF4D5F74B9BB851
          Malicious:false
          Preview:Search for ALC..print(#3, " of ", #2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlFMf:TFLZbK
          MD5:9001A172EA40F02820340531E7188A41
          SHA1:DAA459BCE4ED5638C033AA78879CB220C470A64B
          SHA-256:7CCBCE4B9B81D7584360BB0D4F4D8ABA0DC223789F771B8E9B6F294CE563F85A
          SHA-512:3E090E98D581D96E3C366B6B718CC37213ECB2B7277B3523DF84D686B14E833848DDF32883AB83BA2A656937D9B9F416C9503BE8BBEFD8F90947A6FB2B7F3093
          Malicious:false
          Preview:Search for FIR..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.890640573785258
          Encrypted:false
          SSDEEP:6:TFC5ls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TU5ls8T2gglsQGjV0Bb/dYd4M+
          MD5:CC0DCCF7D856C09226307E643DE76305
          SHA1:7DBC9846AB12E144424603FC38B5A4393EFA85DE
          SHA-256:3FF791F5DF797F7D2840960CC389C543E9A1E7F2B96343A5D146FB8B99CCEFB5
          SHA-512:22CD718C9CC08F3EA4C33A675262F2969839AA72503FD7842BD1FDF198FAA70B2EA9CB5AB737F8571768CD1C1B836F49B3070EA1EABD703A8FEB1F338B04CEED
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDWkov4EK:TFXo0
          MD5:9144A00B8E011154BABD1F2F5F3E2CC7
          SHA1:BB00596141A253C22DAC710FE386FF7F64592BAB
          SHA-256:2F2E531D5B52600A1233F75B00671479F7E60D98D9D578D253FF07C71541F47F
          SHA-512:95A37F16933EE6C8B911453DE5573E22AFB3D549645CC45B0705458648539605F3A89C67F97B11F78F8F156F3F89C8426B45B4E8CF020C1EBCFB0D4B77D1CDF9
          Malicious:false
          Preview:Search for GGA..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRJMey:TFfcXfy
          MD5:E5104FE97581BEF75F2F57EF92B45E72
          SHA1:0614F5E5E1ED319462782F2C22833028F12777AC
          SHA-256:1CAD7906E681EA601DE2D981B44B094B478389624CFFBF052FCC4051CCF430FE
          SHA-512:ECF89F84DA248D9B4D5F01028CBEF82E3303FDF16519CD284ABC47EF5EE4CC8CA96EA4CE9809C5633E87DB138FB36A41786B58B3C2CC642517C79E9C0D9C7CF8
          Malicious:false
          Preview:Search for WAT..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):160
          Entropy (8bit):4.916832398504472
          Encrypted:false
          SSDEEP:3:5NFDiX9KdY7vFuLrVJJSiYgaQ9KwVKXMLrVWEBiYg3sLrX9fLy:TFpYryrVqi3oKrVWEBi33qrBe
          MD5:9383C4474395637C879AC50FDFB42160
          SHA1:D184B1A8926F6764190D97D01644998907ABB5ED
          SHA-256:2470E62B8A609575A955AC7D404C265AAC73830A2BA469CB611DC4D280790683
          SHA-512:1DA884932ED46FB6E25A7F597F1BA00547CDC8FD388962809ABEC991407C43B3001B9812CB827F3B9723B461D15560B099D75D3BAD7AE73690CE5AE50E8D6DD6
          Malicious:false
          Preview:Search for HRM..if (strcmp(#6,"A")==0) {.. print( "Data Valid");..}..else if (strcmp(#6,"V")==0){.. print( "Data Invalid");..}..else {.. print( "Unknown");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):59
          Entropy (8bit):4.746718472943976
          Encrypted:false
          SSDEEP:3:5NFDAxfwRWoOJ2P3FFErFM3vFv:TFPRu2tFErFAvV
          MD5:6453618412AFEC72B6140D2FF66768D7
          SHA1:45FD618BB7826C8DC893ADA2910F0FFD987A358B
          SHA-256:B8EA611B2225D0D136364BFB52177136BC9C940E8CF0E5BBCB6ADE7418B22C18
          SHA-512:29A858050779F081EA75E855C172C08521336F480997B0E16154374060E2357FF6070E08062F17CBBA5B7650E2FDC38A5DFE377DD93A9E7B956151FF5D6F36E6
          Malicious:false
          Preview:Search for WAT..if(strcmp(#2,"S")==0){.. print(#7);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):184
          Entropy (8bit):4.97019263177749
          Encrypted:false
          SSDEEP:3:5NFDdGvM6X9LJE3HFFErQireJ+3A01XK8afX9lGYfPGef4vuLRoRETt7wQwUT3lo:TFZ4RJYlFErQWY2Y8UX9cy+AiurRwjU2
          MD5:0EFE37AC4B0C82A7546AE47F8AB7AEEB
          SHA1:931F675C695AE4F4B0605CFDA09166D2A2F652AB
          SHA-256:B4E864C01FC97691D3265B620016CE8F7496FB8192915FDA5143D95360F07E5D
          SHA-512:B2859CD939F1BF3ABCC85D1840993FC0845D2E311E315ADE5C546F41DACAD1BB6E770650C6238EED3EEC058576144CD738577DF21ED4599EC60CD01EA1900AF6
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #6 1:2 ":" #6 3:2 ":" #6 5:2..print(substr(#6,0,1),":",substr(#6,2,3),":",substr(#6,4,5));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDi7FMLROLrnfn:TFmtrnfn
          MD5:C1C3E489BDFCB595936BEE9F23E07AB9
          SHA1:4943D56DFF09417E7556F046B21D0DE5502C4233
          SHA-256:AD6AAE11EDDF445AF7D2BC6374D739BC5201920F22DBE7605E2A90CED19CF27F
          SHA-512:DDA5098873EB253144154B00F6BE89AA634174EF4186480C2E7427A082B729328ACFA11F5FCAE81988E1683A14436272B430C946864AECC740CBDD69A776250B
          Malicious:false
          Preview:Search for VLW..print(#2, "nm");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1410
          Entropy (8bit):5.044294068122479
          Encrypted:false
          SSDEEP:24:cS24X8UsihUXm2UsihxX2Usih+TX/UsihfXAUsihfXsGUsiZxe3TBsoRc6i:cr4X8UsihUXm2UsihxX2UsihSX/UsihQ
          MD5:57E9FA9E28F39969316E1EC751353C10
          SHA1:A5967B1F2660309061C61231C6BE5548755B6C89
          SHA-256:835706390F3CB5465C2037FBE276A3587B11D9F852118A32925BBE1D2E6D0D92
          SHA-512:9E859AF9F4F9E43DB66DC10C9EC3594E47C2538D411AC07BDF8FEAAA51B36D749E9690D21E1EC79EAED5E5C7BD9271057AD2C6C15911DDE4BC683BF59412E3AD
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"1")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "2" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"2")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "3" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"3")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "4" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"4")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "5" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"5")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. retu
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.782551202337296
          Encrypted:false
          SSDEEP:6:TFJPDGNjXk1FmFErUd6lqNjBsBmFEra6lqNjDk1FmFErzzIlqNjJR3FErpKyGBkq:TPUjXkPuIlYjI3lYjDkPZElYjPSKyGeq
          MD5:8049B7C7FFC37DFCC65B25CF167A1283
          SHA1:41F07E754FA606761E5BCD49C7BDA9A60939C359
          SHA-256:E80F009AC8F3B85A93549E0E065BDC44C12F611C397D030F260A8FE6C6451111
          SHA-512:C77B800C8F453E73E4A5B92D72279B993CF5B01E62EDDEB89BBDE1B75E01EBEC43A474B642A35766EA5012A2036F2E03B4C7436501DA93CC315EBDCDFECC1FF7
          Malicious:false
          Preview:Search for NSR..if( strcmp(#10, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#10, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#10, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#10, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.7261033495736084
          Encrypted:false
          SSDEEP:3:5NFDmB6RK6O3vGHBloGTMMf:TFoZwP8K
          MD5:73F8A302CC3C78B4261A50EEF951C167
          SHA1:FD6EEAC1F239C10B59DE6DED07CE080C43EB0DE9
          SHA-256:2688E08E0294A745DA91E029C564D67DC4CD21776CA4834EF3C637C2764CBEDE
          SHA-512:094459E956BC92567F100902FCD687AFB233530B4C97C09DD873AD9F7002E4AD8F8306C58510BA669707A7B87EDAA4620BBAE9EF7F758035422799E849B3FFE3
          Malicious:false
          Preview:Search for VHW..print(#6," knt");..trend(double(#6));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):239
          Entropy (8bit):4.704716914248863
          Encrypted:false
          SSDEEP:6:TFJPDGNQDsFErvIlqNQTHE1AFErYhlqNQLHMi3FErpKyGBk/y:TPUQ/IlYQCqlYQgiSKyGeq
          MD5:B430A4A044F8E604F3D41A9752DD6F56
          SHA1:221A0036621A739D9636C831ED7561A6E8DBDDE7
          SHA-256:412090C03A7D4C60AF70264F11DC5DBD9A6ACBCD66B3DE81F79FEDA526F95A12
          SHA-512:FA82AD5023848037A127577BD5F999736307A82CEC5830BA53C117A4A9E70C39E29C5B846A37D6B5F46C4AB35B15949CEE6E079F47AB698B6906947B951149A7
          Malicious:false
          Preview:Search for NSR..if( strcmp(#11, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#11, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#11, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.788075985119281
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9PMMco+3AGXKc31+CQHFL:TFaoEFcrV2g/It2e9vfq5GfkCSPmW
          MD5:1F0EACFA3C4DECA6E43B4D7E8985292C
          SHA1:42309AD550D90C8146B4E8C05702D969A61367D3
          SHA-256:7ECA65CF1D25A6477A8BEA0171B2833A1CCC1F5974AFF8E1AD86CEE0D4126E59
          SHA-512:325274795B4F84694D1B262FAC2F5CB4544EA952A1C0E2891DF2A1DD6BA9490C18283AEDEBBBFF0E6CC8961E33DAF5D8A6A670A133ED3EE1CD0B76FE53923C94
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"1") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6EK:TFi
          MD5:DF1728A7643081E7A94D07541090BF14
          SHA1:645A91B67B8339EDC946057D0DAB3A97F34922D2
          SHA-256:835E85143CE6D5CB78435763641ABC89D81BEED4C010A7A314F3E27FB8C98EA3
          SHA-512:E31DAF5F1D0C872FEF48A7A146924D10289C84BC5EC388CE3D928885EF61D358625DEAC572B15BB429BDAF5F700C914EB7F9A9FE0413A38BD1FEC84AA752698C
          Malicious:false
          Preview:Search for ALA..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.895840154756691
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TOT2gglmGjVXv/dYJIhdNu
          MD5:CF43C3C7BD49EAAB06248A5406A9DE63
          SHA1:CB83A5508051208D73DA310D9D53093584760459
          SHA-256:ABA5CB312F72847FE14F09D8CD4956B31A672311DDAC002B53773BDC81B255D0
          SHA-512:94CF6D3ED4685A31C7A36E9DC416AC02954CE97D1169358DBEECC99E09B07D1C7A7F5FD9F6D060F1C7FFCEEAAB12B4F4B9B4AA4874094038FE923DDE07AF1C1E
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDB9KRsfZHBloFifn:TFN9lPYif
          MD5:3EFFBACDD60F7332FEB020A732349A0B
          SHA1:83D8E79196137D49BF2CAC30EF6946879EF293FA
          SHA-256:3E46C33790B6702B23DFA43946A7A571D30DB08C559F4C879750BB085E6FE3EE
          SHA-512:D9BE39A0CC32BF77158462C40888F1B557E793B465F2BEF4C172FD56B156B17F665BC48529D7726BCB4BF13D330A6E806DD2409B8EBBB72CFDCDA7E492442848
          Malicious:false
          Preview:Search for HDT..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDiLIK:TFY
          MD5:9CB7C3DF11E3C07CE792D7CD9698DB1B
          SHA1:AF6267D61A07420348B8EAA6F6485A6F83FA7B43
          SHA-256:8470802DD4CC21ABA24100A2EBF6BB7C5E5EF1F3A86AA29E5FD440B7DFD52D60
          SHA-512:49E9E762B70CDC137DA4BA16E28CBF2459A55C3DA5AC8CA50C1F3891D5193B99028F620477EF1CC3BFF3780ED54666DCE7FCB86E11CC8BC1A5183B632EA23AFD
          Malicious:false
          Preview:Search for ALC..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVTkcrV2g/I9eMFEr+1FeCFErNqwPmif:Tz2gg9P1F4jm0
          MD5:C26B9D0CE5EA6FCFC72F9C6A1C6CC555
          SHA1:E6CE74625BE91C88564BC46960F8D289AFF50DA1
          SHA-256:6BFBF38963369154353C9C11C6AADBE694D674B958B74E7A24D82D80AAD20DBD
          SHA-512:7A0FAC80933E672E99230CB87B042B489355B11CCDB5F85B286B1272599CBD1B4FA88C7C898F4CED562312812D04DA564D312FC9E1AD8E128C974FB3E14F58CD
          Malicious:false
          Preview:Search for RSA..if (strcmp(#3,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#2) > 0){.. print( "SB ");..}..if (double(#2) < 0){.. print( "PS ");..}..print( #2 ,".");..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):62
          Entropy (8bit):4.887438802525302
          Encrypted:false
          SSDEEP:3:5NFDNl3fYovRQHFxiGUm2eov:TF7fYoJSPOmI
          MD5:6E0A62FADCDE084C5C231B29BB9148B0
          SHA1:410BBF6819B1EB36CED8E54E2835CF7407359E93
          SHA-256:EFA8E459F1AABE9F00550585A26248270BB02D441E71954F12700982932CCE4E
          SHA-512:371E8B470118593387DFD729AA957F9CC19C6653E2FC6DF1FF3558040A2B3EE872904AD7C664D020229E5C419726FBA2A8E83C840FE912B3B4DD75C2BC02F908
          Malicious:false
          Preview:Search for HTC..print( #10,"./min");..trend( double(#10) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.730915395146161
          Encrypted:false
          SSDEEP:3:5NFDHFMlsfZHBloFifn:TF7PYif
          MD5:04E5693FF20BBBE70605F7D5ECA497CE
          SHA1:0B8F4304DDB780C96825F536E847260C67849E27
          SHA-256:34CC3E64901E67735E101766350084174FCAEAE693C445F5B4CBA04AC48CA9D2
          SHA-512:32C024BBD8D56ED6AA8ED005C15F6814D4E149BF11DAEA045EAB4B6FC49104FEA986F256A782D4D2E8816C2E0AE9264EA57DB16D4CF6D1B96A09C35FF83E3F34
          Malicious:false
          Preview:Search for HSC..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDUq6NUAv:TFdSJ
          MD5:617749B1BD5871A5B249FF70A9058361
          SHA1:2DEDAB8DE8F802F1A71612953DEE579B5DE07DE1
          SHA-256:87FB54199E318D10EF1D5A292632982C73A8AACA64E19463A366875760662CA3
          SHA-512:552FFB707ABDE69159DFEDD65D7F435433D954DB140A07D721D685CABAB6B4A65C67D287A1D1A6C8B16640CC675B45436680BF4C667E7A583163765F24E11506
          Malicious:false
          Preview:Search for GEN..print(#11);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):282
          Entropy (8bit):4.742918596477533
          Encrypted:false
          SSDEEP:6:TFIQazfIPQ+lIKrbkI+FvIKrbXp4DTcTXKrjy:TOhrIPrlIGC+GXK8ey
          MD5:CE59AA836341199C42FC336B910A2F28
          SHA1:A5532D58B2F6D7D850BCCD1CA688B99BF6773B7E
          SHA-256:45ACB69A6C0E0A76C30A7E7716A731EB131697BED19CDD8BD6EA549704AE5268
          SHA-512:38AC244F621720D9F97E3AF2918224CCC6728CDCB2229AE78D161CAE2D5CDA33FFFC2507175C69A3C76A47D756305F00C996345872B69607C93435B1A83744AC
          Malicious:false
          Preview:Search for ALC..print(#43, " ", #42, " ", #44, " ");..if (0 == strcmp(#5,"10"))..{.. if (0== strcmp(substr(#45,1,1),"*")).. {.. print(substr(#45,0,0));.. }.. if (0== strcmp(substr(#45,2,2),"*")).. {.. print(substr(#45,0,1));.. }..}..if (0 != strcmp(#5,"10"))..{.. print(#45);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):692
          Entropy (8bit):4.958200302568717
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloIFiU3YrPDhloZFiU3YrPDhGtq6FiU3YrPD4f8Bloololc6GZ:Z925tjyxUu7hy+Uu7hpUu740Byoylc6i
          MD5:C74E39B4F2A8EC56E195BC72444C3905
          SHA1:BDE6FCB3B9A5B93C36F0CBD036A92623AE955E81
          SHA-256:93D36316EC95210B2DC1F942CA9CBDF77BC6B283B51ECF7C9835A835050E8FF2
          SHA-512:93CB4BE9396A8524AACC192BCA45E615E08303DC7BBD350611D051A583DFA5C97B07E7C4FD17AD94794062C72EB6E1C4287E8E0A12C719E870BE29EDF825D607
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));.. return;..}..if (strcmp(#13,"D")==0){.. print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));.. return;..}..print( "!");..print( #5," ",substr(#4,0,1),".",fmt("%5.3f",double(substr(#4,2,7))));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD9XKROK:TFZs
          MD5:C03D8C934E2F06F3BFB88E7C5F69644C
          SHA1:295C8595C19DDA731186D8C25F4524793EB930F5
          SHA-256:29CFA759D3BB168B4C159465C380D5345EABBAC22ABD93CF56A424F477E931EC
          SHA-512:970371F9FD66CDADF79771A92F10DA5C3E1ABA904DE82B1115B951E8B36B1DF159EDDC4CD54D0C532460F71D08B918AD6FDB156873EC4A3CFB8EC825B4D281FC
          Malicious:false
          Preview:Search for HBT..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLKfovn:TFGyn
          MD5:DCD024731D315ACF2429111647974FD3
          SHA1:EDB4FAE8971B8305B21B3F6C52FC009E2E40CE8E
          SHA-256:6930C0F5CEDF590B8B11A78DDD1F13BA5F73907F674C19302A3C92428CB36F4E
          SHA-512:205E4C1AE87AEE661E35FA0C83DA8DF864C5B81B0A35AAE5EE7D463D14FA44DC0E4ECF1E081D4ED1245C77F7B1F035580FC808DA8B97877429B650C5AEB77776
          Malicious:false
          Preview:Search for DOR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDzLPMf:TFv7K
          MD5:E12A2F5C0E84A3C995FAEAE318CA5462
          SHA1:EB1A76F1519E803BFF8552AE0A43F0154EBF9FF1
          SHA-256:F0F1B7D2132B715C5725F4DC21CB986CD769B8FC2325FFE67059F8EA1F71D169
          SHA-512:6E25ED61F33D9845D119F78AD4FC62F4DBE56B09AF57863DA5823B792A6639ED2F0D638314A2BCBA8FD011A60D6AD6E9D129A72A785720F615FB824C1545C142
          Malicious:false
          Preview:Search for ALR..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):4.499227541723358
          Encrypted:false
          SSDEEP:3:5NFDmkplPJLCGZ3v:TFTJLFtv
          MD5:30169015BD79435EFB5472B352C1A643
          SHA1:AD5961DEE451BDE3711DE8EECC2F5D5B4BEC4018
          SHA-256:8697BEA61BDB37FB7187D2F630A84B7015028D652F01AA4AC4E628EACE730DF8
          SHA-512:E3D117FE0E106A7126C73F7FE5833FC3E2FDAE5066682B9C614C0D4B95C95D354C651A976428A2D99638B8A1C8703709A1FC587521846D90D9A9D8DD7FAFF914
          Malicious:false
          Preview:Search for ZDA..print(#3," ",#4," ",#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1347
          Entropy (8bit):5.029132232087029
          Encrypted:false
          SSDEEP:24:Zu2s5XyUsihiXVUsihuXrUsih0XXUsihYXBUsihfXsGUsiMBCPc6n:JoXyUsihiXVUsihuXrUsih0XXUsihYXf
          MD5:A9172424F6D4242F2E4642E0E11CEDF7
          SHA1:7EF2C9558E42B620B641AF6FE4C11A377820FBBA
          SHA-256:6C8C79B2F3D96DCBF1BF3DA1FA60F8DA8069B6FF7978D1885679A3BE6AB560EA
          SHA-512:0AF1CE0F2BEAE090E38C0D87D3281EE2C1AE30E8768CEFB61AE0BC3AFADD5AFC04AD324CA81FC300F1A43343AD82431AF4AD6CE447B4C9D77C025E0B832B3B5B
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"A")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "D" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"D")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "P" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"P")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "R" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif..if (strcmp(#7,"R")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;..}..//if #7 = "F" print #6 " " #5 1:3 "." #5 4:6 F00.000 Stop Endif ..if (strcmp(#7,"F")==0){.. print( #6," ",substr(#5,0,2),".",fmt("%5.3f",double(substr(#5,3,8))));.. return;
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):65
          Entropy (8bit):4.7040511288482865
          Encrypted:false
          SSDEEP:3:5NFDpL5FT93vRQHFxiFDy:TFLFFJSPmW
          MD5:F66A022F2F14FF2894733169A4D04BF2
          SHA1:91DDAED0BAA309CB78DE3F541A5E2D950B8B4A08
          SHA-256:0E67203156C7BB28BC4E13003CACC6DD336B942AB20F3D013C8106C158EC820D
          SHA-512:91896D5324DF2412BA6931341EFC612E97F39CBEA2A5FF78372BBD09EE88F64DB1D053C8C0627E5F2A7B1757B899DA5BD5C04FB3C270BDE5AE67B4163225F66A
          Malicious:false
          Preview:Search for DTM..print( #5," ",#4, "min");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLLM3vn:TFjAvn
          MD5:ADD54C2AD039D3819F17D4A255771A77
          SHA1:DF832CA778BB31BF8735BB1469BA4A8B6EC57790
          SHA-256:26430E301504D413136CF3CC53FA4212B4DDC7089FC034F4FA869D6B8A48840C
          SHA-512:1DD6E60A96AC5E358607E42A238426CECA264D1AD2DC798411BD7A4980DA54CB3ADAFE15D9E819B2B93011E849ECDE1C271E8A99F1804E5ADE49EAC2B87079EB
          Malicious:false
          Preview:Search for DOR..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcLM3vn:TF5Avn
          MD5:7CD218B684DB45B17EE11A6E0598DD7F
          SHA1:AF0396EA51591E53AAE819C879C047805F54D47F
          SHA-256:050AF8A13B3605276415B043AC80790A6663DF6C463D5FCAE073BEE3D579D117
          SHA-512:D25BA1095C4BD33B15641245272E89E41D298D437D4EEEED88B9BFCF4B2D86F75A8A70F4FED793484456573225620D25143327BBBA98F980006BA709F1C27723
          Malicious:false
          Preview:Search for VDO..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):4.572469458770135
          Encrypted:false
          SSDEEP:3:5NFDWkov4NRJ96M3v:TFXogRJ96Mf
          MD5:045EE688293BF6CB3FE0556BA5771A06
          SHA1:38F7FDC92569B1374CED20ED30928B6873FCB0F3
          SHA-256:BC0A163B033E4F1671950E83960D4DA95D266E4272FF365A7F0E67E2E80C5050
          SHA-512:0159AEDDD9F6DF75B6CF5724FAE20B970772537064BF8CEB4420A72E17E2A7D2C17A6F77B6C948B62A184DF86CF058DED30FC9A915316D00C88367B0BC15E2BC
          Malicious:false
          Preview:Search for GGA..print(#14, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):224
          Entropy (8bit):5.099125025909878
          Encrypted:false
          SSDEEP:6:TFZ4RJYlFErQWY2Y8S6AKFUFiUNaVVbMWymwK4Pms:TvsS61FUFiU8Yrd1ms
          MD5:EBD87D58F7D0A0DFE57DEEA4C8202964
          SHA1:8A9A2835CD9F828BBDB9EED2A3F0C5A7697E8981
          SHA-256:16E9BAB5D0137FABEDD3992A69EF48103D9CE6264478D058031CB227A17DD1B8
          SHA-512:7B576629A126E635E4A916B7D25BB451761C0138A51A83ECB8689005865B50CD3514B40838D119422CF1A41880AADFFA0C281D99520AA4863C2EE89C69DE9D77
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #5 " " #4 1:3 "." #4 4:6 F00.000 ..print( #5," ",substr(#4,0,2),".",fmt("%5.3f",double(substr(#4,3,8))));..trend( double( #4) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):278
          Entropy (8bit):4.840390712476405
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/IlAFpGjq0pxMeTyeCSPYJIMslFEraGDHK:TOT2gglAXGjVXu50YJI5/GbK
          MD5:4B6A35EDACC70CCE8BB95F9FC555F63B
          SHA1:5CD5507C2ED6C0BA9BF51D4E0217671FFBD3F8F5
          SHA-256:9DC5727C88CD850AFEDF98CC7E9D1B1AED6CE8CF84233A1F1E940D4F89E125C7
          SHA-512:16956530D29DED12CBDB10BE879241F39AABB2C0C8B1E1511F261DF7F5E0A573762B31C605455D367E45A09752D5A8D1080C5260C75AB1404DDB96E9992C16F7
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.806183542158471
          Encrypted:false
          SSDEEP:6:TFkQFErjjsGFEr53shFErhKms1FErpmsjFEr6BwHW:T6/svsSsimszi2
          MD5:32A1DC8B3652E59ADD74501D5A8B64A5
          SHA1:91A0DE499177B94B410B3EECF47B05FE9274F2A0
          SHA-256:05F653DBCF9ED799116AED812386656207D7941AD30FB453248A27CC7DF30FEA
          SHA-512:961CA9FFB5DBA87661BBE6B94CD5BD0EB77A3C39015D025AD93D6E9CDADC3C23905BAAA70C0CE021ED15D055ED7640477F093D77FA0AE716ED9BE8BA233B1A1B
          Malicious:false
          Preview:Search for HTC..if (strcmp(#5,"M")==0){.. print( "Manual");..}..if (strcmp(#5,"S")==0){.. print( "Stand-Alone");..}..if (strcmp(#5,"H")==0){.. print( "Heading");..}..if (strcmp(#5,"T")==0){.. print( "Track");..}..if (strcmp(#5,"R")==0){.. print( "Rudder");..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.778943565027957
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJ2euo+UoU6X9PS+to+3AGXKc31+CQHFL:TFaoEFcrV2g/It2e9vfqjCGfkCSPmW
          MD5:88E1B4B292F87F83F482E5C26F9BEABC
          SHA1:5F59935A09B59E777292C46EBD0E1F7B1C1F3FED
          SHA-256:1E9374F7D33BC20C485DAA4929CA60945691E9051E37F78228F7D8CBCA2838BA
          SHA-512:34802ABA470D375E6D657DF8386FFEBF773D43A28826D040943B737A1DB4BCD83F151BAB22CD143D0749285B5A20E18DE58D3813DBE7F1603140F3658329F3ED
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"S") != 0){ .. return; ..}..if (strcmp(#3,"2") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.827863787639069
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMslFEraSHK:TOT2gglmGjVXv/dYJI5/0K
          MD5:E93CB4326D3E1EC3542BCB01B275BE60
          SHA1:181F2387F4F545CF15102745F49D287AFF42EDEE
          SHA-256:58B77674FA851A3F1EB11D9AD3AA92CBF256FE2CBC0FE5CB75A01F7B44C6A865
          SHA-512:455A5783EC046A34CAD1C7832BFEFC70842B4B70F52678ACDE717B9E7EB6AD101601706CE87A1284F66251D6073846EB223CC2B5086B0E3FCD7231F2A74E3BF6
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) >= 0){.. print(" SB");.. return;..}.....print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):33
          Entropy (8bit):4.513794876803092
          Encrypted:false
          SSDEEP:3:5NFDf2plFJqs3v:TFbQJdf
          MD5:4D0EF61907E761F6F31306E0D4F1869C
          SHA1:4E30EF303B5FE6DD1E1DEEA64F0984CA60036FD2
          SHA-256:0721DDB5FB79CDEE797F937623AB2CC5244443394EEBD6313D98F4A75302EB6F
          SHA-512:ADA0859F196FF6761A09DD618FF7524DD5047760ED6B79C1C00F1401349C74BED8C2B658A1A5A6760E4CE618E3D341187798DAE94AAD53ED32A7752A76F24F1D
          Malicious:false
          Preview:Search for GNS..print(#9, "m");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.4968985554505645
          Encrypted:false
          SSDEEP:3:5NFDBl89Yeyn:TFgyn
          MD5:F602950FE072F1CBF8A5AE02B3DB0A2E
          SHA1:5A062BE2DAD4AFC2B40F5CC3DDA58AC24E707529
          SHA-256:BF4EB8D280C7BA0359E177D842CC0A7F60E5C72C183C4A50BAE078AFDE6988F5
          SHA-512:AE8822F491AD5530F32D08D56E55E78E2BDD4B31227B80399D0855B9C50B81313406C35ED504211105D6A555C7BD8FFCEFDF3CFD87A18883823B90414AB1C0E7
          Malicious:false
          Preview:Search for HDG..print( #4, " ",#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlKfovn:TFLZ0yn
          MD5:153BE4B716EF953E78A1A2FB9E68A2BF
          SHA1:444815C287BA6A4CBA6A4051100720AB3A511742
          SHA-256:ECDBE6942C3D434A9FC62DCA2E2EDBF39367C9E4FAEBBF5540C615BC131E15E8
          SHA-512:7D999C101700C0E518A2BBADFC5AF004B8AEEFC76F7EEE4BA4D41A6CB7AA953A31A9F4CCB0251A8F63AF29DF5C88C709FFED7EE9830403CE9316ECFBB170C303
          Malicious:false
          Preview:Search for FIR..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1255
          Entropy (8bit):4.823382565856403
          Encrypted:false
          SSDEEP:24:cS2hUEUEUFy3UEUEUFYUEUEUF+pUEUEUFsUEUEUFQ+UEUEU/HhIoS6F:criEUEUFykEUEUFDEUEUF5EUEUFnEUEL
          MD5:1E2B0B5C9B045D48E0157B70A99520CE
          SHA1:A56B170163D810456FE82F8AEC6E058130136F30
          SHA-256:3C724229D3EA1AC5E5368BF402C793C216A87B3C1B5729E7DA4A285BB0EE99EF
          SHA-512:BAAAD857AE11B3C598F4548E034770995662DF78AD1938502F875B4406DFCA071D1A8CB4F2AF6F3254B8B9C5C24EDC5409C5B2F19C0682358AC590A545C2E7B8
          Malicious:false
          Preview:Search for GGA..if (strcmp(#7,"0")==0){.. print( "Data invalid");...return;..}..//if #7 = "1" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"1")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "2" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"2")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "3" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"3")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "4" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"4")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..//if #7 = "5" print #2 1:2 ":" #2 3:2 ":" #2 5:2 Stop Endif..if (strcmp(#7,"5")==0){.. print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5));.. return;..}..print( "!" );..//print #2 1:2 ":" #2 3:2 ":" #2 5:2..print( substr(#2,0,
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6PMf:TFNQK
          MD5:B41312F75583AE3C1D61A1914291ED7C
          SHA1:D03125FB6E4E773C9162EEEA363EB39A014C8E48
          SHA-256:040334504D902D0C7A850439D158FCF8975387DFA4C202B73B1B76CC4363ACC6
          SHA-512:E6BB3118B65359E953ABC4F41FC1990E51B68B379896255AE02AC9EA55189C0C85EFD10BEEBE8EB37B3FCAF028B5664382F2130C0BE24FE087D86784CA7D8E26
          Malicious:false
          Preview:Search for ACN..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1492
          Entropy (8bit):4.621895151006009
          Encrypted:false
          SSDEEP:24:3sYdYe20p8zBAtNnZNGYT4X6Hvny+QWrnflnquBcC1lBV:35i1MznBd/BV
          MD5:7CB9E0DEC493FB5079E3FB46E808434E
          SHA1:5DAB211100CA075D364DC8C2583374AD1C8EADDE
          SHA-256:DF5EEE715527B64D28220AECE5B8466EE06CD2079681E0F7C5890F19D5A7C626
          SHA-512:1AD27AD80ECE736D2856A45268366146A52507CE2D75260DE68280C40A06DD6313B5EDE8E0287716D5038986DEBC11575B3E9435EA2F547869E264F0EAC12610
          Malicious:false
          Preview:Search for XDR..if( strcmp(#2,"C")==0){.. if( strcmp(#4,"C")==0){...print(#3,".C");.. return;.. }..}..if( strcmp(#2,"A")==0){.. if( strcmp(#4,"D")==0){...print(#3,".");.. return;.. }..}..if( strcmp(#2,"B")==0){.. if( strcmp(#4,"K")==0){...print(#3,"kg/m3");.. return;.. }..}..if( strcmp(#2,"D")==0){.. if( strcmp(#4,"M")==0){...print(#3,"m");.. return;.. }..}..if( strcmp(#2,"F")==0){.. if( strcmp(#4,"H")==0){...print(#3,"Hz");.. return;.. }..}..if( strcmp(#2,"L")==0){.. if( strcmp(#4,"S")==0){...print(#3,"ppt");.. return;.. }..}..if( strcmp(#2,"N")==0){.. if( strcmp(#4,"N")==0){...print(#3,"N");.. return;.. }..}..if( strcmp(#2,"P")==0){.. if( strcmp(#4,"P")==0){...print(#3,"Pa");.. return;.. }..}..if( strcmp(#2,"R")==0){.. if( strcmp(#4,"I")==0){...print(#3,"l/s");.. return;.. }..}..if( strcmp(#2,"T")==0){.. if( strcmp(#4,"H")==0){...print(#3,"rpm");.. return;.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):592
          Entropy (8bit):4.860033044912777
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloAYClopYCGtquYdf8Bloololc6GZ:Z925tjyVCyGCtd0Byoylc6i
          MD5:0872984EBBE74761131D858F84A5CEF0
          SHA1:029A8193AE37EC088252EB50D1A0903AA90F37BD
          SHA-256:3575E154F98A0ADDBB3DEF59EA5826E7C09075751B9ED796DC439DDD3DD35D4A
          SHA-512:BB1E2C4F85D25EB38CBE3B2AAB807C207FABB5928BE7EA3D763FF1699C20FC5E31EC8C5647EDA83EE928B0377D7597800EFB7071C29BAFE50A7155A48F88DE0C
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. .print( #9,".");...trend(double( #9));.. return;..}..if (strcmp(#13,"D")==0){...print( #9,".");...trend(double( #9));.. return;..}..print( "!");...print( #9,".");...trend(double( #9));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):683
          Entropy (8bit):4.806107560072881
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloCpU4HOUMlo9pU4HOUMGtqUpU4HOUrf8Bloololc6GZ:Z925tjyCpU4HOUMy9pU4HOUMKpU4HOUk
          MD5:C6C3B1CD0CE352EA5AAFAFDCADB0C974
          SHA1:D9B2A07D1EAC50010702A2D51E54C7CFF7A85FEE
          SHA-256:12E2AEE43FAEC05966E6D05E70D468D87D2D8A2F9A1BDCBAFB5435C91F5535BF
          SHA-512:4240C4DEBEE30168454B685842FA208BE27D018B2AD603300B8FF2BEBAD8B8166124C949A28C92D73E447FD9D63541479970CC1312AA8B98E2C7715C7166C43B
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){.. print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));.. return;..}..if (strcmp(#13,"D")==0){.. print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));.. return;..}..print( "!");..print(substr(#10,0,1)," ",substr(#10,2,3)," ","20",substr(#10,4,5));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):159
          Entropy (8bit):5.045714737535048
          Encrypted:false
          SSDEEP:3:5NFDjUZNWX9KdFyLR32g/pUAf6X9P/Ht1+AGXKsfZHBloFifn:TFI4LR32g/p3q/HtclPYif
          MD5:ED7D3B7DA5B88EDF32992DAD50BBFFFB
          SHA1:2D7D393E234CBE13725BF681D28EB4879AEC1CE9
          SHA-256:A8DC01D6D35DEE41723DD228174A899CCE6DDFEF466BA80999A9D957DF7E59FC
          SHA-512:2F09B997EB5B5E5E42C80AFED8641F77335019B40AFCA7CD268C37F246AD72C1FF5351D1886C498AD7BBC9E07828B2CF395FF50223DB3B5F6E806A2085F0EEE7
          Malicious:false
          Preview:Search for MWV..if (strcmp(#6,"A") !=0){...print( "Data invalid");...return;..}..if (strcmp(#3,"T") !=0){...return;..}..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.75886148871991
          Encrypted:false
          SSDEEP:6:TFVVkcrV2g/I94MFEr+1F4CFErNPUwPmW:TFX2gg9461F47VmW
          MD5:54111E4B678A5D098A495B48673B9FDD
          SHA1:E92BE2EB743137A11DAA5DA02D11533478A95E77
          SHA-256:FA7342FA849DBF3491DE8B6718348940902E89D72A36F337D769B1CC477BBB35
          SHA-512:42D61B2185E834A8B8A2CD674037F61EA184FB590B964ABA86BD083714E788B9366E9486C43E2141E64411FA565A987D1369B2D6A55E988F7134340F400EDC74
          Malicious:false
          Preview:Search for RSA..if (strcmp(#5,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (double(#4) > 0){.. print( "SB ");..}..if (double(#4) < 0){.. print( "PS ");..}..print( #4 ,".");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):222
          Entropy (8bit):5.087745028346076
          Encrypted:false
          SSDEEP:6:TFZ4RJYlFErQWY2Y8sHFLesQvWJAUln9VbMWylK4Pmif:TvsmFLes6WJAUdYrl1m0
          MD5:546A3559488C8BD7648DEFC94F917932
          SHA1:CDEEA1642425F1989406D24F953DE723F03D774D
          SHA-256:B478FA523D717F723BD4570E296457AC89AB536D01354E36A51FAF0730DFBACE
          SHA-512:A39F2EC78942CAF6C45A7006A17C63A855E0D44E60829C8E68C33C51F79BD0699513C56C5A9866F994EC88F0B74EC595729C9EF76E0800D5E125B2B0C055282A
          Malicious:false
          Preview:Search for GLL..if (strcmp(#7,"A")!=0){.. print( "GPS failed");.. return;..}..//Print #3 " " #2 1:2 "." #2 3:6 F00.000..print( #3," ",substr(#2,0,1),".",fmt("%5.3f",double(substr(#2,2,7))));..trend( double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.917504567714332
          Encrypted:false
          SSDEEP:6:TFCwxXluJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TUwlJT2gglrGjVeAYnF+
          MD5:2855C5098977A178F249B784541FCE6F
          SHA1:F1964F1C477F94FB0C04A82F0CA4DE650F34E0E1
          SHA-256:8B5C7D6F416880206E131D510F57602FECAD20D1294FB40B23A9B314D6957F6E
          SHA-512:3CEA1DCB690DCFDDE109B686C100E4DC5B2388003E5221FA1E71CA2EB7DA8F16E206C4E53B8EF9D06BBB1215D4D4FCE37A537306194D1466BC487E786F925A68
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6IK:TFda
          MD5:B5FD55809DCB2ACE715944A1B05D8268
          SHA1:1B6EAD168F7EDD133644522A77681A8A953E2B09
          SHA-256:8AB84776194EDDDE62E064C0BA994EA06C9B5700EB80D24FEB254170209CAE2E
          SHA-512:44BD4F6D8C67817F5A7BA5AF96CBC9EB9FF42E0EC3AD4937C5CD3C754AD841B7E34DC3E00BD985274985DAECE2D9D636AFA6BE1AADCE190C4D493342D6BE11A2
          Malicious:false
          Preview:Search for GEN..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):594
          Entropy (8bit):4.8312639140233395
          Encrypted:false
          SSDEEP:12:Tp392ggljjjloAYRlo5YRGtqmYIf8Bloololc6GZ:Z925tjyVRy2RNI0Byoylc6i
          MD5:FA41B00F6D1F8D9286BC72DEF5F2F28B
          SHA1:AA8C347E287153E8C1D8EE47766B1FA01EBE2A88
          SHA-256:84EE43A66BC7208FB0A06C535407CC492E141E57B325C869F899F5089FE152B7
          SHA-512:1DC69BD27BD88C023A197320B4243A5D1E4EE6EB590D5A92AA740E55D31C8060CFA7B50A05ECC35A669A583EFB8003BFDE36C78BAE944D2F4AA25040A95546D9
          Malicious:false
          Preview:Search for RMC..if (strcmp(#13,"N")==0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"A")!=0){.. print( "GNSS Warning");.. return;..}..if (strcmp(#13,"A")==0){...print( #8," knt");...trend(double( #8));.. return;..}..if (strcmp(#13,"D")==0){...print( #8," knt");...trend(double( #8));.. return;..}..print( "!");...print( #8," knt");...trend(double( #8));..if (strcmp(#13,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#13,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#13,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6LM3vn:TFdUAvn
          MD5:733E6AC73E44C6ED593098929168C4F5
          SHA1:DFE7D28DEC8DC26F3D041A7626FE2D868F361308
          SHA-256:4239163C34F8072F7E5BC83A33EAA0C6CC69F61F7BA5E85997263D9D041669ED
          SHA-512:F62F15C0EC237307D09D0DB08BFE635EEBBBA03D7D4184959F33A1DBA987C40C33186D9CDF9330A6AF31F1E79C54F9B848B356615B741046503BD0AAF8000721
          Malicious:false
          Preview:Search for GEN..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAulPMf:TF9K
          MD5:FF321DFAE0D8A5030FC249A7F6C5F678
          SHA1:8F628AC1117DF22EF1AE6B0FCFB08D4886941466
          SHA-256:A75484C2BC6FE73D3E73E5F1ECA827B7D537872FB97DE44252E8FEFB0F0173C2
          SHA-512:89281FD3273D0AD877F927FE3623704697B1295925DF33277223EF634E5BF3F8677DF30F6D4A3EA2B370C807D898195A8E3A3DA9F7A508319951A1D0F81F8ACE
          Malicious:false
          Preview:Search for ACM..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDf2plNWfy:TFbYqy
          MD5:8C1A5A9E9F42D951B259BE2A08DC8A74
          SHA1:CDF3E78ACFA578CA6FB5DC61818B70B3B18DC992
          SHA-256:ED5D5931D4509F2FFD5497FE5EF5FB560C9D6B4F12F863F22AE2DA4BCD263D0B
          SHA-512:9C4EA0C975179D17A3D8293678C996E92FF46ECBD28B07DEFD124DE6FB99FEFCD73A89B493769F2121FD95BD30BAB0E76278B6904100EDE80E1659FB20FC4BB1
          Malicious:false
          Preview:Search for GNS..print(#13);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):491
          Entropy (8bit):4.780142703932923
          Encrypted:false
          SSDEEP:12:TUjClvRcIlvNMFPsr+lvZlv8UllvgcglvoGB:IjCVnVeF3VZV8cVg3VoE
          MD5:CCA80CBECF84E2C8448F5D368867801F
          SHA1:9751F21CE89CB35F2A58D12DF807415D7682F18C
          SHA-256:8EEF0B37F6C51D9A42C4B7F4AEF01C30D0E4B47EDE8851B19784BCFA8D38F479
          SHA-512:78A36DA62613DAC9E1222FC8EB648F6F8F38917B62EC17780084AB38A8EDB0892A80030DF82CEB51B837F45D123176B3F15128FFDE5C8D33DC0A60A7DEEB4CF6
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#8,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#8,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#8,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#8,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#8,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#8,"W") == 0){.. print( "WING");.. return;..}..print( "Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):277
          Entropy (8bit):4.8278508748908555
          Encrypted:false
          SSDEEP:6:TFFmFErV2g/IlAFpGjq0pxMeTyeCSPYJIMgOFEruHhGu:TPT2gglAXGjVXu50YJIhqhGu
          MD5:995E52AB6AD1D2A7C3793A3E6F513BFA
          SHA1:8B962E4C6F76E2D164299FD30A6E5B7F6042CD8A
          SHA-256:4959AE465C17A30F1A8DF980DDD64690DF07BF83BE96B4E59B464E5CA48986A8
          SHA-512:7C999E6C6A271C55229F7042AC9A6E88F014759EA465F5D24ADA9E33877395B9E0132A766E6A94916F5545BC1C3EAC6F345D33D1616C5C8A42E8ED1C21A48698
          Malicious:false
          Preview:Search for TRD..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"R") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("RPM");..trend(double( #3 ));..if (double(#3) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6FMf:TFeK
          MD5:DAF2BEB67F4121F51E890D9979FA2179
          SHA1:CD4BBA849DE3ECD537D3DF560F422BCEF08F3329
          SHA-256:55F389FD218D71EFF9BAAF45EB771411C55424E4E9322E8B5F783BE5763C9992
          SHA-512:A410D094141B292822955C6B4E4190778726EC9CC540F17808F2FB3F4038E2FBB85F1C359A438771FB4184F7DC9AAFB57DCB8498D7BE360D672CC64B82A89974
          Malicious:false
          Preview:Search for ALA..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.885530604025141
          Encrypted:false
          SSDEEP:6:TFCwxXls8mFErV2g/Ils+XGjq0px4BvTHf5PYd4qLR1MY+:TUwls8T2gglsQGjV0Bb/dYd4M+
          MD5:79036DDB917F184548AE33BBDDC030BF
          SHA1:FB173A6E057A9582BF153F60E35FDE29C5DEF4AA
          SHA-256:C23FD1A6F7BAEB32883E5FD740953A62616AFFE5FEDBA580199ED6D19DFC1DEF
          SHA-512:8056EE7F4D727E6C4EA92BCBB179398D850EE633A1A153D6DE9EE20F1DBDB04500B4AD5BDBE2E7B984B18C1CA4526950D354423379B13F0A1574318D4A5B904D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"0") != 0){ .. return;..}..if (strcmp(#5,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#5,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#4))); ..print ("%");..trend(double( #4 ));..if (double(#4) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.7113737109794
          Encrypted:false
          SSDEEP:6:TFwUtzFsKfIPZ+UNjvIKrbUEI+U+kIKrbU8A4DTcMXKrDqe:TPDrIPc6jvIGtPdGD38x
          MD5:F0CEBD8E4DEF2216E6E4AEB384956DC5
          SHA1:4D37F04EA535839E472052091E02772104CB5CEC
          SHA-256:3A066E28039FDC5734B0EB056F6FC1095BC64EFB83666060432E00308CD70938
          SHA-512:F20A662662B36E83006EA174F39DBE0304026117E92597F9D8C3510BB0A7DE5C4BAEFE329102B1453CB99B97616810CADBA1F34CC1D5C81F199B5FE33AAFCA58
          Malicious:false
          Preview:Search for ALC..print(#11, " ", #10, " ", #12, " ");..if (0 == strcmp(#5,"2"))..{.. if (0== strcmp(substr(#13,1,1),"*")).. {.. print(substr(#13,0,0));.. }.. if (0== strcmp(substr(#13,2,2),"*")).. {.. print(substr(#13,0,1));.. }..}..if (0 != strcmp(#5,"2"))..{.. print(#13);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):359
          Entropy (8bit):4.761036585101526
          Encrypted:false
          SSDEEP:6:TFHy4WFEr8JlFyaFErFceoIlF21fOFErJlFkFErDAIlFtZVOFEr0GK3IGs:TpyhlFy3JlF21TlF3AIlF13KYGs
          MD5:11608BE88EBA262C9FEC529AA4B7955E
          SHA1:62BCFD7745351E75A2C49F51E1067EC6E3787926
          SHA-256:696D64267C5495F9ED1139A918922CF9F1E5B269FA7A638B5C3E38610DE0E734
          SHA-512:9D5ABC81D299A3C2F6AC3AC47E7B6AB6E80EA12BE47D8007F0146F3754178B756304113C294CFF76D69A135F26D44DBD553B40746C9391CC157828B327DB64C6
          Malicious:false
          Preview:Search for DTM..if (strcmp(#2,"W84")==0){.. print( "WGS84");.. return;..}..if (strcmp(#2,"W72")==0){.. print( "WGS72");.. return;..}..if (strcmp(#2,"S85")==0){.. print( "SGS85");.. return;..}..if (strcmp(#2,"P90")==0){.. print( "PE90");.. return;..}..if (strcmp(#2,"999")==0){.. print( "User defined");.. return;..}..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlOK:TFLZd
          MD5:C8D5CBF313458D5E441B99E3EA43F20C
          SHA1:564029CD28EFCE342BDD017F6FE6D6F96306837A
          SHA-256:FE60C981B5080B7B1A711F8192CC74361364D3FEFA224FDF7F398741D112BCC0
          SHA-512:214EE131AC19AFA257D040150C6C6BBB2CFBF452F6373C8F07DC0434BCD32A6732978658A0037F5A2B312B5FA81D7EC051E079208FD37F1B6C9FC2D0156D66E1
          Malicious:false
          Preview:Search for FIR..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFDBlsfZHBloFifn:TFiPYif
          MD5:1CD30B0EA309136ED8775947F136352A
          SHA1:1080CF9335DBC22409406EAC6DB1CCCFEB63DEDB
          SHA-256:1867198A606B9FF3081E6BD98E60023F878157E220119092E529DD9134C3B831
          SHA-512:695CC1513A982DC44D3ABAB76175D6435487886B1DBD482650D9F9747364366ABB3E5DA2C15374F9336A90723386317500D310912118D8E6628761F0149A5CC4
          Malicious:false
          Preview:Search for HDG..print( #2,".");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDh6IK:TFNa
          MD5:7C8BB037A13C27C2676A8B98A43C5992
          SHA1:2BA118514051A83ED81A155E4308F147737832DB
          SHA-256:488C7638851251026522A1178C9E6449B243AEF5FD00A710031CA80154F65587
          SHA-512:0F99A4FDAF50B755FBE73C22CE991CF0EA00B512747F970A96FCEF8A7FAF44CBB395C2FC6546BC815DEE95E3754731C38FC5A1C8D3C83212756025ABAC2A3879
          Malicious:false
          Preview:Search for ACN..print(#4);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDflPMf:TF7RK
          MD5:9EBBA5E4945E2912F4BA1156579DAEBA
          SHA1:F22DF7A4FA1D9B58485F7D0AED3C84C3648D7D63
          SHA-256:C283203C6E4CFAC37C905597E7DDADB9EE21C6FFD1AC58C7887C611AFC3B2681
          SHA-512:B3CF03DEE954AD9D6E482DEAA18260D969E63DEA3FC58121AE5A3E306AAD7D031351CD648FA0E9E3CF9F7099C5C62F94F0D75138FDCC8D17AD371636E2C965EE
          Malicious:false
          Preview:Search for ETL..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDpLPMf:TFVK
          MD5:27A2908F51F89EA953C5B849632A95EF
          SHA1:58768D2F54E9F4ACF5BF6BBE57181806FC503824
          SHA-256:1516B976409E722E0FADB46DC88EAEBC27ADCC99D3909F8E25B67D2B84AFA96C
          SHA-512:F17D8E5C0AB122C975644DFE4A0BCBAA379C03A3B1E6036E6B2023A8D7268F356943C1A4FAA684BCED8AF5379A123CA8CA197C50D128DFC09A47F48403568BED
          Malicious:false
          Preview:Search for DTM..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):55
          Entropy (8bit):4.767279031509798
          Encrypted:false
          SSDEEP:3:5NFD6b40/ZHBloFDy:TFM7RPYW
          MD5:4B9A028A5729946076CA012760D3D110
          SHA1:625119C8024B69A8EE743480EE7AA09F7BA88F53
          SHA-256:7AB1C77E93C64BFD59027FDC0EE3CB084C34A92C37AA425B63D66C19E2DB63B0
          SHA-512:08B34C801029C3BC4528F52C1F8D8D4A26617E958470E4B4AEFB9D2FC10AD6A922300515D91091109CB215A95735A168B7C6FDCB71232C19B3276FACFC98B37C
          Malicious:false
          Preview:Search for VTG..print( #4,".");..trend(double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):96
          Entropy (8bit):4.807888696044131
          Encrypted:false
          SSDEEP:3:5NFD3vMkWoI8FB3HFFErCEWEBI+3AGXKPMf:TF7/1lFErCEWEBIGgK
          MD5:95B2A60CBA859364E20C9BD9E1CC6914
          SHA1:BA6467C3EBCC82D6EE702B05C490F37504679319
          SHA-256:76AACBA2B593DA1AC10A10D1326E8FDD074515027617BE3CB0527012562545E8
          SHA-512:51FDB70D5253CB037B48AA0F58B2433BBF0C90BEB9482E78BB243BEFB48BEE6EF07ECC0EA238A92A49713027D0D0DC83D4440A400B0549047C483C9190EBFBC2
          Malicious:false
          Preview:Search for HSS..if(strcmp(#4,"A")!=0){.. print("Data Invalid");.. return;..}..print(#3);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.90729172457204
          Encrypted:false
          SSDEEP:6:TFCjCluJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TUjClJT2gglvGjVeb/dYnF+
          MD5:5560BB9958F5EDE8F5FC8273B94FB46F
          SHA1:9F4524DE875719188222D92EB890C9FB8B29E214
          SHA-256:50D8F09435C7BA95DE260872C5DDE6AE67610A51FE74BDC060BDE394E2A9938E
          SHA-512:186C129D6ACF0A09216D5074EE6C787C480F3993577F8A1A27B94F5551973EEBAF39F2C9CB2716B767C41F2A4E1BC5A1BBB92934C9E622C9EA8B346725FF82B8
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):56
          Entropy (8bit):4.811382823650154
          Encrypted:false
          SSDEEP:3:5NFDVNXKnseCQHBloFcfn:TFb1SPYcf
          MD5:54D1E096C3D62A6CA3A191BCD140B7B8
          SHA1:158AA8B50D5EA7339890FB39DA6D31B11A573195
          SHA-256:48CD274A46DAA8EDE920889CD4FD04BE1789855BA1534DE433958A908D329211
          SHA-512:698D1D11801C825ECED2899E9E8F86595BE0ED3C08AD380642F8BBC253009054F65E2C39A7E4F55A831776D6F50A00EAA61C7EA661D248178F15E0C55751E841
          Malicious:false
          Preview:Search for MWD..print( #8,"m/s");..trend(double( #8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.835201992471304
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlaXGjq0pxKGuPYcKEZmFEruHhGu:TNT2ggl0GjVONYcKEUhGu
          MD5:E9CE55A0DADA85DB6F8198B58489880B
          SHA1:0E52C0EE4D784BBF5A6CE9181F3D7066EB0CBABE
          SHA-256:BA4C9E117A396B445DB20E82EC4AAD5A70BBD5EC203E29693EC11966B6AD7C7A
          SHA-512:465C6725B6D30537E31B30E09FE45DD8451841F669420FC7D499722D18DC9380A9BCEC25D4D0937FEE3F4413141D6B9B5D9F9E5CB9170AA116F94D7514044B08
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print (".");..trend(double( #5 ));..if (double(#5) < 0){.. print(" PS");.. return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):54
          Entropy (8bit):4.722027548259446
          Encrypted:false
          SSDEEP:3:5NFDB9KR4HBloFifn:TFN9DPYif
          MD5:5CE563CCF3AF24FEA99561755B50B3FC
          SHA1:08AD7E2680295ED57F63986C5E81156EB16DADB4
          SHA-256:86B2D4720434C65F59D4B92CB8C33769CFF920FBAC91F90ED37BC13C247963C6
          SHA-512:BAE1818CCAF0774FA7C4E52D9A93FFA5FDC764DD86BCE80892E7DCCF932DBFB99EE1E9CDEE811F91F7C17EF9A3098AEE92D073E72EA8C9D3DC75F034FD88C3D1
          Malicious:false
          Preview:Search for HDT..print( #2,"@");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):58
          Entropy (8bit):4.671877762033242
          Encrypted:false
          SSDEEP:3:5NFD6b4Sl3vGHFxiGTMFK:TFMBlwPCFK
          MD5:BEA259EDFC463A9EC43FBDC4E207ED2E
          SHA1:C1601AC8E182A9D4551F27B8BCE4CB0F63976837
          SHA-256:91532963896577B118F6F6BC8B1F0C7219F0339FB79D0B6E06017C63480F7F76
          SHA-512:ADBB482FA9220796C8EF06E364B6C101D664D9299412C22C670F4D28EDECD4FFB6D61AEE1FEDFB79B2418173CC5337920672D8B229B3A23B39004A72B8D1A0C7
          Malicious:false
          Preview:Search for VTG..print( #6," knt");..trend( double(#6) );..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):57
          Entropy (8bit):4.7491279525714525
          Encrypted:false
          SSDEEP:3:5NFDNliseZHBloFxK:TFGswPYxK
          MD5:616D26A8F1C816E8FFE130104D6237EE
          SHA1:A49CAD6B0CF3DF3466E0F101AD13CEE692778939
          SHA-256:212A268679FECE731A57E7D5C849BA6D7D1C7774F2E5F7B63D58292BBDD03E0B
          SHA-512:3E7B9A99E5FC5D6871B6ACA0D53A997A643A0435609481F68672BAB29EAB52A3892D6A5437EC7F6EE10DD8F06AB17D0FCC2880E9821187742860C4194FA61626
          Malicious:false
          Preview:Search for HTC..print( #11,".");..trend(double( #11));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1415
          Entropy (8bit):5.060161669319466
          Encrypted:false
          SSDEEP:24:Zu2ssnjUWN+WVh7OjUWN+WVh3KjUWN+WVhtMjUWN+WVhxwjUWN+WVhaC0mjUWN+X:JdjU5oqjU5o6jU5oejU5o2jU5oaC0mj2
          MD5:CAE67BACB192EA2B30B99817F27C6CD3
          SHA1:7E2CEBC95F5C4C97B9771C59984B89C614E5452C
          SHA-256:DB9ED45668236293B7158AA0FA701240A083789C38F2DC4D1DE4346E82221882
          SHA-512:9BB1B520E1437A59FE1FDBFFB1EA717BC604E9CB633883436067180BF1A50F0CF1D8A27EB179A50BC087BE6F9B31BF5F3EEA6B1C3027D97D4A8D13942F9B9C44
          Malicious:false
          Preview:Search for GNS..if (strcmp(#7,"N")==0){.. print( "Data invalid");...return;..}..//if #7 = "A" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif..if (strcmp(#7,"A")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "D" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"D")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "P" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"P")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "R" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"R")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. return;..}..//if #7 = "F" print #4 " " #3 1:2 "." #3 3:6 F00.000 Stop Endif ..if (strcmp(#7,"F")==0){.. print( #4," ",substr(#3,0,1),".",fmt("%5.3f",double(substr(#3,2,7))));.. retur
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDLEK:TFh
          MD5:7AEE1F49FF9CD9CFC3813827D5686343
          SHA1:75330E372345037B5B280E029775D0B8E333C0D9
          SHA-256:F9E3D63084FFDF00A2B73944D3F3169FBD050E344E5258E7E0A8DC9C2F510F20
          SHA-512:5947F7325551EC499BF4524F7697AE9AC348005B80EC013DC30899D4B77F3277A9FD20EAF2F194ADBB58972A3C4557E15CD336DEBF79E1843761F6EE97994FBB
          Malicious:false
          Preview:Search for DOR..print(#8);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGVF1FmFErUd6lq9mFEra6lq5F1FmFErzzIlqu3FErpKyGBk/y:TPsPuIl83l0PZEl7SKyGeq
          MD5:00EEB44C24F8B3A601DA1427DA198314
          SHA1:1960DC100D3F1CB40AEEAE99ED99483FF91DEC7E
          SHA-256:FD74DFC0A5156280D67064FC17769ACE390A29681C278279ED6967864D2DB92D
          SHA-512:1D975BA149325FBB00C07F37518EA8CD50A0E7662FBE8A6DBB20771D1A5E2831876C268EDB26C3A48497D0AEA57BAB241A92BAD3F3539E0740ACCC42A1AE683A
          Malicious:false
          Preview:Search for NSR..if( strcmp(#4, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#4, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#4, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#4, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):315
          Entropy (8bit):4.900942518222834
          Encrypted:false
          SSDEEP:6:TFC5luJimFErV2g/IluJgXGjq0pxCBvTHf5PYhtCFMLR1MY+:TU5lJT2gglvGjVeb/dYnF+
          MD5:018DFA70A2067AFCB8E5A459962633B8
          SHA1:B6642CC950572DC86C42D3823BBCC26471166D5F
          SHA-256:52A397989997B5553BB128CCF388DFF44E9DB60128B3054842CA37B84C44ED3A
          SHA-512:ED007CF4489DCCA94CA07892DB05AB6AF811E0AC443A575FF2EA7936977FE2AA77CDC9295266D645FA567537D95EB5FD3ACF073609916835257848BD56A9DA2D
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"1") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print ("%");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):98
          Entropy (8bit):4.638611091386151
          Encrypted:false
          SSDEEP:3:5NFDflH2XUXmMJwQwUXVfHYQwUX1L4QwUXE:TF7+UlwjUlfHYjUFL4jU0
          MD5:8B7FD1FC25DBC3B036B77ACF57B96AF6
          SHA1:018FDED4B112FFBFCF080D70242FCFF65F3E2B47
          SHA-256:98D7D8A197B486CAFB3920BF99C3EAE618086D00316603B67D6737C57CDD7BCA
          SHA-512:D557DB5F3015CF74079BDCFB7BC6C6DB7C9741C2C73100C5E734B4B0F3C98222248A6BA8D4465DD95C53A3FC2132054C1B3713F56FCA073D5B8B65B8A16D1DA9
          Malicious:false
          Preview:Search for ETL..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,5),".",substr(#2,7,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):436
          Entropy (8bit):4.773758506889757
          Encrypted:false
          SSDEEP:6:TF/VE1lFErV2g/Ilq5HzlFQGz5PYLs+FErh6lsQFErQlsHFErj6lsGFErvT6G7:T5Vv2gglukGJYLsGlsolsLls9mG7
          MD5:9F2F2434AAD7E8DF20D6B23A6486C01F
          SHA1:ADDD6F5DA83DA0021DCB93FA96E1EE5227301F64
          SHA-256:3874E202B057A89954250C4F8A29B48A6C83E2A2D200758162D09899E8DD7FB0
          SHA-512:5709B0B0C6B63DF25D67A0B63A6005237892AF569F0ECE3689A113D1593550D0FCB4B315AEDFF5DC465CDF0EA4F2A31F08125E6B43FCC70E7794FE57C51673A8
          Malicious:false
          Preview:Search for MWV....if (strcmp(#6,"A")!=0){.. print( "Data invalid");.. return;..}..if (strcmp(#3,"R")!=0){.. return;..}..print( #4);..trend(double( #4));..if (strcmp(#5,"K")==0){.. print( "Km/h");.. return;..}..if (strcmp(#5,"M")==0){.. print( "m/s");.. return;..}..if (strcmp(#5,"N")==0){.. print( "knt");.. return;..}..if (strcmp(#5,"S")==0){.. print("miles/h");.. return;..}..print( "Unknown unit");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.499597622210291
          Encrypted:false
          SSDEEP:3:5NFDkAL7BloFifn:TFQiPYif
          MD5:9A3F4FC9DA8BAAD941D91AA61CD4F056
          SHA1:A643AC5548ED9EC5EC4454298D6FEE5E3FBD3926
          SHA-256:E257BDE9DE1F6BCBBB09BFEDCB1FE7B7F90E3F8AA9D215337A2153097FEF480C
          SHA-512:C3EEDEB418398A20B370DAC32F0E058C30C1370BD9B504935945BA675432B3BDA017E276EBD3706ADDF89101289251EC05663149B33C083A087F1FC49D12B0FC
          Malicious:false
          Preview:Search for HRM..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDz4JMey:TFHsfy
          MD5:BC9416D7232024B3BD181FA9850DE070
          SHA1:C4480DF352811AD113342F14C1A2DE8ED5B7F5DA
          SHA-256:226627ACB824A4598BA288EDE98E7BA3CE8D829BDE59467CF0406F1A790ABAA0
          SHA-512:6907865D6B415D42D77B5DC3A4B30F5D28B0A3C143D4B29727BEA87F49084A899C34AF140DD5750A88984FE060820DF198B337AB1D9CB2FD02415A2673DB778F
          Malicious:false
          Preview:Search for XDR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRNVM3v:TFfcTVAv
          MD5:1091EAD6B82E5FD88C464BBD61CF97C4
          SHA1:222DE85BC4C17C273B19605376198918743FFFEF
          SHA-256:4EEBE6BF27E678E4CCBC42F4FDA2051BEB2E461AC98AF469B765C7A3C8F617B6
          SHA-512:ED33010C64A2152C865FA8867689F3917D5C3869C6F1E76628CAFCBBFAA17FE2ED034AC35D8CC25259830C2262C88A0C871FFE8E30C709D04DC3B06BC0565D5A
          Malicious:false
          Preview:Search for WAT..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDAxGcLRKfovn:TFfc0yn
          MD5:6291E0C418465725AA8DC0596F72D89D
          SHA1:3C25D40E1469C1D09A5447F336A6708FF1A3F3D6
          SHA-256:4DDEC872E951445E2C3F4A6AC01DECDC065717BB52B31BAEFDBA28B1E497BEC3
          SHA-512:92E709D888AAE0DFB747CBBF77FC3E8F90672EBDE40522590C5BA6D2B8079C9DF806228AF59AB5659A75315576E6F759AB072F0ED47B5ECCF5BA3F678D686060
          Malicious:false
          Preview:Search for WAT..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.807867658033499
          Encrypted:false
          SSDEEP:6:TFJPDGN51FmFErUd6lqNnmFEra6lqNt1FmFErzzIlqNti3FErpKyGBk/y:TPU5PuIlYn3lYtPZElYtiSKyGeq
          MD5:B4A8BE95942B1B265F754B6476BF004C
          SHA1:35B5BFB03E9DBFB446A35280AE4882EC21FA1C1E
          SHA-256:3DC66CB6BA3EA3C4931860BD6BA09B6B3B2828F60E0C496AB4055A7059BCA289
          SHA-512:FA0CCE4F924B4A5AE4DB4C6D0D6EA8AD786A4CD5329BC03A0CF50D9395E196B77398ECC373D59C7A7A6B7A112841110510942CBE6DF3AA191A7A383395178860
          Malicious:false
          Preview:Search for NSR..if( strcmp(#13, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#13, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#13, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#13, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDnLFMf:TF7xK
          MD5:38BB0B8E4C27959F084DFCD3EC02C9CB
          SHA1:FB4CF5B1B7CFC835CF396EE73F77A8DF704FE263
          SHA-256:BF8C9252A0FD961B1C6BD662E08BA44460F752BCF86689CAE74008465F992C52
          SHA-512:7CA5531C02A3AAB4A3A9C33F8A8595E1D2898CBAA84A9670247A53714002339469742B7E7FE136108740667B869328ADB7A0EB52150FF8F3D86ADA796F644BCF
          Malicious:false
          Preview:Search for ALF..print(#9);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.80307885118003
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TOElZClsAPlsKeEUhlsj4K7qgE
          MD5:9A49C5363B3F147F5CA5D397FB2AAA1C
          SHA1:DDE4105F41E0F57BC8FC6CCC8621B1342F9EAED9
          SHA-256:5F95A7F3FB33CDC23D9E4F5A296CED223BD5CE65A7F0E4D92820777874E6ACE4
          SHA-512:4CA5C341EC0C440E7E1630069C50B6163C7FD99F769E919EEBC69A8EDF27531116692F879DDBA982B2F2C2A4F6FC4CA1920AAC2001D0AFE52A4C6581673E1FE1
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):276
          Entropy (8bit):4.818933061327559
          Encrypted:false
          SSDEEP:6:TFHmFErV2g/IlWXGjq0pxKGTHf5PYcKEbIAlFEraGDHK:TNT2ggl4GjVOQ/dYcKEbF/GbK
          MD5:232109F58F88675F382E0A35B0BD4BC3
          SHA1:99077499373C99DBF85B41BAE81FEF907CB40B16
          SHA-256:DB086F56E76AD8A506C8322CDEDF753243A069E855D7E42E72F16FCB36518757
          SHA-512:2FF2B30F5ABD48C595040894EC182C8F505D78D1C484AEFF9AE42307853CB5EF91E57BDD47C6DEFB83C9711023A43689A8A61DF45E6A7F9DDA5F92D3D5D140AD
          Malicious:false
          Preview:Search for TRD..if (strcmp(#6,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#6,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#5))); ..print ("%");..trend(double( #5 ));..if (double(#5) >= 0){.. print(" SB");.. return;..}..print(" PS");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):311
          Entropy (8bit):4.666462569330563
          Encrypted:false
          SSDEEP:6:TFqV9HNFErV2g/IGtHUK2e3FErgW+6lqQFEro+lqGFEr2UF6GRPOy:TA3y2ggGtD8Bl8lpc6GZ
          MD5:DA22728E3D1D46EA91514300438D559A
          SHA1:B5C864132F6AE32F3F934874712DF15CE7E099D6
          SHA-256:289DE3F2A076FA65F1431BA82A0E91EBD61720AE9B1FD5C4290ECFE6F152E07E
          SHA-512:D479C56A46CDF62AEF1A5665F2C45F6A1219216CD533C8ABBB3EF792CAB7DBA5318391C49B44F2B79EACFDC9E8FF52A8449B0D3DB1C19815DBDEBA92564C8401
          Malicious:false
          Preview:Search for THS..if (strcmp(#3,"V")==0){.. print( "Data invalid");.. return;..}..print(#2, ".");..if (strcmp(#3,"E")==0){.. print( " Est");.. return;..}..if (strcmp(#3,"M")==0){.. print( " Man");.. return;..}..if (strcmp(#3,"S")==0){.. print( " Sim");.. return;..}..print( " Unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFD3QMlJMey:TFLZXfy
          MD5:A663D17B1C29CF1172A35534BA35C61F
          SHA1:C1EF2DFE397146A26E41FD0E92075E67EC32856B
          SHA-256:57249D438D62E2EDC67DD0C2CF1965325D78001E9F98F5F335EF74CFCE60E3DF
          SHA-512:029078E235BA19882AA6CA8E5B27655EB8C3B2D4B5DE799306A84B8949898B9E5A7D156D1823DD8A90021B7E812EFBDA544A0705D15C0A1278A596E1F42F4BC5
          Malicious:false
          Preview:Search for FIR..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.7967985228466175
          Encrypted:false
          SSDEEP:12:TKlilw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:m4bIEygGeygIVHiygBKeygaf3E
          MD5:ADEE5AC22C2DEE0C9F461F0792BBFEE8
          SHA1:D54E801EDA819DC81F378A7E06CCE52A27DAA2F7
          SHA-256:C908DFF94B61E02279A64711C3E9F510C9963325B3C84B02CA01F335A64317BF
          SHA-512:0C6CDF6413C2285D37BE003AAE5438091205F6BFC5D538715779975EBDFF8CE1BD1BF2FA341AF9C611D70FD046B3A3ABA0F8B37756EA4544AD91F04D343F3324
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"A") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):279
          Entropy (8bit):4.936378661347794
          Encrypted:false
          SSDEEP:6:TFQLR32g/p3Fe6FOFErWq6e8rSj4FeUFErWq6e8rSjkWV4iPgK:Ty2glFHFEPF9RW2EN
          MD5:C10509CFFD8B49DF4E1692D33936FFBD
          SHA1:3F76CB5AED22423D637568F4C20620C8C0F41357
          SHA-256:1165850372C4BF50F5A3133EE7A6E02DF660728987E7C39E8B61BEB5A80B5D9D
          SHA-512:72388FA50648D6D8AA0C21C8612157CCC36AF5BDC0D7AE79B03731520C24886329A91CAE7B31B262B63EA846F94F3EE7270D87505097E974343A7B7376BE4B33
          Malicious:false
          Preview:Search for VBW..if (strcmp(#4,"A") !=0){...print( "Data invalid");...return;..}..if (double(#2) >=0 ){.. print( fmt("%2.1f",double(#2))) ;.. print(" knt Fwd");..}..if (double(#2) < 0 ){.. print( fmt("%2.1f",double(#2))) ;.. print(" knt Ast");..}..trend(double(#2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):79
          Entropy (8bit):4.642282254934298
          Encrypted:false
          SSDEEP:3:5NFDgG6H2XUXmMJwQwUXVfHYQwUXoov:TF9UlwjUlfHYjUFv
          MD5:BDA918175C26FEE73E277324BC9F8242
          SHA1:74CED1AA141FC4D6767D215FAA077E38C4B1645C
          SHA-256:8A486C5AB541B1290F769D93E76F2A2629C87307AD4F6527EA7DD3CAA3F695F1
          SHA-512:B2B919935D772A1D74F88D27B4FAEC9E888FB7EFC872927F248AC31AD1CC2B739A02F9DB46CBC3E80E22D104C9F91328077FE2A16570F8955DCA27DCC2B23BD5
          Malicious:false
          Preview:Search for ALA..print( substr(#2,0,1),":",substr(#2,2,3),":",substr(#2,4,8));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):280
          Entropy (8bit):4.775567169733104
          Encrypted:false
          SSDEEP:6:TFyIxJFo9uKfIPGyU+hUIvIKrbYI+hIKrbAA4DTcGynXKrS:Tw2o91IPGy3xvIGWaGA38GyH
          MD5:2F2560F0846E110C120CE810E3752610
          SHA1:0E079F7CB82C0A156CE6D30FB69B9ACAC4411C32
          SHA-256:2DD72E6B1271493DD45D0A6E9FECD84B9F1C7111993AA9BC0BF08A2E5275C300
          SHA-512:D1EC4A0CEB6FFA6814DB6FA44762A8B8A30A7ED7C48B4CD3FFA1715E954DFC706CB8B8EFA683C02AC9F08AD547EDE9269125D7FAD77E648A583DBFC4073E8F20
          Malicious:false
          Preview:Search for ALC..print(#39, " ", #38, " ", #40, " ");..if (0 == strcmp(#5,"9"))..{.. if (0== strcmp(substr(#41,1,1),"*")).. {.. print(substr(#41,0,0));.. }.. if (0== strcmp(substr(#41,2,2),"*")).. {.. print(substr(#41,0,1));.. }..}..if (0 != strcmp(#5,"9"))..{.. print(#41);..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGLLHoFErvIlqLLHo1AFErYhlqLLHd3FErpKyGBk/y:TPu/IlCCqlC9SKyGeq
          MD5:303D0D2F4C32C22534533881243D5267
          SHA1:A13171CC51C9350A9164A04BB81DB05561C4BDC9
          SHA-256:CCC23DE69153FDAF2E8E624193C3273ED32C1735B2B05C698518024B9C022A3F
          SHA-512:593BDD59B7286C1A41E036FA9C63A19BBAD74DCA76C920DEA271C318A5F3F8027E06051C8A17F87C3DD281A22D4B70E2E59D581BDE5F51F173191C911CD4DD4E
          Malicious:false
          Preview:Search for NSR..if( strcmp(#7, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#7, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#7, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):869
          Entropy (8bit):4.79852062472922
          Encrypted:false
          SSDEEP:12:TKlZClw4IlCyF6l219eyF6lqblyYldlUyF6lHKeyF6lUlDsYlpE:mSbIEygGeygIVHiygBKeygaf3E
          MD5:0CEF2FB0DD2BB0E0DFC458F23FC54CE4
          SHA1:3CCA4EA3DAF21991794CE6E82B6C3EDA13415A10
          SHA-256:9AF98741E55D0B3FF84588D02653AE1E503399D2F5247FAA18CB167C488B851E
          SHA-512:9951CD42FF12631CB9E8BADA5818A080ACEC091F39D49F3D518D1D4734BA5C2B4495AD6D69D89DA3D9826F593D97D9BAA32DEF4AF21A65A1D29D16E9BBE133C6
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#4,"00") == 0){.. print( "STOP");.. return;..}..if (strcmp(#4,"01") == 0){.. print( "AH-DEAD SLOW");.. return;..}..if (strcmp(#4,"02") == 0){.. print( "AH-SLOW");.. return;..}..if (strcmp(#4,"03") == 0){.. print( "AH-HALF");.. return;..}..if (strcmp(#4,"04") == 0){.. print( "AH-FULL");.. return;..}..if (strcmp(#4,"05") == 0){.. print( "AH-NAV.FULL");.. return;..}..if (strcmp(#4,"11") == 0){.. print( "AS-DEAD SLOW");.. return;..}..if (strcmp(#4,"12") == 0){.. print( "AS-SLOW");.. return;..}..if (strcmp(#4,"13") == 0){.. print( "AS-HALF");.. return;..}..if (strcmp(#4,"14") == 0){.. print( "AS-FULL");.. return;..}..if (strcmp(#4,"15") == 0){.. print( "AS-EMGCY.FULL");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDqcJMey:TF7fy
          MD5:7C49E7807364975649412DC77DD30551
          SHA1:F8CB158215A90B66A65CB07A7B3873BB7AF84B11
          SHA-256:826A3362A264E57B38103AC2C57FF16D4F49B22F03DB7BE76CA82A9B119B1C5F
          SHA-512:C0CE7A1DD486E87B4FF5FBE13558B1CBF82ADB1B1F3BFBEC6FF23EA9544BBE718BF5BDD94CE5257778CC4057A53C0DC216EC79B644C41B7861EE44046A0BE788
          Malicious:false
          Preview:Search for VDO..print(#5);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):312
          Entropy (8bit):4.770310755768087
          Encrypted:false
          SSDEEP:6:TFJPDGyVk1FmFErUd6lqyDsBmFEra6lqyBk1FmFErzzIlqyLR3FErpKyGBk/y:TPpkPuIlG3lRkPZEltSKyGeq
          MD5:4D390F3AFAF20423C562CA6ECC426AA7
          SHA1:874995D14DE9CF15996F8C923B4095B9D64BC63D
          SHA-256:818BF5E9EF0D4C3A23C05EFDCE4C8B1A47A9C72B9ECF77FAEBF849402ABD3C41
          SHA-512:766E80C0BADC51C359D92748EE636C0A388E34DAC3D69B40C74CE209A4CD4BE1B7115779DDA63557BB07AC4749816AC82B366291B011EA40B1DCEE2379380B56
          Malicious:false
          Preview:Search for NSR..if( strcmp(#2, "P") == 0 ){.. print("PASSED");.. return;..}..if( strcmp(#2, "F") == 0 ){.. print("FALLED");.. return;..}..if( strcmp(#2, "D") == 0 ){.. print("DOUBTFUL");.. return;..}..if( strcmp(#2, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.4871228053977985
          Encrypted:false
          SSDEEP:3:5NFDLNVM3v:TFlVAv
          MD5:8F3A409F27D0EBDB6121DE1190AA2A0A
          SHA1:2F9031550CF93A7E318899919C018840E178EC39
          SHA-256:10054F2F458EC23770F85238708D0137AFA553E5B1853935559C12A27D81768F
          SHA-512:62EA7E67E5A7B0405730396E2EB757A752660AC65B5B3BB604CE01091059A6C49402AA05D4971F794A6A17D427DE95CA278AAD4E94AC96F716D07FDF96613448
          Malicious:false
          Preview:Search for DOR..print(#10);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Unicode text, UTF-8 text, with CRLF line terminators
          Category:dropped
          Size (bytes):316
          Entropy (8bit):4.928927480608119
          Encrypted:false
          SSDEEP:6:TFCjCluJimFErV2g/IluJcXGjq0pxCBvuPYhtCFMLR1MY+:TUjClJT2gglrGjVeAYnF+
          MD5:077300DC689235E2DFB2379F6A3EE612
          SHA1:4BA6CBBB2733DB5488EB6AF12202BD5142B87CEC
          SHA-256:930C1906031841A9AD7130462F33E6B2037234ABFD91220359B625191614B0F4
          SHA-512:DA83DFCC2480DDA1D626E7E6E7A97D9913F24C755822C8C8C32D631CF1B4D91BC783FAA1999A69351526E123312466BB5F9A2D1C8499CE56F6A9B37EFED7AA19
          Malicious:false
          Preview:Search for PRC..if (strcmp(#9,"2") != 0){ .. return;..}..if (strcmp(#7,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#7,"D") != 0){ .. return;..}..print( fmt("%4.1f",double(#6))); ..print (".");..trend(double( #6 ));..if (double(#6) < 0){...print(" Ast");...return;..}..print(" Fwd");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6OK:TFd8
          MD5:9A98221B75E04495B57FD940FB905F52
          SHA1:E16E96ED4EEF6073A2AC0CD55B90D374ECB04CBD
          SHA-256:481CC45BC31A6C2165623D338F0F0E8AAD5E8B35DC31F4D0D1A5D7BF831910A5
          SHA-512:BCDADD853FC22A76FB8D538A0390BFF0902E99FEA0F5C3242EE03D5D0E4DF984D57862D95CC7EFF0C4F3EE9C51346AD66FF5987CE75BAFEC74B58BE30DED7CEF
          Malicious:false
          Preview:Search for GEN..print(#2);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.423251796980338
          Encrypted:false
          SSDEEP:3:5NFDUq6Kfovn:TFdpyn
          MD5:DD191062060590C0D600716C0000584F
          SHA1:FB43EED97C406A516B047A92AA14018EA551BAFD
          SHA-256:B165AB96689DB86DE9A3A64126C12CD7891F60C4CFD4F4A4834A37399E508B36
          SHA-512:C5B280224A29D1E1BE9E09768B2713B1D3E4EC75F91732C6CB68CF195AA6E6D8D8A57E116975896AD01854CD328021AC973072E2DE0ED660C5E8EB5FF456FA8C
          Malicious:false
          Preview:Search for GEN..print(#6);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):236
          Entropy (8bit):4.691435688769648
          Encrypted:false
          SSDEEP:6:TFJPDGFsFErvIlqFfsF1AFErYhlqFHR3FErpKyGBk/y:TPcrIlQU7qlQxSKyGeq
          MD5:1099F9D77704C38755C4E0E9257561CC
          SHA1:E3A5EC8B5A09666EEAA6F5E3FEB7677CD8A3C6AB
          SHA-256:0F33ABE013C74A3136164DA66CEC2BEF7285AD88165AE5E2615FA90FDBD63272
          SHA-512:0469708CD802E0A1784E7DA7E1A77CF4E8B91A2E2F1E11F07D2CF7949C2C2B4AEA55D6C3369BF790E73479C5CF263B87D1E27F89918D1EC6926460246D02046A
          Malicious:false
          Preview:Search for NSR..if( strcmp(#9, "A") == 0 ){.. print("YES");.. return;..}..if( strcmp(#9, "V") == 0 ){.. print("NO");.. return;..}..if( strcmp(#9, "N") == 0 ){.. print("NOT AVAILABLE");.. return;..}..print("unknown");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):515
          Entropy (8bit):4.737515256933273
          Encrypted:false
          SSDEEP:6:TFUJVHqXlqaCl6iHFErebAIlyFIFErcr+lPKFErohwlqHFErqqq4lUFErHgqgl9v:TOElZClXcIlWsr+lPDlqUllbglWE
          MD5:322E4C0407390097FEBF059F6809EAE3
          SHA1:87FE7237D7FF62AD7B2611E48DCEEA8D48CE53CA
          SHA-256:5B9AD1CB6CE0B1FBCDF3E3C1E5C3BE3822828C59B35E51850C77C456A2B5D0CD
          SHA-512:32362C709C8A83F0C6282618C2FF0159FDCE18CB41C710D807A3DF0D367CC88C8597C3349A5B486A4E1E28D43BA6FFDF3866D0934611BEF85ABF873DF3964EF5
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"0") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#6,"B") == 0){.. print( "BRIDGE");.. return;..}..if (strcmp(#6,"P") == 0){.. print( "PORT WING");.. return;..}..if (strcmp(#6,"S") == 0){.. print( "STBD WING");.. return;..}..if (strcmp(#6,"C") == 0){.. print( "CONTROL ROOM");.. return;..}..if (strcmp(#6,"E") == 0){.. print( "ENGINE SIDE");.. return;..}..if (strcmp(#6,"W") == 0){.. print( "WING");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.782390539923682
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9Peco+3AGXKc31+CQHFxx:TFaoEFcrV2g/Itge9vfqeXGfkCSPmW
          MD5:98D1D4C295FADEAFB12E6F168FCD9237
          SHA1:77C7B7665CEC7C095301DB80D57F8C2660440838
          SHA-256:AFF41DF2DCD3054B991920CA632DFB13F63175502F6CA812D70789516E8E3E3C
          SHA-512:E558E5F2BB2F78FCF54B6BF0595BF5C7E40F7437969169A01244EEB87D33CF1D258ED5AE886E7588FB8864ADF70F11525D25A42715A9D4BA3181A923DA8B7AAE
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"0") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):314
          Entropy (8bit):4.817503453132198
          Encrypted:false
          SSDEEP:6:TFUJLlqaClsAKFErowlsKemFEraUAd6lslEQFEra42t7qgE:TKlZClsAPlsKeEUhlsj4K7qgE
          MD5:B6EF21247E9C10DFA344FE31BA228D1B
          SHA1:45B28D423810630D17A299AE08A9F2A007FD3E7D
          SHA-256:4FA769729185DA8D6385EC4726ECA7F5007854C3FD80A7C899630E24D108A960
          SHA-512:F75351F6A8E37E26F84F6BDAF48FF211D8D85D574270A115B75302BB27A626F1226DE1639B3C1473DFC5660EEA33C808BC9CC2089CC0C20D4161CF9E1739B61A
          Malicious:false
          Preview:Search for ETL..if (strcmp(#7,"1") != 0){ .. return;..}..if (strcmp(#3,"O") != 0){ .. return;..}..if (strcmp(#5,"20") == 0){.. print( "STAND-BY");.. return;..}..if (strcmp(#5,"30") == 0){.. print( "RUN UP");.. return;..}..if (strcmp(#5,"40") == 0){.. print( "FINISH ENGINE");.. return;..}..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):28
          Entropy (8bit):4.351823225551765
          Encrypted:false
          SSDEEP:3:5NFDgG6LM3vn:TFQAvn
          MD5:1BE0A0A531D7DFE5158294AE79787B4C
          SHA1:C3B62D3A7E7E4EF1BFB3EF9C8FFAF39DFBAC2A4D
          SHA-256:93AC6FCABB3A51A43E7AA35EAAAFDD100D5F97DD500A9932654DA5F1A59E1CD1
          SHA-512:2019EF2D01577DC022F0AF5D3A6976ACE733E55942DA4D63335E3246C5FA24B02AB9181B17C9F5C286DAE5ABBF29B32D0F02F6F04E6CFCA716A62A7300C3D70D
          Malicious:false
          Preview:Search for ALA..print(#7);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):219
          Entropy (8bit):4.797208405210606
          Encrypted:false
          SSDEEP:3:5NFDq1vCmX9KdEBjH8rV2g/I+3ASbX9OJgeuo+UoU6X9PMMco+3AGXKc31+CQHFL:TFaoEFcrV2g/Itge9vfq5GfkCSPmW
          MD5:907BE00AD69828BFAFC26D4634EE73C5
          SHA1:017B1E0D8527780664D4A0C7E362742146AF3FF2
          SHA-256:EE954B4AA9CBCE49BE03A298E3BE24993CF503ECC655364986AA6B3A401470CB
          SHA-512:B691A5868CAB244F2B0F8AD8862E52ACF13A17E681A9C6E47C54FA3CE13941C520746A11195D985B8C1245B7289D392E63A3CE02646B074D101B0FC4825D8156
          Malicious:false
          Preview:Search for RPM..if (strcmp(#6,"A")!=0){ .. print( "Data invalid");.. return;..} ..if (strcmp(#2,"E") != 0){ .. return; ..}..if (strcmp(#3,"1") != 0){ .. return;..}..print( #4 ,"RPM");..trend( double( #4));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):29
          Entropy (8bit):4.418157288156419
          Encrypted:false
          SSDEEP:3:5NFDf2plNXMf:TFbYXK
          MD5:FA44FD4263F7940EBE4F3211508FF122
          SHA1:B13BE419944B0007863D9715766312B5C5A96DE8
          SHA-256:8FC2D817D80B52DF2BEFD99A88395011AF1418CFE5ACD960FB13A0000FEA0B41
          SHA-512:F5B7243112F9CCBE69E19C7C4E9736E80721FFB5AF087F7E704610D53ED0AB6613A0C32C57AF498ACF12DCB5EDACE1C39BDE6BE49BAE97A1F2220556DFCDA2F7
          Malicious:false
          Preview:Search for GNS..print(#12);..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):269
          Entropy (8bit):4.895840154756691
          Encrypted:false
          SSDEEP:6:TF4mFErV2g/Il0XGjq0pxMeTTHf5PYJIMgeLREH0Yu:TOT2gglmGjVXv/dYJIhdNu
          MD5:CF43C3C7BD49EAAB06248A5406A9DE63
          SHA1:CB83A5508051208D73DA310D9D53093584760459
          SHA-256:ABA5CB312F72847FE14F09D8CD4956B31A672311DDAC002B53773BDC81B255D0
          SHA-512:94CF6D3ED4685A31C7A36E9DC416AC02954CE97D1169358DBEECC99E09B07D1C7A7F5FD9F6D060F1C7FFCEEAAB12B4F4B9B4AA4874094038FE923DDE07AF1C1E
          Malicious:false
          Preview:Search for TRC..if (strcmp(#4,"V") == 0){.. print( "Data invalid");.. return;..}..if (strcmp(#4,"P") != 0){ .. return;..}..print( fmt("%4.1f",double(#3))); ..print ("%");..trend(double( #3 ));..if (double(#3) < 0){...print(" PS");...return;..}..print(" SB");..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):54
          Entropy (8bit):4.722027548259446
          Encrypted:false
          SSDEEP:3:5NFDB9KR4HBloFifn:TFN9DPYif
          MD5:5CE563CCF3AF24FEA99561755B50B3FC
          SHA1:08AD7E2680295ED57F63986C5E81156EB16DADB4
          SHA-256:86B2D4720434C65F59D4B92CB8C33769CFF920FBAC91F90ED37BC13C247963C6
          SHA-512:BAE1818CCAF0774FA7C4E52D9A93FFA5FDC764DD86BCE80892E7DCCF932DBFB99EE1E9CDEE811F91F7C17EF9A3098AEE92D073E72EA8C9D3DC75F034FD88C3D1
          Malicious:false
          Preview:Search for HDT..print( #2,"@");..trend(double( #2));..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2560
          Entropy (8bit):5.655995512493813
          Encrypted:false
          SSDEEP:48:4lCrKlH7BBJ4nYJczews7XANIL9+SOICmGAI9KImqwzUgltbo3VYPZfA:4lCriGYuBsbAw9+3zrGq146UfA
          MD5:2EFB185ACD63EA96FF009CA4CF96096E
          SHA1:EED13F85B8E92EF508A674BA0EA86403491DF0C5
          SHA-256:70C699E74AE2AA300D92CF442A3D605AAF39BDFEF9C81D955A27C90B50F7E433
          SHA-512:B2495ECED24EFE4D3CB88A5362CA73AFDAF63C59B4BAD228A913F562D343E802E36A067B066A41121259C27DBC16FACAC7C475D8823CAB91466D3A753500B53A
          Malicious:false
          Preview:@ECHO OFF....SET APP_DLL=./../dlls....SETLOCAL ENABLEDELAYEDEXPANSION..REM REQUIRE VERSION : 1.8 (supported 32bit version only)..SET VV_JAVA_REQUIRE_VERSION=1.8..SET VV_JAVA_HOME=....REM RECOGNIZE OS ARCHITECTURE (32bit OS / 64bit OS)..IF "%PROCESSOR_ARCHITECTURE%" EQU "x86" (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\AdoptOpenJDK\JRE..) ELSE (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AdoptOpenJDK\JRE..)....:MAKE_ADOPT_JAVA_HOME..echo Get Adopt Directory from Registory Key (primary)..for /f "tokens=1" %%A in ('reg query "%ADOPT_KEY%"') do set ADOPT_VER=%%A..if "%ADOPT_VER%" EQU "" goto MAKE_ORACLE_JAVA_HOME..for /f "tokens=1" %%A in ('reg query "%ADOPT_VER%"') do set ADOPT_HOT=%%A..for /f "tokens=1" %%A in ('reg query "%ADOPT_HOT%"') do set ADOPT_MSI=%%A..for /f "TOKENS=1,2,*" %%A IN ('REG QUERY "!ADOPT_
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PNG image data, 986 x 517, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):29117
          Entropy (8bit):7.788435447270712
          Encrypted:false
          SSDEEP:768:V83JGlh06cabKVbX93c1FFE22v2Fxj3eOpZ:VyJohv3bCqFC2okxbeOj
          MD5:C86F08EF26B0425B60BAFFFA076E6E31
          SHA1:4A0075735272AE99D713A3891EB9D040E447834F
          SHA-256:FE8BAD3E3B6FC1663B1275709CA07170910D862498B1CB9578D4244739B072A9
          SHA-512:6A11A837A3280D9EEF368993023A43BC35D77D983736FA3D9BE968DB221A98F1C683C503F1643F91386E879964F01D05013D1C20D56335265D326CA76285445A
          Malicious:false
          Preview:.PNG........IHDR..............j.^....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<..q;IDATx^...x........C......Hh.\....L5..f .L....J.....lK.S..m...{.w[.lK..._.#....vwvf...'.ng.3.{.....Yiii...@....@....@.......... .... ......<).B.@....@....@.Z..... .... ....x%@..J.r.@....@....`v.1.... .... ..w..{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PNG image data, 986 x 517, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):29117
          Entropy (8bit):7.788435447270712
          Encrypted:false
          SSDEEP:768:V83JGlh06cabKVbX93c1FFE22v2Fxj3eOpZ:VyJohv3bCqFC2okxbeOj
          MD5:C86F08EF26B0425B60BAFFFA076E6E31
          SHA1:4A0075735272AE99D713A3891EB9D040E447834F
          SHA-256:FE8BAD3E3B6FC1663B1275709CA07170910D862498B1CB9578D4244739B072A9
          SHA-512:6A11A837A3280D9EEF368993023A43BC35D77D983736FA3D9BE968DB221A98F1C683C503F1643F91386E879964F01D05013D1C20D56335265D326CA76285445A
          Malicious:false
          Preview:.PNG........IHDR..............j.^....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<..q;IDATx^...x........C......Hh.\....L5..f .L....J.....lK.S..m...{.w[.lK..._.#....vwvf...'.ng.3.{.....Yiii...@....@....@.......... .... ......<).B.@....@....@.Z..... .... ....x%@..J.r.@....@....`v.1.... .... ..w..{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PNG image data, 986 x 517, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):29117
          Entropy (8bit):7.788435447270712
          Encrypted:false
          SSDEEP:768:V83JGlh06cabKVbX93c1FFE22v2Fxj3eOpZ:VyJohv3bCqFC2okxbeOj
          MD5:C86F08EF26B0425B60BAFFFA076E6E31
          SHA1:4A0075735272AE99D713A3891EB9D040E447834F
          SHA-256:FE8BAD3E3B6FC1663B1275709CA07170910D862498B1CB9578D4244739B072A9
          SHA-512:6A11A837A3280D9EEF368993023A43BC35D77D983736FA3D9BE968DB221A98F1C683C503F1643F91386E879964F01D05013D1C20D56335265D326CA76285445A
          Malicious:false
          Preview:.PNG........IHDR..............j.^....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<..q;IDATx^...x........C......Hh.\....L5..f .L....J.....lK.S..m...{.w[.lK..._.#....vwvf...'.ng.3.{.....Yiii...@....@....@.......... .... ......<).B.@....@....@.Z..... .... ....x%@..J.r.@....@....`v.1.... .... ..w..{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PNG image data, 986 x 517, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):29117
          Entropy (8bit):7.788435447270712
          Encrypted:false
          SSDEEP:768:V83JGlh06cabKVbX93c1FFE22v2Fxj3eOpZ:VyJohv3bCqFC2okxbeOj
          MD5:C86F08EF26B0425B60BAFFFA076E6E31
          SHA1:4A0075735272AE99D713A3891EB9D040E447834F
          SHA-256:FE8BAD3E3B6FC1663B1275709CA07170910D862498B1CB9578D4244739B072A9
          SHA-512:6A11A837A3280D9EEF368993023A43BC35D77D983736FA3D9BE968DB221A98F1C683C503F1643F91386E879964F01D05013D1C20D56335265D326CA76285445A
          Malicious:false
          Preview:.PNG........IHDR..............j.^....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<..q;IDATx^...x........C......Hh.\....L5..f .L....J.....lK.S..m...{.w[.lK..._.#....vwvf...'.ng.3.{.....Yiii...@....@....@.......... .... ......<).B.@....@....@.Z..... .... ....x%@..J.r.@....@....`v.1.... .... ..w..{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@....... .... ....x'@.....@....@..../@.........@....@.;..w...... .... .x..x..... .... .........d..@....@.......?..@....@.....N.8.=%#.... .....^.8..!.... .... ..w..q..)....@....@ .........@....@..... .{gO.. .... ..... ..~...... .... ...q.;{JF....@.......q<.C....@....@........S2.. .... .@......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):255
          Entropy (8bit):5.47963889152615
          Encrypted:false
          SSDEEP:6:/kFDb1jOx0ec77Lr87KtJqdlsz49+pXWOtWBQCvn:/AR4C7Lr87zd+z4M5WOSv
          MD5:0507C51AF9DA9E6F7CEA66AD4CE143AF
          SHA1:C3ABA1B7F0D31D8FA7D4E12C9452E581BE88BB3C
          SHA-256:61DDEC5B36E39E1F077265DB29843FCB36AF14417300F891FDF36C5DF41CBA0A
          SHA-512:DFB35870621AC25700BA5663C46BBF01CE5166128EDECE351923CCBCB50ACAF091CE68B3DECED38061F8E22BED3ADA84A67A9D87188C8432E172F4F624F88907
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms64m -Xmx512m....SET SPLASH=./images/splash-vmv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/MaintenanceViewerApp..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3650
          Entropy (8bit):4.637588880744435
          Encrypted:false
          SSDEEP:48:k8w6SFSS6SBk2Ki+lazlS94uxzqy5R/QenRbqElAoSEXaajTXK8KMKdD:/QiU9x+lWRuxzPRYeRGotZXfTqD
          MD5:5E0A36C001C6E7713E2B68A7232000B2
          SHA1:1676241A91D7C77DD1CF9EEEBC4B2A3EF9163E0C
          SHA-256:823B40B213152A255F01E5BCA31B115EAC494DCC72EE0F5514AF417A43AC5EDD
          SHA-512:B9A8E9BA9BC07A07A35F025EC73C434727B72C769CAEF29C3AB7567904905CBC5EA5D333E988344C6DEF26C077F6D9315CEC6990720ECFA06485657AB3297BB1
          Malicious:false
          Preview:@ECHO OFF..echo ======================================================================..echo ** %0 %1 %2..echo ======================================================================..REM ----------------------------------------------------------------------..REM ** set destination version..REM ----------------------------------------------------------------------..if "%~2" == "previous" (.. set DEST_ENV=previous..) else (.. set DEST_ENV=latest..)..echo ** start-up [%DEST_ENV%]....setlocal ENABLEDELAYEDEXPANSION..REM ----------------------------------------------------------------------..REM ** check running application version..REM ----------------------------------------------------------------------..cscript versionCheck.vbs....REM errorlevel 0: none, 1:previous, 2:latest..if %errorlevel% == 1 (.. if %DEST_ENV% == latest (.. echo ** running [previous].. .. REM display MessageBox.. echo msgbox "Previous versio
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2417
          Entropy (8bit):5.600665127439893
          Encrypted:false
          SSDEEP:48:Yzzyqy/mqD3baL5RoXBz2x6AiVolwg0t7+EIKCgLMeCMMLNLL7Cgb9BUocq:Yi/OquLroXV2x6TWwp7PBANCgb9Eq
          MD5:54CA503EFF1423862F6E74937F913DF9
          SHA1:4808997E8C0221F25C345BCB0339BE86AFB0DEED
          SHA-256:15CD6BC2F343D8478155DA284F9CE95C8CB2C236916E8F754145737F7A6EE2BC
          SHA-512:BF70003E7C77D2776B2193CDB5C125F23031972E38243DCF65DF0F9E5594555E073B828965AE940387AD3490722A6CA77D63A6695F60B67B15F566B065D95A2A
          Malicious:false
          Preview:' ############################################################..' .N.........Viewer...C.V.o.[.W..............`.F.b.N......' ..' return..' 0.FViewer..N............' 1.F...o.[.W......Viewer...N...........' 2.F.V.o.[.W......Viewer...N...........' ..' Create : 2017/05/12 S.Harada..' Update :..' ############################################################..Option Explicit....Dim WSHShell....' Live Player..^.C.g...o.[..\.............Const searchStrLP = "Live Player V5"....' VDR Maintenance Viewer..^.C.g...o.[..\.............Const searchStrMV = "VDR Maintenance Viewer"....' Viewer..V.o.[.W................Const searchStrVersion = "Version"....Set WSHShell = WScript.CreateObject("WScript.Shell")....' Viewer..o.[.W.......`.F.b.N....B..' Viewer...N............C......I......B..Call CheckVersion( )....' Viewer...N.............C......I......B..WScript.Quit(0)....' ############################################################..' .\......E.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):230
          Entropy (8bit):3.3099117792814483
          Encrypted:false
          SSDEEP:3:/qQK2gupgw9xuvn1afugAG/s3tbadbNnLAdN:/kHu7uN5gj/s3FWnLAdN
          MD5:E7BF3257C2B7ED8755A28FA49224AC46
          SHA1:50BB3B8C7A5F2E12203675C8CE9431D5F88AB053
          SHA-256:9CA952C86AC13AE709F56191B29978A91A88A78FD98CE62F7BB0AA747A9D1BB6
          SHA-512:C682D05786C0C5FD9CCAC38D6E7E6036F8956C56D3D6940C6E80AB9D11FBE0D301BE2B68F7F9C66200603432D095568FE6692557AC98AD449D811C47601EDE1B
          Malicious:false
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM delete latest backup..REM ------------------------------------------------------------..rmdir /S /Q ..\_latest....exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):200
          Entropy (8bit):4.317983857336911
          Encrypted:false
          SSDEEP:6:w5EMJNxMGOyXFrW5WZMcEWcycFIvA1GqVJMwZVMpTsnkJIJ+1S2Vcl:w5EMXxXOyVrW5WZMcE1y0IcqTskG4Sfl
          MD5:B18579A6A1D73835A638971F351140B4
          SHA1:A84E29B48083B075FC6BC2B9E1F9700E648BE84B
          SHA-256:4DF3F8E341004A4A4B06DC2C1189ADF2969AF231DD4DB667E2235C83A8968E38
          SHA-512:9CD8D28DECAF505826B074FDF5EF41172389DE0C93A8974714DA562CAED9AB3506A2643B9C6769C0FD6C698B1786C87347CB6C7D725CBBB9B0405756A653C525
          Malicious:false
          Preview:It failed in allocating a memory necessary for the running...Please allocate an empty memory by the method such as quit other applications..or increasing a physical memory, and restart Live Player V5.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):112
          Entropy (8bit):4.75319606505958
          Encrypted:false
          SSDEEP:3:/qQKyn6AuBHofxVQUH4m5A3IrggA5Ao8Uov:/k9CVd4m57BA5Yv
          MD5:1A82800650E8277DA72DCAEEE4C6E57A
          SHA1:C1C1DB3FCECB5FE076231B340D098BA28E5928C5
          SHA-256:16CBA1A49548ACECA21875D917D30399B662E9C97DDA621459E80F3E17633077
          SHA-512:37D52E784030C1661BD53784032C3D2E12F9808B8CFC595F08CDFB87A2854BD5550C157349F9B776D5ABC19E6EAC896844D2F530F9BFE5941A69522478B49E7D
          Malicious:false
          Preview:@ECHO OFF....REM NO edit this file!!..REM (This file convert to maintenance.exe file)..CALL maintenance.bat %1..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):634880
          Entropy (8bit):5.830287591283141
          Encrypted:false
          SSDEEP:6144:JsSrVaADBmG9ksHN7IAuqfDD5UB/mcSD/bea+J04T9Tc6YL2GymlBKzdFv+zQ:JsHADvkkN7IXqvi/YbbeauBZcX8kWdZ
          MD5:935AB82B8DD966A4CA9ABB62DE6CF869
          SHA1:1807B34685A2886DFA02868F02C6F5EEBA2BD7E0
          SHA-256:A31D98CA993D7F41B2A0609DF5F941B05B1F443E7D596ED317EC16383FD910DC
          SHA-512:0879DDB17A3A3AFAA265F6961A1B03D6BB3FDDC8B4B8B1C7A924E00C55C6842D87B86246105AE8448C71E884208729374CB60E9C63858F64621ACA15F882B9FA
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.n;g..hg..hg..h.S~hn..h@Q}hF..h..]hn..h@Q{he..hg..h...h@Qmh...h@Qnh...h@Q|hf..h@Qxhf..hRichg..h........PE..L......b.....................`......c.............@.............................................................................x.......................................................................................x............................textbss.................................text...5........................... ..`.rdata..............................@..@.data...0,..........................@....idata..W........ ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):78
          Entropy (8bit):3.9275753732673406
          Encrypted:false
          SSDEEP:3:5KOAoApMA/0IiTLD5NZV:cOUMDtTLdjV
          MD5:7504F021590A476273ECB3D5493B91AE
          SHA1:CCFFA2FED7EB43D197C50BD110AAEE1BCEFAA389
          SHA-256:C9E1484D045E5A17562A7E5859914F12D2AB4BC44D7CECAF1DD903654F6F5AE2
          SHA-512:622C5CFA37A3DED6C5012092AB9F28AE3A4A7F72CE71F8CC721B2F14B45220C385DAA9833F0E01B9012645583872471BBFB29D9A38D8D31944B4DA52BD6A68EB
          Malicious:false
          Preview:maintenance.bat..vdrviewer.bat..vmv-env.bat..vv-env.bat..env.bat..splash.bat..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):145
          Entropy (8bit):4.460399365244328
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIXV5GQ9rAXVgKuJCVLOQFJEmKxUL4:S0+zIWXHblkHSXcCVxP4
          MD5:BE816084311BB68552900A9342B6CF6B
          SHA1:209167C831134C9FB593CC248C823048492E654D
          SHA-256:36D7B2270E4FD3FC3F6E32089929D854425044D12B501649FC82A63BC70E5114
          SHA-512:FDAEE278AEC06C1BF1BD17CBE0EAF813C45D8FAA071A8E1BD2999591064F0FBE8E022F0FCBDDEF4E374112D4507B9D14F6F5CB01E1ACDC45DB5AF3A992DAF1AD
          Malicious:false
          Preview:Error occurred during starting up, because JRE version is invalid...(Supported JRE version is 1.7 or later)..Please install a JRE later than 1.7.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):109
          Entropy (8bit):4.8336642463816775
          Encrypted:false
          SSDEEP:3:/qQKyn6AuBHofxVQUHytsrghXAa2ov:/k9CVdytsuQ6v
          MD5:0249CD57C98C6A599BF599534A03A8D5
          SHA1:1686625571DB807C64E2C5B87D0532833D1BA77B
          SHA-256:DFEC622B2D51F19B53E96C7ED5EC9185EA9F6DD6B469A63CABA22F874022150D
          SHA-512:5A0C66860C6E6B072234D1FCC812F654462E23D84D5C0FB4F23E49EA1EA3DA6BA7C6AE18EC8D5C910DCEEB62898CC2D18289AAD62D2920F7686CDCC043ABCFA8
          Malicious:false
          Preview:@ECHO OFF....REM NO edit this file!!..REM (This file convert to liveplayer.exe file)..CALL vdrviewer.bat %1..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):486
          Entropy (8bit):4.9144007171521285
          Encrypted:false
          SSDEEP:12:StpqbvWdwb24BURBSCPfl0Dxb//foKHBz4nKgs0g3aHrqms0g3aHAW:cqbASuT10t5HFd3M43MH
          MD5:8F64CDE5953656472AF7DBABEB328126
          SHA1:89BB49EB6815590D0FC84E7CD05059B9E926EF92
          SHA-256:9D16AE3A0B161CB9800959BB853B380F49639D8DB9BC64AEB53D602AA01E0B38
          SHA-512:A1B2F75F4385A06815C836E03DD052EDFD82F1500105A0D25E925012D15878DFC22A170F53890D43E068710FF495B2983F01E7CB6DED203B3D4337C81B52B29D
          Malicious:false
          Preview:Option Explicit..Dim fs, su, suStr..Set fs = WScript.CreateObject("Scripting.FileSystemObject")....On Error Resume Next..Set su = fs.OpenTextFile(WScript.Arguments.Item( 0 ))..If Err.Number = 0 Then.. Err.Clear.. suStr = su.ReadAll.. If Err.Number = 0 Then....MsgBox suStr,16,WScript.Arguments.Item( 1 ).. Else....MsgBox "Error occurred during proccessing.", 16, "Error".. End If.. su.Close..Else.. MsgBox "Error occurred during proccessing.", 16, "Error"..End If..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):145
          Entropy (8bit):4.460399365244328
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIXV5GQ9rAXVgKuJCVLOQFJEmKxUL4:S0+zIWXHblkHSXcCVxP4
          MD5:BE816084311BB68552900A9342B6CF6B
          SHA1:209167C831134C9FB593CC248C823048492E654D
          SHA-256:36D7B2270E4FD3FC3F6E32089929D854425044D12B501649FC82A63BC70E5114
          SHA-512:FDAEE278AEC06C1BF1BD17CBE0EAF813C45D8FAA071A8E1BD2999591064F0FBE8E022F0FCBDDEF4E374112D4507B9D14F6F5CB01E1ACDC45DB5AF3A992DAF1AD
          Malicious:false
          Preview:Error occurred during starting up, because JRE version is invalid...(Supported JRE version is 1.7 or later)..Please install a JRE later than 1.7.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4956
          Entropy (8bit):5.065986743610286
          Encrypted:false
          SSDEEP:48:SY2dceWTMmzbJjQy7w4YFigqfpIcfNQIneySX8USo6cvReFIMFiCncy6yQjIX1Kq:8ubJjQOw4OigeBNxPqOiCnlWG1KP2jD
          MD5:78423506D10EB0261B7A9F3FFC6E437C
          SHA1:99619C0E9C41EEB8E2349D067DCE14BA26AF4CB9
          SHA-256:3ECC4732A7046EA3604834F68B39E76AC256674B95F32BC562552AEAA21806F1
          SHA-512:BA065788ACF0F813317D90EAD9D84E6B4295A9911D9444066CAB98DDB86593BD7509F541D05C069CADED4B4E7B38EB30E2014877597A0FB7150342839BB4F8EF
          Malicious:false
          Preview:@echo off..REM ====================================================================..REM File Name : Live Player V5 (VR-7000/S) Set Firewall..REM Create : 2016/02/16..REM Update :..REM ====================================================================..setlocal enableextensions enabledelayedexpansion....REM ---------------------------------------------------------------------..REM Set Environment..REM ---------------------------------------------------------------------..call env.bat....REM Delete Double Quotation..set JAVA_EXE=%JAVA_EXE:"=%....REM echo on....set SETUP_FIREWALL_LOG=%CD%\log\setupFirewall.log....REM ---------------------------------------------------------------------..REM MAIN..REM ---------------------------------------------------------------------....cd ..\.....REM Delete Old Log..del /q /f "%SETUP_FIREWALL_LOG%"....REM Windows XP.H..call :IS_WINDOWS_XP..set IsWindowsXP=%errorlevel%....REM [TEST] notepad.exe..REM call :SET_FIREWALL_RULE "VDR L
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4794
          Entropy (8bit):5.105000295370866
          Encrypted:false
          SSDEEP:96:UJPoQMRQLWwmlMGXP37e4iqZ/P1qVqC8KqyqRtPuJqbDx70:qM+U/3a4ia3k8RtuIvxA
          MD5:7B3FC3129561DE48F925A6904E181EA7
          SHA1:B1087BD31D8230ABCDDCA95BC07F0F2682A0EF1B
          SHA-256:988304D91A86FDFE3ADFF267E2931104104C8EBDF0DA73B772F7553C177DA30D
          SHA-512:D8D2051D68DD8D837697710B3F0ED3896C71FFFB5EE1E1CE51FA4FA29A0FD1F6EC2E6B84797489EF7123614BC2CC6384D8AE743CEE455DE2D2462822516348C6
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="Live Player V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##############
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):155
          Entropy (8bit):4.489934819189806
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIW3RhgOBLZlX7ERMDDV/dA0y1JCVLOQLn:S0+zIWXHbleOBLZhjdD+CVxL
          MD5:982FCEFC9B84EFEF75FB81B7B7DB2E1B
          SHA1:2B2507AAF509883B764B36A41B65742A03B35E6F
          SHA-256:3F89F3B895CE6404B23AC134F5BAF3BFE743D5AF01208A21A1AB006C7FF646CD
          SHA-512:46A3344E011DFE49B1DB9ECC4F75399823D0C6D9E9879163B48A93ECDC46F4E7D172170F2A376600AF8639FA7BA23BB5E667335228FF880A3C9240D80283877A
          Malicious:false
          Preview:Error occurred during starting up, because JRE has not installed...("JRE" is foundation software to start up VDR Maintenance Viewer)..Please install a JRE.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):147
          Entropy (8bit):4.54641866126203
          Encrypted:false
          SSDEEP:3:SXKVKwQzgKGWuKCFQZdlIW3RhgOBLZlX7ERMDDV3xEc0oJCVLOQLn:S0+zIWXHbleOBLZhbCcRYVxL
          MD5:913E80B4EDE93D8F437DE6722E16CC68
          SHA1:858CEA17D3659B3F6D7891597462542516DB7535
          SHA-256:021E6E83FA416330B0A951C530FCC9560C2427A1BBAA7604376AC529C048D0B9
          SHA-512:6ECC9D93A1CA1AD62F6561BD8015FB0F7B209765534940DF8112B0FDD979A9472B6457EFB66C0933F2582A55C46D4DB888D662E96D4E72A447496640575509CE
          Malicious:false
          Preview:Error occurred during starting up, because JRE has not installed...("JRE" is foundation software to start up Live Player V5)..Please install a JRE.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4811
          Entropy (8bit):5.101209286895512
          Encrypted:false
          SSDEEP:96:3nPoQMRQzWwmlMGXP37e4iqZ/P1qVqC8KqyqRkuJ4bjJ79:VMYU/3a4ia3k8RkuWXJR
          MD5:CE0E47D3300F3A350E7D61BB5DBB9DEE
          SHA1:BE3266904F001F50A57E23C93D4DD0F09BC1F04C
          SHA-256:C1140DA81AA4A0A81AAC118B084AEFDBF0932AA224780BA9683055EBAB4358B7
          SHA-512:C2B38C666CAB95D453F7B4C6FAF4830E99405BA72901B6D7DAB4D96E78BEDC8B4D64262AD480E56AD66E7142505400CF63B58A097A0592C778B426B5F747D8C1
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vmv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="VDR Maintenance Viewer V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
          Category:dropped
          Size (bytes):26624
          Entropy (8bit):7.692998803999232
          Encrypted:false
          SSDEEP:768:/dL5jeeDoqEZ74Xug7UnZxfHrQQNF7Dq:/dNjeD74b0Zx8Q
          MD5:19BB07DFB40E27A42BA2E3EBF3ABC1B3
          SHA1:638A6C12D290F102E11C8B289033CA5ACFE37500
          SHA-256:1148416F2B78FB9261C314DE1A0BDE9191F0F04A35576D30D71C1DB1CBB08B4D
          SHA-512:43BEEED736345D42F60B505C10535312144E86941222858E3145CB0C78F287D03AE6295FC06FAAC099510575F74B0353335FF3C22D683680B1461F35C354F205
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 26%
          • Antivirus: Virustotal, Detection: 34%, Browse
          Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L......M...............2.....$....................@.............................................. .............................. .......................................................................................H............................MPRESS1.........N.......................MPRESS2.............P...................rsrc................^..............@..............................................................................v2.17...M.....43..C.c....j.&.....9.>R.....Q.RhN}=g..}..1^-...f.IR..F...rQ.,......f..._?.....O;.YW....'g.I#..+.,&....I........4w;,.I..~)L...$.....{.?l8...R/..>...3.p....P..V4....L$<..GV.._:........8y..p..L.....X.+.xsp.....V)...3..if.......[..hz@B...T..6...PJ*:..Wy..9..h......e..a..7..y.wc....[.*..D..IO.v.~2..\|.....|Z.H..-ng0]We.....\.w..k.QRLj.:y...I.o...7....sq.x1#N..8G...x...-.*.s$#.2Gw.%.o....a....p...y.&.....f..lpt....s.S.u..g.aP.......p...G.]%...2...?.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):374
          Entropy (8bit):5.631556032915055
          Encrypted:false
          SSDEEP:6:/keR56QS4vWht6FqL9EKVD/ovkPYuMYy2+t6WYrcVHbzgXXopN2is0WA:/76oW+yV+zInWYo7iXa5WA
          MD5:963EC3BE6D7AC55CA8CF1988AB867AE4
          SHA1:36BD0F20B825C9688A2BEF8236A047035FBBF9DE
          SHA-256:16A0E02C7675255E032C90402FF436FDD99A06AA20B16E37A64A488559CCF8B3
          SHA-512:D0EFE1E7FB093B304208DDDAF5EA643BECE05B4AA538B5D94953E246166EED2E1F0BD39C272F5B4CEECB43AEAB8020776BFCBE11D88C62FB0D1571E0B44B1354
          Malicious:false
          Preview:@ECHO OFF....setlocal....REM .\......i.b.j..SET DISPLAYTIME=15....REM ...s.t.@.C....SET CLASSPATH_SP=./bin;.;../_latest/Viewer/lib/vdr-client.jar;....REM Java.I.v.V......SET JVM_SP_OPTION=-cp %CLASSPATH_SP% -Duser.language=%LANG% -Djava.net.preferIPv4Stack=true....REM ...S.\....%JAVA_EXE% %JVM_SP_OPTION% -splash:%SPLASH% %SPLASH_DISPLAY% %DISPLAYTIME%....endlocal..exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):246
          Entropy (8bit):5.518537632651269
          Encrypted:false
          SSDEEP:6:/kFDb1iWVICbec77Lr87KtJqdlsz49+pXWJV:/ARiSICaC7Lr87zd+z4M5Wb
          MD5:7B94FB5A39E1AC3E86A4447EA6488E85
          SHA1:916508C8CF634D73254A0A7F6C17321CD785338D
          SHA-256:B41115A1AFE407203903E20FD011D3035D116795A996C5AA229C19FE0F23B7DF
          SHA-512:F25D8C33239A0CBB40D137258C1E7CF243823E22DFDC1C5108CBBFD6217BBFA45DDE5351392582BCA8D8107F4D898849EBD14E1473D36B1BE938881B98FD21B0
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms512m -Xmx1024m....SET SPLASH=./images/splash-vv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/VDRViewerApp
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):528
          Entropy (8bit):4.64282523445514
          Encrypted:false
          SSDEEP:6:/kHu7uNhRzj/s3FWnbnLNS6GFNAFS6W5x4fLVUaxJpeOzUKzq56KfsL/:/osuNhsW1dm95xUx9zBCfsL/
          MD5:5D2853DD89B04C09F6AFC0E0307FF7D4
          SHA1:414E14F1829A0F894E16FF25BF93432F32C33819
          SHA-256:A42744B020EFBB0D3DA88773434EE28920AC76A2D5946D8A76EF3BCA0B55A008
          SHA-512:0D6F905531BD425BA937F077EBB6AD340878CE1D542819799CB9AD601608B0BCF63BA3F0A582F825B43637B0FAA8EF57069270DB1BFFD52562AAE53644336999
          Malicious:false
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM create latest backup..REM ------------------------------------------------------------..rmdir /S /Q ..\_latest..mkdir ..\_latest....REM ** copy previous to latest (make a state with files)..xcopy /E /Y ..\_previous ..\_latest....REM ** copy current to latest (only existing files)..xcopy /E /Y /U ..\dlls ..\_latest\dlls..xcopy /E /Y /U ..\server ..\_latest\server..xcopy /E /Y /U ..\Viewer ..\_latest\Viewer....exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):352256
          Entropy (8bit):5.802065785822964
          Encrypted:false
          SSDEEP:6144:K7wMUPVG6p6aH0hgfLt9o8/2Q4/u8EE4evApyT0zQEVIFzhCOvkohG93dBNlHYMr:K75UPVOELSynwGQDf0/L3KpfCFiBV9ZK
          MD5:1669F9908DBDCA5C41F3C3716B69F0F6
          SHA1:65CB7E616D5AF8F7FDD7C42ADFEFD12678A53086
          SHA-256:EAE40AB4DA851C51CA3358A89F5F192F358390C43BD57231D3BE0C53106679ED
          SHA-512:7ECE3BBEECE2B9EB23BA54EAFBEB7014D46C78DA9C811890E9A0C9F7055E8BB44727AD634AB275AC51EF720783C003C0A5CD891FA9347203BE3D804396136488
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 2%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8...|...|...|....R.~...[P.k...[P.}...[P.}...Rich|...........................PE..L....|.[.................p..........<.............@..........................`.......G....@..................................;..(....@.......................P......p...................................................................H............text....j.......p.................. ..`.rdata..z...........................@..@.rsrc........@.......@..............@..@.reloc.......P.......P..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):3.7169715185739918
          Encrypted:false
          SSDEEP:3:dxMqRxukd:jM2xd
          MD5:F1C83E89BF8327FBE4EFE919240E2A8E
          SHA1:AD322A7B3CDE552EB04E40EB088A28B84506A29A
          SHA-256:765BF2B1D540BFDACA9A7F78F38D939C0482996EF82652DF7C5CD7503A4689AF
          SHA-512:CC8B07ADB18890D8ABEF58145CD40A6A585678F799BE175A58DCF4B240ED3E0E89E82FF5252C6269C41C5C23E2E11188B6F396C53176A9171FA54754C69785B3
          Malicious:false
          Preview:LP:2450104-01.64-30..MV:2450105-01.64-30..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
          Category:dropped
          Size (bytes):35328
          Entropy (8bit):7.132664117578073
          Encrypted:false
          SSDEEP:768:/2L5jeeD7Jtyvf9/ODY9ea6cI96G9akwq7hKHC5WEL7DbkPdryF:/2Nje8nKfMMBhY8qICWEId+F
          MD5:7235E09CBCB89FA040C2462E3A1C7078
          SHA1:8A1BE555C5B378C5A5102FE00E992786923451A8
          SHA-256:AEFF758C8FF69AB7811EE337854205EB8A7A9735AE0F485198EE9E81915C545D
          SHA-512:9D33F9CED3FDBAE3E20BB57470BE608720B4133AE015C8B07EED54C11612CBB5254DCDF04960FE41B0DE92A80857CA7E1283E8C625AED90B7193AC448C4EAF40
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 22%
          • Antivirus: Virustotal, Detection: 34%, Browse
          Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L......M...............2.....F....................@..........................@................... .............................. .......\+..............................................................................H............................MPRESS1.........N.......................MPRESS2.............P...................rsrc...\+.......,...^..............@..............................................................................v2.17...M.....43..C.c....j.&.....9.>R.....Q.RhN}=g..}..1^-...f.IR..F...rQ.,......f..._?.....O;.YW....'g.I#..+.,&....I........4w;,.I..~)L...$.....{.?l8...R/..>...3.p....P..V4....L$<..GV.._:........8y..p..L.....X.+.xsp.....V)...3..if.......[..hz@B...T..6...PJ*:..Wy..9..h......e..a..7..y.wc....[.*..D..IO.v.~2..\|.....|Z.H..-ng0]We.....\.w..k.QRLj.:y...I.o...7....sq.x1#N..8G...x...-.*.s$#.2Gw.%.o....a....p...y.&.....f..lpt....s.S.u..g.aP.......p...G.]%...2...?.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):210
          Entropy (8bit):4.305809813655651
          Encrypted:false
          SSDEEP:6:w5EMJNxMGOyXFrW5WZMcEWcycFIvA1GqVJMwTQTsnkJIJ+1Sq+s:w5EMXxXOyVrW5WZMcE1y0I3TskG4Sq
          MD5:446D5EA4B21086BCB46122F2BA5C1854
          SHA1:326D0FB4592676825418DFCAEBD531D72A99E6EC
          SHA-256:38BF8519390E5F6D4832726B02BD8E58427AFBFE2D625AEB42EECCECEE534B2A
          SHA-512:8AF339E820CEC3A1CF88DC6DFA2ED4A23C8666A0C5B425DE6641BE2B0BE76027F25495774E0EC2ABDFED586DC65B08B7ED2691F25DD1FA0A8592178E19F9FD13
          Malicious:false
          Preview:It failed in allocating a memory necessary for the running...Please allocate an empty memory by the method such as quit other applications ..or increasing a physical memory, and restart VDR Maintenance Viewer.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2560
          Entropy (8bit):5.655995512493813
          Encrypted:false
          SSDEEP:48:4lCrKlH7BBJ4nYJczews7XANIL9+SOICmGAI9KImqwzUgltbo3VYPZfA:4lCriGYuBsbAw9+3zrGq146UfA
          MD5:2EFB185ACD63EA96FF009CA4CF96096E
          SHA1:EED13F85B8E92EF508A674BA0EA86403491DF0C5
          SHA-256:70C699E74AE2AA300D92CF442A3D605AAF39BDFEF9C81D955A27C90B50F7E433
          SHA-512:B2495ECED24EFE4D3CB88A5362CA73AFDAF63C59B4BAD228A913F562D343E802E36A067B066A41121259C27DBC16FACAC7C475D8823CAB91466D3A753500B53A
          Malicious:false
          Preview:@ECHO OFF....SET APP_DLL=./../dlls....SETLOCAL ENABLEDELAYEDEXPANSION..REM REQUIRE VERSION : 1.8 (supported 32bit version only)..SET VV_JAVA_REQUIRE_VERSION=1.8..SET VV_JAVA_HOME=....REM RECOGNIZE OS ARCHITECTURE (32bit OS / 64bit OS)..IF "%PROCESSOR_ARCHITECTURE%" EQU "x86" (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\AdoptOpenJDK\JRE..) ELSE (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AdoptOpenJDK\JRE..)....:MAKE_ADOPT_JAVA_HOME..echo Get Adopt Directory from Registory Key (primary)..for /f "tokens=1" %%A in ('reg query "%ADOPT_KEY%"') do set ADOPT_VER=%%A..if "%ADOPT_VER%" EQU "" goto MAKE_ORACLE_JAVA_HOME..for /f "tokens=1" %%A in ('reg query "%ADOPT_VER%"') do set ADOPT_HOT=%%A..for /f "tokens=1" %%A in ('reg query "%ADOPT_HOT%"') do set ADOPT_MSI=%%A..for /f "TOKENS=1,2,*" %%A IN ('REG QUERY "!ADOPT_
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):385024
          Entropy (8bit):6.511547612155607
          Encrypted:false
          SSDEEP:6144:Q/SyaDgv0IFu2fVkcUjPfa/fCiDtE1p8Dv9X:uSFebXfVkcD3zyYDvV
          MD5:FCCDFB2D9A2CD700B1E2C0D7814E97BE
          SHA1:0465B089A6898AC6B86125E32DF6368A5ACFF7F8
          SHA-256:34D5C7451F47D57ED1ED7E85A29DC3C94847D87A60472461048443140B405985
          SHA-512:0025C4D5E35B4E9E206EB13CFA820E37CC4A984F4F6278051D4F042781162A42623A13812BE01DC432A426D9CFC0E838F2A35DCA74631DEE7BA8CD5F74F8AA8F
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B]..]..]...5..Q..z7..B..z7.....].........Z..z7.....z7..\..Rich]..........................PE..L......b.............................W............@..........................P......|M.........................................P....@..............................p..................................@............................................text...S........................... ..`.rdata..............................@..@.data............ ..................@....rsrc........@......................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):11969
          Entropy (8bit):4.486509106233647
          Encrypted:false
          SSDEEP:192:THfTT8UGqxTScKX6Z05qVWGbN231KLvk5LFX8FF/4ae2VxAJGyaK1TPB/zJb1k9P:PAZUNNM1dpKNt0lTcBW0oa7ZkTE2jm
          MD5:77B00E2CC37D39BB47F9FC11C24D1A82
          SHA1:3978B453D806D26B4C4E4AA3AF2421372A05F1FF
          SHA-256:2F2F7C23C936578AC3D402C58C151E83C1451F9B47D4754C467771393E125B92
          SHA-512:24116A8DB4B6190029A7DDB92A5D1146498B10A71764E63141FC0EB59B16C8D84D6DC946D4B513A418D7B5A70BA142AC47BCA6F0FCDDA703A8033358359E0F18
          Malicious:false
          Preview:/*.. * Apache License.. * Version 2.0, January 2004.. * http://www.apache.org/licenses/.. *.. * TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. *.. * 1. Definitions... *.. * "License" shall mean the terms and conditions for use, reproduction,.. * and distribution as defined by Sections 1 through 9 of this document... *.. * "Licensor" shall mean the copyright owner or entity authorized by.. * the copyright owner that is granting the License... *.. * "Legal Entity" shall mean the union of the acting entity and all.. * other entities that control, are controlled by, or are under common.. * control with that entity. For the purposes of this definition,.. * "control" means (i) the power, direct or indirect, to cause the.. * direction or management of such entity, whether by contract or.. * otherwise, or (ii) ownership of fifty percent (50%) or
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):1289806
          Entropy (8bit):7.932553095620212
          Encrypted:false
          SSDEEP:24576:4xVcwZd39YnmPKYbJb8At5cXlfzHNENd/wE5:aJ39amPKIJb3+XJzHNA
          MD5:133E8979E9C11450F557CA890177FE0A
          SHA1:9746AF1A485E50CF18DCB232489032A847067066
          SHA-256:92F72307E7440F1E352C916F2438D2BBAB3FFD2CF730C71316117AD04ABADEA8
          SHA-512:24AD0D5BC6B1A283B3E7A8091F674848266FC0EF6D2B23167BAE8C7B7F2FDA687758C6730161A04664A49122C150885E2499D7BC2AC0E435CE23425EC59CE208
          Malicious:false
          Preview:PK.........9.5................META-INF/....PK.........9.5.R..............META-INF/MANIFEST.MF..N.0.......T$...u.Q+u(K.+:%....-.............w..@.....C..6jeJ)*.L*..;.q6..)...c..?..3.k.....\T...j7..c.U{j..F..X.u.1n..o..N......I@.).`.L..)2)FRH..`..)M..j..G...l......%.`.<........:>C@.s'j3.b?...$.u.......U..u)..PK.........9.5................org/PK.........9.5................org/apache/PK.........9.5................org/apache/tools/PK.........9.5................org/apache/tools/ant/PK.........9.5................org/apache/tools/ant/dispatch/PK.........9.5................org/apache/tools/ant/filters/PK.........9.5............"...org/apache/tools/ant/filters/util/PK.........9.5................org/apache/tools/ant/helper/PK.........9.5................org/apache/tools/ant/input/PK.........9.5................org/apache/tools/ant/launch/PK.........9.5................org/apache/tools/ant/listener/PK.........9.5................org/apache/tools/ant/loader/PK.........9.5................org/apache/
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
          Category:dropped
          Size (bytes):28043
          Entropy (8bit):7.820842155394776
          Encrypted:false
          SSDEEP:768:M7BE7rv/R41VxQNTq1PSCSW1hJgtuTMc/Sx2y3:0EfZGaTeSCSAJgwTz/k
          MD5:67F04ECDDB9171962A222308ADDB5C84
          SHA1:E1CFFE12249CA60D0A6AB6772C632DF9942AB417
          SHA-256:17E856646323B55F4C1103E75290BEE9433C3BD24EFFD8E6995BC1D64FFF092F
          SHA-512:636AFECEA9C90285BE564A88F3AF4D60F1D9586B6B0E538DC48EFE03E766F881F28233B878CC0851C79E1AC8773D0299CD2A7A303E41C54BB5D18E4686025546
          Malicious:false
          Preview:PK.........o%................META-INF/MANIFEST.MF....X...{%.?.....VI.dG.D.....P6Y..~.....[.b<<.O...=./.#h./6...,...............+..y....U.~?.W..M......,..M....Vo*......}.v...5uU^..l..1.\.<9;RN....r;..d.m].S....e..I..S...]....=.B...-n..a.+#$..J7..j.....t....(...El.....MWU7..>hz.j...._CP.....'mwl..S...).h..........(a..C.#..@..=.?...(.....aYF....%..L.W=.ej.I.d.Dz.*.,3...=...d.%...H.|\f.@..6....Z...Q.X.p.9..`lR...-..p...!...d.P.?I+...f%5.m....U.4....*..|.$.xf./..6.v..v&Ci1.K.*7is....M=i....X...qhh42.P....d..CbzG...a..<.n%....8....b.qU+..Y...-.}....0...nX..we&.y....V.].|....(.D.T...*T...h..'.Y.h\._.....$.6Y..X(.[c..X....;N.`]f...../..H...'..L.p.`.j6U...i{~.............M.......p.d4X..ze..Qg....G`T44....~...L.G.....KJ{7....t....|^....|M.E.....<fPYN.:..g[....dO.K...?..P.j....^..,....T"R ...n{$...F.^..k..^O.V..ZY..-.Gc...n.).c..<.......&g0.m.rqk....>....5]....>../d!..mb.n.K.g.Dm.A..m0....z/9...\-).#"...k.O..ITT...&.....%..F.S&..8...W...?...]...k
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):571259
          Entropy (8bit):7.871042230671787
          Encrypted:false
          SSDEEP:12288:0pyvVrrCHWWD0K+8CfLWCsIyx98TNrxraIPRWR5gvjdGJ6g:0IV33WDT+8eLUn8prfoRn6g
          MD5:7B9216B608D550787BDF43A63D88BF3B
          SHA1:F951934AA5AE5A88D7E6DFAA6D32307D834A88BE
          SHA-256:093FEA360752DE55AFCB80CF713403EB1A66CB7DC0D529955B6F4A96F975DF5C
          SHA-512:4C3361C8CF553C6FC34FE10624985BC1A08EA84547F4FB970487E99DC795A67B4BD36A0A1015492019E36DC1AE8B36DEF98F3ED3BF3E8382057923DDF67EE5EF
          Malicious:false
          Preview:PK...........4................META-INF/PK...........4..9.............META-INF/MANIFEST.MF..AK.0...............UV...Mb:..dR....o...*..!..o..$..B.w..v.f.XP......z..zI........g.._....f'.l..w.."...T.[....k.. .q.P.Z.!Uc@....\.F...7.&....3.#(.k%..k.U.m.a....Z....]....e...h.w..M..6v4`..o.....Y._.<.7]...........+.W........~.XH...PK...........4.._I{...(-......META-INF/LICENSE.txt.Zmo....^ .aK....e'M....Xr...I.......#.>.2.w.._.gf_..e..V!h.....<...}.;....J.......P.i...^T.o.....^......}...n...|....?.=..w......;q....n.W.....N......+q{......+z\.[W.......I....q.Z........?.p..pk.ub.d/..xPv...Q....Dk.....U[k....U.^n...^...!.h.T..^....%..f\....E.=S......{$[m.{.W.A.]...TX.....6V..O...Z2.. p..J..W.R..D.........{.%_A.Y.>Q.....}...Bj.....`MW.iU..c.+..=....j..>n...;=..F.....X.d;...d.&.'[..63...g..5;e+...Z$....+1.QKX..........^..Y.Nvc...Ub.V.....,y.vv....i..Vrk...Z.B.[ek.....8...T.v..7@.d...*...K.C...A'.......3q.../;;/...H1...i7+J?.;.GH.....7.9v.v9..l..^w..k.$.m
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):245274
          Entropy (8bit):7.945063255754872
          Encrypted:false
          SSDEEP:6144:gycxE5gCBLmjqT+5salGjHS27rLkL76EA/uHg:FuE5JBLY5flGjy2fIpdA
          MD5:DCDCBB47176603907C9F79A1349193EB
          SHA1:0EECDAC8C86BC84B4BDFC24371BA8C785A1FC552
          SHA-256:069361C71F22F8D7FBD4C3A568C015E2809327FC2E68699AEB63A64178CDE56F
          SHA-512:9363AF7AD6AB1ADD7AED7547A790D7DDFDD1DC72266ACCEC61B4FF69B5708204D689D55A45B328FA68A7961943B28D4328818116FFA9FBCA8B9A46DB3E5F305C
          Malicious:false
          Preview:PK..........I6................META-INF/....PK..........I66.$.............META-INF/MANIFEST.MF..MK.0......'....+..Z...B..&C:...4E..&]w)..^.yg.....j....}..Y.L.)...;.o.b-.3......k~......./.....r.:d..n..OXi...S....Z\1.[..@!.......Rr...$!....?.oh.P.FI.).[.T,.....m].&|.Gvc.S......]...!.......h.o....r....4....j...t^.!...%......h...E.%.|.PK..........I6................org/PK..........I6................org/apache/PK..........I6................org/apache/commons/PK........#.I6................org/apache/commons/lang/PK........$.I6............ ...org/apache/commons/lang/builder/PK........#.I6................org/apache/commons/lang/enum/PK........$.I6................org/apache/commons/lang/enums/PK........$.I6............"...org/apache/commons/lang/exception/PK........#.I6................org/apache/commons/lang/math/PK........#.I6............ ...org/apache/commons/lang/mutable/PK........$.I6................org/apache/commons/lang/text/PK........#.I6................org/apache/commons/lang/time/P
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):180799
          Entropy (8bit):7.875521799409909
          Encrypted:false
          SSDEEP:3072:fvgP127G3MIEVGnlF7NMmT4nHNg977OYgjwxy91SBoXeyzFd5:Hg47G3Lh447/QcyPzFn
          MD5:B79A2562EABCFB4423ED4F77EE93F88E
          SHA1:EB47E8CAD2DD7F92FD7E77DF1D1529CAE87361F7
          SHA-256:61FC639D7C60D80F523C76867B4D83EBB54A4740E8CA1D9C61216668CEB25988
          SHA-512:BA8AD3963F270B8ADDC0A32E8C92558546883FFEFC66F45268B5E56AA6E74CF27FA0143019D8FC22808CE2AEB5B5C995215FAACF7C0E6E993B67555DE07F8C1E
          Malicious:false
          Preview:PK.........2................META-INF/PK.........2................META-INF/MANIFEST.MF..Ak.1........k..7.....x-C2.a7.%;...7.-...........c}...H3.`FR..N..`/....S.X&.F..._..."I....{.....`k8.L.t6...."u.....K.._FOR.n.T...B6.:t.8.h}.-p....Ll............).*......7H...J..............g........PK....1.........PK..........2................org/PK..........2................org/apache/PK..........2................org/apache/commons/PK..........2................org/apache/commons/net/PK..........2................org/apache/commons/net/bsd/PK..........2................org/apache/commons/net/ftp/PK..........2............"...org/apache/commons/net/ftp/parser/PK..........2................org/apache/commons/net/io/PK..........2................org/apache/commons/net/nntp/PK..........2................org/apache/commons/net/ntp/PK..........2................org/apache/commons/net/pop3/PK..........2................org/apache/commons/net/smtp/PK..........2................org/apache/
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):303658
          Entropy (8bit):7.9079053517780356
          Encrypted:false
          SSDEEP:6144:DDVseijt4M4craHwK6HbwS9mqD3h40piw43FmcShW/xGrA+:3At4kDKg463hNML/8rh
          MD5:67CDD14323977FA71A21D9603B3D59B6
          SHA1:342FC284019F590E1308056990FDB24A08F06318
          SHA-256:C25B0DA668B3C5649F002D504DEF22D1B4CB30D206F05428D2FE168FA1A901C2
          SHA-512:EDFF097520A11CC08E04E84FFEF0C20638E525055B09FE63655269D3E55F2524E681663E32FFC5249E0889B3561A3D29EB48F2AF13005D9B63F3F282EEB96A66
          Malicious:false
          Preview:PK...........H................META-INF/PK...........H................META-INF/MANIFEST.MF.V]o.8.}...`.a.jIH.P5..\*.[(*..V.d.o.;k;..... .R.F+...L..#c....v..TL....g[.M&.v.4..K...K.f4Z...4.\....g.4......H.s.*./l..VT....F;g.1.j.B3.1.a*...3...H.s.^0.....Bg......fT...F;u....#...9..\74.5.i..D.m.K.M]......)|..0.Ap.|.5K...z%.:F..T.O...C..4K@...7b..$$R.)e...u....H(#V.9g...Ll...)pM5..L'..}A..K.d.x..9K.......B!..<.....:...n}..v......L.3...Y.4...d...........\.......FW..`.n.......c!...w;'gb..T.y.9....5.).w=.e.....p.q.....+...v{.^.s....X._....l.t0,zS...\ jB....r...C|h..v...nZx..Z..^..1....V......L......~.'.&.&........C...j...@.O.$.3..\FPc.s.9+...s.a.o\...f.....&._..c.c..s..w....o{...x7V....7P.d...O.H.6.Tn..ax.nR\&.DF..,....... ...f. ......%.(.....PA.1..GI..U.p..c1..?...dR<.c.:.^.Zd6...",....{....7.....t8.....|.Fr.i.........+W).JB..."'.~.>........Q.{$o......uF.5......q_..d..u......O...u.<..z].P.Ej.D.jOF.{....6..&..k......}..9.O:....z._1O....^F+.].z.4.M.....l._P
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):815544
          Entropy (8bit):7.892984118213049
          Encrypted:false
          SSDEEP:12288:sKu2y2XjChIcHOjMteTtwRCPRH3jxqlew+YhRScOwaAhsqD75tkBPuxOtyKNVy+3:tjBKHOXwRAH1yewvm0xse9N49NVyM
          MD5:D9F6295776D41CA2B4D8E7E15472B8CA
          SHA1:0EC558D0F90C77C3F96F1F5073F5CF63BEA31105
          SHA-256:4B960DB1A6404BD0BBF898B72F96BD5716B776268502643B7136DBC72B99DB12
          SHA-512:5AED9B6C1D4262F3C4CFAC0401E16198409B40FA0DE65503FAC7207C8E97A4F257163EE308CD8F83D59BEEBF55BCD78A6E383CFF2C8CF3BF37E96FD367124AF5
          Malicious:false
          Preview:PK.........YRT................META-INF/....PK.........YRT..~T...b.......META-INF/MANIFEST.MF....b.......T........M..LK-...K-*...R0.3..r.C.q,HL.HU...%-A..E..%.).N. ..z..F.F.I.....)..%...y^...\.\.PK.........YRT................dooars/PK.........YRT................dooars/app/PK.........YRT................dooars/applet/PK.........YRT................dooars/applet/infobus/PK.........YRT................dooars/beans/PK.........YRT................dooars/beans/ctrl/PK.........YRT................dooars/beans/furuno/PK.........YRT................dooars/beans/trend/PK.........YRT................dooars/beans/ts/PK.........YRT................dooars/bridge/PK.........YRT................dooars/development/PK.........YRT................dooars/event/PK.........YRT................dooars/event/app/PK.........YRT................dooars/factory/PK.........YRT................dooars/foundation/PK.........YRT................dooars/graphics/PK.........YRT................dooars/net/PK.........YRT................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):245274
          Entropy (8bit):7.945063255754872
          Encrypted:false
          SSDEEP:6144:gycxE5gCBLmjqT+5salGjHS27rLkL76EA/uHg:FuE5JBLY5flGjy2fIpdA
          MD5:DCDCBB47176603907C9F79A1349193EB
          SHA1:0EECDAC8C86BC84B4BDFC24371BA8C785A1FC552
          SHA-256:069361C71F22F8D7FBD4C3A568C015E2809327FC2E68699AEB63A64178CDE56F
          SHA-512:9363AF7AD6AB1ADD7AED7547A790D7DDFDD1DC72266ACCEC61B4FF69B5708204D689D55A45B328FA68A7961943B28D4328818116FFA9FBCA8B9A46DB3E5F305C
          Malicious:false
          Preview:PK..........I6................META-INF/....PK..........I66.$.............META-INF/MANIFEST.MF..MK.0......'....+..Z...B..&C:...4E..&]w)..^.yg.....j....}..Y.L.)...;.o.b-.3......k~......./.....r.:d..n..OXi...S....Z\1.[..@!.......Rr...$!....?.oh.P.FI.).[.T,.....m].&|.Gvc.S......]...!.......h.o....r....4....j...t^.!...%......h...E.%.|.PK..........I6................org/PK..........I6................org/apache/PK..........I6................org/apache/commons/PK........#.I6................org/apache/commons/lang/PK........$.I6............ ...org/apache/commons/lang/builder/PK........#.I6................org/apache/commons/lang/enum/PK........$.I6................org/apache/commons/lang/enums/PK........$.I6............"...org/apache/commons/lang/exception/PK........#.I6................org/apache/commons/lang/math/PK........#.I6............ ...org/apache/commons/lang/mutable/PK........$.I6................org/apache/commons/lang/text/PK........#.I6................org/apache/commons/lang/time/P
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):11969
          Entropy (8bit):4.486509106233647
          Encrypted:false
          SSDEEP:192:THfTT8UGqxTScKX6Z05qVWGbN231KLvk5LFX8FF/4ae2VxAJGyaK1TPB/zJb1k9P:PAZUNNM1dpKNt0lTcBW0oa7ZkTE2jm
          MD5:77B00E2CC37D39BB47F9FC11C24D1A82
          SHA1:3978B453D806D26B4C4E4AA3AF2421372A05F1FF
          SHA-256:2F2F7C23C936578AC3D402C58C151E83C1451F9B47D4754C467771393E125B92
          SHA-512:24116A8DB4B6190029A7DDB92A5D1146498B10A71764E63141FC0EB59B16C8D84D6DC946D4B513A418D7B5A70BA142AC47BCA6F0FCDDA703A8033358359E0F18
          Malicious:false
          Preview:/*.. * Apache License.. * Version 2.0, January 2004.. * http://www.apache.org/licenses/.. *.. * TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. *.. * 1. Definitions... *.. * "License" shall mean the terms and conditions for use, reproduction,.. * and distribution as defined by Sections 1 through 9 of this document... *.. * "Licensor" shall mean the copyright owner or entity authorized by.. * the copyright owner that is granting the License... *.. * "Legal Entity" shall mean the union of the acting entity and all.. * other entities that control, are controlled by, or are under common.. * control with that entity. For the purposes of this definition,.. * "control" means (i) the power, direct or indirect, to cause the.. * direction or management of such entity, whether by contract or.. * otherwise, or (ii) ownership of fifty percent (50%) or
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):180799
          Entropy (8bit):7.875521799409909
          Encrypted:false
          SSDEEP:3072:fvgP127G3MIEVGnlF7NMmT4nHNg977OYgjwxy91SBoXeyzFd5:Hg47G3Lh447/QcyPzFn
          MD5:B79A2562EABCFB4423ED4F77EE93F88E
          SHA1:EB47E8CAD2DD7F92FD7E77DF1D1529CAE87361F7
          SHA-256:61FC639D7C60D80F523C76867B4D83EBB54A4740E8CA1D9C61216668CEB25988
          SHA-512:BA8AD3963F270B8ADDC0A32E8C92558546883FFEFC66F45268B5E56AA6E74CF27FA0143019D8FC22808CE2AEB5B5C995215FAACF7C0E6E993B67555DE07F8C1E
          Malicious:false
          Preview:PK.........2................META-INF/PK.........2................META-INF/MANIFEST.MF..Ak.1........k..7.....x-C2.a7.%;...7.-...........c}...H3.`FR..N..`/....S.X&.F..._..."I....{.....`k8.L.t6...."u.....K.._FOR.n.T...B6.:t.8.h}.-p....Ll............).*......7H...J..............g........PK....1.........PK..........2................org/PK..........2................org/apache/PK..........2................org/apache/commons/PK..........2................org/apache/commons/net/PK..........2................org/apache/commons/net/bsd/PK..........2................org/apache/commons/net/ftp/PK..........2............"...org/apache/commons/net/ftp/parser/PK..........2................org/apache/commons/net/io/PK..........2................org/apache/commons/net/nntp/PK..........2................org/apache/commons/net/ntp/PK..........2................org/apache/commons/net/pop3/PK..........2................org/apache/commons/net/smtp/PK..........2................org/apache/
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):303658
          Entropy (8bit):7.9079053517780356
          Encrypted:false
          SSDEEP:6144:DDVseijt4M4craHwK6HbwS9mqD3h40piw43FmcShW/xGrA+:3At4kDKg463hNML/8rh
          MD5:67CDD14323977FA71A21D9603B3D59B6
          SHA1:342FC284019F590E1308056990FDB24A08F06318
          SHA-256:C25B0DA668B3C5649F002D504DEF22D1B4CB30D206F05428D2FE168FA1A901C2
          SHA-512:EDFF097520A11CC08E04E84FFEF0C20638E525055B09FE63655269D3E55F2524E681663E32FFC5249E0889B3561A3D29EB48F2AF13005D9B63F3F282EEB96A66
          Malicious:false
          Preview:PK...........H................META-INF/PK...........H................META-INF/MANIFEST.MF.V]o.8.}...`.a.jIH.P5..\*.[(*..V.d.o.;k;..... .R.F+...L..#c....v..TL....g[.M&.v.4..K...K.f4Z...4.\....g.4......H.s.*./l..VT....F;g.1.j.B3.1.a*...3...H.s.^0.....Bg......fT...F;u....#...9..\74.5.i..D.m.K.M]......)|..0.Ap.|.5K...z%.:F..T.O...C..4K@...7b..$$R.)e...u....H(#V.9g...Ll...)pM5..L'..}A..K.d.x..9K.......B!..<.....:...n}..v......L.3...Y.4...d...........\.......FW..`.n.......c!...w;'gb..T.y.9....5.).w=.e.....p.q.....+...v{.^.s....X._....l.t0,zS...\ jB....r...C|h..v...nZx..Z..^..1....V......L......~.'.&.&........C...j...@.O.$.3..\FPc.s.9+...s.a.o\...f.....&._..c.c..s..w....o{...x7V....7P.d...O.H.6.Tn..ax.nR\&.DF..,....... ...f. ......%.(.....PA.1..GI..U.p..c1..?...dR<.c.:.^.Zd6...",....{....7.....t8.....|.Fr.i.........+W).JB..."'.~.>........Q.{$o......uF.5......q_..d..u......O...u.<..z].P.Ej.D.jOF.{....6..&..k......}..9.O:....z._1O....^F+.].z.4.M.....l._P
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):815544
          Entropy (8bit):7.892984118213049
          Encrypted:false
          SSDEEP:12288:sKu2y2XjChIcHOjMteTtwRCPRH3jxqlew+YhRScOwaAhsqD75tkBPuxOtyKNVy+3:tjBKHOXwRAH1yewvm0xse9N49NVyM
          MD5:D9F6295776D41CA2B4D8E7E15472B8CA
          SHA1:0EC558D0F90C77C3F96F1F5073F5CF63BEA31105
          SHA-256:4B960DB1A6404BD0BBF898B72F96BD5716B776268502643B7136DBC72B99DB12
          SHA-512:5AED9B6C1D4262F3C4CFAC0401E16198409B40FA0DE65503FAC7207C8E97A4F257163EE308CD8F83D59BEEBF55BCD78A6E383CFF2C8CF3BF37E96FD367124AF5
          Malicious:false
          Preview:PK.........YRT................META-INF/....PK.........YRT..~T...b.......META-INF/MANIFEST.MF....b.......T........M..LK-...K-*...R0.3..r.C.q,HL.HU...%-A..E..%.).N. ..z..F.F.I.....)..%...y^...\.\.PK.........YRT................dooars/PK.........YRT................dooars/app/PK.........YRT................dooars/applet/PK.........YRT................dooars/applet/infobus/PK.........YRT................dooars/beans/PK.........YRT................dooars/beans/ctrl/PK.........YRT................dooars/beans/furuno/PK.........YRT................dooars/beans/trend/PK.........YRT................dooars/beans/ts/PK.........YRT................dooars/bridge/PK.........YRT................dooars/development/PK.........YRT................dooars/event/PK.........YRT................dooars/event/app/PK.........YRT................dooars/factory/PK.........YRT................dooars/foundation/PK.........YRT................dooars/graphics/PK.........YRT................dooars/net/PK.........YRT................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):1229289
          Entropy (8bit):7.9067088766813605
          Encrypted:false
          SSDEEP:24576:uFHEK3iBVLnK2/pbPpWg5onPfUJ+M5ga4pXtqKsuUrQ:uZt3iLLK2hboLPi5gVxtq3u9
          MD5:DA09B75B562CA9A8E9A535D2148BE8E4
          SHA1:1136D197E2755BBDE296CEEE217EC5FE2917477B
          SHA-256:9B4A8557217FE93C3A274D301E45C3F93CAEB36F89B720A5F42AC34F7D27CD88
          SHA-512:37A13B129F3536A53F2A553151A53997DA6DE7CE4D7231EFEEFD26A68C92BE309666F2EE1F527D3B8C38BC6ADDC9FCCBBDD0D134759FD88667976B0CFF842435
          Malicious:false
          Preview:PK........0..7................META-INF/....PK......../..76.{.d...........META-INF/MANIFEST.MF.Qo.0......q...a.4..I .V.+}5..F...&...9....Nb...9.._...\.1.[.Am..mh..W..;+.......y.FE...D*.D.1.Jo........v..[..w+..bM....^.Lin).W.j.<.6(=.y.._...."....E.7."U...mx-j.=..w..j]*F...?......ee(s.l.z.k.z<..e....@..k..j...`...6L.....ks..[......a.&..K..w.Mi....x...\Z.'...W.6.0.c..I.8fzqO].+..a.m....s.C......-..i...s:$#.S..%T....b.ZeZ.0...}..V..*=.......G...*....1..Z.Uv.J'1.E.0......b.Vz.......Y..c..q...vm...cX.:1.c..x.\.0...kg....3..p3.......d.G..c....ye...p.z....PDZ.......U....9..:%..8..;.z....kC..*.k...n5....k._..-....y"..R..../3n.W.. .8..........(;GB%.c..|..q.Y.C.Ti....k...2^.i...>..PK..........7................META-INF/services/PK........!..7................org/PK........"..7................org/apache/PK...........7................org/apache/html/PK........"..7................org/apache/html/dom/PK........"..7................org/apache/wml/PK........"..7................o
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):3472143
          Entropy (8bit):7.873152172954716
          Encrypted:false
          SSDEEP:98304:rTIlzujdp6DsGVR/jH9vka8ttMw0lyI5v:gJujdDSBdvka+MXv
          MD5:717C657BF38389EC31901542403E71F2
          SHA1:79A1C7FBAE69F76A3C82CAC951A487FA8015AA12
          SHA-256:2586461A684E2502C0926C35A118EB4397D078C60F0ECF570F8EEBC6766A6CED
          SHA-512:C122A3F225B8BB1C3E8B6368EDDFD485C4A312A9A2292CB70D12D71F79DFB8C386A68C4A5564D3A324E4EBB3890B7E2E88BED11A525A7BBD43E1D555AF286FDE
          Malicious:false
          Preview:PK.........ZRT................META-INF/....PK.........ZRT................META-INF/MANIFEST.MF....................u.Ak.0...{ ..=x.CB...DAg...^%....I..C...al.].....zw.kb.......%..S.....c...}..m.-ow.sqP.bG........<.(Y.......|......(.L.:....oT6.RdLH..QRY..z.O......}."..s(@.....%.T.@..1%.....?..t.l4..Z.)...PK.........YRT................jp/PK.........YRT................jp/co/PK.........YRT................jp/co/furuno/PK.........YRT................jp/co/furuno/vdr/PK.........YRT................jp/co/furuno/vdr/app/PK.........YRT................jp/co/furuno/vdr/conf/PK.........YRT............ ...jp/co/furuno/vdr/conf/component/PK.........YRT................jp/co/furuno/vdr/controller/PK.........YRT............$...jp/co/furuno/vdr/controller/extract/PK.........YRT............(...jp/co/furuno/vdr/controller/maintenance/PK.........YRT................jp/co/furuno/vdr/dataview/PK.........YRT................jp/co/furuno/vdr/debug/PK.........YRT................jp/co/furuno/vdr/decoder/PK..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):1289806
          Entropy (8bit):7.932553095620212
          Encrypted:false
          SSDEEP:24576:4xVcwZd39YnmPKYbJb8At5cXlfzHNENd/wE5:aJ39amPKIJb3+XJzHNA
          MD5:133E8979E9C11450F557CA890177FE0A
          SHA1:9746AF1A485E50CF18DCB232489032A847067066
          SHA-256:92F72307E7440F1E352C916F2438D2BBAB3FFD2CF730C71316117AD04ABADEA8
          SHA-512:24AD0D5BC6B1A283B3E7A8091F674848266FC0EF6D2B23167BAE8C7B7F2FDA687758C6730161A04664A49122C150885E2499D7BC2AC0E435CE23425EC59CE208
          Malicious:false
          Preview:PK.........9.5................META-INF/....PK.........9.5.R..............META-INF/MANIFEST.MF..N.0.......T$...u.Q+u(K.+:%....-.............w..@.....C..6jeJ)*.L*..;.q6..)...c..?..3.k.....\T...j7..c.U{j..F..X.u.1n..o..N......I@.).`.L..)2)FRH..`..)M..j..G...l......%.`.<........:>C@.s'j3.b?...$.u.......U..u)..PK.........9.5................org/PK.........9.5................org/apache/PK.........9.5................org/apache/tools/PK.........9.5................org/apache/tools/ant/PK.........9.5................org/apache/tools/ant/dispatch/PK.........9.5................org/apache/tools/ant/filters/PK.........9.5............"...org/apache/tools/ant/filters/util/PK.........9.5................org/apache/tools/ant/helper/PK.........9.5................org/apache/tools/ant/input/PK.........9.5................org/apache/tools/ant/launch/PK.........9.5................org/apache/tools/ant/listener/PK.........9.5................org/apache/tools/ant/loader/PK.........9.5................org/apache/
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):194354
          Entropy (8bit):7.6968628231831735
          Encrypted:false
          SSDEEP:3072:tKHSI8s531xQp5tk6k15FFGFVLG2TLp5ayAVuTuc6cqQMUGyLfm3p/V:4Hd8831+NJkcf/poXV1Gf0/V
          MD5:9AE9C29E4497FC35A3EADE1E6DD0BBEB
          SHA1:90B215F48FE42776C8C7F6E3509EC54E84FD65EF
          SHA-256:D404AA881EB9C5F7A4FB546E84EA11506CD417A72B5972E88EFF17F43F9F8A64
          SHA-512:1086A52924ADD2406E0B4EC7219A8783AC20E02A32A7A2461EFBF092F0070501F7CADE9C0588907C403352F1A48F80B950E6D40B2E4E3E9EB886E7DB4E97BDEC
          Malicious:false
          Preview:PK........2.s5................META-INF/....PK........1.s5#..S,...........META-INF/MANIFEST.MF.UM..0..#...V...B..n,..+.]m.W...UbG...........h#q..7o.L\......D.....#.fc..N.1.W...\....H"..t....'w.<.0.2..jS.n6..o4....thF.l...Q$.r.v.e.....F.(....(9.a!$.....-%9.....y,......Da.1...-U6@.;.a...w'..'E...I..;.<.rg.'.zM%.W.. ....x..*D.^.{e@......s.)........?..cvB.>O2.Wwz.,e.i..pq.d\Ym.........=.o_..l`..gT....t...zm[..d......N ...=.~by.in....Ch...6L15.}....jgB...X.0....R.$..".x..7..Q|.?...i~..mk}3.+"...Ma*h........ABU.D.hj...?1..Lp.P....u.?..y...Y...b|i...k..m.....P[.1R0.>..!...Bs....T..\......\j..Nt..Ii.r.[Jf.....6..1.R0......^.R&......PK........0.s5................javax/PK........1.s5................javax/xml/PK........0.s5................javax/xml/datatype/PK........0.s5................javax/xml/namespace/PK........0.s5................javax/xml/parsers/PK........0.s5................javax/xml/transform/PK........0.s5................javax/xml/transform/dom/PK........0.s5..........
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):914597
          Entropy (8bit):7.990703942256781
          Encrypted:true
          SSDEEP:24576:QmOyBLsRQ/6DU0VO1tT977DS1QErj1t/V:QmOyB4CqUn1tT97vSaEn1t/V
          MD5:B0E08C9936DC52AA40439C71FCAD6297
          SHA1:1C12D070E602EFD8021891CDD7FD18BC129372D4
          SHA-256:1AA37E9EA6BAA0EE152D89509F758F0847EAC66EC179B955CAFE0919E540A92E
          SHA-512:EA1B400CF25C6032160553F19BAEDB21103341F1C4236FBECF5F8462CC4DB06F3459D7812ED0AD07A0B9FAA3B576F8FA6EDBD9ED64F9486B85E5BF982C21775E
          Malicious:false
          Preview:PK.........@fD................META-INF/....PK.........@fD...............META-INF/MANIFEST.MF..As.0......1...!.M`8...B3%.kG.D.-...._..el7=...>....?...'P.K1&.Q..f..2.({..k..&...\..!.o.F.9........\|S.%@.ReR...?..r......0.Fz+.7A...v.{_.,..Dn..G.'.(.$O b...~5#w..Df.%y..6..F..6G.6C....g.-.....1.Z....L.}].....nE.@8..^.....?...8....V4.#..;.L.,.Bc.+.(..G...nd.YQ.dY*.X.....+..{`[._..WR..q..z.^F...+.R4c.....x........8%y.@.O.........y...U5.s`s.#. z(.ge..z.O<.:.9{..$..LIs.RM..G.G...&5.%A3%...@.)D]..........)**......Jm.K..J...B.vwj......Z..9EPNs.4,W....SXV.1...!.m...nj<.H.>..1.Xo.JB.;.+.&D=*..9.e1.'.b[7..W.-..9.#..G.f...L.9...r&..s.(.4.g}.Zi. .9m...........;..FT#9.g...1......DU...,...`C\gD.....Da.....e.{i...OwX......S._.:......)eR.'...)....8~a|./PK.........@fD................com/PK.........@fD................com/sun/PK.........@fD................com/sun/jna/PK.........@fD................com/sun/jna/ptr/PK.........@fD................com/sun/jna/win32/PK.........@fD.Y..m..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v1.0 to extract, compression method=store
          Category:dropped
          Size (bytes):571259
          Entropy (8bit):7.871042230671787
          Encrypted:false
          SSDEEP:12288:0pyvVrrCHWWD0K+8CfLWCsIyx98TNrxraIPRWR5gvjdGJ6g:0IV33WDT+8eLUn8prfoRn6g
          MD5:7B9216B608D550787BDF43A63D88BF3B
          SHA1:F951934AA5AE5A88D7E6DFAA6D32307D834A88BE
          SHA-256:093FEA360752DE55AFCB80CF713403EB1A66CB7DC0D529955B6F4A96F975DF5C
          SHA-512:4C3361C8CF553C6FC34FE10624985BC1A08EA84547F4FB970487E99DC795A67B4BD36A0A1015492019E36DC1AE8B36DEF98F3ED3BF3E8382057923DDF67EE5EF
          Malicious:false
          Preview:PK...........4................META-INF/PK...........4..9.............META-INF/MANIFEST.MF..AK.0...............UV...Mb:..dR....o...*..!..o..$..B.w..v.f.XP......z..zI........g.._....f'.l..w.."...T.[....k.. .q.P.Z.!Uc@....\.F...7.&....3.#(.k%..k.U.m.a....Z....]....e...h.w..M..6v4`..o.....Y._.<.7]...........+.W........~.XH...PK...........4.._I{...(-......META-INF/LICENSE.txt.Zmo....^ .aK....e'M....Xr...I.......#.>.2.w.._.gf_..e..V!h.....<...}.;....J.......P.i...^T.o.....^......}...n...|....?.=..w......;q....n.W.....N......+q{......+z\.[W.......I....q.Z........?.p..pk.ub.d/..xPv...Q....Dk.....U[k....U.^n...^...!.h.T..^....%..f\....E.=S......{$[m.{.W.A.]...TX.....6V..O...Z2.. p..J..W.R..D.........{.%_A.Y.>Q.....}...Bj.....`MW.iU..c.+..=....j..>n...;=..F.....X.d;...d.&.'[..63...g..5;e+...Z$....+1.QKX..........^..Y.Nvc...Ub.V.....,y.vv....i..Vrk...Z.B.[ek.....8...T.v..7@.d...*...K.C...A'.......3q.../;;/...H1...i7+J?.;.GH.....7.9v.v9..l..^w..k.$.m
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):358180
          Entropy (8bit):7.909141156954573
          Encrypted:false
          SSDEEP:6144:+ZyWLQScRA6Q9IRnJ3efO7+7SRsLw4ZJM/fqzOSPzPkt0aZMj40tsrOHX:+AjSi12IRnxTiXw4ZmKLzvaZMLsrA
          MD5:52169B4A318E3246483F39F62B84B948
          SHA1:8B1B85D04EEA979C33109EA42808B7D3F6D355AB
          SHA-256:C8ED615889A62D7957C4EA44B0D1D290B9F308C88EDABAC325526957259D7F14
          SHA-512:3FB663E1507E87680001AE678ED46D58CB4386BAD363C3F07FF941A636DA8599C4D4C9F9EB8E0128140A5D692DBAEAA31BF863E8C4A406ED9232B3A69090BE4B
          Malicious:false
          Preview:PK...........3................META-INF/....PK...........3................META-INF/MANIFEST.MFm....0.E.&...I......&&..`\M.....%......].9y.T\....o`..*'....j..#o.@..aFS.N...6<..PvgY..3..'E*..mg.@ZR...1...%.D.>..h.}..0*.8......p..W..7...?\...$.6.son..........PK...........3................org/PK...........3................org/apache/PK...........3................org/apache/log4j/PK...........3`..hL...........org/apache/log4j/Appender.class}.9O.@..gs9..8.....%..........DA.......F...G!..1W...O......7.q...=.....W....p..)-m.r.Q....;.=;}...\.8.......j./.N?#.|?.(:...C.U.a(...dE.HI..r8.Al.-...O4.E..>...i.cM:JlF".j..5.\?..U.?U.)....Z..,.B.#...1CoI\..._&....ki.([.._.4.jh.<...2C....:VS..j.f.i.B.%.....L...N.}..'.10.Z..Q..E..-..+sV.fXC...a....4.B.p.;...P....9t?.PK...........3.? .........'...org/apache/log4j/AppenderSkeleton.class.V[p.U...M.i...P.r. X..xA..h.r.B.R.@.mr.l...P.......v...f.00.#.......A_.q....l..4."...9.._...|....P...8...P.b.u.h.r.$....e..Y.T.8.1.......!...8.3
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):484
          Entropy (8bit):4.794696349914124
          Encrypted:false
          SSDEEP:6:nTlpAiyjDYKGvlzYNs7LUoyJFoneDrCuj8rNJau4vG/dAi+MFLQkKpLKBM7eVNu6:nRbywfkkBzo+r/dA0skKpMM7oFAcC+
          MD5:E349FB3DD18116706D457C3DAA33175E
          SHA1:BC5EE41378733CED531BA99C93D13E0F8D5C6640
          SHA-256:12226C3D9B053C2FE8CA992CA4EA069567037DF7FDF923B1CFC2E628CE7A4F7B
          SHA-512:D8165D0453997E55DAF72BF0FD94E7FDF5E9EC493163C39F54947A7E6E0E50BA4C27A975B7C6AC9DA2008A185FB9973B214E41C01266A72904093CDD785AEA17
          Malicious:false
          Preview:#..# Drivers loaded by the Java Communications API standard extension..# at initialization time..#..# Format:..#.Each line must contain ONE driver definition only..#.Each line must be of the form:..#...driver=<ClassName>..#..No spaces or tabs in the line...#..ClassName must implement the interface javax.comm.CommDriver..#...example: driver=Win32Serial..#...#..# The hash(#) character indicates comment till end of line...#..# Windows Serial Driver..Driver=com.sun.comm.Win32Driver..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
          Category:dropped
          Size (bytes):28043
          Entropy (8bit):7.820842155394776
          Encrypted:false
          SSDEEP:768:M7BE7rv/R41VxQNTq1PSCSW1hJgtuTMc/Sx2y3:0EfZGaTeSCSAJgwTz/k
          MD5:67F04ECDDB9171962A222308ADDB5C84
          SHA1:E1CFFE12249CA60D0A6AB6772C632DF9942AB417
          SHA-256:17E856646323B55F4C1103E75290BEE9433C3BD24EFFD8E6995BC1D64FFF092F
          SHA-512:636AFECEA9C90285BE564A88F3AF4D60F1D9586B6B0E538DC48EFE03E766F881F28233B878CC0851C79E1AC8773D0299CD2A7A303E41C54BB5D18E4686025546
          Malicious:false
          Preview:PK.........o%................META-INF/MANIFEST.MF....X...{%.?.....VI.dG.D.....P6Y..~.....[.b<<.O...=./.#h./6...,...............+..y....U.~?.W..M......,..M....Vo*......}.v...5uU^..l..1.\.<9;RN....r;..d.m].S....e..I..S...]....=.B...-n..a.+#$..J7..j.....t....(...El.....MWU7..>hz.j...._CP.....'mwl..S...).h..........(a..C.#..@..=.?...(.....aYF....%..L.W=.ej.I.d.Dz.*.,3...=...d.%...H.|\f.@..6....Z...Q.X.p.9..`lR...-..p...!...d.P.?I+...f%5.m....U.4....*..|.$.xf./..6.v..v&Ci1.K.*7is....M=i....X...qhh42.P....d..CbzG...a..<.n%....8....b.qU+..Y...-.}....0...nX..we&.y....V.].|....(.D.T...*T...h..'.Y.h\._.....$.6Y..X(.[c..X....;N.`]f...../..H...'..L.p.`.j6U...i{~.............M.......p.d4X..ze..Qg....G`T44....~...L.G.....KJ{7....t....|^....|M.E.....<fPYN.:..g[....dO.K...?..P.j....^..,....T"R ...n{$...F.^..k..^O.V..ZY..-.Gc...n.).c..<.......&g0.m.rqk....>....5]....>../d!..mb.n.K.g.Dm.A..m0....z/9...\-).#"...k.O..ITT...&.....%..F.S&..8...W...?...]...k
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):484
          Entropy (8bit):4.794696349914124
          Encrypted:false
          SSDEEP:6:nTlpAiyjDYKGvlzYNs7LUoyJFoneDrCuj8rNJau4vG/dAi+MFLQkKpLKBM7eVNu6:nRbywfkkBzo+r/dA0skKpMM7oFAcC+
          MD5:E349FB3DD18116706D457C3DAA33175E
          SHA1:BC5EE41378733CED531BA99C93D13E0F8D5C6640
          SHA-256:12226C3D9B053C2FE8CA992CA4EA069567037DF7FDF923B1CFC2E628CE7A4F7B
          SHA-512:D8165D0453997E55DAF72BF0FD94E7FDF5E9EC493163C39F54947A7E6E0E50BA4C27A975B7C6AC9DA2008A185FB9973B214E41C01266A72904093CDD785AEA17
          Malicious:false
          Preview:#..# Drivers loaded by the Java Communications API standard extension..# at initialization time..#..# Format:..#.Each line must contain ONE driver definition only..#.Each line must be of the form:..#...driver=<ClassName>..#..No spaces or tabs in the line...#..ClassName must implement the interface javax.comm.CommDriver..#...example: driver=Win32Serial..#...#..# The hash(#) character indicates comment till end of line...#..# Windows Serial Driver..Driver=com.sun.comm.Win32Driver..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):914597
          Entropy (8bit):7.990703942256781
          Encrypted:true
          SSDEEP:24576:QmOyBLsRQ/6DU0VO1tT977DS1QErj1t/V:QmOyB4CqUn1tT97vSaEn1t/V
          MD5:B0E08C9936DC52AA40439C71FCAD6297
          SHA1:1C12D070E602EFD8021891CDD7FD18BC129372D4
          SHA-256:1AA37E9EA6BAA0EE152D89509F758F0847EAC66EC179B955CAFE0919E540A92E
          SHA-512:EA1B400CF25C6032160553F19BAEDB21103341F1C4236FBECF5F8462CC4DB06F3459D7812ED0AD07A0B9FAA3B576F8FA6EDBD9ED64F9486B85E5BF982C21775E
          Malicious:false
          Preview:PK.........@fD................META-INF/....PK.........@fD...............META-INF/MANIFEST.MF..As.0......1...!.M`8...B3%.kG.D.-...._..el7=...>....?...'P.K1&.Q..f..2.({..k..&...\..!.o.F.9........\|S.%@.ReR...?..r......0.Fz+.7A...v.{_.,..Dn..G.'.(.$O b...~5#w..Df.%y..6..F..6G.6C....g.-.....1.Z....L.}].....nE.@8..^.....?...8....V4.#..;.L.,.Bc.+.(..G...nd.YQ.dY*.X.....+..{`[._..WR..q..z.^F...+.R4c.....x........8%y.@.O.........y...U5.s`s.#. z(.ge..z.O<.:.9{..$..LIs.RM..G.G...&5.%A3%...@.)D]..........)**......Jm.K..J...B.vwj......Z..9EPNs.4,W....SXV.1...!.m...nj<.H.>..1.Xo.JB.;.+.&D=*..9.e1.'.b[7..W.-..9.#..G.f...L.9...r&..s.(.4.g}.Zi. .9m...........;..FT#9.g...1......DU...,...`C\gD.....Da.....e.{i...OwX......S._.:......)eR.'...)....8~a|./PK.........@fD................com/PK.........@fD................com/sun/PK.........@fD................com/sun/jna/PK.........@fD................com/sun/jna/ptr/PK.........@fD................com/sun/jna/win32/PK.........@fD.Y..m..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):358180
          Entropy (8bit):7.909141156954573
          Encrypted:false
          SSDEEP:6144:+ZyWLQScRA6Q9IRnJ3efO7+7SRsLw4ZJM/fqzOSPzPkt0aZMj40tsrOHX:+AjSi12IRnxTiXw4ZmKLzvaZMLsrA
          MD5:52169B4A318E3246483F39F62B84B948
          SHA1:8B1B85D04EEA979C33109EA42808B7D3F6D355AB
          SHA-256:C8ED615889A62D7957C4EA44B0D1D290B9F308C88EDABAC325526957259D7F14
          SHA-512:3FB663E1507E87680001AE678ED46D58CB4386BAD363C3F07FF941A636DA8599C4D4C9F9EB8E0128140A5D692DBAEAA31BF863E8C4A406ED9232B3A69090BE4B
          Malicious:false
          Preview:PK...........3................META-INF/....PK...........3................META-INF/MANIFEST.MFm....0.E.&...I......&&..`\M.....%......].9y.T\....o`..*'....j..#o.@..aFS.N...6<..PvgY..3..'E*..mg.@ZR...1...%.D.>..h.}..0*.8......p..W..7...?\...$.6.son..........PK...........3................org/PK...........3................org/apache/PK...........3................org/apache/log4j/PK...........3`..hL...........org/apache/log4j/Appender.class}.9O.@..gs9..8.....%..........DA.......F...G!..1W...O......7.q...=.....W....p..)-m.r.Q....;.=;}...\.8.......j./.N?#.|?.(:...C.U.a(...dE.HI..r8.Al.-...O4.E..>...i.cM:JlF".j..5.\?..U.?U.)....Z..,.B.#...1CoI\..._&....ki.([.._.4.jh.<...2C....:VS..j.f.i.B.%.....L...N.}..'.10.Z..Q..E..-..+sV.fXC...a....4.B.p.;...P....9t?.PK...........3.? .........'...org/apache/log4j/AppenderSkeleton.class.V[p.U...M.i...P.r. X..xA..h.r.B.R.@.mr.l...P.......v...f.00.#.......A_.q....l..4."...9.._...|....P...8...P.b.u.h.r.$....e..Y.T.8.1.......!...8.3
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):3472143
          Entropy (8bit):7.873152172954716
          Encrypted:false
          SSDEEP:98304:rTIlzujdp6DsGVR/jH9vka8ttMw0lyI5v:gJujdDSBdvka+MXv
          MD5:717C657BF38389EC31901542403E71F2
          SHA1:79A1C7FBAE69F76A3C82CAC951A487FA8015AA12
          SHA-256:2586461A684E2502C0926C35A118EB4397D078C60F0ECF570F8EEBC6766A6CED
          SHA-512:C122A3F225B8BB1C3E8B6368EDDFD485C4A312A9A2292CB70D12D71F79DFB8C386A68C4A5564D3A324E4EBB3890B7E2E88BED11A525A7BBD43E1D555AF286FDE
          Malicious:false
          Preview:PK.........ZRT................META-INF/....PK.........ZRT................META-INF/MANIFEST.MF....................u.Ak.0...{ ..=x.CB...DAg...^%....I..C...al.].....zw.kb.......%..S.....c...}..m.-ow.sqP.bG........<.(Y.......|......(.L.:....oT6.RdLH..QRY..z.O......}."..s(@.....%.T.@..1%.....?..t.l4..Z.)...PK.........YRT................jp/PK.........YRT................jp/co/PK.........YRT................jp/co/furuno/PK.........YRT................jp/co/furuno/vdr/PK.........YRT................jp/co/furuno/vdr/app/PK.........YRT................jp/co/furuno/vdr/conf/PK.........YRT............ ...jp/co/furuno/vdr/conf/component/PK.........YRT................jp/co/furuno/vdr/controller/PK.........YRT............$...jp/co/furuno/vdr/controller/extract/PK.........YRT............(...jp/co/furuno/vdr/controller/maintenance/PK.........YRT................jp/co/furuno/vdr/dataview/PK.........YRT................jp/co/furuno/vdr/debug/PK.........YRT................jp/co/furuno/vdr/decoder/PK..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):1229289
          Entropy (8bit):7.9067088766813605
          Encrypted:false
          SSDEEP:24576:uFHEK3iBVLnK2/pbPpWg5onPfUJ+M5ga4pXtqKsuUrQ:uZt3iLLK2hboLPi5gVxtq3u9
          MD5:DA09B75B562CA9A8E9A535D2148BE8E4
          SHA1:1136D197E2755BBDE296CEEE217EC5FE2917477B
          SHA-256:9B4A8557217FE93C3A274D301E45C3F93CAEB36F89B720A5F42AC34F7D27CD88
          SHA-512:37A13B129F3536A53F2A553151A53997DA6DE7CE4D7231EFEEFD26A68C92BE309666F2EE1F527D3B8C38BC6ADDC9FCCBBDD0D134759FD88667976B0CFF842435
          Malicious:false
          Preview:PK........0..7................META-INF/....PK......../..76.{.d...........META-INF/MANIFEST.MF.Qo.0......q...a.4..I .V.+}5..F...&...9....Nb...9.._...\.1.[.Am..mh..W..;+.......y.FE...D*.D.1.Jo........v..[..w+..bM....^.Lin).W.j.<.6(=.y.._...."....E.7."U...mx-j.=..w..j]*F...?......ee(s.l.z.k.z<..e....@..k..j...`...6L.....ks..[......a.&..K..w.Mi....x...\Z.'...W.6.0.c..I.8fzqO].+..a.m....s.C......-..i...s:$#.S..%T....b.ZeZ.0...}..V..*=.......G...*....1..Z.Uv.J'1.E.0......b.Vz.......Y..c..q...vm...cX.:1.c..x.\.0...kg....3..p3.......d.G..c....ye...p.z....PDZ.......U....9..:%..8..;.z....kC..*.k...n5....k._..-....y"..R..../3n.W.. .8..........(;GB%.c..|..q.Y.C.Ti....k...2^.i...>..PK..........7................META-INF/services/PK........!..7................org/PK........"..7................org/apache/PK...........7................org/apache/html/PK........"..7................org/apache/html/dom/PK........"..7................org/apache/wml/PK........"..7................o
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):194354
          Entropy (8bit):7.6968628231831735
          Encrypted:false
          SSDEEP:3072:tKHSI8s531xQp5tk6k15FFGFVLG2TLp5ayAVuTuc6cqQMUGyLfm3p/V:4Hd8831+NJkcf/poXV1Gf0/V
          MD5:9AE9C29E4497FC35A3EADE1E6DD0BBEB
          SHA1:90B215F48FE42776C8C7F6E3509EC54E84FD65EF
          SHA-256:D404AA881EB9C5F7A4FB546E84EA11506CD417A72B5972E88EFF17F43F9F8A64
          SHA-512:1086A52924ADD2406E0B4EC7219A8783AC20E02A32A7A2461EFBF092F0070501F7CADE9C0588907C403352F1A48F80B950E6D40B2E4E3E9EB886E7DB4E97BDEC
          Malicious:false
          Preview:PK........2.s5................META-INF/....PK........1.s5#..S,...........META-INF/MANIFEST.MF.UM..0..#...V...B..n,..+.]m.W...UbG...........h#q..7o.L\......D.....#.fc..N.1.W...\....H"..t....'w.<.0.2..jS.n6..o4....thF.l...Q$.r.v.e.....F.(....(9.a!$.....-%9.....y,......Da.1...-U6@.;.a...w'..'E...I..;.<.rg.'.zM%.W.. ....x..*D.^.{e@......s.)........?..cvB.>O2.Wwz.,e.i..pq.d\Ym.........=.o_..l`..gT....t...zm[..d......N ...=.~by.in....Ch...6L15.}....jgB...X.0....R.$..".x..7..Q|.?...i~..mk}3.+"...Ma*h........ABU.D.hj...?1..Lp.P....u.?..y...Y...b|i...k..m.....P[.1R0.>..!...Bs....T..\......\j..Nt..Ii.r.[Jf.....6..1.R0......^.R&......PK........0.s5................javax/PK........1.s5................javax/xml/PK........0.s5................javax/xml/datatype/PK........0.s5................javax/xml/namespace/PK........0.s5................javax/xml/parsers/PK........0.s5................javax/xml/transform/PK........0.s5................javax/xml/transform/dom/PK........0.s5..........
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
          Category:dropped
          Size (bytes):35328
          Entropy (8bit):7.132664117578073
          Encrypted:false
          SSDEEP:768:/2L5jeeD7Jtyvf9/ODY9ea6cI96G9akwq7hKHC5WEL7DbkPdryF:/2Nje8nKfMMBhY8qICWEId+F
          MD5:7235E09CBCB89FA040C2462E3A1C7078
          SHA1:8A1BE555C5B378C5A5102FE00E992786923451A8
          SHA-256:AEFF758C8FF69AB7811EE337854205EB8A7A9735AE0F485198EE9E81915C545D
          SHA-512:9D33F9CED3FDBAE3E20BB57470BE608720B4133AE015C8B07EED54C11612CBB5254DCDF04960FE41B0DE92A80857CA7E1283E8C625AED90B7193AC448C4EAF40
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 22%
          • Antivirus: Virustotal, Detection: 34%, Browse
          Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L......M...............2.....F....................@..........................@................... .............................. .......\+..............................................................................H............................MPRESS1.........N.......................MPRESS2.............P...................rsrc...\+.......,...^..............@..............................................................................v2.17...M.....43..C.c....j.&.....9.>R.....Q.RhN}=g..}..1^-...f.IR..F...rQ.,......f..._?.....O;.YW....'g.I#..+.,&....I........4w;,.I..~)L...$.....{.?l8...R/..>...3.p....P..V4....L$<..GV.._:........8y..p..L.....X.+.xsp.....V)...3..if.......[..hz@B...T..6...PJ*:..Wy..9..h......e..a..7..y.wc....[.*..D..IO.v.~2..\|.....|Z.H..-ng0]We.....\.w..k.QRLj.:y...I.o...7....sq.x1#N..8G...x...-.*.s$#.2Gw.%.o....a....p...y.&.....f..lpt....s.S.u..g.aP.......p...G.]%...2...?.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4811
          Entropy (8bit):5.101209286895512
          Encrypted:false
          SSDEEP:96:3nPoQMRQzWwmlMGXP37e4iqZ/P1qVqC8KqyqRkuJ4bjJ79:VMYU/3a4ia3k8RkuWXJR
          MD5:CE0E47D3300F3A350E7D61BB5DBB9DEE
          SHA1:BE3266904F001F50A57E23C93D4DD0F09BC1F04C
          SHA-256:C1140DA81AA4A0A81AAC118B084AEFDBF0932AA224780BA9683055EBAB4358B7
          SHA-512:C2B38C666CAB95D453F7B4C6FAF4830E99405BA72901B6D7DAB4D96E78BEDC8B4D64262AD480E56AD66E7142505400CF63B58A097A0592C778B426B5F747D8C1
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vmv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="VDR Maintenance Viewer V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
          Category:dropped
          Size (bytes):26624
          Entropy (8bit):7.692998803999232
          Encrypted:false
          SSDEEP:768:/dL5jeeDoqEZ74Xug7UnZxfHrQQNF7Dq:/dNjeD74b0Zx8Q
          MD5:19BB07DFB40E27A42BA2E3EBF3ABC1B3
          SHA1:638A6C12D290F102E11C8B289033CA5ACFE37500
          SHA-256:1148416F2B78FB9261C314DE1A0BDE9191F0F04A35576D30D71C1DB1CBB08B4D
          SHA-512:43BEEED736345D42F60B505C10535312144E86941222858E3145CB0C78F287D03AE6295FC06FAAC099510575F74B0353335FF3C22D683680B1461F35C354F205
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 26%
          • Antivirus: Virustotal, Detection: 34%, Browse
          Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L......M...............2.....$....................@.............................................. .............................. .......................................................................................H............................MPRESS1.........N.......................MPRESS2.............P...................rsrc................^..............@..............................................................................v2.17...M.....43..C.c....j.&.....9.>R.....Q.RhN}=g..}..1^-...f.IR..F...rQ.,......f..._?.....O;.YW....'g.I#..+.,&....I........4w;,.I..~)L...$.....{.?l8...R/..>...3.p....P..V4....L$<..GV.._:........8y..p..L.....X.+.xsp.....V)...3..if.......[..hz@B...T..6...PJ*:..Wy..9..h......e..a..7..y.wc....[.*..D..IO.v.~2..\|.....|Z.H..-ng0]We.....\.w..k.QRLj.:y...I.o...7....sq.x1#N..8G...x...-.*.s$#.2Gw.%.o....a....p...y.&.....f..lpt....s.S.u..g.aP.......p...G.]%...2...?.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):385024
          Entropy (8bit):6.511547612155607
          Encrypted:false
          SSDEEP:6144:Q/SyaDgv0IFu2fVkcUjPfa/fCiDtE1p8Dv9X:uSFebXfVkcD3zyYDvV
          MD5:FCCDFB2D9A2CD700B1E2C0D7814E97BE
          SHA1:0465B089A6898AC6B86125E32DF6368A5ACFF7F8
          SHA-256:34D5C7451F47D57ED1ED7E85A29DC3C94847D87A60472461048443140B405985
          SHA-512:0025C4D5E35B4E9E206EB13CFA820E37CC4A984F4F6278051D4F042781162A42623A13812BE01DC432A426D9CFC0E838F2A35DCA74631DEE7BA8CD5F74F8AA8F
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B]..]..]...5..Q..z7..B..z7.....].........Z..z7.....z7..\..Rich]..........................PE..L......b.............................W............@..........................P......|M.........................................P....@..............................p..................................@............................................text...S........................... ..`.rdata..............................@..@.data............ ..................@....rsrc........@......................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3650
          Entropy (8bit):4.637588880744435
          Encrypted:false
          SSDEEP:48:k8w6SFSS6SBk2Ki+lazlS94uxzqy5R/QenRbqElAoSEXaajTXK8KMKdD:/QiU9x+lWRuxzPRYeRGotZXfTqD
          MD5:5E0A36C001C6E7713E2B68A7232000B2
          SHA1:1676241A91D7C77DD1CF9EEEBC4B2A3EF9163E0C
          SHA-256:823B40B213152A255F01E5BCA31B115EAC494DCC72EE0F5514AF417A43AC5EDD
          SHA-512:B9A8E9BA9BC07A07A35F025EC73C434727B72C769CAEF29C3AB7567904905CBC5EA5D333E988344C6DEF26C077F6D9315CEC6990720ECFA06485657AB3297BB1
          Malicious:false
          Preview:@ECHO OFF..echo ======================================================================..echo ** %0 %1 %2..echo ======================================================================..REM ----------------------------------------------------------------------..REM ** set destination version..REM ----------------------------------------------------------------------..if "%~2" == "previous" (.. set DEST_ENV=previous..) else (.. set DEST_ENV=latest..)..echo ** start-up [%DEST_ENV%]....setlocal ENABLEDELAYEDEXPANSION..REM ----------------------------------------------------------------------..REM ** check running application version..REM ----------------------------------------------------------------------..cscript versionCheck.vbs....REM errorlevel 0: none, 1:previous, 2:latest..if %errorlevel% == 1 (.. if %DEST_ENV% == latest (.. echo ** running [previous].. .. REM display MessageBox.. echo msgbox "Previous versio
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):78
          Entropy (8bit):3.9275753732673406
          Encrypted:false
          SSDEEP:3:5KOAoApMA/0IiTLD5NZV:cOUMDtTLdjV
          MD5:7504F021590A476273ECB3D5493B91AE
          SHA1:CCFFA2FED7EB43D197C50BD110AAEE1BCEFAA389
          SHA-256:C9E1484D045E5A17562A7E5859914F12D2AB4BC44D7CECAF1DD903654F6F5AE2
          SHA-512:622C5CFA37A3DED6C5012092AB9F28AE3A4A7F72CE71F8CC721B2F14B45220C385DAA9833F0E01B9012645583872471BBFB29D9A38D8D31944B4DA52BD6A68EB
          Malicious:false
          Preview:maintenance.bat..vdrviewer.bat..vmv-env.bat..vv-env.bat..env.bat..splash.bat..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4956
          Entropy (8bit):5.065986743610286
          Encrypted:false
          SSDEEP:48:SY2dceWTMmzbJjQy7w4YFigqfpIcfNQIneySX8USo6cvReFIMFiCncy6yQjIX1Kq:8ubJjQOw4OigeBNxPqOiCnlWG1KP2jD
          MD5:78423506D10EB0261B7A9F3FFC6E437C
          SHA1:99619C0E9C41EEB8E2349D067DCE14BA26AF4CB9
          SHA-256:3ECC4732A7046EA3604834F68B39E76AC256674B95F32BC562552AEAA21806F1
          SHA-512:BA065788ACF0F813317D90EAD9D84E6B4295A9911D9444066CAB98DDB86593BD7509F541D05C069CADED4B4E7B38EB30E2014877597A0FB7150342839BB4F8EF
          Malicious:false
          Preview:@echo off..REM ====================================================================..REM File Name : Live Player V5 (VR-7000/S) Set Firewall..REM Create : 2016/02/16..REM Update :..REM ====================================================================..setlocal enableextensions enabledelayedexpansion....REM ---------------------------------------------------------------------..REM Set Environment..REM ---------------------------------------------------------------------..call env.bat....REM Delete Double Quotation..set JAVA_EXE=%JAVA_EXE:"=%....REM echo on....set SETUP_FIREWALL_LOG=%CD%\log\setupFirewall.log....REM ---------------------------------------------------------------------..REM MAIN..REM ---------------------------------------------------------------------....cd ..\.....REM Delete Old Log..del /q /f "%SETUP_FIREWALL_LOG%"....REM Windows XP.H..call :IS_WINDOWS_XP..set IsWindowsXP=%errorlevel%....REM [TEST] notepad.exe..REM call :SET_FIREWALL_RULE "VDR L
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):634880
          Entropy (8bit):5.830287591283141
          Encrypted:false
          SSDEEP:6144:JsSrVaADBmG9ksHN7IAuqfDD5UB/mcSD/bea+J04T9Tc6YL2GymlBKzdFv+zQ:JsHADvkkN7IXqvi/YbbeauBZcX8kWdZ
          MD5:935AB82B8DD966A4CA9ABB62DE6CF869
          SHA1:1807B34685A2886DFA02868F02C6F5EEBA2BD7E0
          SHA-256:A31D98CA993D7F41B2A0609DF5F941B05B1F443E7D596ED317EC16383FD910DC
          SHA-512:0879DDB17A3A3AFAA265F6961A1B03D6BB3FDDC8B4B8B1C7A924E00C55C6842D87B86246105AE8448C71E884208729374CB60E9C63858F64621ACA15F882B9FA
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 3%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.n;g..hg..hg..h.S~hn..h@Q}hF..h..]hn..h@Q{he..hg..h...h@Qmh...h@Qnh...h@Q|hf..h@Qxhf..hRichg..h........PE..L......b.....................`......c.............@.............................................................................x.......................................................................................x............................textbss.................................text...5........................... ..`.rdata..............................@..@.data...0,..........................@....idata..W........ ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):374
          Entropy (8bit):5.631556032915055
          Encrypted:false
          SSDEEP:6:/keR56QS4vWht6FqL9EKVD/ovkPYuMYy2+t6WYrcVHbzgXXopN2is0WA:/76oW+yV+zInWYo7iXa5WA
          MD5:963EC3BE6D7AC55CA8CF1988AB867AE4
          SHA1:36BD0F20B825C9688A2BEF8236A047035FBBF9DE
          SHA-256:16A0E02C7675255E032C90402FF436FDD99A06AA20B16E37A64A488559CCF8B3
          SHA-512:D0EFE1E7FB093B304208DDDAF5EA643BECE05B4AA538B5D94953E246166EED2E1F0BD39C272F5B4CEECB43AEAB8020776BFCBE11D88C62FB0D1571E0B44B1354
          Malicious:false
          Preview:@ECHO OFF....setlocal....REM .\......i.b.j..SET DISPLAYTIME=15....REM ...s.t.@.C....SET CLASSPATH_SP=./bin;.;../_latest/Viewer/lib/vdr-client.jar;....REM Java.I.v.V......SET JVM_SP_OPTION=-cp %CLASSPATH_SP% -Duser.language=%LANG% -Djava.net.preferIPv4Stack=true....REM ...S.\....%JAVA_EXE% %JVM_SP_OPTION% -splash:%SPLASH% %SPLASH_DISPLAY% %DISPLAYTIME%....endlocal..exit..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):109
          Entropy (8bit):4.8336642463816775
          Encrypted:false
          SSDEEP:3:/qQKyn6AuBHofxVQUHytsrghXAa2ov:/k9CVdytsuQ6v
          MD5:0249CD57C98C6A599BF599534A03A8D5
          SHA1:1686625571DB807C64E2C5B87D0532833D1BA77B
          SHA-256:DFEC622B2D51F19B53E96C7ED5EC9185EA9F6DD6B469A63CABA22F874022150D
          SHA-512:5A0C66860C6E6B072234D1FCC812F654462E23D84D5C0FB4F23E49EA1EA3DA6BA7C6AE18EC8D5C910DCEEB62898CC2D18289AAD62D2920F7686CDCC043ABCFA8
          Malicious:false
          Preview:@ECHO OFF....REM NO edit this file!!..REM (This file convert to liveplayer.exe file)..CALL vdrviewer.bat %1..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):112
          Entropy (8bit):4.75319606505958
          Encrypted:false
          SSDEEP:3:/qQKyn6AuBHofxVQUH4m5A3IrggA5Ao8Uov:/k9CVd4m57BA5Yv
          MD5:1A82800650E8277DA72DCAEEE4C6E57A
          SHA1:C1C1DB3FCECB5FE076231B340D098BA28E5928C5
          SHA-256:16CBA1A49548ACECA21875D917D30399B662E9C97DDA621459E80F3E17633077
          SHA-512:37D52E784030C1661BD53784032C3D2E12F9808B8CFC595F08CDFB87A2854BD5550C157349F9B776D5ABC19E6EAC896844D2F530F9BFE5941A69522478B49E7D
          Malicious:false
          Preview:@ECHO OFF....REM NO edit this file!!..REM (This file convert to maintenance.exe file)..CALL maintenance.bat %1..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4794
          Entropy (8bit):5.105000295370866
          Encrypted:false
          SSDEEP:96:UJPoQMRQLWwmlMGXP37e4iqZ/P1qVqC8KqyqRtPuJqbDx70:qM+U/3a4ia3k8RtuIvxA
          MD5:7B3FC3129561DE48F925A6904E181EA7
          SHA1:B1087BD31D8230ABCDDCA95BC07F0F2682A0EF1B
          SHA-256:988304D91A86FDFE3ADFF267E2931104104C8EBDF0DA73B772F7553C177DA30D
          SHA-512:D8D2051D68DD8D837697710B3F0ED3896C71FFFB5EE1E1CE51FA4FA29A0FD1F6EC2E6B84797489EF7123614BC2CC6384D8AE743CEE455DE2D2462822516348C6
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="Live Player V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##############
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):3.7169715185739918
          Encrypted:false
          SSDEEP:3:dxMqRxukd:jM2xd
          MD5:F1C83E89BF8327FBE4EFE919240E2A8E
          SHA1:AD322A7B3CDE552EB04E40EB088A28B84506A29A
          SHA-256:765BF2B1D540BFDACA9A7F78F38D939C0482996EF82652DF7C5CD7503A4689AF
          SHA-512:CC8B07ADB18890D8ABEF58145CD40A6A585678F799BE175A58DCF4B240ED3E0E89E82FF5252C6269C41C5C23E2E11188B6F396C53176A9171FA54754C69785B3
          Malicious:false
          Preview:LP:2450104-01.64-30..MV:2450105-01.64-30..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2417
          Entropy (8bit):5.600665127439893
          Encrypted:false
          SSDEEP:48:Yzzyqy/mqD3baL5RoXBz2x6AiVolwg0t7+EIKCgLMeCMMLNLL7Cgb9BUocq:Yi/OquLroXV2x6TWwp7PBANCgb9Eq
          MD5:54CA503EFF1423862F6E74937F913DF9
          SHA1:4808997E8C0221F25C345BCB0339BE86AFB0DEED
          SHA-256:15CD6BC2F343D8478155DA284F9CE95C8CB2C236916E8F754145737F7A6EE2BC
          SHA-512:BF70003E7C77D2776B2193CDB5C125F23031972E38243DCF65DF0F9E5594555E073B828965AE940387AD3490722A6CA77D63A6695F60B67B15F566B065D95A2A
          Malicious:false
          Preview:' ############################################################..' .N.........Viewer...C.V.o.[.W..............`.F.b.N......' ..' return..' 0.FViewer..N............' 1.F...o.[.W......Viewer...N...........' 2.F.V.o.[.W......Viewer...N...........' ..' Create : 2017/05/12 S.Harada..' Update :..' ############################################################..Option Explicit....Dim WSHShell....' Live Player..^.C.g...o.[..\.............Const searchStrLP = "Live Player V5"....' VDR Maintenance Viewer..^.C.g...o.[..\.............Const searchStrMV = "VDR Maintenance Viewer"....' Viewer..V.o.[.W................Const searchStrVersion = "Version"....Set WSHShell = WScript.CreateObject("WScript.Shell")....' Viewer..o.[.W.......`.F.b.N....B..' Viewer...N............C......I......B..Call CheckVersion( )....' Viewer...N.............C......I......B..WScript.Quit(0)....' ############################################################..' .\......E.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):255
          Entropy (8bit):5.47963889152615
          Encrypted:false
          SSDEEP:6:/kFDb1jOx0ec77Lr87KtJqdlsz49+pXWOtWBQCvn:/AR4C7Lr87zd+z4M5WOSv
          MD5:0507C51AF9DA9E6F7CEA66AD4CE143AF
          SHA1:C3ABA1B7F0D31D8FA7D4E12C9452E581BE88BB3C
          SHA-256:61DDEC5B36E39E1F077265DB29843FCB36AF14417300F891FDF36C5DF41CBA0A
          SHA-512:DFB35870621AC25700BA5663C46BBF01CE5166128EDECE351923CCBCB50ACAF091CE68B3DECED38061F8E22BED3ADA84A67A9D87188C8432E172F4F624F88907
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms64m -Xmx512m....SET SPLASH=./images/splash-vmv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/MaintenanceViewerApp..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):246
          Entropy (8bit):5.518537632651269
          Encrypted:false
          SSDEEP:6:/kFDb1iWVICbec77Lr87KtJqdlsz49+pXWJV:/ARiSICaC7Lr87zd+z4M5Wb
          MD5:7B94FB5A39E1AC3E86A4447EA6488E85
          SHA1:916508C8CF634D73254A0A7F6C17321CD785338D
          SHA-256:B41115A1AFE407203903E20FD011D3035D116795A996C5AA229C19FE0F23B7DF
          SHA-512:F25D8C33239A0CBB40D137258C1E7CF243823E22DFDC1C5108CBBFD6217BBFA45DDE5351392582BCA8D8107F4D898849EBD14E1473D36B1BE938881B98FD21B0
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms512m -Xmx1024m....SET SPLASH=./images/splash-vv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/VDRViewerApp
          Process:C:\Windows\System32\xcopy.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1200418
          Entropy (8bit):4.457764155962315
          Encrypted:false
          SSDEEP:1536:X1mtgbyt80F2vwxtG/AQPKx0jeFIHNmr85SXYVu+lUDqRwv2dTk1O/Ah6LccLGt7:EaA
          MD5:DDC994C447826488D0C14E012D6B1E68
          SHA1:17CB905E26B756CE095247366658B5E09E5AD353
          SHA-256:6B964B6EF677A01D768C28756D0779D432588A75D799887E09B5ECD080D9B665
          SHA-512:6488D0C34FCEA46E3443EB3D2E244B0ED1C7E080EADF2D87D0E0993DC01994DC18B5DEC9B8E4C56375717DE60BACE5F7CFB2342AEEC54E4708D7685C75FB5816
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<config>.. <category id="ImageRecordSetting">.. <data>.. <channel id="1" validity="true">.. <parameter id="1" name="Active" value="true"/>.. <parameter id="2" name="No" value="Radar1"/>.. <parameter id="38" name="Check" value="0"/>.. <parameter id="27" name="Recording method" value="0"/>.. <parameter id="28" name="No.1 Input source" value="1"/>.. <parameter id="29" name="No.2 Input source" value="0"/>.. <parameter id="30" name="No.3 Input source" value="0"/>.. <parameter id="31" name="No.4 Input source" value="0"/>.. <parameter id="39" name="Fixed DRU Recording" value="true"/>.. <parameter id="40" name="Float DRU Recording" value="true"/>.. <parameter id="41" name="Long Term Device Recording" value="true"/>.. <parameter id="46" name="User Disk Recording" value="true"/>.. <parameter id="42" name="Network Output" value="true"/>..
          Process:C:\Windows\System32\xcopy.exe
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2560
          Entropy (8bit):5.655995512493813
          Encrypted:false
          SSDEEP:48:4lCrKlH7BBJ4nYJczews7XANIL9+SOICmGAI9KImqwzUgltbo3VYPZfA:4lCriGYuBsbAw9+3zrGq146UfA
          MD5:2EFB185ACD63EA96FF009CA4CF96096E
          SHA1:EED13F85B8E92EF508A674BA0EA86403491DF0C5
          SHA-256:70C699E74AE2AA300D92CF442A3D605AAF39BDFEF9C81D955A27C90B50F7E433
          SHA-512:B2495ECED24EFE4D3CB88A5362CA73AFDAF63C59B4BAD228A913F562D343E802E36A067B066A41121259C27DBC16FACAC7C475D8823CAB91466D3A753500B53A
          Malicious:false
          Preview:@ECHO OFF....SET APP_DLL=./../dlls....SETLOCAL ENABLEDELAYEDEXPANSION..REM REQUIRE VERSION : 1.8 (supported 32bit version only)..SET VV_JAVA_REQUIRE_VERSION=1.8..SET VV_JAVA_HOME=....REM RECOGNIZE OS ARCHITECTURE (32bit OS / 64bit OS)..IF "%PROCESSOR_ARCHITECTURE%" EQU "x86" (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\AdoptOpenJDK\JRE..) ELSE (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AdoptOpenJDK\JRE..)....:MAKE_ADOPT_JAVA_HOME..echo Get Adopt Directory from Registory Key (primary)..for /f "tokens=1" %%A in ('reg query "%ADOPT_KEY%"') do set ADOPT_VER=%%A..if "%ADOPT_VER%" EQU "" goto MAKE_ORACLE_JAVA_HOME..for /f "tokens=1" %%A in ('reg query "%ADOPT_VER%"') do set ADOPT_HOT=%%A..for /f "tokens=1" %%A in ('reg query "%ADOPT_HOT%"') do set ADOPT_MSI=%%A..for /f "TOKENS=1,2,*" %%A IN ('REG QUERY "!ADOPT_
          Process:C:\Windows\System32\xcopy.exe
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):815544
          Entropy (8bit):7.892984118213049
          Encrypted:false
          SSDEEP:12288:sKu2y2XjChIcHOjMteTtwRCPRH3jxqlew+YhRScOwaAhsqD75tkBPuxOtyKNVy+3:tjBKHOXwRAH1yewvm0xse9N49NVyM
          MD5:D9F6295776D41CA2B4D8E7E15472B8CA
          SHA1:0EC558D0F90C77C3F96F1F5073F5CF63BEA31105
          SHA-256:4B960DB1A6404BD0BBF898B72F96BD5716B776268502643B7136DBC72B99DB12
          SHA-512:5AED9B6C1D4262F3C4CFAC0401E16198409B40FA0DE65503FAC7207C8E97A4F257163EE308CD8F83D59BEEBF55BCD78A6E383CFF2C8CF3BF37E96FD367124AF5
          Malicious:false
          Preview:PK.........YRT................META-INF/....PK.........YRT..~T...b.......META-INF/MANIFEST.MF....b.......T........M..LK-...K-*...R0.3..r.C.q,HL.HU...%-A..E..%.).N. ..z..F.F.I.....)..%...y^...\.\.PK.........YRT................dooars/PK.........YRT................dooars/app/PK.........YRT................dooars/applet/PK.........YRT................dooars/applet/infobus/PK.........YRT................dooars/beans/PK.........YRT................dooars/beans/ctrl/PK.........YRT................dooars/beans/furuno/PK.........YRT................dooars/beans/trend/PK.........YRT................dooars/beans/ts/PK.........YRT................dooars/bridge/PK.........YRT................dooars/development/PK.........YRT................dooars/event/PK.........YRT................dooars/event/app/PK.........YRT................dooars/factory/PK.........YRT................dooars/foundation/PK.........YRT................dooars/graphics/PK.........YRT................dooars/net/PK.........YRT................
          Process:C:\Windows\System32\xcopy.exe
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):3472143
          Entropy (8bit):7.873152172954716
          Encrypted:false
          SSDEEP:98304:rTIlzujdp6DsGVR/jH9vka8ttMw0lyI5v:gJujdDSBdvka+MXv
          MD5:717C657BF38389EC31901542403E71F2
          SHA1:79A1C7FBAE69F76A3C82CAC951A487FA8015AA12
          SHA-256:2586461A684E2502C0926C35A118EB4397D078C60F0ECF570F8EEBC6766A6CED
          SHA-512:C122A3F225B8BB1C3E8B6368EDDFD485C4A312A9A2292CB70D12D71F79DFB8C386A68C4A5564D3A324E4EBB3890B7E2E88BED11A525A7BBD43E1D555AF286FDE
          Malicious:false
          Preview:PK.........ZRT................META-INF/....PK.........ZRT................META-INF/MANIFEST.MF....................u.Ak.0...{ ..=x.CB...DAg...^%....I..C...al.].....zw.kb.......%..S.....c...}..m.-ow.sqP.bG........<.(Y.......|......(.L.:....oT6.RdLH..QRY..z.O......}."..s(@.....%.T.@..1%.....?..t.l4..Z.)...PK.........YRT................jp/PK.........YRT................jp/co/PK.........YRT................jp/co/furuno/PK.........YRT................jp/co/furuno/vdr/PK.........YRT................jp/co/furuno/vdr/app/PK.........YRT................jp/co/furuno/vdr/conf/PK.........YRT............ ...jp/co/furuno/vdr/conf/component/PK.........YRT................jp/co/furuno/vdr/controller/PK.........YRT............$...jp/co/furuno/vdr/controller/extract/PK.........YRT............(...jp/co/furuno/vdr/controller/maintenance/PK.........YRT................jp/co/furuno/vdr/dataview/PK.........YRT................jp/co/furuno/vdr/debug/PK.........YRT................jp/co/furuno/vdr/decoder/PK..
          Process:C:\Windows\System32\xcopy.exe
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4811
          Entropy (8bit):5.101209286895512
          Encrypted:false
          SSDEEP:96:3nPoQMRQzWwmlMGXP37e4iqZ/P1qVqC8KqyqRkuJ4bjJ79:VMYU/3a4ia3k8RkuWXJR
          MD5:CE0E47D3300F3A350E7D61BB5DBB9DEE
          SHA1:BE3266904F001F50A57E23C93D4DD0F09BC1F04C
          SHA-256:C1140DA81AA4A0A81AAC118B084AEFDBF0932AA224780BA9683055EBAB4358B7
          SHA-512:C2B38C666CAB95D453F7B4C6FAF4830E99405BA72901B6D7DAB4D96E78BEDC8B4D64262AD480E56AD66E7142505400CF63B58A097A0592C778B426B5F747D8C1
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vmv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="VDR Maintenance Viewer V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##
          Process:C:\Windows\System32\xcopy.exe
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4794
          Entropy (8bit):5.105000295370866
          Encrypted:false
          SSDEEP:96:UJPoQMRQLWwmlMGXP37e4iqZ/P1qVqC8KqyqRtPuJqbDx70:qM+U/3a4ia3k8RtuIvxA
          MD5:7B3FC3129561DE48F925A6904E181EA7
          SHA1:B1087BD31D8230ABCDDCA95BC07F0F2682A0EF1B
          SHA-256:988304D91A86FDFE3ADFF267E2931104104C8EBDF0DA73B772F7553C177DA30D
          SHA-512:D8D2051D68DD8D837697710B3F0ED3896C71FFFB5EE1E1CE51FA4FA29A0FD1F6EC2E6B84797489EF7123614BC2CC6384D8AE743CEE455DE2D2462822516348C6
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..CALL vv-env.bat....REM display splash screen..start /b splash.bat....setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="Live Player V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)....REM ############################################################..REM Environment Check & Replacement..REM ##############
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):3.7169715185739918
          Encrypted:false
          SSDEEP:3:dxMqRxukd:jM2xd
          MD5:F1C83E89BF8327FBE4EFE919240E2A8E
          SHA1:AD322A7B3CDE552EB04E40EB088A28B84506A29A
          SHA-256:765BF2B1D540BFDACA9A7F78F38D939C0482996EF82652DF7C5CD7503A4689AF
          SHA-512:CC8B07ADB18890D8ABEF58145CD40A6A585678F799BE175A58DCF4B240ED3E0E89E82FF5252C6269C41C5C23E2E11188B6F396C53176A9171FA54754C69785B3
          Malicious:false
          Preview:LP:2450104-01.64-30..MV:2450105-01.64-30..
          Process:C:\Windows\System32\xcopy.exe
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):255
          Entropy (8bit):5.47963889152615
          Encrypted:false
          SSDEEP:6:/kFDb1jOx0ec77Lr87KtJqdlsz49+pXWOtWBQCvn:/AR4C7Lr87zd+z4M5WOSv
          MD5:0507C51AF9DA9E6F7CEA66AD4CE143AF
          SHA1:C3ABA1B7F0D31D8FA7D4E12C9452E581BE88BB3C
          SHA-256:61DDEC5B36E39E1F077265DB29843FCB36AF14417300F891FDF36C5DF41CBA0A
          SHA-512:DFB35870621AC25700BA5663C46BBF01CE5166128EDECE351923CCBCB50ACAF091CE68B3DECED38061F8E22BED3ADA84A67A9D87188C8432E172F4F624F88907
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms64m -Xmx512m....SET SPLASH=./images/splash-vmv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/MaintenanceViewerApp..
          Process:C:\Windows\System32\xcopy.exe
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):246
          Entropy (8bit):5.518537632651269
          Encrypted:false
          SSDEEP:6:/kFDb1iWVICbec77Lr87KtJqdlsz49+pXWJV:/ARiSICaC7Lr87zd+z4M5Wb
          MD5:7B94FB5A39E1AC3E86A4447EA6488E85
          SHA1:916508C8CF634D73254A0A7F6C17321CD785338D
          SHA-256:B41115A1AFE407203903E20FD011D3035D116795A996C5AA229C19FE0F23B7DF
          SHA-512:F25D8C33239A0CBB40D137258C1E7CF243823E22DFDC1C5108CBBFD6217BBFA45DDE5351392582BCA8D8107F4D898849EBD14E1473D36B1BE938881B98FD21B0
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms512m -Xmx1024m....SET SPLASH=./images/splash-vv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP%....SET SPLASH_DISPLAY=jp.co.furuno.vdr.util.SplashViewer....SET MAIN_CLASS=jp/co/furuno/vdr/app/VDRViewerApp
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):405504
          Entropy (8bit):5.780562511553602
          Encrypted:false
          SSDEEP:3072:j2UJUIPtaqPHX/mh0GVLLiabBQSOrtKZ52+TT1ZyAHgx0baEIVv1eSTnxHs3tStc:jLXmLVVbBQSSE9AEICegl2v
          MD5:F0BA0BAEAFE8D485FCF8F23C60745DD0
          SHA1:A365B8231D98088EA7B2F807CA1AA2FB8C0D5A2A
          SHA-256:E32C740D1ADD0D9556BE1E37E9B23BB34E1CACECAE7C537189843F2A17FF4675
          SHA-512:2EB4A1917DD503A40F07D2A01B5C50CAB328A8E6908B8D4820DAFE2A7DB2B9C35A087950887DF976E1429C37B29DEA6223C01EB2BBC04919947829AA9D4CEE6C
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......rNO.6/!.6/!.6/!...Z.:/!.YY..7/!.?W..4/!.. |.</!...\.(/!...L../!.....3/!.6/ ../!...O.g/!...[.7/!...].7/!...Y.7/!.Rich6/!.........................PE..L......b...........!.....p..........&J.......................................`.......................................b..j.......,............................ .../......................................@............................................text....h.......p.................. ..`.rdata..............................@..@.data...4z...p...P...p..............@....idata..D........ ..................@....rsrc...............................@..@.reloc..W6... ...@..................@..B................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):61440
          Entropy (8bit):5.501689591810636
          Encrypted:false
          SSDEEP:768:wuWX6ZY7Dsl0lKVnUxHuQuIIsYHJ2TlixPXVth:w7XMY7DzlKVnUDIsYcMxNt
          MD5:E03F1FF95E5F5E470B60B98CF8DABA7E
          SHA1:5FF6B61CB323F6F2EC9F1BAEF64B4574CF0955A3
          SHA-256:B18D1CAD6EC5E7FC416CE61BB0C2D8F5ADB7645C5C378FD9D66EBB77057A9429
          SHA-512:0B8D2F24896032C8DD9C52F521A5555DF7A18516C0E6F464C41E4776238269C6F67F9E09FEABE82276B306F175E830BA0722156C16D1D031343939456D1652FB
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..H...H...H...3...H...5...H...&...H...I...H.U.....H...%...H...2...H...0...H.Rich..H.........................PE..L......W...........!.........`.......#..............................................VQ..............................P..........d...............................P......................................@...............4............................text....p.......................... ..`.rdata...!.......0..................@..@.data...d...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1490944
          Entropy (8bit):5.918416150691233
          Encrypted:false
          SSDEEP:24576:Uo02dPZXnHI47KOUWujnfZp3hHHLJw01Lxtykgdl4/8:Uo02dPZXh2OUWMJ1Lxty8/8
          MD5:D5738D9829DF5D18855EFB675231CB8B
          SHA1:F6D1067DEA9A11E1916D7CFBCCB00E4262F1471F
          SHA-256:F67FDE05EB130F74C43C2894C7C8154BD773FEC890BAD4769956F216F3DCB9EA
          SHA-512:BD4D021C59145B7CE42B5F31014A3B4B0A46AE8B494EA0C2450D5E5ACE91CAC69EC4FBBEE5377F8E0EA06EB4FD67EFAAE33FB2DFC05E973DD2BB0B286E0874BD
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 2%
          • Antivirus: Virustotal, Detection: 4%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G.d..d..d.Dh...d..j...d..j...d...9..d..e...d..j..6.d..j..p.d..j...d..j...d.Rich.d.........................PE..L...:..b..................... .......3............@........................... ............................................... ....... ............................................................................... ..............................textbss.................................text....... ...................... ..`.rdata...7.......@..................@..@.data...T...........................@....idata..(..... .. ..................@....rsrc......... .....................@..@........................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):2662400
          Entropy (8bit):5.915842537430716
          Encrypted:false
          SSDEEP:49152:S0ied+UyJl7e2zlNdwO7EQla5biyKi14z328:diedw/pwwEQGz1
          MD5:B4809CE2B21C498EF4ECCFB4B506F784
          SHA1:BEFEC7DB7F0A795A2E041B1F0669CF81FAF34539
          SHA-256:47F1F189B99A4074705FBE2FD247ED5B48E2D815D69B514BDD471810F8BE81BC
          SHA-512:CDE74D2751B0FBD87A89A22A709EA1E32326D314E10BCE10A6EBAF871F582E71B73C97CD6C1558872BDB37EE758F31D176854C1C83891E2A4A8A2CA076FD081E
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$".wJq.wJq.wJql.4q.wJq.7q.wJq8x*q.wJq.1q.wJq8x.q.wJq.wKq.vJq.'q.vJq.$q.wJq.0q.wJq.6q.wJq.2q.wJqRich.wJq................PE..L...P..b.........................................@...........................:..................................... w6......p:.,.....:............................. ...............................................xx:.L............................textbss.................................text....{... ...................... ..`.rdata..............................@..@.data.........6......p'.............@....idata..((...p:..0...`(.............@....rsrc.........:.......(.............@..@................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1396736
          Entropy (8bit):6.530224476491686
          Encrypted:false
          SSDEEP:24576:xm1oPnzDyv8kCv8p30Ed0DxKlTxRor2nmyylX1Tq/PIh99dlkkPbW3/VSAk90/Td:IOPzWkkCvMxsxjjyya/PIh9zHYsz9+
          MD5:44E3F6CCE9AB5A045165330DB87205AE
          SHA1:87456956E251AC0FCFD5874C5AF8375433550103
          SHA-256:245160BAC02DA98439B6D243486B6FE23F3A75310C685412E2AD50D60A4604F1
          SHA-512:39DAABB6CD644FC6EB67FA23D008C26E9F0E74A36934DAEA84634E12981F69C0C8C18BE480C0145EAEA2E4C9944C7BAB5EF2D5C64FB2F4E69E4C3474EEF7910E
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>%..zD..zD..zD....wD..]...MD..]...rD..K..}D..zD...D..]...D..]....D..]...{D..RichzD..........................PE..L......b.................@..........`........P....@.................................T...............................................................................@T..................................@............P...............................text....:.......@.................. ..`.rdata...B...P...P...P..............@..@.data...............................@....rsrc................@..............@..@................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):552960
          Entropy (8bit):6.502032146686435
          Encrypted:false
          SSDEEP:12288:vQfdbvXmARDcl5RAam2hv8YXJGapNLED++ANt5kP+yciW9sllVJ9gr8izBAop7xT:0vXDRDY5Xl8YXJAizBAedCs
          MD5:0D6B3D038E635907A8296EB3BF137F20
          SHA1:530701890DD67AB505CBF4EADFDC2DF7A8E2EBFA
          SHA-256:C409D7F5F5158669C5D7F1593A116876326F7E5D18434BCB941CEE527CF73B39
          SHA-512:CE08EADC561A1287DDAE3641C84F89441614BC462FF7FDF67FD005C0DCA2B86130F16FA654F2494FFE7E2ADD40C97EEDCF817B490A3E78F023DF2FEF56608CDB
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 5%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.@._.@._.@..U>.S.@.xW=.~.@.....X.@._.A..@.xW-...@.xW..%.@.xW8.^.@.Rich_.@.................PE..L...%..b.................0...0.......k.......@....@.......................... ......dd..........................................P...................................................................H...@............@...............................text..../.......0.................. ..`.rdata......@.......@..............@..@.data............p..................@....rsrc................`..............@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):286
          Entropy (8bit):4.4127659163167
          Encrypted:false
          SSDEEP:6:xqOFECtFrEw5tFErMAT8RAE1T/A2we4iX+3y7FQ:xvECfrEw5LEtT8RBdwe4044Q
          MD5:DD38EB05852B8BC83871AABAE9935465
          SHA1:5400A62AE69C5FFE62C99CF707D4A31F029EC04A
          SHA-256:7EF19D070E82D00DB30974C6E32B7BF0DCF0116E96B4F6C81188985D855D6CBD
          SHA-512:35EAC0444CFB65DEDA9CECDADF7CAFC23A5B3507CC3AA8AEA946F5E39B4CFDF478EA37108CC4306C4FC549D3693F2A216F802CF8588CDEA56FEF6E21546265AD
          Malicious:false
          Preview:start "extclient" extclient.exe -cons -debug -v..start "rcplayer" rcplayer.exe -cons -debug -v..start "rserv" rserv.exe -cons -debug -v..start "clientRecorder" clientrecorder.exe -cons -ftpuser furuno -ftppass furuno -debug 0x10000..start "remoteclient" remoteclient.exe -cons -debug -v
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8406
          Entropy (8bit):4.7248589356062975
          Encrypted:false
          SSDEEP:192:sUylxbUT/t1VcfbfZpBZp8xFI+OrU5h2P:Glh8/3obJuewuP
          MD5:499EC3F872B9F8E910D79AC5B0A613DC
          SHA1:1496A8261E2123EDD21644E702899AE7E962271C
          SHA-256:0E16CE7D50F83E415C48B0FADD9B0C0A63B56FF74820E5A3715F113CCDFDD2C5
          SHA-512:8C09C6E395C011902AA89B46256CAE5C147A4C6D39CB2826292242686B3C8B0DDE1DCEA9F268A028D5CB9D260EED2B146E7FF7CE89FD52B5872B6DA12BA5C886
          Malicious:false
          Preview:# generated date: Fri Aug 30 16:30:00 2019..e openclose_t 1..v 0 |open..v 1 |close..e onoff_t 2..v 0 |off..v 1 |on..e power_status_t 3..v 0 |green..v 1 |yellow..v 2 |red..e save_button_t 4..v 0 |lighting..v 1 |lights-out..v 2 |blinking..e normal_button_t 5..v 0 |lighting..v 1 |lights-out..e error_button_t 6..v 0 |green..v 1 |blinking-in-red..v 2 |red..e power_type_t 7..v 1 |AC..v 2 |DC..v 3 |BATT..e land_mark_type_t 8..v 0 |unknown..v 1 |Input Device..v 2 |Terminal Board Ether..v 3 |Junction Box..v 4 |Audio Board..v 5 |MIC..v 6 |Video LAN Converter..v 7 |Radar..v 8 |Terminal Board..v 9 |Serial Input..v 10 |Analog..v 11 |Digital..v 12 |Alarm..v 13 |Power Status..v 14 |System Status..v 15 |VHF..v 16 |Sentence..v 17 |Process..v 18 |Config Status..v 19 |Sensor(LAN) Input..v 20 |AMS Input..e internal_value_type_t 9..v 0 |unknown..v 1 |Power Trigger..v 2 |Current Value..v 3 |Test Value..v 4 |Test Result..v 5 |Capture Resolution (H)..v 6 |Capture Resolution (V)..v 7 |Capture Size..v 8 |Diag R
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):13789
          Entropy (8bit):5.051328041173336
          Encrypted:false
          SSDEEP:96:WxPp6HuGAnQmO3JmyJpmPZcOuKTHymp32ml5Kdt4BleMkhkNu171FtAi8lr2U35P:unOoyUOAHyUG05KzgleFhP1bJpHZs
          MD5:3306236F69013E5C3AEF09D36294B655
          SHA1:BFFEED6C74F4F85508AF31925FA0E81A54824A79
          SHA-256:C3D6878FF5B457C9DE85FCD77551E6E4448100038639B489DDCF5A831E5D1E0E
          SHA-512:E4B795003C183F5465C29A1913617D9083E6B9869C177E520436D11FC8819626BE620F01759BCC99B4021F9D33593E030D0055239A04F9F97B6C90DF44775FEB
          Malicious:false
          Preview:# 1 "class.cpp"..# 1 "<built-in>"..# 1 "<command-line>"..# 1 "class.cpp"..# 10 "class.cpp"..enum openclose_t {.. {0,"open"},.. {1,"close"},..};..enum onoff_t {.. {0,"off"},.. {1,"on"},..};..enum power_status_t {.. {0,"green"},.. {1,"yellow"},.. {2,"red"},..};..enum save_button_t {.. {0,"lighting"},.. {1,"lights-out"},.. {2,"blinking"},..};..enum normal_button_t {.. {0,"lighting"},.. {1,"lights-out"},..};..enum error_button_t {.. {0,"green"},.. {1,"blinking-in-red"},.. {2,"red"},..};..enum power_type_t {.. {1,"AC"},.. {2,"DC"},.. {3,"BATT"},..};....enum land_mark_type_t..{.. {0, "unknown"},.. {1, "Input Device"},.. {2, "Terminal Board Ether"},.. {3, "Junction Box"},.. {4, "Audio Board"},.. {5, "MIC"},.. {6, "Video LAN Converter"},.. {7, "Radar"},.. {8, "Terminal Board"},.. {9, "Serial Input"},.. {10,"Analog"},.. {11,"Digital"},.. {12,"Alarm"},.. {13,"Power Status"},.. {14,"System Status"
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):362
          Entropy (8bit):4.3744796318157215
          Encrypted:false
          SSDEEP:6:n/MW//Did+V6jMHeBLNmAIQ1dGJeMei1AxRADyT/A2weyyCp+ep:n0G4+V67B51Bi18RHdweyXNp
          MD5:066BD77D49DB45FA283042AB2F1BC8AE
          SHA1:FE2AFB82C819936ABB896FEEC897897120B95E91
          SHA-256:9C3B9AF44DBB2E4A147F69A33BD966E8AC61D3FEBF0A5B772BA97036E403436F
          SHA-512:26652A6ED8A0719028F1B8CE44919357DCE06707F3616B393E18B3C83447D7D76CEB7E65BD0836999897413BC592AD79786F410BA7553BBF1B31482622C6DC78
          Malicious:false
          Preview:#..# type procname command & args..#..respawn rserv rserv -debug 0x10000..respawn rcplayer rcplayer -debug 0x10000 -timeStamp 112:0x100001:10..respawn extclient extclient -debug 0x10000..respawn clientrecorder clientrecorder -ftpuser furuno -ftppass furuno -debug 0x10000 -v..respawn remoteclient remoteclient -debug 0x10000..
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):680
          Entropy (8bit):4.162406236493623
          Encrypted:false
          SSDEEP:12:i+bTVheO/OI9WD33V0+PO7I4vjh+SQic0+n:i+bTD9+i1Qm+n
          MD5:DB551FA8DC64E8B58619D7D0E142F638
          SHA1:46FC47809B3AF871928E69C0CA14981EA90BB2A6
          SHA-256:4790F553AFA3E6AEF151A7C3C36EDD700A33D2C02311261CFF5D459AB258C8EA
          SHA-512:010AD9B84E78A1950A430BE45AEF3876F99B787568949D6139DCD586ADF6F65FF1834809061AE311531F85A8CAC0C28029F0DB85107C0CE090E8A2D2378079AB
          Malicious:false
          Preview:# id.type.priority [systemid].ip:port.or file..ip:port.or file..1.modelserv.0.1.localhost..2.logger..0.1.localhost:10020..1.crntserv.0.1.localhost:15000..51.ioserv .0.1.localhost:12001....15 rcplayer 0 1 localhost:10105..16 extserv 0 1 10.0.0.100:10106..17 extclient 0 1 localhost:10107......#1.modelserv.0.1.localhost..#2.logger..0.1.localhost:10020..#1.crntserv.0.1.localhost:15000..#51.ioserv .0.1.localhost:12001....#15 rcplayer 0 1 localhost:10105..#16 extserv 0 1 10.160.155.164:10106..#17 extclient 0 1 localhost:10107......
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):226
          Entropy (8bit):3.983068315890039
          Encrypted:false
          SSDEEP:3:TR29QKB3JU25xecgXsGXR1fCaAOgqJEF/FFJcVM9YdRT64MbvyZuFcqkwOKDeNFR:o9fBqG/gcifNJENhklTBmVc1dVEUn
          MD5:D5BE99A24E4FA518C483C54427DCB976
          SHA1:F8DD2C1A9646CAB3F67813049C74114A06802F6B
          SHA-256:779717057FF3FB7D74E07B6C1A5A72B91923AB9660486299B24AE22716A04E88
          SHA-512:F0AFD27F8925AE2240EB3D5AEAD36B75D1B6E20F9E4AFCAC22239BAADB70E87A5BBD26CC3D457E04086A18D7DE33C7F8F641F7B9F8DF99129214D3B00B2F2EF5
          Malicious:false
          Preview:#.name.type.port..modelserv.1.24001..crntserv 3 15000..logger..4.10020..ioserv..5.12001....rcplayer 1005 10105..extclient 1007 10107..extserv 1006 10106....sysinfo 9 0..
          Process:C:\Windows\System32\xcopy.exe
          File Type:Generic INItialization configuration [drucapa]
          Category:dropped
          Size (bytes):202
          Entropy (8bit):4.696032879598639
          Encrypted:false
          SSDEEP:3:7F8zRIXKyJHSKVJ+3fsfWcYFHyeWiXAsLvsXAsNYRekGW0AsfUeov:7SzEhyM+3fTysQCEQDRepk/eov
          MD5:22C30E24367DBB6D49595D5FDD86CC43
          SHA1:19FF654DFFAB542693655C4309FB46DC442A1A56
          SHA-256:3D2633567D669EF6DD0893974361204F643A898CA70EF2181A99EEAD3F6F78CC
          SHA-512:EE63A543A85F5FCE18B87AFEEABB55444702F1D9B46B52CFF35C7982CB40BB67E9DE37C711E74A76138FB9C918E39169F2D614AC9A35F087E61A5DC5DCF8B2FE
          Malicious:false
          Preview:[extract]..restore = /opt/vr/data/restore;....[drucapa]..capacity = 30000;....[audio]..startOffset = 4600..deliveryCount = 1;..;startOffset = 7488..;startOffset = 9504..; -4896..;startOffset = 4608..;..
          Process:C:\Windows\System32\xcopy.exe
          File Type:data
          Category:dropped
          Size (bytes):68960
          Entropy (8bit):4.889017390182576
          Encrypted:false
          SSDEEP:768:pmHS0+rz2TejydHTbOFVqFUCfnO5LTwnKTvUkIjXxCbv1ByUQVULap4/ukl2HI5J:pmHN+3IHTbUqFi1UkIjhCbXyU/D
          MD5:9EC77F47DC53838FC3CC7079D180E34F
          SHA1:ECB48D106FF6878A49B3F717CB12D94BFC86EAC9
          SHA-256:7AB11DEA44E4C5FF38C2A33D7C3D222E29955D1D47388B8F071F6E6F5DCB8A10
          SHA-512:1571C81EEA2F9BF07703FD79360C16CA893D6FDBBE6EFA0420FA163B7809D55D3938F7E0CB4A2A9ACA01F15315B1A48D2C1D0DACD7B000923F9657B8EF5CEDA8
          Malicious:false
          Preview:.VC.U.o`....(...(...........q..........K...........n...................n...................n...................n...........!.......n...........).......n...........1.......n...........9.......n...........A.......n...........I.......n...........Q.......n...........Y.......n...........a.......n...........i.......n...........q.......n...........y.......n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n... ...............n...!...............n..."...............n...#...............n...$.......!.......n...%.......).......n...&.......1.......n...'.......9.......n...(.......A.......n...).......I.......n...*.......Q.......n...+.......Y.......n...,.......a.......n...-.......i.......n...........q.......n.../.......y.......n...0...
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text
          Category:dropped
          Size (bytes):280471
          Entropy (8bit):4.825966410766605
          Encrypted:false
          SSDEEP:6144:c05idHv11NzvZpLxxLXzVL8qXRCdVijVz3hxJrj9lgWD9njTBbNv/UMJH4URnrKy:xreX
          MD5:A602B91DDC542E56F4D2A44E6D25D638
          SHA1:EC4A4C9EBDFFC358E7EA640CC39DB3532145FA88
          SHA-256:8F10D42FF5383DA8FAEEAD0C4F0B9C91AD4B1278CB8EF42884CB99300B46B1B1
          SHA-512:2D27636FB8572617B526C376CAF51B2A21C208DD29E7AEF5AB91019624C59E580E85D2AED3E2DB4DB6C9650638AABF2DA4207D7E2263804C489DCDA9D3959F32
          Malicious:false
          Preview:@i 0 5 0 0 0 278 840 0 0 476 1376 1174 35 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100001 13 4|||0|||DRU:Device Num:Fixed DRU.5 3 202 0x100001 14 4|||0|||DRU:Round Trip:Fixed DRU.5 4 202 0x100001 15 4|||0|||DRU:Index:Fixed DRU.5 5 202 0x100001 16 4|||0|||DRU:Restart Counter:Fixed DRU.5 6 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 7 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 8 202 0x100002 13 4|||0|||DRU:Device Num:Float DRU.5 9 202 0x100002 14 4|||0|||DRU:Round Trip:Float DRU.5 10 202 0x100002 15 4|||0|||DRU:Index:Float DRU.5 11 202 0x100002 16 4|||0|||DRU:Restart Counter:Float DRU.5 12 203 0x100001 10 4|||0|||HDD:areaNo:Lon
          Process:C:\Windows\System32\xcopy.exe
          File Type:ASCII text
          Category:dropped
          Size (bytes):66614
          Entropy (8bit):4.712231082284398
          Encrypted:false
          SSDEEP:1536:MwdHuAW61Np1wn0ZyGLOSxLlxzVL8qX7MueZrql:1dHv11Nzw0ZpLOSxLlxzVL8qXQuehql
          MD5:E566BB30590682C468E9F9AF0B4F514B
          SHA1:CFE919552115B95CAB2FB11ABAA112814BFA2014
          SHA-256:221D72A03B4C2B164D455D763484EA27712B20CF383C2B3E272F0DC9429775A4
          SHA-512:ECB0DB14DEC33640A0F59EFAADE432F1DFC4F41999C5DCDD79EA9032446976B5C9B19EF72E60CD5F23100CB18C05BC7A8DE05020AEB656A7BC309E55DC228299
          Malicious:false
          Preview:@i 0 5 0 0 0 6 778 0 0 0 0 268 2 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 3 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 4 203 0x100001 10 4|||0|||HDD:areaNo:Long Term Device.5 5 203 0x100001 12 4|||0|||HDD:SIZE:Long Term Device.6 0 110 0x100001 1 4|||0|||analog value:Raw Data:AICH001.6 1 110 0x100002 1 4|||0|||analog value:Raw Data:AICH002.6 2 110 0x100003 1 4|||0|||analog value:Raw Data:AICH003.6 3 110 0x100004 1 4|||0|||analog value:Raw Data:AICH004.6 4 110 0x100005 1 4|||0|||analog value:Raw Data:AICH005.6 5 110 0x100006 1 4|||0|||analog value:Raw Data:AICH006.6 6 110 0x100007 1 4|||0||
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1170699
          Entropy (8bit):4.448309377017215
          Encrypted:false
          SSDEEP:1536:X1mtgbyt80F2vwxtG/AQPKx0jeFIHNmr85SXYVu+lUDqRwv2dTk1O/Ah6LccLGtY:ESJ
          MD5:89730B7ECADC6D34C6FA8AA16A747420
          SHA1:94571C2F3AC44657978910ADE581763287E5B6D6
          SHA-256:681F67296E5B4B170DD32B79718A51064FB0F1E05CFF6DDE6D93D556513C3ECC
          SHA-512:D9181B1624D027E580E56C1C79C38AC74FA63E0718C687119A91698D248F5AB196F4DEBCA8E05EABFB28A7D80A8BAB3C43B95E0916F0843746D61526FEA689C5
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<config>.. <category id="ImageRecordSetting">.. <data>.. <channel id="1" validity="true">.. <parameter id="1" name="Active" value="true"/>.. <parameter id="2" name="No" value="Radar1"/>.. <parameter id="38" name="Check" value="0"/>.. <parameter id="27" name="Recording method" value="0"/>.. <parameter id="28" name="No.1 Input source" value="1"/>.. <parameter id="29" name="No.2 Input source" value="0"/>.. <parameter id="30" name="No.3 Input source" value="0"/>.. <parameter id="31" name="No.4 Input source" value="0"/>.. <parameter id="39" name="Fixed DRU Recording" value="true"/>.. <parameter id="40" name="Float DRU Recording" value="true"/>.. <parameter id="41" name="Long Term Device Recording" value="true"/>.. <parameter id="46" name="User Disk Recording" value="true"/>.. <parameter id="42" name="Network Output" value="true"/>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1170699
          Entropy (8bit):4.448309377017215
          Encrypted:false
          SSDEEP:1536:X1mtgbyt80F2vwxtG/AQPKx0jeFIHNmr85SXYVu+lUDqRwv2dTk1O/Ah6LccLGtY:ESJ
          MD5:89730B7ECADC6D34C6FA8AA16A747420
          SHA1:94571C2F3AC44657978910ADE581763287E5B6D6
          SHA-256:681F67296E5B4B170DD32B79718A51064FB0F1E05CFF6DDE6D93D556513C3ECC
          SHA-512:D9181B1624D027E580E56C1C79C38AC74FA63E0718C687119A91698D248F5AB196F4DEBCA8E05EABFB28A7D80A8BAB3C43B95E0916F0843746D61526FEA689C5
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<config>.. <category id="ImageRecordSetting">.. <data>.. <channel id="1" validity="true">.. <parameter id="1" name="Active" value="true"/>.. <parameter id="2" name="No" value="Radar1"/>.. <parameter id="38" name="Check" value="0"/>.. <parameter id="27" name="Recording method" value="0"/>.. <parameter id="28" name="No.1 Input source" value="1"/>.. <parameter id="29" name="No.2 Input source" value="0"/>.. <parameter id="30" name="No.3 Input source" value="0"/>.. <parameter id="31" name="No.4 Input source" value="0"/>.. <parameter id="39" name="Fixed DRU Recording" value="true"/>.. <parameter id="40" name="Float DRU Recording" value="true"/>.. <parameter id="41" name="Long Term Device Recording" value="true"/>.. <parameter id="46" name="User Disk Recording" value="true"/>.. <parameter id="42" name="Network Output" value="true"/>..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2558
          Entropy (8bit):5.658284950015424
          Encrypted:false
          SSDEEP:48:4lf4alH7BBJ4HJczews7XANIL9+SOICmGAI9KImqwzUgltbo3TGYPZfA:4lf4SYuBsbAw9+3zrGq146TnfA
          MD5:AE9C15353864A1246B36516103365593
          SHA1:AC3524CCC2653F70DAADC7619DA352BE37922C79
          SHA-256:8EC627FB916178D4FA6BCBC3B841AEFA304DDBF552B5C738B106C2AE3EE7759B
          SHA-512:EDFE8B18BC1F096AA242D901F1A6BCD92D4D0EFA3A7796038DE0A67C0FA1CD75613B71EA280D5B2B39AD3378B966B083B26F986E8AC8794B42E4D512DEF5FAD1
          Malicious:false
          Preview:@ECHO OFF....SET APP_DLL=./../dlls....SETLOCAL ENABLEDELAYEDEXPANSION..REM REQUIRE VERSION : 1.7 (supported 32bit version only)..SET VV_JAVA_REQUIRE_VERSION=1.7..SET VV_JAVA_HOME=....REM RECOGNIZE OS ARCHITECTURE (32bit OS / 64bit OS)..IF "%PROCESSOR_ARCHITECTURE%" EQU "x86" (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\AdoptOpenJDK..) ELSE (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AdoptOpenJDK\JRE..)....:MAKE_ADOPT_JAVA_HOME..echo Get Adopt Directory from Registory Key (primary)..for /f "tokens=1" %%A in ('reg query "%ADOPT_KEY%"') do set ADOPT_VER=%%A..if "%ADOPT_VER%" EQU "" goto MAKE_ORACLE_JAVA_HOME..for /f "tokens=1" %%A in ('reg query "%ADOPT_VER%"') do set ADOPT_HOT=%%A..for /f "tokens=1" %%A in ('reg query "%ADOPT_HOT%"') do set ADOPT_MSI=%%A..for /f "TOKENS=1,2,*" %%A IN ('REG QUERY "!ADOPT_MSI!
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4502
          Entropy (8bit):5.153810388662076
          Encrypted:false
          SSDEEP:96:iJPoQMRQxwmlMGXP37e4iqZ/P1qVqC8KqyqRtPuJqbDx70:0MxU/3a4ia3k8RtuIvxA
          MD5:E5E7FD82A500BD50A2AEF6FA401877ED
          SHA1:D43AC5937FE4E39FBFEA0D11ABDCCCA6B2054974
          SHA-256:B9FABCDEDEAFD9FDA0763BF35EC4A836D1B29F58A6BAEDB7F04AE2026DE39575
          SHA-512:7148D32A486CCE27B4375600F25C6C7B7F206F6ACA01D5BC04E5EAAE545E7487FE616914D5E0BC1E9D5725812F9AF007029898DDAC33574AC3C1930369DBA636
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="Live Player V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)..endlocal....CALL vv-env.bat....REM ############################################################..REM Checking installed JRE, or not...REM ######################################################
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3730
          Entropy (8bit):4.889614411755457
          Encrypted:false
          SSDEEP:48:ysoAxUPoAk4rjwRQsag1i1kd7lMiRjM+dykGYz5JSa7e4gWyuJsDbjJr4+gTTWw8:inPoQMRQWwmlMGXP37e4uuJ4bjJ79
          MD5:EF3F917109AB48FE95B423C8261B823A
          SHA1:A081481E8C6BBE76108A74026E3440414B697A05
          SHA-256:979565AB78B93A5FE7D15A8EE01417B679BAF9273B07F733488AD7DC629000A1
          SHA-512:B0D31C7DA5B59A5C70BA8108D2ED928A5E44977974D13FE334F92468A2CFE6DD4E605331CEA350007557A10FA12FFAA466EBF4CF9EE37DF4605C254BDB773A21
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="VDR Maintenance Viewer V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)..endlocal....CALL vmv-env.bat....REM ############################################################..REM Checking installed JRE, or not...REM ##########################################
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):215
          Entropy (8bit):5.45187981568043
          Encrypted:false
          SSDEEP:3:/qQKGgynib1nxFnUXVf9MIEDYy6L4Hfelz2dpxB1xLxthKyvWNfAC+pXWBadKOA/:/kFDb1jOx0ec77Lr81NIpXWOtWBQCvn
          MD5:4DB13C9E68F954038F1894482D35C7FF
          SHA1:57FF69D81501F8EC1F7185542BD6993406D7A019
          SHA-256:AC994746CEF8329FA585811DDA36A6C938A2BBA0C3A321472CDC1B0652B769C1
          SHA-512:97F45EC9FACC472DC9A6BD1D10E60109B148C3A9A445FBE966A269D5BD1B08A95E484740E143B9837660421EF66F409BF0CFF0F0F55CA0BE9619F1BEB27CC348
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms64m -Xmx512m....SET SPLASH=./images/splash-vmv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP% -splash:%SPLASH%....SET MAIN_CLASS=jp/co/furuno/vdr/app/MaintenanceViewerApp..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):2558
          Entropy (8bit):5.658284950015424
          Encrypted:false
          SSDEEP:48:4lf4alH7BBJ4HJczews7XANIL9+SOICmGAI9KImqwzUgltbo3TGYPZfA:4lf4SYuBsbAw9+3zrGq146TnfA
          MD5:AE9C15353864A1246B36516103365593
          SHA1:AC3524CCC2653F70DAADC7619DA352BE37922C79
          SHA-256:8EC627FB916178D4FA6BCBC3B841AEFA304DDBF552B5C738B106C2AE3EE7759B
          SHA-512:EDFE8B18BC1F096AA242D901F1A6BCD92D4D0EFA3A7796038DE0A67C0FA1CD75613B71EA280D5B2B39AD3378B966B083B26F986E8AC8794B42E4D512DEF5FAD1
          Malicious:false
          Preview:@ECHO OFF....SET APP_DLL=./../dlls....SETLOCAL ENABLEDELAYEDEXPANSION..REM REQUIRE VERSION : 1.7 (supported 32bit version only)..SET VV_JAVA_REQUIRE_VERSION=1.7..SET VV_JAVA_HOME=....REM RECOGNIZE OS ARCHITECTURE (32bit OS / 64bit OS)..IF "%PROCESSOR_ARCHITECTURE%" EQU "x86" (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\AdoptOpenJDK..) ELSE (.. SET REG_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment.. SET ADOPT_KEY=HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AdoptOpenJDK\JRE..)....:MAKE_ADOPT_JAVA_HOME..echo Get Adopt Directory from Registory Key (primary)..for /f "tokens=1" %%A in ('reg query "%ADOPT_KEY%"') do set ADOPT_VER=%%A..if "%ADOPT_VER%" EQU "" goto MAKE_ORACLE_JAVA_HOME..for /f "tokens=1" %%A in ('reg query "%ADOPT_VER%"') do set ADOPT_HOT=%%A..for /f "tokens=1" %%A in ('reg query "%ADOPT_HOT%"') do set ADOPT_MSI=%%A..for /f "TOKENS=1,2,*" %%A IN ('REG QUERY "!ADOPT_MSI!
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):205
          Entropy (8bit):5.46405281471386
          Encrypted:false
          SSDEEP:3:/qQKGgynib1n1FqSUXVf9MIEDYypLCoaHfelz2dpxB1xLxthKyvWNfAC+pXWBaPA:/kFDb1iSOiCbec77Lr81NIpXWJV
          MD5:8951D263875C81386C4F8AEEBAF3D7E8
          SHA1:A3594EFD9ED810256FA3358F02408104F484F190
          SHA-256:FD2AFFCEE0218DD6F6F825FBC598BC46216B3D592B20321E3F1B2285E121FF67
          SHA-512:790B9045B52A4535F06BAFC62D121836FE9A99A190F3428499F3F93CBD21B2F8385F800C926877E2CD70CA4EAC4DB79207BA163FAE318615DC98CB106385B52D
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms512m -Xmx512m....SET SPLASH=./images/splash-vv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP% -splash:%SPLASH%....SET MAIN_CLASS=jp/co/furuno/vdr/app/VDRViewerApp
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):3.5294881142662016
          Encrypted:false
          SSDEEP:3:dxMtiTsQmkVITsn:jMtiTsAVITsn
          MD5:935C59B9103671517B7C8C4F032E615A
          SHA1:4D06BB62C51534652A8B8C2E73B9BD935FDB8D9E
          SHA-256:6FE33FAAA98B8F7F3DED8EBE97278AA3208B95DE604F790BBC345C2AE5FB94FE
          SHA-512:97894B70BE89853FA410DE13D070E4B44203C5F3DEFA6A805818AAE308051FC003F52AA7C7F0CB4809A825594742C1ED7CA8BCB9B9760AFF2140CF16C36732E6
          Malicious:false
          Preview:LP:2450104-01.10-60..MV:2450105-01.10-60..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):802608
          Entropy (8bit):7.9225120609642845
          Encrypted:false
          SSDEEP:12288:8302bdDItF4hn5TIafzhtMFYUMu7R/7bWZgJXXHBuNnNmRzJyOvEuTvZ:+KtF4jhtMF37R/vagJHhud85U7ud
          MD5:A217E2C4F7BFA712216223DF81B2E680
          SHA1:4D03152622BBA41BE3018392BD42E58F8DC9C6FA
          SHA-256:66DBC4FA34CA3608996BA504DA631B48E3AD42060B28345630CFD4FA1776A510
          SHA-512:A6AFD9A743920FC89BBB24D5E0801DE98A6CE422109BAE3B5C4655CAFA41B61833598A97590F1EF860AB50A169BBA200C5B371640DED5C2683093C7A8304AA01
          Malicious:false
          Preview:PK........T.:I................META-INF/....PK........S.:I...!Z...g.......META-INF/MANIFEST.MF.M..LK-...K-*...R0.3..r.C.q,HL.HU...%-.x...R.KRSt.*A.....Lu....4....sR......K..5y.x..PK........H.:I................dooars/PK........G.:I................dooars/app/PK........G.:I................dooars/applet/PK........G.:I................dooars/applet/infobus/PK........J.:I................dooars/beans/PK........H.:I................dooars/beans/ctrl/PK........J.:I................dooars/beans/furuno/PK........H.:I................dooars/beans/trend/PK........H.:I................dooars/beans/ts/PK........H.:I................dooars/bridge/PK........H.:I................dooars/development/PK........H.:I................dooars/event/PK........H.:I................dooars/event/app/PK........H.:I................dooars/factory/PK........H.:I................dooars/foundation/PK........H.:I................dooars/graphics/PK........G.:I................dooars/net/PK........H.:I................dooars/net/cli
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):3123101
          Entropy (8bit):7.904963208019537
          Encrypted:false
          SSDEEP:49152:AsICHSSv6KBg8s8VXvVBPppBgbuiEzza8liJYxYMDcm53BeJFL6jk:dSSvlK8s8VXDpK9EzzaQFxe236F4k
          MD5:E2B73C2D35166C7B6E4CEB971C73BE41
          SHA1:44C41E6F8F184A799DD485DC5086892373466678
          SHA-256:D261B93BE17A819C6427C0ED95091CE15EEBE0B474226753B7679C39BA5F6AC5
          SHA-512:DBDEC5F5CCFB7C87625A263F160B85155A99B235EB4A1A6A2DD4A12BDEE90457397E54022498462605B7A18579683BE5A817DD0E78598D7CD24D3C17A09B5EF2
          Malicious:false
          Preview:PK........T.:I................META-INF/....PK........S.:I..'i............META-INF/MANIFEST.MFu.1..0...@....tHH..G..*..J.]%..$)1"".w..x.o=..8......X..j..@rAIn......!f....%..x`...p.KR....V^w...|....Q2..K`ET2.<.M....%mQ......V2N..c&$..G...h....4.E[......]....7.s...A"d..m.]U0[.TS/.../..SB..PK........G.:I................jp/PK........J.:I................jp/co/PK........J.:I................jp/co/furuno/PK........S.:I................jp/co/furuno/vdr/PK........L.:I................jp/co/furuno/vdr/app/PK........L.:I................jp/co/furuno/vdr/conf/PK........L.:I............ ...jp/co/furuno/vdr/conf/component/PK........L.:I................jp/co/furuno/vdr/controller/PK........K.:I............$...jp/co/furuno/vdr/controller/extract/PK........L.:I............(...jp/co/furuno/vdr/controller/maintenance/PK........L.:I................jp/co/furuno/vdr/dataview/PK........M.:I................jp/co/furuno/vdr/debug/PK........M.:I................jp/co/furuno/vdr/decoder/PK........M.:I.............
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):802608
          Entropy (8bit):7.9225120609642845
          Encrypted:false
          SSDEEP:12288:8302bdDItF4hn5TIafzhtMFYUMu7R/7bWZgJXXHBuNnNmRzJyOvEuTvZ:+KtF4jhtMF37R/vagJHhud85U7ud
          MD5:A217E2C4F7BFA712216223DF81B2E680
          SHA1:4D03152622BBA41BE3018392BD42E58F8DC9C6FA
          SHA-256:66DBC4FA34CA3608996BA504DA631B48E3AD42060B28345630CFD4FA1776A510
          SHA-512:A6AFD9A743920FC89BBB24D5E0801DE98A6CE422109BAE3B5C4655CAFA41B61833598A97590F1EF860AB50A169BBA200C5B371640DED5C2683093C7A8304AA01
          Malicious:false
          Preview:PK........T.:I................META-INF/....PK........S.:I...!Z...g.......META-INF/MANIFEST.MF.M..LK-...K-*...R0.3..r.C.q,HL.HU...%-.x...R.KRSt.*A.....Lu....4....sR......K..5y.x..PK........H.:I................dooars/PK........G.:I................dooars/app/PK........G.:I................dooars/applet/PK........G.:I................dooars/applet/infobus/PK........J.:I................dooars/beans/PK........H.:I................dooars/beans/ctrl/PK........J.:I................dooars/beans/furuno/PK........H.:I................dooars/beans/trend/PK........H.:I................dooars/beans/ts/PK........H.:I................dooars/bridge/PK........H.:I................dooars/development/PK........H.:I................dooars/event/PK........H.:I................dooars/event/app/PK........H.:I................dooars/factory/PK........H.:I................dooars/foundation/PK........H.:I................dooars/graphics/PK........G.:I................dooars/net/PK........H.:I................dooars/net/cli
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Java archive data (JAR)
          Category:dropped
          Size (bytes):3123101
          Entropy (8bit):7.904963208019537
          Encrypted:false
          SSDEEP:49152:AsICHSSv6KBg8s8VXvVBPppBgbuiEzza8liJYxYMDcm53BeJFL6jk:dSSvlK8s8VXDpK9EzzaQFxe236F4k
          MD5:E2B73C2D35166C7B6E4CEB971C73BE41
          SHA1:44C41E6F8F184A799DD485DC5086892373466678
          SHA-256:D261B93BE17A819C6427C0ED95091CE15EEBE0B474226753B7679C39BA5F6AC5
          SHA-512:DBDEC5F5CCFB7C87625A263F160B85155A99B235EB4A1A6A2DD4A12BDEE90457397E54022498462605B7A18579683BE5A817DD0E78598D7CD24D3C17A09B5EF2
          Malicious:false
          Preview:PK........T.:I................META-INF/....PK........S.:I..'i............META-INF/MANIFEST.MFu.1..0...@....tHH..G..*..J.]%..$)1"".w..x.o=..8......X..j..@rAIn......!f....%..x`...p.KR....V^w...|....Q2..K`ET2.<.M....%mQ......V2N..c&$..G...h....4.E[......]....7.s...A"d..m.]U0[.TS/.../..SB..PK........G.:I................jp/PK........J.:I................jp/co/PK........J.:I................jp/co/furuno/PK........S.:I................jp/co/furuno/vdr/PK........L.:I................jp/co/furuno/vdr/app/PK........L.:I................jp/co/furuno/vdr/conf/PK........L.:I............ ...jp/co/furuno/vdr/conf/component/PK........L.:I................jp/co/furuno/vdr/controller/PK........K.:I............$...jp/co/furuno/vdr/controller/extract/PK........L.:I............(...jp/co/furuno/vdr/controller/maintenance/PK........L.:I................jp/co/furuno/vdr/dataview/PK........M.:I................jp/co/furuno/vdr/debug/PK........M.:I................jp/co/furuno/vdr/decoder/PK........M.:I.............
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):3730
          Entropy (8bit):4.889614411755457
          Encrypted:false
          SSDEEP:48:ysoAxUPoAk4rjwRQsag1i1kd7lMiRjM+dykGYz5JSa7e4gWyuJsDbjJr4+gTTWw8:inPoQMRQWwmlMGXP37e4uuJ4bjJ79
          MD5:EF3F917109AB48FE95B423C8261B823A
          SHA1:A081481E8C6BBE76108A74026E3440414B697A05
          SHA-256:979565AB78B93A5FE7D15A8EE01417B679BAF9273B07F733488AD7DC629000A1
          SHA-512:B0D31C7DA5B59A5C70BA8108D2ED928A5E44977974D13FE334F92468A2CFE6DD4E605331CEA350007557A10FA12FFAA466EBF4CF9EE37DF4605C254BDB773A21
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="VDR Maintenance Viewer V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)..endlocal....CALL vmv-env.bat....REM ############################################################..REM Checking installed JRE, or not...REM ##########################################
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4502
          Entropy (8bit):5.153810388662076
          Encrypted:false
          SSDEEP:96:iJPoQMRQxwmlMGXP37e4iqZ/P1qVqC8KqyqRtPuJqbDx70:0MxU/3a4ia3k8RtuIvxA
          MD5:E5E7FD82A500BD50A2AEF6FA401877ED
          SHA1:D43AC5937FE4E39FBFEA0D11ABDCCCA6B2054974
          SHA-256:B9FABCDEDEAFD9FDA0763BF35EC4A836D1B29F58A6BAEDB7F04AE2026DE39575
          SHA-512:7148D32A486CCE27B4375600F25C6C7B7F206F6ACA01D5BC04E5EAAE545E7487FE616914D5E0BC1E9D5725812F9AF007029898DDAC33574AC3C1930369DBA636
          Malicious:false
          Preview:@ECHO OFF..REM ############################################################..REM Check : another version is running ?..REM ############################################################..setlocal ENABLEDELAYEDEXPANSION..set RESULT_TASKLIST=..set TASKNAME="Live Player V5"....REM TASKLIST..for /F "usebackq tokens=1" %%i in (`tasklist`) do (.. set RESULT_TASKLIST=!RESULT_TASKLIST!;%%i..)....REM find_task..if "%RESULT_TASKLIST%" NEQ "" (.. REM LivePlayer V4 is running ?.. call :find_task "liveplayerv4.exe" %TASKNAME% "Live Player V4".. if errorlevel 1 (.. endlocal.. goto EOF.. ).. .. REM MaintenanceViewer V4 is running ?.. call :find_task "maintenancev4.exe" %TASKNAME% "VDR Maintenance Viewer V4".. if errorlevel 1 (.. endlocal.. goto EOF.. )..)..endlocal....CALL vv-env.bat....REM ############################################################..REM Checking installed JRE, or not...REM ######################################################
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):42
          Entropy (8bit):3.5294881142662016
          Encrypted:false
          SSDEEP:3:dxMtiTsQmkVITsn:jMtiTsAVITsn
          MD5:935C59B9103671517B7C8C4F032E615A
          SHA1:4D06BB62C51534652A8B8C2E73B9BD935FDB8D9E
          SHA-256:6FE33FAAA98B8F7F3DED8EBE97278AA3208B95DE604F790BBC345C2AE5FB94FE
          SHA-512:97894B70BE89853FA410DE13D070E4B44203C5F3DEFA6A805818AAE308051FC003F52AA7C7F0CB4809A825594742C1ED7CA8BCB9B9760AFF2140CF16C36732E6
          Malicious:false
          Preview:LP:2450104-01.10-60..MV:2450105-01.10-60..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):215
          Entropy (8bit):5.45187981568043
          Encrypted:false
          SSDEEP:3:/qQKGgynib1nxFnUXVf9MIEDYy6L4Hfelz2dpxB1xLxthKyvWNfAC+pXWBadKOA/:/kFDb1jOx0ec77Lr81NIpXWOtWBQCvn
          MD5:4DB13C9E68F954038F1894482D35C7FF
          SHA1:57FF69D81501F8EC1F7185542BD6993406D7A019
          SHA-256:AC994746CEF8329FA585811DDA36A6C938A2BBA0C3A321472CDC1B0652B769C1
          SHA-512:97F45EC9FACC472DC9A6BD1D10E60109B148C3A9A445FBE966A269D5BD1B08A95E484740E143B9837660421EF66F409BF0CFF0F0F55CA0BE9619F1BEB27CC348
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms64m -Xmx512m....SET SPLASH=./images/splash-vmv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP% -splash:%SPLASH%....SET MAIN_CLASS=jp/co/furuno/vdr/app/MaintenanceViewerApp..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):205
          Entropy (8bit):5.46405281471386
          Encrypted:false
          SSDEEP:3:/qQKGgynib1n1FqSUXVf9MIEDYypLCoaHfelz2dpxB1xLxthKyvWNfAC+pXWBaPA:/kFDb1iSOiCbec77Lr81NIpXWJV
          MD5:8951D263875C81386C4F8AEEBAF3D7E8
          SHA1:A3594EFD9ED810256FA3358F02408104F484F190
          SHA-256:FD2AFFCEE0218DD6F6F825FBC598BC46216B3D592B20321E3F1B2285E121FF67
          SHA-512:790B9045B52A4535F06BAFC62D121836FE9A99A190F3428499F3F93CBD21B2F8385F800C926877E2CD70CA4EAC4DB79207BA163FAE318615DC98CB106385B52D
          Malicious:false
          Preview:@ECHO OFF..call env.bat....SET HEAP=-Xms512m -Xmx512m....SET SPLASH=./images/splash-vv.png....SET JVM_OPTION=%JVM_DEFAULT_OPTION% %HEAP% -splash:%SPLASH%....SET MAIN_CLASS=jp/co/furuno/vdr/app/VDRViewerApp
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):409600
          Entropy (8bit):5.801713181991892
          Encrypted:false
          SSDEEP:3072:1TFyQkn5bNLi/E+cUwEmxMcKGSumBzFBD7iYDkBTRFndQPugnIft6A4hjW:1xwbX1UwDneZBDWckBtvgId8a
          MD5:42069D18F1BA168943EBDCEC036CC048
          SHA1:6786D8B1E2A80C7D9AA96F864E284F2FFD752CC6
          SHA-256:BF92CDA3AA7580533C556FE24FD92AC583660C03F6CF8B9C28A7C17B7514CC50
          SHA-512:88A64039F4F9AD4706E1D5671112582B13F4ABCC278A081552B9478EA8469A65EB5BADDA780053ABBA70C88EDD5C848845CFE0BAECE912E320E820F2596BE50D
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0..0..0.....0..{...0..[...0..b?..0.....0...../0...FS.0..0...0......0.....0.....0.....0..Rich.0..................PE..L......W...........!.....p...........G.......................................p.......................................o..........,.... .......................0.../......................................@............................................text....i.......p.................. ..`.rdata..............................@..@.data....x.......P..................@....idata..D........ ..................@....rsrc........ ......................@..@.reloc..Q6...0...@..................@..B........................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):61440
          Entropy (8bit):5.501689591810636
          Encrypted:false
          SSDEEP:768:wuWX6ZY7Dsl0lKVnUxHuQuIIsYHJ2TlixPXVth:w7XMY7DzlKVnUDIsYcMxNt
          MD5:E03F1FF95E5F5E470B60B98CF8DABA7E
          SHA1:5FF6B61CB323F6F2EC9F1BAEF64B4574CF0955A3
          SHA-256:B18D1CAD6EC5E7FC416CE61BB0C2D8F5ADB7645C5C378FD9D66EBB77057A9429
          SHA-512:0B8D2F24896032C8DD9C52F521A5555DF7A18516C0E6F464C41E4776238269C6F67F9E09FEABE82276B306F175E830BA0722156C16D1D031343939456D1652FB
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..H...H...H...3...H...5...H...&...H...I...H.U.....H...%...H...2...H...0...H.Rich..H.........................PE..L......W...........!.........`.......#..............................................VQ..............................P..........d...............................P......................................@...............4............................text....p.......................... ..`.rdata...!.......0..................@..@.data...d...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):409600
          Entropy (8bit):5.801713181991892
          Encrypted:false
          SSDEEP:3072:1TFyQkn5bNLi/E+cUwEmxMcKGSumBzFBD7iYDkBTRFndQPugnIft6A4hjW:1xwbX1UwDneZBDWckBtvgId8a
          MD5:42069D18F1BA168943EBDCEC036CC048
          SHA1:6786D8B1E2A80C7D9AA96F864E284F2FFD752CC6
          SHA-256:BF92CDA3AA7580533C556FE24FD92AC583660C03F6CF8B9C28A7C17B7514CC50
          SHA-512:88A64039F4F9AD4706E1D5671112582B13F4ABCC278A081552B9478EA8469A65EB5BADDA780053ABBA70C88EDD5C848845CFE0BAECE912E320E820F2596BE50D
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0..0..0.....0..{...0..[...0..b?..0.....0...../0...FS.0..0...0......0.....0.....0.....0..Rich.0..................PE..L......W...........!.....p...........G.......................................p.......................................o..........,.... .......................0.../......................................@............................................text....i.......p.................. ..`.rdata..............................@..@.data....x.......P..................@....idata..D........ ..................@....rsrc........ ......................@..@.reloc..Q6...0...@..................@..B........................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):61440
          Entropy (8bit):5.501689591810636
          Encrypted:false
          SSDEEP:768:wuWX6ZY7Dsl0lKVnUxHuQuIIsYHJ2TlixPXVth:w7XMY7DzlKVnUDIsYcMxNt
          MD5:E03F1FF95E5F5E470B60B98CF8DABA7E
          SHA1:5FF6B61CB323F6F2EC9F1BAEF64B4574CF0955A3
          SHA-256:B18D1CAD6EC5E7FC416CE61BB0C2D8F5ADB7645C5C378FD9D66EBB77057A9429
          SHA-512:0B8D2F24896032C8DD9C52F521A5555DF7A18516C0E6F464C41E4776238269C6F67F9E09FEABE82276B306F175E830BA0722156C16D1D031343939456D1652FB
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..H...H...H...3...H...5...H...&...H...I...H.U.....H...%...H...2...H...0...H.Rich..H.........................PE..L......W...........!.........`.......#..............................................VQ..............................P..........d...............................P......................................@...............4............................text....p.......................... ..`.rdata...!.......0..................@..@.data...d...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1015808
          Entropy (8bit):6.542088089476902
          Encrypted:false
          SSDEEP:24576:/uZfNaOvT/8d/N1ZW288dB6rO+ckntq7BuiDW18q:mZl7/8ZZX88qvntq7U18q
          MD5:694FABF3B683D8B48946A9010903BF4F
          SHA1:70431D1952CAD3A4810C69F283B6D784934A26B6
          SHA-256:EF1E34D0A3C21A4F3C73DE5BB54A191A8D59F7E79BF1A8BDDA24FC69C3E59462
          SHA-512:5883F19D57F83818FD053D53C328475FB59CA27391C1DF17DA055545A85EC650A0D879244B5C337F4BCB0DD3F89C9B61D796E2DD71A3352DA2891C8521AA131E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3...]..]..].1.#..].. ..].e....]..\.7.]..0.F.]..3.).]..%..].Rich..].........PE..L...~..W.................P... .......?.......`....@.......................... ......F.......................................T...P...................................................................._..@............`..8............................text....J.......P.................. ..`.rdata.......`.......`..............@..@.data...............................@....rsrc................p..............@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1994752
          Entropy (8bit):6.5767709678262625
          Encrypted:false
          SSDEEP:49152:O64ScMTAtw5VznPH1mv5o+nEdlj4dY4Bnxv2T8vt:t4T05BnPwClj4L
          MD5:58748E8DF83A2C846B8F464B01CC0118
          SHA1:BEB296D4B64390835AF88C424B105BF80BB1F53A
          SHA-256:E3FF6D40FE1F54289D14D0E1294032C96E6BE5623C2563AB2DC0E5227A58D5D7
          SHA-512:D0AFD02A38CA0BA5934751337510823430C12DA9F958AA7DAF8646D271F1EAB83F63B35B03BBEF0B87524D511677B72ACF2C182DB94C9BADBECF2F5685F459A7
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K.Wg..94..94..94.wG4..94(uD44.94.Y4..94(uB4..94.d4..94..84.94(uT4..94(uW4.94(uC4..94(uA4..94Rich..94........PE..L...I..W..........................................@........................... ......\..............................`.../............. ................................................................@............................................text............................... ..`.rdata..............................@..@.data....&..........................@....rsrc......... ......`..............@..@................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):231
          Entropy (8bit):4.412353247213706
          Encrypted:false
          SSDEEP:3:Lj8eMddg/VKOEY5FXG4cYrKOEYT5gCVKOEY+MAgX2o9RAtuKPQ1WeXOWCMA2weU:xqOFECtFrEw5tFErMAT8RAE1T/A2weU
          MD5:AEB505A807428E687161DB5CD96AC83B
          SHA1:E07531E8D436D54EA21EFC8673648A3F6A025B1F
          SHA-256:DD7E7D78AD421467002BFC621A329FEAF77232F645B812B8B772DDA83483E3A8
          SHA-512:9F3AED43E9470852E355E436EE271EF87DBE3D98507891CC2617AABB0D86DEA34F1C7300A9F07124414FE8A7252F9FFDF1A3F95C1B814508868E2E25CABEAE2F
          Malicious:false
          Preview:start "extclient" extclient.exe -cons -debug -v..start "rcplayer" rcplayer.exe -cons -debug -v..start "rserv" rserv.exe -cons -debug -v..start "clientRecorder" clientrecorder.exe -cons -ftpuser furuno -ftppass furuno -debug 0x10000
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1994752
          Entropy (8bit):6.5767709678262625
          Encrypted:false
          SSDEEP:49152:O64ScMTAtw5VznPH1mv5o+nEdlj4dY4Bnxv2T8vt:t4T05BnPwClj4L
          MD5:58748E8DF83A2C846B8F464B01CC0118
          SHA1:BEB296D4B64390835AF88C424B105BF80BB1F53A
          SHA-256:E3FF6D40FE1F54289D14D0E1294032C96E6BE5623C2563AB2DC0E5227A58D5D7
          SHA-512:D0AFD02A38CA0BA5934751337510823430C12DA9F958AA7DAF8646D271F1EAB83F63B35B03BBEF0B87524D511677B72ACF2C182DB94C9BADBECF2F5685F459A7
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K.Wg..94..94..94.wG4..94(uD44.94.Y4..94(uB4..94.d4..94..84.94(uT4..94(uW4.94(uC4..94(uA4..94Rich..94........PE..L...I..W..........................................@........................... ......\..............................`.../............. ................................................................@............................................text............................... ..`.rdata..............................@..@.data....&..........................@....rsrc......... ......`..............@..@................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1376256
          Entropy (8bit):6.541448938044473
          Encrypted:false
          SSDEEP:24576:gDPltY1cK4WVGbTN0cGNPDeDFRcTHbgm1du4mbQbrD3lfkWJSzp8M73OG/A7w:qg4WVaN0De4Hbgm1du4mMbfRY8yO2
          MD5:47A4639E254BA052F7973598BEACBB15
          SHA1:CFD85CC4FF9C9A195CC1BAF6F29A7F38A27E95E4
          SHA-256:BA0DC61505E41CE5844911C287F22DD391AF6502001A0D68FBD9D5B153FCD2FD
          SHA-512:C11203E9C055405E26BD16F85319A082229D0532FA0A2E4D2CD70EDE42E0C18888E76763119041FB694596CC7326ED9FE53D0DCA50B737BD6DF3AB8574AD5E2E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......iwQZ-.?.-.?.-.?...A. .?...B...?...D.%.?...b.*.?.-.>...?...R...?...Q...?...G.,.?.Rich-.?.........PE..L......W..........................................@.................................,.......................................@@......................................@...............................Xy..@............................................text............................... ..`.rdata...=.......@..................@..@.data...<....P.......P..............@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):626688
          Entropy (8bit):6.4899024529004095
          Encrypted:false
          SSDEEP:12288:vtKx5rGeD5xjBtWWQjNLn561AsnfYX40bauCWXlVJ9hEyaBRXMqBNFddvDNu6wUk:VKx5KixjBtW7aBhJu6wEz+wC
          MD5:FC11049AA47FE838672FB367BAD0D795
          SHA1:BF953775C98B99D882CFEEE9E07FB2C3E583B718
          SHA-256:616D9E377C723EB03681B118A5F76AF3D99B69FDAAD72EAF3FEC3F9421E48908
          SHA-512:DD35836261449361D57FBB46505EFCAC4DD3FFFC5251D153E0B1AC2B4657629413F7FB91389477F5CD245DAF1D5883348FC78A22358B10F76FC4AF4766CF054F
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.@._.@._.@..U>.S.@.xW=.~.@.....X.@._.A..@.xW-...@.xW..%.@.xW8.^.@.Rich_.@.................PE..L......W................. ...`......r,.......0....@..........................0.......i..........................................P.... ..............................................................x...@............0...............................text............ .................. ..`.rdata.......0.......0..............@..@.data...............................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1015808
          Entropy (8bit):6.542088089476902
          Encrypted:false
          SSDEEP:24576:/uZfNaOvT/8d/N1ZW288dB6rO+ckntq7BuiDW18q:mZl7/8ZZX88qvntq7U18q
          MD5:694FABF3B683D8B48946A9010903BF4F
          SHA1:70431D1952CAD3A4810C69F283B6D784934A26B6
          SHA-256:EF1E34D0A3C21A4F3C73DE5BB54A191A8D59F7E79BF1A8BDDA24FC69C3E59462
          SHA-512:5883F19D57F83818FD053D53C328475FB59CA27391C1DF17DA055545A85EC650A0D879244B5C337F4BCB0DD3F89C9B61D796E2DD71A3352DA2891C8521AA131E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3...]..]..].1.#..].. ..].e....]..\.7.]..0.F.]..3.).]..%..].Rich..].........PE..L...~..W.................P... .......?.......`....@.......................... ......F.......................................T...P...................................................................._..@............`..8............................text....J.......P.................. ..`.rdata.......`.......`..............@..@.data...............................@....rsrc................p..............@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1376256
          Entropy (8bit):6.541448938044473
          Encrypted:false
          SSDEEP:24576:gDPltY1cK4WVGbTN0cGNPDeDFRcTHbgm1du4mbQbrD3lfkWJSzp8M73OG/A7w:qg4WVaN0De4Hbgm1du4mMbfRY8yO2
          MD5:47A4639E254BA052F7973598BEACBB15
          SHA1:CFD85CC4FF9C9A195CC1BAF6F29A7F38A27E95E4
          SHA-256:BA0DC61505E41CE5844911C287F22DD391AF6502001A0D68FBD9D5B153FCD2FD
          SHA-512:C11203E9C055405E26BD16F85319A082229D0532FA0A2E4D2CD70EDE42E0C18888E76763119041FB694596CC7326ED9FE53D0DCA50B737BD6DF3AB8574AD5E2E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......iwQZ-.?.-.?.-.?...A. .?...B...?...D.%.?...b.*.?.-.>...?...R...?...Q...?...G.,.?.Rich-.?.........PE..L......W..........................................@.................................,.......................................@@......................................@...............................Xy..@............................................text............................... ..`.rdata...=.......@..................@..@.data...<....P.......P..............@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):626688
          Entropy (8bit):6.4899024529004095
          Encrypted:false
          SSDEEP:12288:vtKx5rGeD5xjBtWWQjNLn561AsnfYX40bauCWXlVJ9hEyaBRXMqBNFddvDNu6wUk:VKx5KixjBtW7aBhJu6wEz+wC
          MD5:FC11049AA47FE838672FB367BAD0D795
          SHA1:BF953775C98B99D882CFEEE9E07FB2C3E583B718
          SHA-256:616D9E377C723EB03681B118A5F76AF3D99B69FDAAD72EAF3FEC3F9421E48908
          SHA-512:DD35836261449361D57FBB46505EFCAC4DD3FFFC5251D153E0B1AC2B4657629413F7FB91389477F5CD245DAF1D5883348FC78A22358B10F76FC4AF4766CF054F
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.@._.@._.@..U>.S.@.xW=.~.@.....X.@._.A..@.xW-...@.xW..%.@.xW8.^.@.Rich_.@.................PE..L......W................. ...`......r,.......0....@..........................0.......i..........................................P.... ..............................................................x...@............0...............................text............ .................. ..`.rdata.......0.......0..............@..@.data...............................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):231
          Entropy (8bit):4.412353247213706
          Encrypted:false
          SSDEEP:3:Lj8eMddg/VKOEY5FXG4cYrKOEYT5gCVKOEY+MAgX2o9RAtuKPQ1WeXOWCMA2weU:xqOFECtFrEw5tFErMAT8RAE1T/A2weU
          MD5:AEB505A807428E687161DB5CD96AC83B
          SHA1:E07531E8D436D54EA21EFC8673648A3F6A025B1F
          SHA-256:DD7E7D78AD421467002BFC621A329FEAF77232F645B812B8B772DDA83483E3A8
          SHA-512:9F3AED43E9470852E355E436EE271EF87DBE3D98507891CC2617AABB0D86DEA34F1C7300A9F07124414FE8A7252F9FFDF1A3F95C1B814508868E2E25CABEAE2F
          Malicious:false
          Preview:start "extclient" extclient.exe -cons -debug -v..start "rcplayer" rcplayer.exe -cons -debug -v..start "rserv" rserv.exe -cons -debug -v..start "clientRecorder" clientrecorder.exe -cons -ftpuser furuno -ftppass furuno -debug 0x10000
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8284
          Entropy (8bit):4.729859635270701
          Encrypted:false
          SSDEEP:96:VbktJ5HxbUT5vWut15TcfPZArafJPpqy61Olp7ApNPCj0FI+1+Xy0/+xgYq8CPnu:VylxbUT/t1VcfbfZpBZp8xFI+OrU5hH
          MD5:F8C16F29C1E96B7FD1E62AE3B1E4135A
          SHA1:CD269FC31600DD2427EF845AE880029444D238D6
          SHA-256:1A656186A9CDD883D275BA9230B6C76CDE49E546E5B64B90EB325E1E2F23976D
          SHA-512:26CE20B8788348F0467E45A61BB63A7666B653D9FC2A8197BB4D0F7EFE3C70F320A52DB3E3275A419A97A044AC1F0574EC65BE0D6262C81BE4949C2CA1FF245F
          Malicious:false
          Preview:# generated date: Mon Nov 25 10:39:31 2013..e openclose_t 1..v 0 |open..v 1 |close..e onoff_t 2..v 0 |off..v 1 |on..e power_status_t 3..v 0 |green..v 1 |yellow..v 2 |red..e save_button_t 4..v 0 |lighting..v 1 |lights-out..v 2 |blinking..e normal_button_t 5..v 0 |lighting..v 1 |lights-out..e error_button_t 6..v 0 |green..v 1 |blinking-in-red..v 2 |red..e power_type_t 7..v 1 |AC..v 2 |DC..v 3 |BATT..e land_mark_type_t 8..v 0 |unknown..v 1 |Input Device..v 2 |Terminal Board Ether..v 3 |Junction Box..v 4 |Audio Board..v 5 |MIC..v 6 |Video LAN Converter..v 7 |Radar..v 8 |Terminal Board..v 9 |Serial Input..v 10 |Analog..v 11 |Digital..v 12 |Alarm..v 13 |Power Status..v 14 |System Status..v 15 |VHF..v 16 |Sentence..v 17 |Process..v 18 |Config Status..v 19 |Sensor(LAN) Input..v 20 |AMS Input..e internal_value_type_t 9..v 0 |unknown..v 1 |Power Trigger..v 2 |Current Value..v 3 |Test Value..v 4 |Test Result..v 5 |Capture Resolution (H)..v 6 |Capture Resolution (V)..v 7 |Capture Size..v 8 |Diag R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):13583
          Entropy (8bit):5.054705498950709
          Encrypted:false
          SSDEEP:96:WxPp6HuGAnQmO3JmyJpmPZcOuKTHymp32ml5Kdt4BleMkhkNu171FtAi8lr2U35A:unOoyUOAHyUG05KzgleFhP1bJ+Zs
          MD5:E172D06A1ED7FDCE7EA3E1AC7E39E3DC
          SHA1:494A1A1A69E351DCC1AAC2DF3760169D7A294FC5
          SHA-256:4C6D681D865592B77CD25CBC83D2AF2235425C0EC14B66A0BD44B262511514CD
          SHA-512:15FBBEF5933FEE3E8AABA3B73EF5E7F55BA88089630E9EAF79CF538F3A70CC2DCFDE07345F94A27E55E875364EC420B27A0CB3DE1A25A0D06A3D8110A446C1C0
          Malicious:false
          Preview:# 1 "class.cpp"..# 1 "<built-in>"..# 1 "<command-line>"..# 1 "class.cpp"..# 10 "class.cpp"..enum openclose_t {.. {0,"open"},.. {1,"close"},..};..enum onoff_t {.. {0,"off"},.. {1,"on"},..};..enum power_status_t {.. {0,"green"},.. {1,"yellow"},.. {2,"red"},..};..enum save_button_t {.. {0,"lighting"},.. {1,"lights-out"},.. {2,"blinking"},..};..enum normal_button_t {.. {0,"lighting"},.. {1,"lights-out"},..};..enum error_button_t {.. {0,"green"},.. {1,"blinking-in-red"},.. {2,"red"},..};..enum power_type_t {.. {1,"AC"},.. {2,"DC"},.. {3,"BATT"},..};....enum land_mark_type_t..{.. {0, "unknown"},.. {1, "Input Device"},.. {2, "Terminal Board Ether"},.. {3, "Junction Box"},.. {4, "Audio Board"},.. {5, "MIC"},.. {6, "Video LAN Converter"},.. {7, "Radar"},.. {8, "Terminal Board"},.. {9, "Serial Input"},.. {10,"Analog"},.. {11,"Digital"},.. {12,"Alarm"},.. {13,"Power Status"},.. {14,"System Status"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8284
          Entropy (8bit):4.729859635270701
          Encrypted:false
          SSDEEP:96:VbktJ5HxbUT5vWut15TcfPZArafJPpqy61Olp7ApNPCj0FI+1+Xy0/+xgYq8CPnu:VylxbUT/t1VcfbfZpBZp8xFI+OrU5hH
          MD5:F8C16F29C1E96B7FD1E62AE3B1E4135A
          SHA1:CD269FC31600DD2427EF845AE880029444D238D6
          SHA-256:1A656186A9CDD883D275BA9230B6C76CDE49E546E5B64B90EB325E1E2F23976D
          SHA-512:26CE20B8788348F0467E45A61BB63A7666B653D9FC2A8197BB4D0F7EFE3C70F320A52DB3E3275A419A97A044AC1F0574EC65BE0D6262C81BE4949C2CA1FF245F
          Malicious:false
          Preview:# generated date: Mon Nov 25 10:39:31 2013..e openclose_t 1..v 0 |open..v 1 |close..e onoff_t 2..v 0 |off..v 1 |on..e power_status_t 3..v 0 |green..v 1 |yellow..v 2 |red..e save_button_t 4..v 0 |lighting..v 1 |lights-out..v 2 |blinking..e normal_button_t 5..v 0 |lighting..v 1 |lights-out..e error_button_t 6..v 0 |green..v 1 |blinking-in-red..v 2 |red..e power_type_t 7..v 1 |AC..v 2 |DC..v 3 |BATT..e land_mark_type_t 8..v 0 |unknown..v 1 |Input Device..v 2 |Terminal Board Ether..v 3 |Junction Box..v 4 |Audio Board..v 5 |MIC..v 6 |Video LAN Converter..v 7 |Radar..v 8 |Terminal Board..v 9 |Serial Input..v 10 |Analog..v 11 |Digital..v 12 |Alarm..v 13 |Power Status..v 14 |System Status..v 15 |VHF..v 16 |Sentence..v 17 |Process..v 18 |Config Status..v 19 |Sensor(LAN) Input..v 20 |AMS Input..e internal_value_type_t 9..v 0 |unknown..v 1 |Power Trigger..v 2 |Current Value..v 3 |Test Value..v 4 |Test Result..v 5 |Capture Resolution (H)..v 6 |Capture Resolution (V)..v 7 |Capture Size..v 8 |Diag R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):226
          Entropy (8bit):3.983068315890039
          Encrypted:false
          SSDEEP:3:TR29QKB3JU25xecgXsGXR1fCaAOgqJEF/FFJcVM9YdRT64MbvyZuFcqkwOKDeNFR:o9fBqG/gcifNJENhklTBmVc1dVEUn
          MD5:D5BE99A24E4FA518C483C54427DCB976
          SHA1:F8DD2C1A9646CAB3F67813049C74114A06802F6B
          SHA-256:779717057FF3FB7D74E07B6C1A5A72B91923AB9660486299B24AE22716A04E88
          SHA-512:F0AFD27F8925AE2240EB3D5AEAD36B75D1B6E20F9E4AFCAC22239BAADB70E87A5BBD26CC3D457E04086A18D7DE33C7F8F641F7B9F8DF99129214D3B00B2F2EF5
          Malicious:false
          Preview:#.name.type.port..modelserv.1.24001..crntserv 3 15000..logger..4.10020..ioserv..5.12001....rcplayer 1005 10105..extclient 1007 10107..extserv 1006 10106....sysinfo 9 0..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):309
          Entropy (8bit):4.373072583790819
          Encrypted:false
          SSDEEP:6:n/MW//Did+V6jMHeBLNmAIQ1dGJeMei1AxRADyT/A2weE:n0G4+V67B51Bi18RHdweE
          MD5:7EE712690E3411FBF100507CEC19B98A
          SHA1:676B5597FF93C5A6842D4C516172F4E14BF65B06
          SHA-256:E62A38B9E3A29CF5B2B6B9F1358AF18C5CBB576B43E11608CD17A7F9F9C99045
          SHA-512:B5AC2F42FCF7E5137D0818B9C58D3BB744D99CCAF422FF3D8CE0628F69B1F01F72B86EB7712528763BCD4FE0E22609F8E2F8EFC3F226F51962155BBFEC4B9E8F
          Malicious:false
          Preview:#..# type procname command & args..#..respawn rserv rserv -debug 0x10000..respawn rcplayer rcplayer -debug 0x10000 -timeStamp 112:0x100001:10..respawn extclient extclient -debug 0x10000..respawn clientrecorder clientrecorder -ftpuser furuno -ftppass furuno -debug 0x10000 -v..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):680
          Entropy (8bit):4.162406236493623
          Encrypted:false
          SSDEEP:12:i+bTVheO/OI9WD33V0+PO7I4vjh+SQic0+n:i+bTD9+i1Qm+n
          MD5:DB551FA8DC64E8B58619D7D0E142F638
          SHA1:46FC47809B3AF871928E69C0CA14981EA90BB2A6
          SHA-256:4790F553AFA3E6AEF151A7C3C36EDD700A33D2C02311261CFF5D459AB258C8EA
          SHA-512:010AD9B84E78A1950A430BE45AEF3876F99B787568949D6139DCD586ADF6F65FF1834809061AE311531F85A8CAC0C28029F0DB85107C0CE090E8A2D2378079AB
          Malicious:false
          Preview:# id.type.priority [systemid].ip:port.or file..ip:port.or file..1.modelserv.0.1.localhost..2.logger..0.1.localhost:10020..1.crntserv.0.1.localhost:15000..51.ioserv .0.1.localhost:12001....15 rcplayer 0 1 localhost:10105..16 extserv 0 1 10.0.0.100:10106..17 extclient 0 1 localhost:10107......#1.modelserv.0.1.localhost..#2.logger..0.1.localhost:10020..#1.crntserv.0.1.localhost:15000..#51.ioserv .0.1.localhost:12001....#15 rcplayer 0 1 localhost:10105..#16 extserv 0 1 10.160.155.164:10106..#17 extclient 0 1 localhost:10107......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):13583
          Entropy (8bit):5.054705498950709
          Encrypted:false
          SSDEEP:96:WxPp6HuGAnQmO3JmyJpmPZcOuKTHymp32ml5Kdt4BleMkhkNu171FtAi8lr2U35A:unOoyUOAHyUG05KzgleFhP1bJ+Zs
          MD5:E172D06A1ED7FDCE7EA3E1AC7E39E3DC
          SHA1:494A1A1A69E351DCC1AAC2DF3760169D7A294FC5
          SHA-256:4C6D681D865592B77CD25CBC83D2AF2235425C0EC14B66A0BD44B262511514CD
          SHA-512:15FBBEF5933FEE3E8AABA3B73EF5E7F55BA88089630E9EAF79CF538F3A70CC2DCFDE07345F94A27E55E875364EC420B27A0CB3DE1A25A0D06A3D8110A446C1C0
          Malicious:false
          Preview:# 1 "class.cpp"..# 1 "<built-in>"..# 1 "<command-line>"..# 1 "class.cpp"..# 10 "class.cpp"..enum openclose_t {.. {0,"open"},.. {1,"close"},..};..enum onoff_t {.. {0,"off"},.. {1,"on"},..};..enum power_status_t {.. {0,"green"},.. {1,"yellow"},.. {2,"red"},..};..enum save_button_t {.. {0,"lighting"},.. {1,"lights-out"},.. {2,"blinking"},..};..enum normal_button_t {.. {0,"lighting"},.. {1,"lights-out"},..};..enum error_button_t {.. {0,"green"},.. {1,"blinking-in-red"},.. {2,"red"},..};..enum power_type_t {.. {1,"AC"},.. {2,"DC"},.. {3,"BATT"},..};....enum land_mark_type_t..{.. {0, "unknown"},.. {1, "Input Device"},.. {2, "Terminal Board Ether"},.. {3, "Junction Box"},.. {4, "Audio Board"},.. {5, "MIC"},.. {6, "Video LAN Converter"},.. {7, "Radar"},.. {8, "Terminal Board"},.. {9, "Serial Input"},.. {10,"Analog"},.. {11,"Digital"},.. {12,"Alarm"},.. {13,"Power Status"},.. {14,"System Status"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):309
          Entropy (8bit):4.373072583790819
          Encrypted:false
          SSDEEP:6:n/MW//Did+V6jMHeBLNmAIQ1dGJeMei1AxRADyT/A2weE:n0G4+V67B51Bi18RHdweE
          MD5:7EE712690E3411FBF100507CEC19B98A
          SHA1:676B5597FF93C5A6842D4C516172F4E14BF65B06
          SHA-256:E62A38B9E3A29CF5B2B6B9F1358AF18C5CBB576B43E11608CD17A7F9F9C99045
          SHA-512:B5AC2F42FCF7E5137D0818B9C58D3BB744D99CCAF422FF3D8CE0628F69B1F01F72B86EB7712528763BCD4FE0E22609F8E2F8EFC3F226F51962155BBFEC4B9E8F
          Malicious:false
          Preview:#..# type procname command & args..#..respawn rserv rserv -debug 0x10000..respawn rcplayer rcplayer -debug 0x10000 -timeStamp 112:0x100001:10..respawn extclient extclient -debug 0x10000..respawn clientrecorder clientrecorder -ftpuser furuno -ftppass furuno -debug 0x10000 -v..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):680
          Entropy (8bit):4.162406236493623
          Encrypted:false
          SSDEEP:12:i+bTVheO/OI9WD33V0+PO7I4vjh+SQic0+n:i+bTD9+i1Qm+n
          MD5:DB551FA8DC64E8B58619D7D0E142F638
          SHA1:46FC47809B3AF871928E69C0CA14981EA90BB2A6
          SHA-256:4790F553AFA3E6AEF151A7C3C36EDD700A33D2C02311261CFF5D459AB258C8EA
          SHA-512:010AD9B84E78A1950A430BE45AEF3876F99B787568949D6139DCD586ADF6F65FF1834809061AE311531F85A8CAC0C28029F0DB85107C0CE090E8A2D2378079AB
          Malicious:false
          Preview:# id.type.priority [systemid].ip:port.or file..ip:port.or file..1.modelserv.0.1.localhost..2.logger..0.1.localhost:10020..1.crntserv.0.1.localhost:15000..51.ioserv .0.1.localhost:12001....15 rcplayer 0 1 localhost:10105..16 extserv 0 1 10.0.0.100:10106..17 extclient 0 1 localhost:10107......#1.modelserv.0.1.localhost..#2.logger..0.1.localhost:10020..#1.crntserv.0.1.localhost:15000..#51.ioserv .0.1.localhost:12001....#15 rcplayer 0 1 localhost:10105..#16 extserv 0 1 10.160.155.164:10106..#17 extclient 0 1 localhost:10107......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):226
          Entropy (8bit):3.983068315890039
          Encrypted:false
          SSDEEP:3:TR29QKB3JU25xecgXsGXR1fCaAOgqJEF/FFJcVM9YdRT64MbvyZuFcqkwOKDeNFR:o9fBqG/gcifNJENhklTBmVc1dVEUn
          MD5:D5BE99A24E4FA518C483C54427DCB976
          SHA1:F8DD2C1A9646CAB3F67813049C74114A06802F6B
          SHA-256:779717057FF3FB7D74E07B6C1A5A72B91923AB9660486299B24AE22716A04E88
          SHA-512:F0AFD27F8925AE2240EB3D5AEAD36B75D1B6E20F9E4AFCAC22239BAADB70E87A5BBD26CC3D457E04086A18D7DE33C7F8F641F7B9F8DF99129214D3B00B2F2EF5
          Malicious:false
          Preview:#.name.type.port..modelserv.1.24001..crntserv 3 15000..logger..4.10020..ioserv..5.12001....rcplayer 1005 10105..extclient 1007 10107..extserv 1006 10106....sysinfo 9 0..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [extract]
          Category:dropped
          Size (bytes):263
          Entropy (8bit):4.80778433711678
          Encrypted:false
          SSDEEP:6:NyyYcpR3SzEhyM+3fTysQCEQDRepk/eov:NyyH9yM+bysLmiv
          MD5:D6BC4F1AC2504B94C3E0F7F18288DB8E
          SHA1:286E500342A29FCFAC1AA03D1A289626DC56D740
          SHA-256:C6D088D6ACA44724184C10A9CF21E6CF1FE1B864AB72FB925895F8413F9261AD
          SHA-512:05A2C8FC9369B65A0BBAEA5E742FF9049B88DBBAEECAF1B83A4B1437C46598262BDE7FFC5B8070E6A09718E6AA7F571BAAA920F58011B2B853FA9CF139BCBB06
          Malicious:false
          Preview:[ftp]..user = 38da5b219dd4e064;..pass = 38da5b219dd4e064;....[extract]..restore = /opt/vr/data/restore;....[drucapa]..capacity = 30000;....[audio]..startOffset = 4600..deliveryCount = 1;..;startOffset = 7488..;startOffset = 9504..; -4896..;startOffset = 4608..;..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:data
          Category:dropped
          Size (bytes):59552
          Entropy (8bit):4.816391877928976
          Encrypted:false
          SSDEEP:768:0mHS0+rz2TejyzzIpeFc7aTrHUav4RrvUkIjXxCKTByE:0mHN+3uzIpc2FUkIjhCYyE
          MD5:E85C37F0C35F9E5CB79F34B4C89F8230
          SHA1:B05491E3550D16D82C7FFCB392A19C84C516B26F
          SHA-256:21C15C60379DDBCE2F8F34CEC708333B0DA1C5252D68D778B2DDFDAC0FEFC6ED
          SHA-512:ED8DA62FE74F603B1DA1649990B296A2C716FAE5E76C5B045D9BA371F75ED4965D4572E61039AB2F2E1AB47EC25681799C5F88742DAB11C1659410271D98E0A2
          Malicious:false
          Preview:.VC./2.W....(...(...........8\..........K...........n...................n...................n...................n...........!.......n...........).......n...........1.......n...........9.......n...........A.......n...........I.......n...........Q.......n...........Y.......n...........a.......n...........i.......n...........q.......n...........y.......n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n... ...............n...!...............n..."...............n...#...............n...$.......!.......n...%.......).......n...&.......1.......n...'.......9.......n...(.......A.......n...).......I.......n...*.......Q.......n...+.......Y.......n...,.......a.......n...-.......i.......n...........q.......n.../.......y.......n...0...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):259711
          Entropy (8bit):4.807591821628971
          Encrypted:false
          SSDEEP:6144:P05EdHv11NzvZpLxxLXzVL8qXRCdVijVz3hxJrj9lgWD9njTBbNvHOz6H4URnrKU:Apk
          MD5:8909E6E59564D5AE4195409041BF1024
          SHA1:5BFB002E750E6F3BB04A2092DB061A591AF53DE7
          SHA-256:7BB5DC973415394A4E11D4DD8B7F6B7EED8B35305B9E4E18134D74EA345EE9A6
          SHA-512:CF8F0BE00E240432BAE56C98AA34769FE1C3CEE7BAE1D913A6F7CBDB119CFBFD38EB94EAC686CEC94C56E5C99944ECDDEB938506A87041EBE5BB56967CE85E67
          Malicious:false
          Preview:@i 0 5 0 0 0 276 840 0 0 476 1294 1002 33 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100001 13 4|||0|||DRU:Device Num:Fixed DRU.5 3 202 0x100001 14 4|||0|||DRU:Round Trip:Fixed DRU.5 4 202 0x100001 15 4|||0|||DRU:Index:Fixed DRU.5 5 202 0x100001 16 4|||0|||DRU:Restart Counter:Fixed DRU.5 6 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 7 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 8 202 0x100002 13 4|||0|||DRU:Device Num:Float DRU.5 9 202 0x100002 14 4|||0|||DRU:Round Trip:Float DRU.5 10 202 0x100002 15 4|||0|||DRU:Index:Float DRU.5 11 202 0x100002 16 4|||0|||DRU:Restart Counter:Float DRU.5 12 203 0x100001 10 4|||0|||HDD:areaNo:Lon
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:data
          Category:dropped
          Size (bytes):59552
          Entropy (8bit):4.816391877928976
          Encrypted:false
          SSDEEP:768:0mHS0+rz2TejyzzIpeFc7aTrHUav4RrvUkIjXxCKTByE:0mHN+3uzIpc2FUkIjhCYyE
          MD5:E85C37F0C35F9E5CB79F34B4C89F8230
          SHA1:B05491E3550D16D82C7FFCB392A19C84C516B26F
          SHA-256:21C15C60379DDBCE2F8F34CEC708333B0DA1C5252D68D778B2DDFDAC0FEFC6ED
          SHA-512:ED8DA62FE74F603B1DA1649990B296A2C716FAE5E76C5B045D9BA371F75ED4965D4572E61039AB2F2E1AB47EC25681799C5F88742DAB11C1659410271D98E0A2
          Malicious:false
          Preview:.VC./2.W....(...(...........8\..........K...........n...................n...................n...................n...........!.......n...........).......n...........1.......n...........9.......n...........A.......n...........I.......n...........Q.......n...........Y.......n...........a.......n...........i.......n...........q.......n...........y.......n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n... ...............n...!...............n..."...............n...#...............n...$.......!.......n...%.......).......n...&.......1.......n...'.......9.......n...(.......A.......n...).......I.......n...*.......Q.......n...+.......Y.......n...,.......a.......n...-.......i.......n...........q.......n.../.......y.......n...0...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):60020
          Entropy (8bit):4.676548497004412
          Encrypted:false
          SSDEEP:1536:DwdHuAW61Np1wn0ZyGLOSxLlxzVL8qX7Muee:sdHv11Nzw0ZpLOSxLlxzVL8qXQuee
          MD5:80C955F3552F5E99085A6FB215893A1F
          SHA1:F8360E7AC1739AC98FFF06CBF9CEB9A75860397D
          SHA-256:A7A3AA964D1677182E304569C95E3D8153B29A840C04343A632203AC139C4A57
          SHA-512:3674C323177CDADEB15A787C4AC5138D35768BB7083A2EF52F18972B1B2F991ADAD0B23FD8D6BB9EFF0A178F116B6080F2D2B6F5DC41667682AC63C0AEFD8292
          Malicious:false
          Preview:@i 0 5 0 0 0 6 778 0 0 0 0 182 2 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 3 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 4 203 0x100001 10 4|||0|||HDD:areaNo:Long Term Device.5 5 203 0x100001 12 4|||0|||HDD:SIZE:Long Term Device.6 0 110 0x100001 1 4|||0|||analog value:Raw Data:AICH001.6 1 110 0x100002 1 4|||0|||analog value:Raw Data:AICH002.6 2 110 0x100003 1 4|||0|||analog value:Raw Data:AICH003.6 3 110 0x100004 1 4|||0|||analog value:Raw Data:AICH004.6 4 110 0x100005 1 4|||0|||analog value:Raw Data:AICH005.6 5 110 0x100006 1 4|||0|||analog value:Raw Data:AICH006.6 6 110 0x100007 1 4|||0||
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [extract]
          Category:dropped
          Size (bytes):263
          Entropy (8bit):4.80778433711678
          Encrypted:false
          SSDEEP:6:NyyYcpR3SzEhyM+3fTysQCEQDRepk/eov:NyyH9yM+bysLmiv
          MD5:D6BC4F1AC2504B94C3E0F7F18288DB8E
          SHA1:286E500342A29FCFAC1AA03D1A289626DC56D740
          SHA-256:C6D088D6ACA44724184C10A9CF21E6CF1FE1B864AB72FB925895F8413F9261AD
          SHA-512:05A2C8FC9369B65A0BBAEA5E742FF9049B88DBBAEECAF1B83A4B1437C46598262BDE7FFC5B8070E6A09718E6AA7F571BAAA920F58011B2B853FA9CF139BCBB06
          Malicious:false
          Preview:[ftp]..user = 38da5b219dd4e064;..pass = 38da5b219dd4e064;....[extract]..restore = /opt/vr/data/restore;....[drucapa]..capacity = 30000;....[audio]..startOffset = 4600..deliveryCount = 1;..;startOffset = 7488..;startOffset = 9504..; -4896..;startOffset = 4608..;..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):259711
          Entropy (8bit):4.807591821628971
          Encrypted:false
          SSDEEP:6144:P05EdHv11NzvZpLxxLXzVL8qXRCdVijVz3hxJrj9lgWD9njTBbNvHOz6H4URnrKU:Apk
          MD5:8909E6E59564D5AE4195409041BF1024
          SHA1:5BFB002E750E6F3BB04A2092DB061A591AF53DE7
          SHA-256:7BB5DC973415394A4E11D4DD8B7F6B7EED8B35305B9E4E18134D74EA345EE9A6
          SHA-512:CF8F0BE00E240432BAE56C98AA34769FE1C3CEE7BAE1D913A6F7CBDB119CFBFD38EB94EAC686CEC94C56E5C99944ECDDEB938506A87041EBE5BB56967CE85E67
          Malicious:false
          Preview:@i 0 5 0 0 0 276 840 0 0 476 1294 1002 33 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100001 13 4|||0|||DRU:Device Num:Fixed DRU.5 3 202 0x100001 14 4|||0|||DRU:Round Trip:Fixed DRU.5 4 202 0x100001 15 4|||0|||DRU:Index:Fixed DRU.5 5 202 0x100001 16 4|||0|||DRU:Restart Counter:Fixed DRU.5 6 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 7 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 8 202 0x100002 13 4|||0|||DRU:Device Num:Float DRU.5 9 202 0x100002 14 4|||0|||DRU:Round Trip:Float DRU.5 10 202 0x100002 15 4|||0|||DRU:Index:Float DRU.5 11 202 0x100002 16 4|||0|||DRU:Restart Counter:Float DRU.5 12 203 0x100001 10 4|||0|||HDD:areaNo:Lon
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):60020
          Entropy (8bit):4.676548497004412
          Encrypted:false
          SSDEEP:1536:DwdHuAW61Np1wn0ZyGLOSxLlxzVL8qX7Muee:sdHv11Nzw0ZpLOSxLlxzVL8qXQuee
          MD5:80C955F3552F5E99085A6FB215893A1F
          SHA1:F8360E7AC1739AC98FFF06CBF9CEB9A75860397D
          SHA-256:A7A3AA964D1677182E304569C95E3D8153B29A840C04343A632203AC139C4A57
          SHA-512:3674C323177CDADEB15A787C4AC5138D35768BB7083A2EF52F18972B1B2F991ADAD0B23FD8D6BB9EFF0A178F116B6080F2D2B6F5DC41667682AC63C0AEFD8292
          Malicious:false
          Preview:@i 0 5 0 0 0 6 778 0 0 0 0 182 2 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 3 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 4 203 0x100001 10 4|||0|||HDD:areaNo:Long Term Device.5 5 203 0x100001 12 4|||0|||HDD:SIZE:Long Term Device.6 0 110 0x100001 1 4|||0|||analog value:Raw Data:AICH001.6 1 110 0x100002 1 4|||0|||analog value:Raw Data:AICH002.6 2 110 0x100003 1 4|||0|||analog value:Raw Data:AICH003.6 3 110 0x100004 1 4|||0|||analog value:Raw Data:AICH004.6 4 110 0x100005 1 4|||0|||analog value:Raw Data:AICH005.6 5 110 0x100006 1 4|||0|||analog value:Raw Data:AICH006.6 6 110 0x100007 1 4|||0||
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data, Vorbis audio, stereo, 16000 Hz, ~49000 bps
          Category:dropped
          Size (bytes):1380
          Entropy (8bit):6.452558893988802
          Encrypted:false
          SSDEEP:24:O4i6xqlWeLva6v41DTxnTUWM3/4KSCdv9v4IEdNwlFACjXcZ:O471DeWM3/4PIEDwlVsZ
          MD5:AF56A60EB782D1AEB2DCA370D99EB1CA
          SHA1:7351D598846F1A4BF301DE3FF5598967A35BCE02
          SHA-256:B84693BF333AE83F26D496404EFDE8AFD63F90FA1920385E9C498D7650145FB0
          SHA-512:7F28C73DBD70DDD7E4F05DC2EF00AE72321875B20B7A2EBDCC019EB05BBAF09D511581FEF4E5EBC4FF4DAD53EE535291EFF0FD5644058F78C5E8CF9196FA2030
          Malicious:false
          Preview:OggS..........xV4.....Y..d...vorbis......>......h.........OggS..........xV4.....)..;.8.vorbis....VLSI Solution Oy........ENCODER=VS1053 v1.70.OggS..........xV4.......;j.......vorbis.BCV..@..&I.$I.$I.$I.,.,.,.,.4M.4M.4M.4M.4M.4M.4M.4M..U.....EQ..q.I.$.,M.4..<Q.E.4MUUU.u]Y.e.m].u..}a..a.. 4d.....`Q..q.G.$.,K.4..<O.E.4MSUU.u]W.e.m[.u..}_..a..!..Y.....X.Eq..$I.,..4M.<..EQ4M.TUUu].eY.m..u].}...a..a.BCV..@...EQ..q$I.,.4M.<..DQ.M.4UUU].ueY.m.u].}...a..a.....@.....<..<.<.<..<.<..<...<....,..<..<..<..<..<..,..<..<..<O..@...@..Rh.J. ...f9.f9..I..H..H..Y.'..`... ...Qh.J. ...fY.ei.eI..Y..H.eI..H.eI.dY.eY..i.eY.&..p... .........x...i..(..8..i...........2Tv....4d.....`....u.e.UU..E..4.$.Q.Eq.I.,M.<Q4MUu]Y.m].}_..........V.@...8.DY..y.H....L....P...<.T]..}.X....\...........p..i..i..i..i..i..i..i..i..)..i..i..i..(..i..i..i..%..i..i..(Z.%..i..i..eY.(..i..(..%X.(..i..(..e..h..i..(..(..i..i..(..h..i..i..(..i..i..i..h..i..i..i..i..i..i..i..i..i..N.p..~..!Ce....BCV.....^.UUUUUUU].
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data, Vorbis audio, stereo, 16000 Hz, ~88000 bps, created by: Xiph.Org libVorbis I (1.3.3)
          Category:dropped
          Size (bytes):3452
          Entropy (8bit):6.96239029258027
          Encrypted:false
          SSDEEP:96:uYLvSatuKPak5RuUPpspcqHPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPCxchMIIat:jrtoKPdvpOAGXIi
          MD5:3FAC012E171C4635C32B8F1B57E0369D
          SHA1:B951E466318D413614A3AC8CDA342F890DF0E2E4
          SHA-256:4CD997A8AD4A9013723CFA897E3CB75BBD35278C2B7789435A8F01449956A4AA
          SHA-512:A442D4E0D81D3A35C04F5320962FA31D2E5A80D418C67307A4B22FB3A5518E70D3FA3D24F423B45ED4A5DEBBADD0B80F09C3C86D326B45BC1EB4B403B55E3475
          Malicious:false
          Preview:OggS...........z7M..........vorbis......>.......W........OggS...........z7M....Ly...h.vorbis+...Xiph.Org libVorbis I 20120203 (Omnipresent)....)...ENCODER=VDRAudioStreamConverter(libMedia).OggS...........z7M....^.I................vorbis$BCV..@...B.*..c.:..!....B.)..B.!.$C.:.5..cG.d.B..U..@....WPrI-.s..W.q. .s. g.q.%.s.9.r.1.s..W.r)-.s..G.q...s..G.q...sm1..r.9.s. .Rr.5.s..g.r.%.s. g.q. .s.5..r.9.s.9.s.9.s.1.s.9.sn1..s.9.s.9..s.9.s 4d.......(..(..........@q.G..K....$...Y.........H..H..X.fi.&z.(..*..i.,........H..PQ..p....Y..d...`(..8..X..Y.............P.G..M.$..<..<..<..<..<..<..<...Y.. ....(d..BCV..@...!..C.R.\..B..C.B.C....).%c.S.A.!|.=..{..U.....a.8...$.!.b.'Dq. .!..$X.y.$...B..{...{ 4d...... ..B.!..B.)..RH)..b.)..s.1. ..2.N:..N:.$..Rk)..SL...c...s.A)c.1..c.1..c.1..#..Y........d.A.!..RH)..r.1...BCV..........ER$Gr$G.$.,I.<.<.<M.DM.U.Um..m_.m..e..e..e].e.m].]].u].u].u].u].u]..U.......8..8..H..H.............8..H..X.%Y.&i.gy..y....................(..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data, Vorbis audio, stereo, 16000 Hz, ~49000 bps
          Category:dropped
          Size (bytes):1380
          Entropy (8bit):6.452558893988802
          Encrypted:false
          SSDEEP:24:O4i6xqlWeLva6v41DTxnTUWM3/4KSCdv9v4IEdNwlFACjXcZ:O471DeWM3/4PIEDwlVsZ
          MD5:AF56A60EB782D1AEB2DCA370D99EB1CA
          SHA1:7351D598846F1A4BF301DE3FF5598967A35BCE02
          SHA-256:B84693BF333AE83F26D496404EFDE8AFD63F90FA1920385E9C498D7650145FB0
          SHA-512:7F28C73DBD70DDD7E4F05DC2EF00AE72321875B20B7A2EBDCC019EB05BBAF09D511581FEF4E5EBC4FF4DAD53EE535291EFF0FD5644058F78C5E8CF9196FA2030
          Malicious:false
          Preview:OggS..........xV4.....Y..d...vorbis......>......h.........OggS..........xV4.....)..;.8.vorbis....VLSI Solution Oy........ENCODER=VS1053 v1.70.OggS..........xV4.......;j.......vorbis.BCV..@..&I.$I.$I.$I.,.,.,.,.4M.4M.4M.4M.4M.4M.4M.4M..U.....EQ..q.I.$.,M.4..<Q.E.4MUUU.u]Y.e.m].u..}a..a.. 4d.....`Q..q.G.$.,K.4..<O.E.4MSUU.u]W.e.m[.u..}_..a..!..Y.....X.Eq..$I.,..4M.<..EQ4M.TUUu].eY.m..u].}...a..a.BCV..@...EQ..q$I.,.4M.<..DQ.M.4UUU].ueY.m.u].}...a..a.....@.....<..<.<.<..<.<..<...<....,..<..<..<..<..<..,..<..<..<O..@...@..Rh.J. ...f9.f9..I..H..H..Y.'..`... ...Qh.J. ...fY.ei.eI..Y..H.eI..H.eI.dY.eY..i.eY.&..p... .........x...i..(..8..i...........2Tv....4d.....`....u.e.UU..E..4.$.Q.Eq.I.,M.<Q4MUu]Y.m].}_..........V.@...8.DY..y.H....L....P...<.T]..}.X....\...........p..i..i..i..i..i..i..i..i..)..i..i..i..(..i..i..i..%..i..i..(Z.%..i..i..eY.(..i..(..%X.(..i..(..e..h..i..(..(..i..i..(..h..i..i..(..i..i..i..h..i..i..i..i..i..i..i..i..i..N.p..~..!Ce....BCV.....^.UUUUUUU].
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data, Vorbis audio, stereo, 16000 Hz, ~88000 bps, created by: Xiph.Org libVorbis I (1.3.3)
          Category:dropped
          Size (bytes):3452
          Entropy (8bit):6.96239029258027
          Encrypted:false
          SSDEEP:96:uYLvSatuKPak5RuUPpspcqHPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPCxchMIIat:jrtoKPdvpOAGXIi
          MD5:3FAC012E171C4635C32B8F1B57E0369D
          SHA1:B951E466318D413614A3AC8CDA342F890DF0E2E4
          SHA-256:4CD997A8AD4A9013723CFA897E3CB75BBD35278C2B7789435A8F01449956A4AA
          SHA-512:A442D4E0D81D3A35C04F5320962FA31D2E5A80D418C67307A4B22FB3A5518E70D3FA3D24F423B45ED4A5DEBBADD0B80F09C3C86D326B45BC1EB4B403B55E3475
          Malicious:false
          Preview:OggS...........z7M..........vorbis......>.......W........OggS...........z7M....Ly...h.vorbis+...Xiph.Org libVorbis I 20120203 (Omnipresent)....)...ENCODER=VDRAudioStreamConverter(libMedia).OggS...........z7M....^.I................vorbis$BCV..@...B.*..c.:..!....B.)..B.!.$C.:.5..cG.d.B..U..@....WPrI-.s..W.q. .s. g.q.%.s.9.r.1.s..W.r)-.s..G.q...s..G.q...sm1..r.9.s. .Rr.5.s..g.r.%.s. g.q. .s.5..r.9.s.9.s.9.s.1.s.9.sn1..s.9.s.9..s.9.s 4d.......(..(..........@q.G..K....$...Y.........H..H..X.fi.&z.(..*..i.,........H..PQ..p....Y..d...`(..8..X..Y.............P.G..M.$..<..<..<..<..<..<..<...Y.. ....(d..BCV..@...!..C.R.\..B..C.B.C....).%c.S.A.!|.=..{..U.....a.8...$.!.b.'Dq. .!..$X.y.$...B..{...{ 4d...... ..B.!..B.)..RH)..b.)..s.1. ..2.N:..N:.$..Rk)..SL...c...s.A)c.1..c.1..c.1..#..Y........d.A.!..RH)..r.1...BCV..........ER$Gr$G.$.,I.<.<.<M.DM.U.Um..m_.m..e..e..e].e.m].]].u].u].u].u].u]..U.......8..8..H..H.............8..H..X.%Y.&i.gy..y....................(..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):593920
          Entropy (8bit):6.219272600977045
          Encrypted:false
          SSDEEP:12288:JXiLIjfMfkrmJ0EPZP72BkxSq8KfJrAXLyQSGY:piL6mJ0EPd75S6r
          MD5:E8D9F7F3100CC1617CC4C0D2A192CC65
          SHA1:CA5B510749F0D046A1769A73DE7B785A53087AA0
          SHA-256:F221F3F7F3097653CB6122422723DEF7DF1FB3E35E1C55880944405D5FC4DB68
          SHA-512:F62FA17108D0CC915A435D3B004EF3F54F4CC8731830D7139AC427B7F082A23E8A616B04FED70985487ACCFC2A1282D3F182F1A0EECFFD6F5CFA1DC105B200BA
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q.q....I...I...I.&aI...I2$bI#..I...I...I..BI...I2$rI...I2$qI...I2$eI...I2$gI...IRich...I........PE..L......b...........!.........P.......1....................................... ..........................................r.......(....p..........................xI.................................. ...@...............t............................text............................... ..`.rdata..RN.......P..................@..@.data....].......P..................@....rsrc........p.......`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):573440
          Entropy (8bit):6.233175890219993
          Encrypted:false
          SSDEEP:12288:mshe8YKefkefSPD9fY7zVPHkDq8KfJrAXLyQSGF:mMe8gfSb9wPC6r
          MD5:A55645F58E32DD30D21D28AD0D4BCDB8
          SHA1:68245D0ED0D950A78B5EEC04D54029E895AE2590
          SHA-256:0F6A0FBB9A4B80F7465DB8F9133883F37E1E4767B889F2A89FB87F1956087EAC
          SHA-512:25D649E8034A3481DB67295F19759E923D8B64137EC00963412B3A54899936447D3F7C041E315E643E96443EFBCCECFAAE7D08976CC15F72C191F80089511D5D
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........' ..Is..Is..IsjZ7s.Is.X4s.Is..Hso.Is>..s..Is.X$s%.Is.X'sn.Is.X3s..Is.X1s..IsRich..Is........PE..L......b...........!......... .......1..............................................)...................................=.......(............................ ...@..................................h...@...............t............................text...V........................... ..`.rdata..-=.......@..................@..@.data...X(.......@..................@....rsrc................ ..............@..@.reloc....... .......0..............@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):69632
          Entropy (8bit):5.234515699739443
          Encrypted:false
          SSDEEP:1536:+KwF/uZnd+l07TjdghAQ4dYMqLcBrtXt:bd++qYepcBrtXt
          MD5:DDB8AB034F46DD12361E0BAF09F58E9C
          SHA1:8470B31D10299B367D3C1DB225153FACEE41E2EF
          SHA-256:52451F4DB95E02463F27A5B93C213D13776EAF6856E36BE4595CBF38F7AFECAB
          SHA-512:B40A24E5D226035B0AF8F36DAE9D6F21F6E811136BAC5F00B0B6818A7568988103D7C782983DFEF7137419519EEA674F84EDF106D7FD925BE49BB7DE0EF01D4C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8..k..k..k.k.k...k.k.k...k.k.k..k..k...k&..k..k.k.k...k.k.k..k.k.k..k.k.k..kRich..k................PE..L......J...........!.........p.......6....................................... .......;......................................T...d...................................................................`...@...............x............................text...d........................... ..`.rdata..X".......0..................@..@.data...............................@....rsrc...............................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):57344
          Entropy (8bit):5.486829962298087
          Encrypted:false
          SSDEEP:768:cGX3DM7IcGTHT3SB2cND8M5rh1RbLVYfxN//+BQ/2:cMQ7bEHTzh4vbLu/+BQu
          MD5:423E1D328703F43E25A869B740C075EC
          SHA1:72A2CB247432F92B7D69DA858C892199EB29FD66
          SHA-256:74076D82326DE8A5E8C3A9445C3840B5D93DFE689960C17B72AD568FD0979710
          SHA-512:81A0FE3D6C73BECC8244BC9C900A3E6E869E5C02A5AB62B16F15A92A5E48BA1CCFE15466E552BB043D8262D6D87F9D0D1DC0240976643A9ECFF6FCE46F814F5E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7-W{sL9(sL9(sL9(T.D(bL9(T.W(jL9(.Cd(vL9(sL8($L9(T.T(9L9(T.C(rL9(T.E(rL9(T.A(rL9(RichsL9(................PE..L...7..J...........!.........P.......$....................................... ......U-..............................P...Z.......<.......:.......................`.......................................@...............,............................text....u.......................... ..`.rdata........... ..................@..@.data....L..........................@....rsrc...:...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):61440
          Entropy (8bit):5.224612666656956
          Encrypted:false
          SSDEEP:768:Msa6BbqLbf8gOCJfzVbvYhC1ZiBuJHM5VtyZWU:M6BMTRtvMCSmHMt+WU
          MD5:34EE2255C994924E192466BC4FE409E9
          SHA1:61CB7F6A6E5850F7FCAD26910F5C1015CE9041CF
          SHA-256:1717EEC862F0AC755BA9604A92537331CB3CDD4879CEA7F48B91ACB5BA66ECA5
          SHA-512:8661FCAE057635E8029247B54770FFC75DF3CC93568A5F3FE69BAD41BA506D0C465CDEE5749E7A2029376F9CE9EF90153BB3BDFF6CA1AC7A27E7E1B7BBF151E9
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U..W.it..it..it.6....it.6....it.6....it..vg..it..f)..it..iu.qit.6...Zit.6....it.6....it.6....it.Rich.it.........PE..L......J...........!.........`......9$..............................................^I......................................$...x.......n.......................\...................................8...@...............X............................text....t.......................... ..`.rdata... .......0..................@..@.data...............................@....rsrc...n...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):135168
          Entropy (8bit):6.193484192480897
          Encrypted:false
          SSDEEP:1536:ds1LrnH0yUHjq+8aKKtnIMfA8HYfDBgO6KxR/ybqiTfpNk1telXIPx:0r3ujq+8aKQn1GueCputwXW
          MD5:B921E0D4C6B7E4F117B8C499DCB69135
          SHA1:BD84F51E7BF7DFAFB4206053430A2BB84FA5E34A
          SHA-256:16A4700694D0AFE763708598F91B2751550832152935681A94284A61A6F6F769
          SHA-512:1A58D9A27E6BD446232B78EEF311B834BF65C3FA4EB3D13DE96D36AD079AC9A380A549D2381DC4362FB16A4B545D7BF8ECE1D0960C8581F754618F7E6DE15738
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8.r/|..||..||..|.Lb|}..|[Na|j..|[Nq|...|..C|}..|..A|q..||..|...|[Nr|7..|[Nf|}..|[Nd|}..|Rich|..|........PE..L......b...........!.....@..........6........P...............................0......................................p.......$...........................................................................@............P...............................text...|9.......@.................. ..`.rdata..U`...P...p...P..............@..@.data...`1....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):405504
          Entropy (8bit):5.780562511553602
          Encrypted:false
          SSDEEP:3072:j2UJUIPtaqPHX/mh0GVLLiabBQSOrtKZ52+TT1ZyAHgx0baEIVv1eSTnxHs3tStc:jLXmLVVbBQSSE9AEICegl2v
          MD5:F0BA0BAEAFE8D485FCF8F23C60745DD0
          SHA1:A365B8231D98088EA7B2F807CA1AA2FB8C0D5A2A
          SHA-256:E32C740D1ADD0D9556BE1E37E9B23BB34E1CACECAE7C537189843F2A17FF4675
          SHA-512:2EB4A1917DD503A40F07D2A01B5C50CAB328A8E6908B8D4820DAFE2A7DB2B9C35A087950887DF976E1429C37B29DEA6223C01EB2BBC04919947829AA9D4CEE6C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......rNO.6/!.6/!.6/!...Z.:/!.YY..7/!.?W..4/!.. |.</!...\.(/!...L../!.....3/!.6/ ../!...O.g/!...[.7/!...].7/!...Y.7/!.Rich6/!.........................PE..L......b...........!.....p..........&J.......................................`.......................................b..j.......,............................ .../......................................@............................................text....h.......p.................. ..`.rdata..............................@..@.data...4z...p...P...p..............@....idata..D........ ..................@....rsrc...............................@..@.reloc..W6... ...@..................@..B................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):57344
          Entropy (8bit):5.737327475219662
          Encrypted:false
          SSDEEP:768:Zk45EBOzZiCBbnHIZR+/VYuou0fPr9vBYZe+VtuYu:Zr5+OsvAarJgHtuYu
          MD5:54232CC07D353267275B3A536557970A
          SHA1:292FDE8EBADC83CF056B4987487EF202354C51B8
          SHA-256:C939943F693110C4737FA251CADA6A801651E5A4DEA8E4A841EECE6053B5B9E8
          SHA-512:65FD70EEBF2795DDE2BB65C33270FAC18C85F65FA26F0B9707ED12D917DB06C380391F56F202E5E8F0D178B1961A83F0F8E9BC1CF00280E2341B512C5215E520
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..H...H...H...3...H...5...H...&...H...I...H.U.....H...%...H...2...H...0...H.Rich..H.........................PE..L...k..b...........!.....p...`.......#.............................................................................. ...........d...............................<.......................................@...............0............................text....o.......p.................. ..`.rdata... .......0..................@..@.data...D...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):294912
          Entropy (8bit):6.234368795782389
          Encrypted:false
          SSDEEP:6144:INEPA98Jl2mbYTUQb8aou/7Gj04cyBkuEg1u:h3bYYQb8aouTl4n3g
          MD5:916C8F533D67DA5E590C5B3818643683
          SHA1:86E30CFA2AD14448B863C758E41304C663E61B9C
          SHA-256:FE14610F67B451502A1E716BFF3BBAC6C493D5DE0ECAE4148C749B080DEEBC9C
          SHA-512:EAE6A8577C2A7FF058CE3465E0E34A02822461241C0A5A7CB6195C30B429066033BE88D11AD02781BEE3336572BB64881BE580E8056DE704C83D23C87DFEE02B
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\..B..................................?Q......?Q......?Q......?Q......?Q......Rich....................PE..L...H..b................. ...P...............0....@.................................*....................................................=..............................................................@............0..8.......@....................text...t........ .................. ..`.rdata..4....0.......0..............@..@.data...|d.......0..................@....rsrc....=.......@...@..............@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):593920
          Entropy (8bit):6.219272600977045
          Encrypted:false
          SSDEEP:12288:JXiLIjfMfkrmJ0EPZP72BkxSq8KfJrAXLyQSGY:piL6mJ0EPd75S6r
          MD5:E8D9F7F3100CC1617CC4C0D2A192CC65
          SHA1:CA5B510749F0D046A1769A73DE7B785A53087AA0
          SHA-256:F221F3F7F3097653CB6122422723DEF7DF1FB3E35E1C55880944405D5FC4DB68
          SHA-512:F62FA17108D0CC915A435D3B004EF3F54F4CC8731830D7139AC427B7F082A23E8A616B04FED70985487ACCFC2A1282D3F182F1A0EECFFD6F5CFA1DC105B200BA
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q.q....I...I...I.&aI...I2$bI#..I...I...I..BI...I2$rI...I2$qI...I2$eI...I2$gI...IRich...I........PE..L......b...........!.........P.......1....................................... ..........................................r.......(....p..........................xI.................................. ...@...............t............................text............................... ..`.rdata..RN.......P..................@..@.data....].......P..................@....rsrc........p.......`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):360448
          Entropy (8bit):6.401050257504742
          Encrypted:false
          SSDEEP:6144:6xYeTPHmTueSd40p8U3zjhG53A41svaez6D7yNbeebjrUoJ5fWIwvDXMTBo5OWV:6xYeTPH28d40p8U3zjE53A4MfzGUbeKu
          MD5:DFBFB1D1C3ED06713E56E55E7CADAEE7
          SHA1:5FF05A6A404D9558BD85EB52ADFC8B7D5E63A59A
          SHA-256:0C7ECE4AB807996A5D52E5008E0C1E1B1BDEBF33B9C2288739F7241945D0710F
          SHA-512:E67624E55DB70AA5264B0A0C93E8FBA713C9A6A6B09C056DBA454FBB7BE9600408422BB7B4366E802D13A0E9AE598C64F9DF81C478567BAD16DCD5044BB414D5
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%..Oa...a...a.......g.....|.......m.......g...g...k.......f.......d...a.....W.....W...v.......`.......`...Richa...........PE..L....Q.a...........!................a$...................................................................................... ...<....@..p....................P..t0...................................................................................text............................... ..`.rdata..............................@..@.data....z.......p..................@....rsrc...p....@.......0..............@..@.reloc...8...P...@...@..............@..B........................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):405504
          Entropy (8bit):5.780562511553602
          Encrypted:false
          SSDEEP:3072:j2UJUIPtaqPHX/mh0GVLLiabBQSOrtKZ52+TT1ZyAHgx0baEIVv1eSTnxHs3tStc:jLXmLVVbBQSSE9AEICegl2v
          MD5:F0BA0BAEAFE8D485FCF8F23C60745DD0
          SHA1:A365B8231D98088EA7B2F807CA1AA2FB8C0D5A2A
          SHA-256:E32C740D1ADD0D9556BE1E37E9B23BB34E1CACECAE7C537189843F2A17FF4675
          SHA-512:2EB4A1917DD503A40F07D2A01B5C50CAB328A8E6908B8D4820DAFE2A7DB2B9C35A087950887DF976E1429C37B29DEA6223C01EB2BBC04919947829AA9D4CEE6C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......rNO.6/!.6/!.6/!...Z.:/!.YY..7/!.?W..4/!.. |.</!...\.(/!...L../!.....3/!.6/ ../!...O.g/!...[.7/!...].7/!...Y.7/!.Rich6/!.........................PE..L......b...........!.....p..........&J.......................................`.......................................b..j.......,............................ .../......................................@............................................text....h.......p.................. ..`.rdata..............................@..@.data...4z...p...P...p..............@....idata..D........ ..................@....rsrc...............................@..@.reloc..W6... ...@..................@..B................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):294912
          Entropy (8bit):6.234368795782389
          Encrypted:false
          SSDEEP:6144:INEPA98Jl2mbYTUQb8aou/7Gj04cyBkuEg1u:h3bYYQb8aouTl4n3g
          MD5:916C8F533D67DA5E590C5B3818643683
          SHA1:86E30CFA2AD14448B863C758E41304C663E61B9C
          SHA-256:FE14610F67B451502A1E716BFF3BBAC6C493D5DE0ECAE4148C749B080DEEBC9C
          SHA-512:EAE6A8577C2A7FF058CE3465E0E34A02822461241C0A5A7CB6195C30B429066033BE88D11AD02781BEE3336572BB64881BE580E8056DE704C83D23C87DFEE02B
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\..B..................................?Q......?Q......?Q......?Q......?Q......Rich....................PE..L...H..b................. ...P...............0....@.................................*....................................................=..............................................................@............0..8.......@....................text...t........ .................. ..`.rdata..4....0.......0..............@..@.data...|d.......0..................@....rsrc....=.......@...@..............@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1722880
          Entropy (8bit):2.607191566647403
          Encrypted:false
          SSDEEP:3072:u45PRUFnXYswu5gNCdiVwHHlS0btoCBrbK6ESzIlMR0IAQQhWfPXXbmzAg0Fum1v:ukRWXSPVwnlS6flnR0cWAOm13M
          MD5:A5CE62769B0B85B37805A47D9C40C338
          SHA1:C8F350BCECD05AD0048C59BD9DB1A6017510A52D
          SHA-256:7B36FDAA75540831754C0826D35EFD12B3FC15BDC74F6EC248DA4DCAFAD20709
          SHA-512:3643DFF86096E8D5A7BB1E46015284F822399C91C38B1B84EBFF9AB76D30796AA94980F0574CCF06C2BD447CEA0E4483AF80BF5648CB9A452E7E5AC89E229C2C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V..S7j.S7j.S7j.t...O7j.t...z7j.t...07j.87.Q7j.t...P7j.S7k..7j.t...F7j.t...R7j.t...R7j.RichS7j.........PE..L...a..b...........!.....@...........&.......P..............................................................................t...<....0.......................@.../..................................`...@............P..$............................text...;>.......@.................. ..`.rdata......P.......D..............@..@.data...d#..........................@....rsrc........0......................@..@.reloc...=...@...>..................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):57344
          Entropy (8bit):5.486829962298087
          Encrypted:false
          SSDEEP:768:cGX3DM7IcGTHT3SB2cND8M5rh1RbLVYfxN//+BQ/2:cMQ7bEHTzh4vbLu/+BQu
          MD5:423E1D328703F43E25A869B740C075EC
          SHA1:72A2CB247432F92B7D69DA858C892199EB29FD66
          SHA-256:74076D82326DE8A5E8C3A9445C3840B5D93DFE689960C17B72AD568FD0979710
          SHA-512:81A0FE3D6C73BECC8244BC9C900A3E6E869E5C02A5AB62B16F15A92A5E48BA1CCFE15466E552BB043D8262D6D87F9D0D1DC0240976643A9ECFF6FCE46F814F5E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7-W{sL9(sL9(sL9(T.D(bL9(T.W(jL9(.Cd(vL9(sL8($L9(T.T(9L9(T.C(rL9(T.E(rL9(T.A(rL9(RichsL9(................PE..L...7..J...........!.........P.......$....................................... ......U-..............................P...Z.......<.......:.......................`.......................................@...............,............................text....u.......................... ..`.rdata........... ..................@..@.data....L..........................@....rsrc...:...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):69632
          Entropy (8bit):5.234515699739443
          Encrypted:false
          SSDEEP:1536:+KwF/uZnd+l07TjdghAQ4dYMqLcBrtXt:bd++qYepcBrtXt
          MD5:DDB8AB034F46DD12361E0BAF09F58E9C
          SHA1:8470B31D10299B367D3C1DB225153FACEE41E2EF
          SHA-256:52451F4DB95E02463F27A5B93C213D13776EAF6856E36BE4595CBF38F7AFECAB
          SHA-512:B40A24E5D226035B0AF8F36DAE9D6F21F6E811136BAC5F00B0B6818A7568988103D7C782983DFEF7137419519EEA674F84EDF106D7FD925BE49BB7DE0EF01D4C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8..k..k..k.k.k...k.k.k...k.k.k..k..k...k&..k..k.k.k...k.k.k..k.k.k..k.k.k..kRich..k................PE..L......J...........!.........p.......6....................................... .......;......................................T...d...................................................................`...@...............x............................text...d........................... ..`.rdata..X".......0..................@..@.data...............................@....rsrc...............................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):5.8422211712195535
          Encrypted:false
          SSDEEP:768:+ZKeNAteyvtMWEZWZEZBywcfOeAamxzRezBtvJ7B7FRIvCbbzeH7Zt5tQllo:+ZKeathmWg2ELW+xzRettBhFOKO79tQ
          MD5:66DF8002F27D90E5A3EB546FF52B7D63
          SHA1:9B922040FA9ED87C7716EC201B3D9555F1961756
          SHA-256:F1484ED8252EA6A1F6F883975F6ADCCCA44925FDBFA9F34D4AB25A8740439700
          SHA-512:27C9C9CA74B593726E6CEB8DE5F2920687A0680174F5017084FB2299A1B3C6F31E532989989081D237C4CA21225345083BC2FCE97F8EEAB4CD6B7634E987F243
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........EW.\$9^\$9^\$9^{.D^L$9^{.T^.$9^.+d^Y$9^\$8^.$9^{.W^C$9^{.K^^$9^{.C^]$9^{.A^]$9^Rich\$9^................PE..L......b...........!.........`......l........................................ ..........................................j...l...<...................................................................x...@...............D............................text............................... ..`.rdata... .......0..................@..@.data....+..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):573440
          Entropy (8bit):6.233175890219993
          Encrypted:false
          SSDEEP:12288:mshe8YKefkefSPD9fY7zVPHkDq8KfJrAXLyQSGF:mMe8gfSb9wPC6r
          MD5:A55645F58E32DD30D21D28AD0D4BCDB8
          SHA1:68245D0ED0D950A78B5EEC04D54029E895AE2590
          SHA-256:0F6A0FBB9A4B80F7465DB8F9133883F37E1E4767B889F2A89FB87F1956087EAC
          SHA-512:25D649E8034A3481DB67295F19759E923D8B64137EC00963412B3A54899936447D3F7C041E315E643E96443EFBCCECFAAE7D08976CC15F72C191F80089511D5D
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........' ..Is..Is..IsjZ7s.Is.X4s.Is..Hso.Is>..s..Is.X$s%.Is.X'sn.Is.X3s..Is.X1s..IsRich..Is........PE..L......b...........!......... .......1..............................................)...................................=.......(............................ ...@..................................h...@...............t............................text...V........................... ..`.rdata..-=.......@..................@..@.data...X(.......@..................@....rsrc................ ..............@..@.reloc....... .......0..............@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):151552
          Entropy (8bit):6.320874154978678
          Encrypted:false
          SSDEEP:1536:nRXlWUw6EYSxjL6fSqMTV71nL1b0Ihp1Cjjhwzryc5/z6fTyASZK/t273:RVy6lSqMj1z1CRUX5/z6nSZOt
          MD5:D36AF189F252AF3867FA69A054AE9109
          SHA1:A4A706B97B6389BA504ACC27D859D03045997457
          SHA-256:7784CF4EB4D1A3B587B82F926B8F8D098634BBBDD9676FA53A588F471CB237F0
          SHA-512:847D2857FB252CE20E6BA2397B799E5E9DF7E0E5A285DDC4150ED615CEF6D4FB2711CF7DF65C58889DCA3848D544CC76610CE78F621217568D02B524ED9E5A24
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e1..b..b..b.Nvb...b.Neb..b(.Vb..b..b...b.Nfb...b.Nqb..b.Nsb..bRich..b........................PE..L......b...........!.................].......................................`......E|..............................p...........(....0.......................@......................................(...@............................................text............................... ..`.rdata...G.......P..................@..@.data...d...........................@....rsrc........0....... ..............@..@.reloc.......@... ...0..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):36864
          Entropy (8bit):3.7552472295006774
          Encrypted:false
          SSDEEP:384:AmCB9ZQb2C+4ASzjqr/9jK0yY/8remoZC:69+bhrue0B/iemo
          MD5:311271336002DAC15544CE988B8A3582
          SHA1:6F179251D068CD59186B6605377ACE33FB61CC68
          SHA-256:DCD4AFF6F70076C6D94F7F26CFD7B1A475DF1D507FF68CF36C7DFFEDEC5C2D7D
          SHA-512:96DDCF13C46970FBFA5B9533B0E418C94CA15D33666DA8199466899FB38178DAC410F525573A000C11E96A33D4BF338F576AAE2CCC7D94D2424F844CBD32F2B1
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................................`...............................Rich............PE..L....Q.a.................@...@......?........P....@.........................................................................<T..<....................................................................................P...............................text....6.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@...........................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):27648
          Entropy (8bit):4.58580130770935
          Encrypted:false
          SSDEEP:384:HndXeN7V6BpQVrDcp5dt1FaFQ1FT7PIXX:HndyR6BpQ2FaFQ1FT
          MD5:2AD8ACAB7EEE003C3A805D9A5F3E702D
          SHA1:FC8F16CC9961864A7C3471DACD721D58B47A57DC
          SHA-256:4614FA8681CBBA8ECAEB932D380D18310ED8CBEB5257C54DDE953BEB8BCDFEEE
          SHA-512:01411054F58EE86BDD614C5088304C538580EE0A33E05BFEC8D0276E1B2AB55BC4E49F7943BC81ED61908F67CAF6E899E7422E9EC4DEF6E99B9B7A4FD7817611
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O..!...!...!...!...!...#...!.Rich..!.................PE..L...nlO6...........!.....4...,......01.......P......................................................................pQ..........P...............................t....P..T...............................................`............................text...s3.......4.................. ..`.rdata..(....P.......8..............@..@.data........p.......J..............@....idata..\............X..............@....reloc..I............`..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):5.701768629129277
          Encrypted:false
          SSDEEP:768:vexS9CN2+YnAbXejMpfYO/LsQHWhaJ5EMBzTiWOI1oPCtWrn:vzk2+YncXD5oQZJ5EUpJton
          MD5:63C572103D8B85363F29824344421C68
          SHA1:56D4C1DCF464B7BF1DAD1DC36FF2DDA6D187DB52
          SHA-256:76D65AB7FF443AFCA20F4A6B11DDFC1C67CE1410C11F6A94D296027DC938B1A9
          SHA-512:5C56DD61C39A212EA90C04FAD7AB54F1A7A1A7A851F740DADE7DB9E16734B7458CB58354C2524D181279B08C845C32488261DE8D93891DB6EE08AE521D3C6844
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&8..Hk..Hk..Hk./5k..Hk./&k..Hk./%k..Hk7..k..Hk..Ik..Hk./9k..Hk./2k..Hk./0k..HkRich..Hk........PE..L...R..b...........!.........`.......8...............................................0..........................................(...............................0.......................................@............................................text............................... ..`.rdata...%.......0..................@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):135168
          Entropy (8bit):6.193484192480897
          Encrypted:false
          SSDEEP:1536:ds1LrnH0yUHjq+8aKKtnIMfA8HYfDBgO6KxR/ybqiTfpNk1telXIPx:0r3ujq+8aKQn1GueCputwXW
          MD5:B921E0D4C6B7E4F117B8C499DCB69135
          SHA1:BD84F51E7BF7DFAFB4206053430A2BB84FA5E34A
          SHA-256:16A4700694D0AFE763708598F91B2751550832152935681A94284A61A6F6F769
          SHA-512:1A58D9A27E6BD446232B78EEF311B834BF65C3FA4EB3D13DE96D36AD079AC9A380A549D2381DC4362FB16A4B545D7BF8ECE1D0960C8581F754618F7E6DE15738
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8.r/|..||..||..|.Lb|}..|[Na|j..|[Nq|...|..C|}..|..A|q..||..|...|[Nr|7..|[Nf|}..|[Nd|}..|Rich|..|........PE..L......b...........!.....@..........6........P...............................0......................................p.......$...........................................................................@............P...............................text...|9.......@.................. ..`.rdata..U`...P...p...P..............@..@.data...`1....... ..................@....rsrc...............................@..@.reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):61440
          Entropy (8bit):5.224612666656956
          Encrypted:false
          SSDEEP:768:Msa6BbqLbf8gOCJfzVbvYhC1ZiBuJHM5VtyZWU:M6BMTRtvMCSmHMt+WU
          MD5:34EE2255C994924E192466BC4FE409E9
          SHA1:61CB7F6A6E5850F7FCAD26910F5C1015CE9041CF
          SHA-256:1717EEC862F0AC755BA9604A92537331CB3CDD4879CEA7F48B91ACB5BA66ECA5
          SHA-512:8661FCAE057635E8029247B54770FFC75DF3CC93568A5F3FE69BAD41BA506D0C465CDEE5749E7A2029376F9CE9EF90153BB3BDFF6CA1AC7A27E7E1B7BBF151E9
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U..W.it..it..it.6....it.6....it.6....it..vg..it..f)..it..iu.qit.6...Zit.6....it.6....it.6....it.Rich.it.........PE..L......J...........!.........`......9$..............................................^I......................................$...x.......n.......................\...................................8...@...............X............................text....t.......................... ..`.rdata... .......0..................@..@.data...............................@....rsrc...n...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):110592
          Entropy (8bit):6.139690357998456
          Encrypted:false
          SSDEEP:1536:qrvwsHbRtrfs7zx/gkuu9YBilpu3HFu/zvMr3htXg7ycO:qr4sHNm5/i4Y7Aw9tXOyc
          MD5:4553230F7FC1001759D693C5CB0E48C5
          SHA1:274EB35A94201ADB5D654540E49A720239BFDE30
          SHA-256:0BCB7EFEF180DA11B662A62DCE776137DFA3234BFDA3AA1359C04504C834D146
          SHA-512:D0635C0377B20B4A82B06B0E6F9691262E26E32A59A7104A6FBA0CF798AF21C5A65896E7645C4D2A5D9B10AA584BE21A5215DBD8E1992266F26C3D28E7767BD2
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........=).Z\G.Z\G.Z\G.}.).D\G.}.:.B\G.S..X\G.}.<._\G.Z\F..\G.}.*.&\G.}.=.[\G.}.?.[\G.RichZ\G.........................PE..L...d..b...........!..... ...........f.......0......................................................................0U..p...dJ..P...................................................................HE..@............0...............................text............ .................. ..`.rdata...(...0...0...0..............@..@.data...|0...`... ...`..............@....rsrc...............................@..@.reloc..:........ ..................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):57344
          Entropy (8bit):5.737327475219662
          Encrypted:false
          SSDEEP:768:Zk45EBOzZiCBbnHIZR+/VYuou0fPr9vBYZe+VtuYu:Zr5+OsvAarJgHtuYu
          MD5:54232CC07D353267275B3A536557970A
          SHA1:292FDE8EBADC83CF056B4987487EF202354C51B8
          SHA-256:C939943F693110C4737FA251CADA6A801651E5A4DEA8E4A841EECE6053B5B9E8
          SHA-512:65FD70EEBF2795DDE2BB65C33270FAC18C85F65FA26F0B9707ED12D917DB06C380391F56F202E5E8F0D178B1961A83F0F8E9BC1CF00280E2341B512C5215E520
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..H...H...H...3...H...5...H...&...H...I...H.U.....H...%...H...2...H...0...H.Rich..H.........................PE..L...k..b...........!.....p...`.......#.............................................................................. ...........d...............................<.......................................@...............0............................text....o.......p.................. ..`.rdata... .......0..................@..@.data...D...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):5.8422211712195535
          Encrypted:false
          SSDEEP:768:+ZKeNAteyvtMWEZWZEZBywcfOeAamxzRezBtvJ7B7FRIvCbbzeH7Zt5tQllo:+ZKeathmWg2ELW+xzRettBhFOKO79tQ
          MD5:66DF8002F27D90E5A3EB546FF52B7D63
          SHA1:9B922040FA9ED87C7716EC201B3D9555F1961756
          SHA-256:F1484ED8252EA6A1F6F883975F6ADCCCA44925FDBFA9F34D4AB25A8740439700
          SHA-512:27C9C9CA74B593726E6CEB8DE5F2920687A0680174F5017084FB2299A1B3C6F31E532989989081D237C4CA21225345083BC2FCE97F8EEAB4CD6B7634E987F243
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........EW.\$9^\$9^\$9^{.D^L$9^{.T^.$9^.+d^Y$9^\$8^.$9^{.W^C$9^{.K^^$9^{.C^]$9^{.A^]$9^Rich\$9^................PE..L......b...........!.........`......l........................................ ..........................................j...l...<...................................................................x...@...............D............................text............................... ..`.rdata... .......0..................@..@.data....+..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):151552
          Entropy (8bit):6.320874154978678
          Encrypted:false
          SSDEEP:1536:nRXlWUw6EYSxjL6fSqMTV71nL1b0Ihp1Cjjhwzryc5/z6fTyASZK/t273:RVy6lSqMj1z1CRUX5/z6nSZOt
          MD5:D36AF189F252AF3867FA69A054AE9109
          SHA1:A4A706B97B6389BA504ACC27D859D03045997457
          SHA-256:7784CF4EB4D1A3B587B82F926B8F8D098634BBBDD9676FA53A588F471CB237F0
          SHA-512:847D2857FB252CE20E6BA2397B799E5E9DF7E0E5A285DDC4150ED615CEF6D4FB2711CF7DF65C58889DCA3848D544CC76610CE78F621217568D02B524ED9E5A24
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e1..b..b..b.Nvb...b.Neb..b(.Vb..b..b...b.Nfb...b.Nqb..b.Nsb..bRich..b........................PE..L......b...........!.................].......................................`......E|..............................p...........(....0.......................@......................................(...@............................................text............................... ..`.rdata...G.......P..................@..@.data...d...........................@....rsrc........0....... ..............@..@.reloc.......@... ...0..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):5.701768629129277
          Encrypted:false
          SSDEEP:768:vexS9CN2+YnAbXejMpfYO/LsQHWhaJ5EMBzTiWOI1oPCtWrn:vzk2+YncXD5oQZJ5EUpJton
          MD5:63C572103D8B85363F29824344421C68
          SHA1:56D4C1DCF464B7BF1DAD1DC36FF2DDA6D187DB52
          SHA-256:76D65AB7FF443AFCA20F4A6B11DDFC1C67CE1410C11F6A94D296027DC938B1A9
          SHA-512:5C56DD61C39A212EA90C04FAD7AB54F1A7A1A7A851F740DADE7DB9E16734B7458CB58354C2524D181279B08C845C32488261DE8D93891DB6EE08AE521D3C6844
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&8..Hk..Hk..Hk./5k..Hk./&k..Hk./%k..Hk7..k..Hk..Ik..Hk./9k..Hk./2k..Hk./0k..HkRich..Hk........PE..L...R..b...........!.........`.......8...............................................0..........................................(...............................0.......................................@............................................text............................... ..`.rdata...%.......0..................@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1722880
          Entropy (8bit):2.607191566647403
          Encrypted:false
          SSDEEP:3072:u45PRUFnXYswu5gNCdiVwHHlS0btoCBrbK6ESzIlMR0IAQQhWfPXXbmzAg0Fum1v:ukRWXSPVwnlS6flnR0cWAOm13M
          MD5:A5CE62769B0B85B37805A47D9C40C338
          SHA1:C8F350BCECD05AD0048C59BD9DB1A6017510A52D
          SHA-256:7B36FDAA75540831754C0826D35EFD12B3FC15BDC74F6EC248DA4DCAFAD20709
          SHA-512:3643DFF86096E8D5A7BB1E46015284F822399C91C38B1B84EBFF9AB76D30796AA94980F0574CCF06C2BD447CEA0E4483AF80BF5648CB9A452E7E5AC89E229C2C
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V..S7j.S7j.S7j.t...O7j.t...z7j.t...07j.87.Q7j.t...P7j.S7k..7j.t...F7j.t...R7j.t...R7j.RichS7j.........PE..L...a..b...........!.....@...........&.......P..............................................................................t...<....0.......................@.../..................................`...@............P..$............................text...;>.......@.................. ..`.rdata......P.......D..............@..@.data...d#..........................@....rsrc........0......................@..@.reloc...=...@...>..................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):110592
          Entropy (8bit):6.139690357998456
          Encrypted:false
          SSDEEP:1536:qrvwsHbRtrfs7zx/gkuu9YBilpu3HFu/zvMr3htXg7ycO:qr4sHNm5/i4Y7Aw9tXOyc
          MD5:4553230F7FC1001759D693C5CB0E48C5
          SHA1:274EB35A94201ADB5D654540E49A720239BFDE30
          SHA-256:0BCB7EFEF180DA11B662A62DCE776137DFA3234BFDA3AA1359C04504C834D146
          SHA-512:D0635C0377B20B4A82B06B0E6F9691262E26E32A59A7104A6FBA0CF798AF21C5A65896E7645C4D2A5D9B10AA584BE21A5215DBD8E1992266F26C3D28E7767BD2
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........=).Z\G.Z\G.Z\G.}.).D\G.}.:.B\G.S..X\G.}.<._\G.Z\F..\G.}.*.&\G.}.=.[\G.}.?.[\G.RichZ\G.........................PE..L...d..b...........!..... ...........f.......0......................................................................0U..p...dJ..P...................................................................HE..@............0...............................text............ .................. ..`.rdata...(...0...0...0..............@..@.data...|0...`... ...`..............@....rsrc...............................@..@.reloc..:........ ..................@..B........................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):360448
          Entropy (8bit):6.401050257504742
          Encrypted:false
          SSDEEP:6144:6xYeTPHmTueSd40p8U3zjhG53A41svaez6D7yNbeebjrUoJ5fWIwvDXMTBo5OWV:6xYeTPH28d40p8U3zjE53A4MfzGUbeKu
          MD5:DFBFB1D1C3ED06713E56E55E7CADAEE7
          SHA1:5FF05A6A404D9558BD85EB52ADFC8B7D5E63A59A
          SHA-256:0C7ECE4AB807996A5D52E5008E0C1E1B1BDEBF33B9C2288739F7241945D0710F
          SHA-512:E67624E55DB70AA5264B0A0C93E8FBA713C9A6A6B09C056DBA454FBB7BE9600408422BB7B4366E802D13A0E9AE598C64F9DF81C478567BAD16DCD5044BB414D5
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%..Oa...a...a.......g.....|.......m.......g...g...k.......f.......d...a.....W.....W...v.......`.......`...Richa...........PE..L....Q.a...........!................a$...................................................................................... ...<....@..p....................P..t0...................................................................................text............................... ..`.rdata..............................@..@.data....z.......p..................@....rsrc...p....@.......0..............@..@.reloc...8...P...@...@..............@..B........................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):36864
          Entropy (8bit):3.7552472295006774
          Encrypted:false
          SSDEEP:384:AmCB9ZQb2C+4ASzjqr/9jK0yY/8remoZC:69+bhrue0B/iemo
          MD5:311271336002DAC15544CE988B8A3582
          SHA1:6F179251D068CD59186B6605377ACE33FB61CC68
          SHA-256:DCD4AFF6F70076C6D94F7F26CFD7B1A475DF1D507FF68CF36C7DFFEDEC5C2D7D
          SHA-512:96DDCF13C46970FBFA5B9533B0E418C94CA15D33666DA8199466899FB38178DAC410F525573A000C11E96A33D4BF338F576AAE2CCC7D94D2424F844CBD32F2B1
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................................`...............................Rich............PE..L....Q.a.................@...@......?........P....@.........................................................................<T..<....................................................................................P...............................text....6.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@...........................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):27648
          Entropy (8bit):4.58580130770935
          Encrypted:false
          SSDEEP:384:HndXeN7V6BpQVrDcp5dt1FaFQ1FT7PIXX:HndyR6BpQ2FaFQ1FT
          MD5:2AD8ACAB7EEE003C3A805D9A5F3E702D
          SHA1:FC8F16CC9961864A7C3471DACD721D58B47A57DC
          SHA-256:4614FA8681CBBA8ECAEB932D380D18310ED8CBEB5257C54DDE953BEB8BCDFEEE
          SHA-512:01411054F58EE86BDD614C5088304C538580EE0A33E05BFEC8D0276E1B2AB55BC4E49F7943BC81ED61908F67CAF6E899E7422E9EC4DEF6E99B9B7A4FD7817611
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O..!...!...!...!...!...#...!.Rich..!.................PE..L...nlO6...........!.....4...,......01.......P......................................................................pQ..........P...............................t....P..T...............................................`............................text...s3.......4.................. ..`.rdata..(....P.......8..............@..@.data........p.......J..............@....idata..\............X..............@....reloc..I............`..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:DOS batch file, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1218
          Entropy (8bit):4.540363884302869
          Encrypted:false
          SSDEEP:24:Q1NLI/TeZu9YM7/M2v2OAUWwGJtob132zmFdIq8qVsAFdIkjkjAloNzmWNvn:GNc/8u9YF2v2OAmGJab1mzmEP3AEyIAY
          MD5:AF54A8883211A3C956E9F41955125D54
          SHA1:DAACB0AFB3BA703B2B17AC93D5775206BD7A3AFC
          SHA-256:494AF8EE4EDB809B7E04CF42A6FC6E9BBD3781798A07BBA4CA2431A5A339835B
          SHA-512:09FAA6E6A86E29A7488E10B993DB434DCB62E331D7B0053169E9F3208C30429418EA9E664FF0AF9E7AAEF4C8DCB79BE39C28BF9846F05A902D01D55531156268
          Malicious:false
          Preview:@ECHO OFF..SETLOCAL ENABLEEXTENSIONS....REM ------------------------------------------------------------..REM Main Routine..REM ------------------------------------------------------------..SET LOGFILE=nul..REM SET LOGFILE=%TEMP%\VDRServiceRegist.log..ECHO ------------------------------------------------------------ >> %LOGFILE%..ECHO %DATE% %TIME% >> %LOGFILE%....REM see ./scada_win/app/ServiceMinit/ServiceMinit.rc..SET SERVICE_NAME="VDR Servers Service"....REM Stop Service..sc stop %SERVICE_NAME%..ECHO sc stop %SERVICE_NAME% RESULT:%ERRORLEVEL% >> %LOGFILE%....REM Regist Service..SET SERVICE_MINIT=server\bin\ServiceMinit.exe..CALL :REGIST_SERVICE....ECHO DONE. >> %LOGFILE%..EXIT....REM ------------------------------------------------------------..REM Regist Service..REM ------------------------------------------------------------..:REGIST_SERVICE..IF EXIST %SERVICE_MINIT% (.. ECHO Regist Service : %SERVICE_MINIT% >> %LOGFILE%.. %SERVICE_MINIT% /UnregServer.. ECHO %SERVICE_MINIT% /
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):717985
          Entropy (8bit):6.514892357658037
          Encrypted:false
          SSDEEP:12288:6TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyFj:SPcYn5c/rPx37/zHBA6pFptZ1CEQqMRG
          MD5:7ED0852A51DF0E4AD455F7EA3F39E596
          SHA1:113630652C21A6D5F6498E06475D89AA850A4149
          SHA-256:0BD7976242464961623A701A9744FCAD739702BC2C55FE080165E3DC33F33363
          SHA-512:201689B8BCEAA91967F3A65176756CD98618F0CAFEA7C8BAA3EF5AA06CE8F05AD858B2DD04A7D433530D2D0805E0FE302AF628B46D24A1426350223FB5B1D6E2
          Malicious:true
          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):34
          Entropy (8bit):3.9069050327968804
          Encrypted:false
          SSDEEP:3:cYKLD2ns2en2:3Kn2nXK2
          MD5:60205CC6480608E98E14D4BCECE0C3C0
          SHA1:EABC789A03D9CCE98CB750A760583023F0063FFC
          SHA-256:C7E629CB94B54623B592C64F3B6029B9D21BF24B3188FB69E2C05772541F059A
          SHA-512:BA11BC7B040C5B631B39FF6F33EDA820D66151173749385811175F7B22E2DEBCE99CB9F95EF680FE23BDA478ACF5765984E20CB58F3144E88F0CB46E58567428
          Malicious:false
          Preview:wscript UninstSeverEnvironment.vbs
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):32
          Entropy (8bit):3.944548827786958
          Encrypted:false
          SSDEEP:3:cYWLWnTAs2en2:3WYAXK2
          MD5:1E9D5E4E473BB1E85C8E596F8B3026B5
          SHA1:C3E2328311AA8D6E7BB4D5ED0238C803D85AC905
          SHA-256:BF23E7816400F1C208E5A4D397DA03ED0BE087AEBED6845F07BB79E0838D9AEA
          SHA-512:B38BBF8555AC4B86BECA1B35505E38899C561305F198BC3B932AC9C545B9FFCE282DC0C4A52F7857EE9197B4E8AF5F53F49A35CC4BD712185F9FB9E6A72A62D5
          Malicious:false
          Preview:wscript InstSeverEnvironment.vbs
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1286
          Entropy (8bit):5.299118839599219
          Encrypted:false
          SSDEEP:24:IN8KW5iQM7lI5yDiseh2PD/eoSVd+sHGLuGub3MJ:y8ITRMyDPD/O8s+X1
          MD5:5618CF19864999A6D4566D60F8525B40
          SHA1:A97188305138C0518E2E43E1F47A0158CE101FC8
          SHA-256:1EB7B63FB3BE1C9E138B94F27D5272434F880DD588789B24336D46D3B631D323
          SHA-512:25A56F01A473B56E163FF702021274057245885A7CDBB7FD0547E41A17DB217EDC9452C7D4D486FD4F8A979D5BED8B92BF3F7090071D8AC4868CCFA40DD5460B
          Malicious:false
          Preview:Option Explicit..Dim WShell..Dim SFileSystem..Dim WEnvironment..Dim Members..Dim i..Dim bFind..Dim SystemRootFolder..Dim CurrentDirectory..Dim SFolderObject..Dim SFolderCollection....Set WShell = CreateObject("WScript.Shell")..Set SFileSystem= CreateObject("Scripting.FileSystemObject")..Set WEnvironment = WShell.Environment("System")....'''''''''''''''''''''''''''''''''''''''''''''''''..' ...W.X.g........s.t.H..._..........SystemRootFolder = "%SERVER_DLLS%"....Members = Split (WEnvironment.Item("PATH"), ";")..bFind = false..For i = LBound(Members) To UBound(Members).. If StrComp (Members(i), SystemRootFolder ) = 0 Then..'.WScript.Echo "...."...bFind = true.. End If..Next....If bFind = false Then.. WEnvironment.Item("PATH") = WEnvironment.Item("PATH") & ";" & SystemRootFolder ..' WScript.Echo "..............................."..End If....''''''''''''''''''''''''''''''''''''''''''''''''''..'' .J.....g.f.B...N.g.....X......'CurrentDirectory = WShell.CurrentDirecto
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):75
          Entropy (8bit):4.106505774273587
          Encrypted:false
          SSDEEP:3:6090ERMCAVAMerTA4v:DXYybgi
          MD5:2EA1C7B1F55930C9AEFC37D288AE89A5
          SHA1:ADFC44AE6811D426DD70BC986ADC1FA4635CBF06
          SHA-256:BD855484AE6249F651E082BDC0C83D732F988818C2596C2655FA1AE9108B0B00
          SHA-512:DFD584E2FEC5831F4C110FE309FDBE7ECDC34620A8E5F004D806B08ABDA16DD9F9DAB5F977C7DD661C194C4C19B38A4DE44627ACA199768752D4D286A6C52863
          Malicious:false
          Preview:sc stop "Grass Servers Service"..server\bin\ServiceMinit.exe /UnregServer..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Non-ISO extended-ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1104
          Entropy (8bit):5.469738261088247
          Encrypted:false
          SSDEEP:24:IN8KNg5iQM7lISflvWtsehD5PD/uIyGLi1Y:y8STRDju/RXf
          MD5:EC4723BDFC1B0F8A04C6C483397466C6
          SHA1:5437FF0C03378D6E9BE5B9BA341A60208895B09F
          SHA-256:7402167192B842D30273CFE711E483F4974A92EC8D91E78AAA63269A343FC693
          SHA-512:60ED6560FAC57D76615A96F17FD617B499082213EF5D47377FBFC202404A82DD4498B8663DD63B46B661AA2218B00EC0E23F058587B2167FA4E452D01E95FCAA
          Malicious:false
          Preview:Option Explicit..Dim WShell..Dim SFileSystem..Dim WEnvironment..Dim Members..Dim i..Dim bFind..Dim SystemRootFolder..Dim UnInstallPath....Set WShell = CreateObject("WScript.Shell")..Set SFileSystem= CreateObject("Scripting.FileSystemObject")..Set WEnvironment = WShell.Environment("System")....'''''''''''''''''''''''''''''''''''''''''''''''''..' ...W.X.g......V.X.e.....[.g.t.H..._.........SystemRootFolder = WShell.RegRead("HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\SERVER_DLLS")......Members = Split (WEnvironment.Item("PATH"), ";")..bFind = false..UnInstallPath = vbNull..For i = LBound(Members) To UBound(Members)..'.WScript.Echo Members(i).. If StrComp (Members(i), SystemRootFolder ) = 0 Then..'.WScript.Echo "...."...bFind = true.. Else...If UnInstallPath = vbNull Then... UnInstallPath = Members(i)...Else... UnInstallPath = UnInstallPath & ";" & Members(i)...End If.. End If ..Next....If bFind = true Then..' WScript.Echo "...............
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):245760
          Entropy (8bit):6.380415251741467
          Encrypted:false
          SSDEEP:6144:8r425MUQLzjkAdhY3Twy9/r1hUEtF6wbwfQ+:8r425MUWz9yDworgEtF6w0
          MD5:01C338C4765202CB8D712FD7CCDF9BD1
          SHA1:A9F0A8D8597A223379788FBBBF089F5AF295952A
          SHA-256:B25F15F33842A7A19B2042501E277B7E1633463A6A6B84608AF1931D15B25D4B
          SHA-512:0D1AEB83DC6C7329845564337DB0521CAF5FAAEAF125EF1872B3A8686CDAAEBCB5BD8319D434B26FFF4719CDE8914A767097E49B03EF54C9FCDA7ED976FECA65
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........^............|...................{...(......(..........F...........................Rich............PE..L......b............................C9............@.................................o........................................w..x...................................0...............................0`..@............................................text............................... ..`.rdata..\...........................@..@.data....?....... ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):401408
          Entropy (8bit):6.581487194029644
          Encrypted:false
          SSDEEP:6144:r2DjfnabpRHiwo8qffutpzMcOpglVhpXHv+Tz:r2Djfnab3HiwoJozdOpi7/8
          MD5:B7F40ECDA7EEA42C8DFE0F01F6291C8E
          SHA1:3D4244A41CB02AC7097AD909EECFF7C772903CAA
          SHA-256:CD59EAD0B2F04AABA206E9DBC21AC0ADFBD23BBF847D437DE88891D88A8F4212
          SHA-512:405E86F41CDBAD07F21844D874FD9613AD74E97FD71E1AC84FFE4940663592F5D95CCE8FCAB0994E169EBC43670F1B1F792214713255912CDF17E0AA94B876E5
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B............1.....!3...............m..!3.....!3..U..!3.....Rich...........PE..L...L..b.....................0....................@..................................\..........................................(................................... ................................l..@............................................text............................... ..`.rdata..R...........................@..@.data...\........p..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1490944
          Entropy (8bit):5.918416150691233
          Encrypted:false
          SSDEEP:24576:Uo02dPZXnHI47KOUWujnfZp3hHHLJw01Lxtykgdl4/8:Uo02dPZXh2OUWMJ1Lxty8/8
          MD5:D5738D9829DF5D18855EFB675231CB8B
          SHA1:F6D1067DEA9A11E1916D7CFBCCB00E4262F1471F
          SHA-256:F67FDE05EB130F74C43C2894C7C8154BD773FEC890BAD4769956F216F3DCB9EA
          SHA-512:BD4D021C59145B7CE42B5F31014A3B4B0A46AE8B494EA0C2450D5E5ACE91CAC69EC4FBBEE5377F8E0EA06EB4FD67EFAAE33FB2DFC05E973DD2BB0B286E0874BD
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G.d..d..d.Dh...d..j...d..j...d...9..d..e...d..j..6.d..j..p.d..j...d..j...d.Rich.d.........................PE..L...:..b..................... .......3............@........................... ............................................... ....... ............................................................................... ..............................textbss.................................text....... ...................... ..`.rdata...7.......@..................@..@.data...T...........................@....idata..(..... .. ..................@....rsrc......... .....................@..@........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):352256
          Entropy (8bit):5.802065785822964
          Encrypted:false
          SSDEEP:6144:K7wMUPVG6p6aH0hgfLt9o8/2Q4/u8EE4evApyT0zQEVIFzhCOvkohG93dBNlHYMr:K75UPVOELSynwGQDf0/L3KpfCFiBV9ZK
          MD5:1669F9908DBDCA5C41F3C3716B69F0F6
          SHA1:65CB7E616D5AF8F7FDD7C42ADFEFD12678A53086
          SHA-256:EAE40AB4DA851C51CA3358A89F5F192F358390C43BD57231D3BE0C53106679ED
          SHA-512:7ECE3BBEECE2B9EB23BA54EAFBEB7014D46C78DA9C811890E9A0C9F7055E8BB44727AD634AB275AC51EF720783C003C0A5CD891FA9347203BE3D804396136488
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8...|...|...|....R.~...[P.k...[P.}...[P.}...Rich|...........................PE..L....|.[.................p..........<.............@..........................`.......G....@..................................;..(....@.......................P......p...................................................................H............text....j.......p.................. ..`.rdata..z...........................@..@.rsrc........@.......@..............@..@.reloc.......P.......P..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):46080
          Entropy (8bit):5.94709491629093
          Encrypted:false
          SSDEEP:768:W6kUN34JEFWMt40racTPmYpJYwIazJ4bPTni2b4HuwIAhhJHyd4bM0+KNweG/5mj:W6kpJVSVraQJpJYwI2J4bPTni2b4Huwh
          MD5:A63B60E462CC0CE896312B233059626F
          SHA1:94B683F0DD4164DECA764244BD5463DB987A1454
          SHA-256:90B16029499CB678F75A414FCE7DFBE771B8B1DD65F8E114CA18E56DC8E41D1E
          SHA-512:70ED3C4F73089CF949637E835C3D41D6419D6E079756E01C491A63D12C51FEDFD65DD9F79A2A835514D3F09A816765110F4869EF09AE216CD553382E56B7BD9D
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........4...g...g...g.\.g...g.\.g...g.\.g...gRich...g........PE..L...v.%G.............................*.......0....@.................................+.......................................x...(...................................`0...............................................0..............|0..H............text............................... ..`.rdata.......0......."..............@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):2662400
          Entropy (8bit):5.915842537430716
          Encrypted:false
          SSDEEP:49152:S0ied+UyJl7e2zlNdwO7EQla5biyKi14z328:diedw/pwwEQGz1
          MD5:B4809CE2B21C498EF4ECCFB4B506F784
          SHA1:BEFEC7DB7F0A795A2E041B1F0669CF81FAF34539
          SHA-256:47F1F189B99A4074705FBE2FD247ED5B48E2D815D69B514BDD471810F8BE81BC
          SHA-512:CDE74D2751B0FBD87A89A22A709EA1E32326D314E10BCE10A6EBAF871F582E71B73C97CD6C1558872BDB37EE758F31D176854C1C83891E2A4A8A2CA076FD081E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$".wJq.wJq.wJql.4q.wJq.7q.wJq8x*q.wJq.1q.wJq8x.q.wJq.wKq.vJq.'q.vJq.$q.wJq.0q.wJq.6q.wJq.2q.wJqRich.wJq................PE..L...P..b.........................................@...........................:..................................... w6......p:.,.....:............................. ...............................................xx:.L............................textbss.................................text....{... ...................... ..`.rdata..............................@..@.data.........6......p'.............@....idata..((...p:..0...`(.............@....rsrc.........:.......(.............@..@................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):245760
          Entropy (8bit):6.380415251741467
          Encrypted:false
          SSDEEP:6144:8r425MUQLzjkAdhY3Twy9/r1hUEtF6wbwfQ+:8r425MUWz9yDworgEtF6w0
          MD5:01C338C4765202CB8D712FD7CCDF9BD1
          SHA1:A9F0A8D8597A223379788FBBBF089F5AF295952A
          SHA-256:B25F15F33842A7A19B2042501E277B7E1633463A6A6B84608AF1931D15B25D4B
          SHA-512:0D1AEB83DC6C7329845564337DB0521CAF5FAAEAF125EF1872B3A8686CDAAEBCB5BD8319D434B26FFF4719CDE8914A767097E49B03EF54C9FCDA7ED976FECA65
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........^............|...................{...(......(..........F...........................Rich............PE..L......b............................C9............@.................................o........................................w..x...................................0...............................0`..@............................................text............................... ..`.rdata..\...........................@..@.data....?....... ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):618496
          Entropy (8bit):5.8869532376972336
          Encrypted:false
          SSDEEP:12288:mes2q9BSGZFh2P6AJmVNCI8lAwyisjZ0O:S24BPAJGL8lAwyfjZ0
          MD5:51E76427CA5624D19CECEA9EA1D32DAE
          SHA1:8AD1EDA5F7FFDA245A3DD8A90BB60C69C5160429
          SHA-256:11C9C4AB30D7A599E9B0C9D3D845129044C67391687D835BC0EAAD31C67C3BE6
          SHA-512:94491B2C397E6462EFECE2CF1B2A3A7FEA92352C6657BBB462B2A9636982863D7326FA1739914FF2B1B23304331C118120533B902606DE3B354E3A0061037F69
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........lt.............<.d.......g.....h.G...............w.d.....t.......f.......b.....Rich............................PE..L......b.....................p......T.............@.............................................................................(....................................P..............................................t...L............................textbss.................................text...,........................... ..`.rdata.......@... ..................@..@.data....(...`......................@....idata...............P..............@....rsrc................`..............@..@................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):401408
          Entropy (8bit):6.581487194029644
          Encrypted:false
          SSDEEP:6144:r2DjfnabpRHiwo8qffutpzMcOpglVhpXHv+Tz:r2Djfnab3HiwoJozdOpi7/8
          MD5:B7F40ECDA7EEA42C8DFE0F01F6291C8E
          SHA1:3D4244A41CB02AC7097AD909EECFF7C772903CAA
          SHA-256:CD59EAD0B2F04AABA206E9DBC21AC0ADFBD23BBF847D437DE88891D88A8F4212
          SHA-512:405E86F41CDBAD07F21844D874FD9613AD74E97FD71E1AC84FFE4940663592F5D95CCE8FCAB0994E169EBC43670F1B1F792214713255912CDF17E0AA94B876E5
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B............1.....!3...............m..!3.....!3..U..!3.....Rich...........PE..L...L..b.....................0....................@..................................\..........................................(................................... ................................l..@............................................text............................... ..`.rdata..R...........................@..@.data...\........p..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):299008
          Entropy (8bit):6.439258445164575
          Encrypted:false
          SSDEEP:6144:HQKSun5VB/jBFPklPp/wa2EyAgYsRipd7Zuo6wZQXK31:wKSun5VBlFPuR4bnYsg7Zuo6wZQXKl
          MD5:28A37DE2CB159371787002488A0BE5FB
          SHA1:018424B4D27A6A92C7A00F9B701F18296C74B0B1
          SHA-256:5AF6D2A9EA6E1B0099EA882562ADDD9D03966936E672DB8E00218A1C084EDC7B
          SHA-512:1D5797BB3D330E0BDC7622A045B79552617E33C2173999C9C500B911283084E27F2F8626998F192541A1EE79DBD1734B30290345F946E5F40D681CBD07858CD3
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Y............a]......._.....5..........t...._..S...._......._......Rich............PE..L...R..b.............................D............@..........................................................................T..P...................................................................P;..@............................................text.............................. ..`.rdata..............................@..@.data...8....`... ...`..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1490944
          Entropy (8bit):5.918416150691233
          Encrypted:false
          SSDEEP:24576:Uo02dPZXnHI47KOUWujnfZp3hHHLJw01Lxtykgdl4/8:Uo02dPZXh2OUWMJ1Lxty8/8
          MD5:D5738D9829DF5D18855EFB675231CB8B
          SHA1:F6D1067DEA9A11E1916D7CFBCCB00E4262F1471F
          SHA-256:F67FDE05EB130F74C43C2894C7C8154BD773FEC890BAD4769956F216F3DCB9EA
          SHA-512:BD4D021C59145B7CE42B5F31014A3B4B0A46AE8B494EA0C2450D5E5ACE91CAC69EC4FBBEE5377F8E0EA06EB4FD67EFAAE33FB2DFC05E973DD2BB0B286E0874BD
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G.d..d..d.Dh...d..j...d..j...d...9..d..e...d..j..6.d..j..p.d..j...d..j...d.Rich.d.........................PE..L...:..b..................... .......3............@........................... ............................................... ....... ............................................................................... ..............................textbss.................................text....... ...................... ..`.rdata...7.......@..................@..@.data...T...........................@....idata..(..... .. ..................@....rsrc......... .....................@..@........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):843776
          Entropy (8bit):5.81708561086406
          Encrypted:false
          SSDEEP:12288:PmUgzUMeLUJStkldwoule4uAjlZIIR0bS2SublVJ9P529JsLEJJAvHa6+P:PmUgzUMeLyStkldiM529SAJJQHa6+
          MD5:110A0794DFBC02AC3690DBD0B428DD12
          SHA1:D24192122915108870FA114B078AA35FCEEE4B4C
          SHA-256:13096074A5A3CB3DE623826C2FF1F14AC5B58CA1957EC7C151978B5927CF0C25
          SHA-512:94F67626EA27C6ABE708F0A741EB03760A55B5A18CD6604E84A614521369390A10804B74905CAE059E2BE369CECB20414E0FDB8BEC1F2ADEBCFBD71C64F5F2E2
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.|.../.../.../.V./.../,T./*../,T./.../../.../.../.../,T./../,T./z../,T./.../,T./.../Rich.../................PE..L......b.................P...@......9.............@..........................0..................................................d.... ..................................................................................P............................textbss................................text....A.......P.................. ..`.rdata..e............`..............@..@.data...PD........... ..............@....idata.._........ ..................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):634880
          Entropy (8bit):5.830287591283141
          Encrypted:false
          SSDEEP:6144:JsSrVaADBmG9ksHN7IAuqfDD5UB/mcSD/bea+J04T9Tc6YL2GymlBKzdFv+zQ:JsHADvkkN7IXqvi/YbbeauBZcX8kWdZ
          MD5:935AB82B8DD966A4CA9ABB62DE6CF869
          SHA1:1807B34685A2886DFA02868F02C6F5EEBA2BD7E0
          SHA-256:A31D98CA993D7F41B2A0609DF5F941B05B1F443E7D596ED317EC16383FD910DC
          SHA-512:0879DDB17A3A3AFAA265F6961A1B03D6BB3FDDC8B4B8B1C7A924E00C55C6842D87B86246105AE8448C71E884208729374CB60E9C63858F64621ACA15F882B9FA
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.n;g..hg..hg..h.S~hn..h@Q}hF..h..]hn..h@Q{he..hg..h...h@Qmh...h@Qnh...h@Q|hf..h@Qxhf..hRichg..h........PE..L......b.....................`......c.............@.............................................................................x.......................................................................................x............................textbss.................................text...5........................... ..`.rdata..............................@..@.data...0,..........................@....idata..W........ ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):46080
          Entropy (8bit):5.94709491629093
          Encrypted:false
          SSDEEP:768:W6kUN34JEFWMt40racTPmYpJYwIazJ4bPTni2b4HuwIAhhJHyd4bM0+KNweG/5mj:W6kpJVSVraQJpJYwI2J4bPTni2b4Huwh
          MD5:A63B60E462CC0CE896312B233059626F
          SHA1:94B683F0DD4164DECA764244BD5463DB987A1454
          SHA-256:90B16029499CB678F75A414FCE7DFBE771B8B1DD65F8E114CA18E56DC8E41D1E
          SHA-512:70ED3C4F73089CF949637E835C3D41D6419D6E079756E01C491A63D12C51FEDFD65DD9F79A2A835514D3F09A816765110F4869EF09AE216CD553382E56B7BD9D
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........4...g...g...g.\.g...g.\.g...g.\.g...gRich...g........PE..L...v.%G.............................*.......0....@.................................+.......................................x...(...................................`0...............................................0..............|0..H............text............................... ..`.rdata.......0......."..............@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1396736
          Entropy (8bit):6.530224476491686
          Encrypted:false
          SSDEEP:24576:xm1oPnzDyv8kCv8p30Ed0DxKlTxRor2nmyylX1Tq/PIh99dlkkPbW3/VSAk90/Td:IOPzWkkCvMxsxjjyya/PIh9zHYsz9+
          MD5:44E3F6CCE9AB5A045165330DB87205AE
          SHA1:87456956E251AC0FCFD5874C5AF8375433550103
          SHA-256:245160BAC02DA98439B6D243486B6FE23F3A75310C685412E2AD50D60A4604F1
          SHA-512:39DAABB6CD644FC6EB67FA23D008C26E9F0E74A36934DAEA84634E12981F69C0C8C18BE480C0145EAEA2E4C9944C7BAB5EF2D5C64FB2F4E69E4C3474EEF7910E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>%..zD..zD..zD....wD..]...MD..]...rD..K..}D..zD...D..]...D..]....D..]...{D..RichzD..........................PE..L......b.................@..........`........P....@.................................T...............................................................................@T..................................@............P...............................text....:.......@.................. ..`.rdata...B...P...P...P..............@..@.data...............................@....rsrc................@..............@..@................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):286
          Entropy (8bit):4.4127659163167
          Encrypted:false
          SSDEEP:6:xqOFECtFrEw5tFErMAT8RAE1T/A2we4iX+3y7FQ:xvECfrEw5LEtT8RBdwe4044Q
          MD5:DD38EB05852B8BC83871AABAE9935465
          SHA1:5400A62AE69C5FFE62C99CF707D4A31F029EC04A
          SHA-256:7EF19D070E82D00DB30974C6E32B7BF0DCF0116E96B4F6C81188985D855D6CBD
          SHA-512:35EAC0444CFB65DEDA9CECDADF7CAFC23A5B3507CC3AA8AEA946F5E39B4CFDF478EA37108CC4306C4FC549D3693F2A216F802CF8588CDEA56FEF6E21546265AD
          Malicious:false
          Preview:start "extclient" extclient.exe -cons -debug -v..start "rcplayer" rcplayer.exe -cons -debug -v..start "rserv" rserv.exe -cons -debug -v..start "clientRecorder" clientrecorder.exe -cons -ftpuser furuno -ftppass furuno -debug 0x10000..start "remoteclient" remoteclient.exe -cons -debug -v
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):2662400
          Entropy (8bit):5.915842537430716
          Encrypted:false
          SSDEEP:49152:S0ied+UyJl7e2zlNdwO7EQla5biyKi14z328:diedw/pwwEQGz1
          MD5:B4809CE2B21C498EF4ECCFB4B506F784
          SHA1:BEFEC7DB7F0A795A2E041B1F0669CF81FAF34539
          SHA-256:47F1F189B99A4074705FBE2FD247ED5B48E2D815D69B514BDD471810F8BE81BC
          SHA-512:CDE74D2751B0FBD87A89A22A709EA1E32326D314E10BCE10A6EBAF871F582E71B73C97CD6C1558872BDB37EE758F31D176854C1C83891E2A4A8A2CA076FD081E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$".wJq.wJq.wJql.4q.wJq.7q.wJq8x*q.wJq.1q.wJq8x.q.wJq.wKq.vJq.'q.vJq.$q.wJq.0q.wJq.6q.wJq.2q.wJqRich.wJq................PE..L...P..b.........................................@...........................:..................................... w6......p:.,.....:............................. ...............................................xx:.L............................textbss.................................text....{... ...................... ..`.rdata..............................@..@.data.........6......p'.............@....idata..((...p:..0...`(.............@....rsrc.........:.......(.............@..@................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):352256
          Entropy (8bit):5.802065785822964
          Encrypted:false
          SSDEEP:6144:K7wMUPVG6p6aH0hgfLt9o8/2Q4/u8EE4evApyT0zQEVIFzhCOvkohG93dBNlHYMr:K75UPVOELSynwGQDf0/L3KpfCFiBV9ZK
          MD5:1669F9908DBDCA5C41F3C3716B69F0F6
          SHA1:65CB7E616D5AF8F7FDD7C42ADFEFD12678A53086
          SHA-256:EAE40AB4DA851C51CA3358A89F5F192F358390C43BD57231D3BE0C53106679ED
          SHA-512:7ECE3BBEECE2B9EB23BA54EAFBEB7014D46C78DA9C811890E9A0C9F7055E8BB44727AD634AB275AC51EF720783C003C0A5CD891FA9347203BE3D804396136488
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8...|...|...|....R.~...[P.k...[P.}...[P.}...Rich|...........................PE..L....|.[.................p..........<.............@..........................`.......G....@..................................;..(....@.......................P......p...................................................................H............text....j.......p.................. ..`.rdata..z...........................@..@.rsrc........@.......@..............@..@.reloc.......P.......P..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):552960
          Entropy (8bit):6.502032146686435
          Encrypted:false
          SSDEEP:12288:vQfdbvXmARDcl5RAam2hv8YXJGapNLED++ANt5kP+yciW9sllVJ9gr8izBAop7xT:0vXDRDY5Xl8YXJAizBAedCs
          MD5:0D6B3D038E635907A8296EB3BF137F20
          SHA1:530701890DD67AB505CBF4EADFDC2DF7A8E2EBFA
          SHA-256:C409D7F5F5158669C5D7F1593A116876326F7E5D18434BCB941CEE527CF73B39
          SHA-512:CE08EADC561A1287DDAE3641C84F89441614BC462FF7FDF67FD005C0DCA2B86130F16FA654F2494FFE7E2ADD40C97EEDCF817B490A3E78F023DF2FEF56608CDB
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.@._.@._.@..U>.S.@.xW=.~.@.....X.@._.A..@.xW-...@.xW..%.@.xW8.^.@.Rich_.@.................PE..L...%..b.................0...0.......k.......@....@.......................... ......dd..........................................P...................................................................H...@............@...............................text..../.......0.................. ..`.rdata......@.......@..............@..@.data............p..................@....rsrc................`..............@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):618496
          Entropy (8bit):5.8869532376972336
          Encrypted:false
          SSDEEP:12288:mes2q9BSGZFh2P6AJmVNCI8lAwyisjZ0O:S24BPAJGL8lAwyfjZ0
          MD5:51E76427CA5624D19CECEA9EA1D32DAE
          SHA1:8AD1EDA5F7FFDA245A3DD8A90BB60C69C5160429
          SHA-256:11C9C4AB30D7A599E9B0C9D3D845129044C67391687D835BC0EAAD31C67C3BE6
          SHA-512:94491B2C397E6462EFECE2CF1B2A3A7FEA92352C6657BBB462B2A9636982863D7326FA1739914FF2B1B23304331C118120533B902606DE3B354E3A0061037F69
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........lt.............<.d.......g.....h.G...............w.d.....t.......f.......b.....Rich............................PE..L......b.....................p......T.............@.............................................................................(....................................P..............................................t...L............................textbss.................................text...,........................... ..`.rdata.......@... ..................@..@.data....(...`......................@....idata...............P..............@....rsrc................`..............@..@................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):1396736
          Entropy (8bit):6.530224476491686
          Encrypted:false
          SSDEEP:24576:xm1oPnzDyv8kCv8p30Ed0DxKlTxRor2nmyylX1Tq/PIh99dlkkPbW3/VSAk90/Td:IOPzWkkCvMxsxjjyya/PIh9zHYsz9+
          MD5:44E3F6CCE9AB5A045165330DB87205AE
          SHA1:87456956E251AC0FCFD5874C5AF8375433550103
          SHA-256:245160BAC02DA98439B6D243486B6FE23F3A75310C685412E2AD50D60A4604F1
          SHA-512:39DAABB6CD644FC6EB67FA23D008C26E9F0E74A36934DAEA84634E12981F69C0C8C18BE480C0145EAEA2E4C9944C7BAB5EF2D5C64FB2F4E69E4C3474EEF7910E
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>%..zD..zD..zD....wD..]...MD..]...rD..K..}D..zD...D..]...D..]....D..]...{D..RichzD..........................PE..L......b.................@..........`........P....@.................................T...............................................................................@T..................................@............P...............................text....:.......@.................. ..`.rdata...B...P...P...P..............@..@.data...............................@....rsrc................@..............@..@................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):843776
          Entropy (8bit):5.81708561086406
          Encrypted:false
          SSDEEP:12288:PmUgzUMeLUJStkldwoule4uAjlZIIR0bS2SublVJ9P529JsLEJJAvHa6+P:PmUgzUMeLyStkldiM529SAJJQHa6+
          MD5:110A0794DFBC02AC3690DBD0B428DD12
          SHA1:D24192122915108870FA114B078AA35FCEEE4B4C
          SHA-256:13096074A5A3CB3DE623826C2FF1F14AC5B58CA1957EC7C151978B5927CF0C25
          SHA-512:94F67626EA27C6ABE708F0A741EB03760A55B5A18CD6604E84A614521369390A10804B74905CAE059E2BE369CECB20414E0FDB8BEC1F2ADEBCFBD71C64F5F2E2
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.|.../.../.../.V./.../,T./*../,T./.../../.../.../.../,T./../,T./z../,T./.../,T./.../Rich.../................PE..L......b.................P...@......9.............@..........................0..................................................d.... ..................................................................................P............................textbss................................text....A.......P.................. ..`.rdata..e............`..............@..@.data...PD........... ..............@....idata.._........ ..................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):552960
          Entropy (8bit):6.502032146686435
          Encrypted:false
          SSDEEP:12288:vQfdbvXmARDcl5RAam2hv8YXJGapNLED++ANt5kP+yciW9sllVJ9gr8izBAop7xT:0vXDRDY5Xl8YXJAizBAedCs
          MD5:0D6B3D038E635907A8296EB3BF137F20
          SHA1:530701890DD67AB505CBF4EADFDC2DF7A8E2EBFA
          SHA-256:C409D7F5F5158669C5D7F1593A116876326F7E5D18434BCB941CEE527CF73B39
          SHA-512:CE08EADC561A1287DDAE3641C84F89441614BC462FF7FDF67FD005C0DCA2B86130F16FA654F2494FFE7E2ADD40C97EEDCF817B490A3E78F023DF2FEF56608CDB
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.@._.@._.@..U>.S.@.xW=.~.@.....X.@._.A..@.xW-...@.xW..%.@.xW8.^.@.Rich_.@.................PE..L...%..b.................0...0.......k.......@....@.......................... ......dd..........................................P...................................................................H...@............@...............................text..../.......0.................. ..`.rdata......@.......@..............@..@.data............p..................@....rsrc................`..............@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):286
          Entropy (8bit):4.4127659163167
          Encrypted:false
          SSDEEP:6:xqOFECtFrEw5tFErMAT8RAE1T/A2we4iX+3y7FQ:xvECfrEw5LEtT8RBdwe4044Q
          MD5:DD38EB05852B8BC83871AABAE9935465
          SHA1:5400A62AE69C5FFE62C99CF707D4A31F029EC04A
          SHA-256:7EF19D070E82D00DB30974C6E32B7BF0DCF0116E96B4F6C81188985D855D6CBD
          SHA-512:35EAC0444CFB65DEDA9CECDADF7CAFC23A5B3507CC3AA8AEA946F5E39B4CFDF478EA37108CC4306C4FC549D3693F2A216F802CF8588CDEA56FEF6E21546265AD
          Malicious:false
          Preview:start "extclient" extclient.exe -cons -debug -v..start "rcplayer" rcplayer.exe -cons -debug -v..start "rserv" rserv.exe -cons -debug -v..start "clientRecorder" clientrecorder.exe -cons -ftpuser furuno -ftppass furuno -debug 0x10000..start "remoteclient" remoteclient.exe -cons -debug -v
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):634880
          Entropy (8bit):5.830287591283141
          Encrypted:false
          SSDEEP:6144:JsSrVaADBmG9ksHN7IAuqfDD5UB/mcSD/bea+J04T9Tc6YL2GymlBKzdFv+zQ:JsHADvkkN7IXqvi/YbbeauBZcX8kWdZ
          MD5:935AB82B8DD966A4CA9ABB62DE6CF869
          SHA1:1807B34685A2886DFA02868F02C6F5EEBA2BD7E0
          SHA-256:A31D98CA993D7F41B2A0609DF5F941B05B1F443E7D596ED317EC16383FD910DC
          SHA-512:0879DDB17A3A3AFAA265F6961A1B03D6BB3FDDC8B4B8B1C7A924E00C55C6842D87B86246105AE8448C71E884208729374CB60E9C63858F64621ACA15F882B9FA
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.n;g..hg..hg..h.S~hn..h@Q}hF..h..]hn..h@Q{he..hg..h...h@Qmh...h@Qnh...h@Q|hf..h@Qxhf..hRichg..h........PE..L......b.....................`......c.............@.............................................................................x.......................................................................................x............................textbss.................................text...5........................... ..`.rdata..............................@..@.data...0,..........................@....idata..W........ ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (console) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):299008
          Entropy (8bit):6.439258445164575
          Encrypted:false
          SSDEEP:6144:HQKSun5VB/jBFPklPp/wa2EyAgYsRipd7Zuo6wZQXK31:wKSun5VBlFPuR4bnYsg7Zuo6wZQXKl
          MD5:28A37DE2CB159371787002488A0BE5FB
          SHA1:018424B4D27A6A92C7A00F9B701F18296C74B0B1
          SHA-256:5AF6D2A9EA6E1B0099EA882562ADDD9D03966936E672DB8E00218A1C084EDC7B
          SHA-512:1D5797BB3D330E0BDC7622A045B79552617E33C2173999C9C500B911283084E27F2F8626998F192541A1EE79DBD1734B30290345F946E5F40D681CBD07858CD3
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Y............a]......._.....5..........t...._..S...._......._......Rich............PE..L...R..b.............................D............@..........................................................................T..P...................................................................P;..@............................................text.............................. ..`.rdata..............................@..@.data...8....`... ...`..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8406
          Entropy (8bit):4.7248589356062975
          Encrypted:false
          SSDEEP:192:sUylxbUT/t1VcfbfZpBZp8xFI+OrU5h2P:Glh8/3obJuewuP
          MD5:499EC3F872B9F8E910D79AC5B0A613DC
          SHA1:1496A8261E2123EDD21644E702899AE7E962271C
          SHA-256:0E16CE7D50F83E415C48B0FADD9B0C0A63B56FF74820E5A3715F113CCDFDD2C5
          SHA-512:8C09C6E395C011902AA89B46256CAE5C147A4C6D39CB2826292242686B3C8B0DDE1DCEA9F268A028D5CB9D260EED2B146E7FF7CE89FD52B5872B6DA12BA5C886
          Malicious:false
          Preview:# generated date: Fri Aug 30 16:30:00 2019..e openclose_t 1..v 0 |open..v 1 |close..e onoff_t 2..v 0 |off..v 1 |on..e power_status_t 3..v 0 |green..v 1 |yellow..v 2 |red..e save_button_t 4..v 0 |lighting..v 1 |lights-out..v 2 |blinking..e normal_button_t 5..v 0 |lighting..v 1 |lights-out..e error_button_t 6..v 0 |green..v 1 |blinking-in-red..v 2 |red..e power_type_t 7..v 1 |AC..v 2 |DC..v 3 |BATT..e land_mark_type_t 8..v 0 |unknown..v 1 |Input Device..v 2 |Terminal Board Ether..v 3 |Junction Box..v 4 |Audio Board..v 5 |MIC..v 6 |Video LAN Converter..v 7 |Radar..v 8 |Terminal Board..v 9 |Serial Input..v 10 |Analog..v 11 |Digital..v 12 |Alarm..v 13 |Power Status..v 14 |System Status..v 15 |VHF..v 16 |Sentence..v 17 |Process..v 18 |Config Status..v 19 |Sensor(LAN) Input..v 20 |AMS Input..e internal_value_type_t 9..v 0 |unknown..v 1 |Power Trigger..v 2 |Current Value..v 3 |Test Value..v 4 |Test Result..v 5 |Capture Resolution (H)..v 6 |Capture Resolution (V)..v 7 |Capture Size..v 8 |Diag R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):13789
          Entropy (8bit):5.051328041173336
          Encrypted:false
          SSDEEP:96:WxPp6HuGAnQmO3JmyJpmPZcOuKTHymp32ml5Kdt4BleMkhkNu171FtAi8lr2U35P:unOoyUOAHyUG05KzgleFhP1bJpHZs
          MD5:3306236F69013E5C3AEF09D36294B655
          SHA1:BFFEED6C74F4F85508AF31925FA0E81A54824A79
          SHA-256:C3D6878FF5B457C9DE85FCD77551E6E4448100038639B489DDCF5A831E5D1E0E
          SHA-512:E4B795003C183F5465C29A1913617D9083E6B9869C177E520436D11FC8819626BE620F01759BCC99B4021F9D33593E030D0055239A04F9F97B6C90DF44775FEB
          Malicious:false
          Preview:# 1 "class.cpp"..# 1 "<built-in>"..# 1 "<command-line>"..# 1 "class.cpp"..# 10 "class.cpp"..enum openclose_t {.. {0,"open"},.. {1,"close"},..};..enum onoff_t {.. {0,"off"},.. {1,"on"},..};..enum power_status_t {.. {0,"green"},.. {1,"yellow"},.. {2,"red"},..};..enum save_button_t {.. {0,"lighting"},.. {1,"lights-out"},.. {2,"blinking"},..};..enum normal_button_t {.. {0,"lighting"},.. {1,"lights-out"},..};..enum error_button_t {.. {0,"green"},.. {1,"blinking-in-red"},.. {2,"red"},..};..enum power_type_t {.. {1,"AC"},.. {2,"DC"},.. {3,"BATT"},..};....enum land_mark_type_t..{.. {0, "unknown"},.. {1, "Input Device"},.. {2, "Terminal Board Ether"},.. {3, "Junction Box"},.. {4, "Audio Board"},.. {5, "MIC"},.. {6, "Video LAN Converter"},.. {7, "Radar"},.. {8, "Terminal Board"},.. {9, "Serial Input"},.. {10,"Analog"},.. {11,"Digital"},.. {12,"Alarm"},.. {13,"Power Status"},.. {14,"System Status"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8406
          Entropy (8bit):4.7248589356062975
          Encrypted:false
          SSDEEP:192:sUylxbUT/t1VcfbfZpBZp8xFI+OrU5h2P:Glh8/3obJuewuP
          MD5:499EC3F872B9F8E910D79AC5B0A613DC
          SHA1:1496A8261E2123EDD21644E702899AE7E962271C
          SHA-256:0E16CE7D50F83E415C48B0FADD9B0C0A63B56FF74820E5A3715F113CCDFDD2C5
          SHA-512:8C09C6E395C011902AA89B46256CAE5C147A4C6D39CB2826292242686B3C8B0DDE1DCEA9F268A028D5CB9D260EED2B146E7FF7CE89FD52B5872B6DA12BA5C886
          Malicious:false
          Preview:# generated date: Fri Aug 30 16:30:00 2019..e openclose_t 1..v 0 |open..v 1 |close..e onoff_t 2..v 0 |off..v 1 |on..e power_status_t 3..v 0 |green..v 1 |yellow..v 2 |red..e save_button_t 4..v 0 |lighting..v 1 |lights-out..v 2 |blinking..e normal_button_t 5..v 0 |lighting..v 1 |lights-out..e error_button_t 6..v 0 |green..v 1 |blinking-in-red..v 2 |red..e power_type_t 7..v 1 |AC..v 2 |DC..v 3 |BATT..e land_mark_type_t 8..v 0 |unknown..v 1 |Input Device..v 2 |Terminal Board Ether..v 3 |Junction Box..v 4 |Audio Board..v 5 |MIC..v 6 |Video LAN Converter..v 7 |Radar..v 8 |Terminal Board..v 9 |Serial Input..v 10 |Analog..v 11 |Digital..v 12 |Alarm..v 13 |Power Status..v 14 |System Status..v 15 |VHF..v 16 |Sentence..v 17 |Process..v 18 |Config Status..v 19 |Sensor(LAN) Input..v 20 |AMS Input..e internal_value_type_t 9..v 0 |unknown..v 1 |Power Trigger..v 2 |Current Value..v 3 |Test Value..v 4 |Test Result..v 5 |Capture Resolution (H)..v 6 |Capture Resolution (V)..v 7 |Capture Size..v 8 |Diag R
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):13789
          Entropy (8bit):5.051328041173336
          Encrypted:false
          SSDEEP:96:WxPp6HuGAnQmO3JmyJpmPZcOuKTHymp32ml5Kdt4BleMkhkNu171FtAi8lr2U35P:unOoyUOAHyUG05KzgleFhP1bJpHZs
          MD5:3306236F69013E5C3AEF09D36294B655
          SHA1:BFFEED6C74F4F85508AF31925FA0E81A54824A79
          SHA-256:C3D6878FF5B457C9DE85FCD77551E6E4448100038639B489DDCF5A831E5D1E0E
          SHA-512:E4B795003C183F5465C29A1913617D9083E6B9869C177E520436D11FC8819626BE620F01759BCC99B4021F9D33593E030D0055239A04F9F97B6C90DF44775FEB
          Malicious:false
          Preview:# 1 "class.cpp"..# 1 "<built-in>"..# 1 "<command-line>"..# 1 "class.cpp"..# 10 "class.cpp"..enum openclose_t {.. {0,"open"},.. {1,"close"},..};..enum onoff_t {.. {0,"off"},.. {1,"on"},..};..enum power_status_t {.. {0,"green"},.. {1,"yellow"},.. {2,"red"},..};..enum save_button_t {.. {0,"lighting"},.. {1,"lights-out"},.. {2,"blinking"},..};..enum normal_button_t {.. {0,"lighting"},.. {1,"lights-out"},..};..enum error_button_t {.. {0,"green"},.. {1,"blinking-in-red"},.. {2,"red"},..};..enum power_type_t {.. {1,"AC"},.. {2,"DC"},.. {3,"BATT"},..};....enum land_mark_type_t..{.. {0, "unknown"},.. {1, "Input Device"},.. {2, "Terminal Board Ether"},.. {3, "Junction Box"},.. {4, "Audio Board"},.. {5, "MIC"},.. {6, "Video LAN Converter"},.. {7, "Radar"},.. {8, "Terminal Board"},.. {9, "Serial Input"},.. {10,"Analog"},.. {11,"Digital"},.. {12,"Alarm"},.. {13,"Power Status"},.. {14,"System Status"
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):680
          Entropy (8bit):4.162406236493623
          Encrypted:false
          SSDEEP:12:i+bTVheO/OI9WD33V0+PO7I4vjh+SQic0+n:i+bTD9+i1Qm+n
          MD5:DB551FA8DC64E8B58619D7D0E142F638
          SHA1:46FC47809B3AF871928E69C0CA14981EA90BB2A6
          SHA-256:4790F553AFA3E6AEF151A7C3C36EDD700A33D2C02311261CFF5D459AB258C8EA
          SHA-512:010AD9B84E78A1950A430BE45AEF3876F99B787568949D6139DCD586ADF6F65FF1834809061AE311531F85A8CAC0C28029F0DB85107C0CE090E8A2D2378079AB
          Malicious:false
          Preview:# id.type.priority [systemid].ip:port.or file..ip:port.or file..1.modelserv.0.1.localhost..2.logger..0.1.localhost:10020..1.crntserv.0.1.localhost:15000..51.ioserv .0.1.localhost:12001....15 rcplayer 0 1 localhost:10105..16 extserv 0 1 10.0.0.100:10106..17 extclient 0 1 localhost:10107......#1.modelserv.0.1.localhost..#2.logger..0.1.localhost:10020..#1.crntserv.0.1.localhost:15000..#51.ioserv .0.1.localhost:12001....#15 rcplayer 0 1 localhost:10105..#16 extserv 0 1 10.160.155.164:10106..#17 extclient 0 1 localhost:10107......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):362
          Entropy (8bit):4.3744796318157215
          Encrypted:false
          SSDEEP:6:n/MW//Did+V6jMHeBLNmAIQ1dGJeMei1AxRADyT/A2weyyCp+ep:n0G4+V67B51Bi18RHdweyXNp
          MD5:066BD77D49DB45FA283042AB2F1BC8AE
          SHA1:FE2AFB82C819936ABB896FEEC897897120B95E91
          SHA-256:9C3B9AF44DBB2E4A147F69A33BD966E8AC61D3FEBF0A5B772BA97036E403436F
          SHA-512:26652A6ED8A0719028F1B8CE44919357DCE06707F3616B393E18B3C83447D7D76CEB7E65BD0836999897413BC592AD79786F410BA7553BBF1B31482622C6DC78
          Malicious:false
          Preview:#..# type procname command & args..#..respawn rserv rserv -debug 0x10000..respawn rcplayer rcplayer -debug 0x10000 -timeStamp 112:0x100001:10..respawn extclient extclient -debug 0x10000..respawn clientrecorder clientrecorder -ftpuser furuno -ftppass furuno -debug 0x10000 -v..respawn remoteclient remoteclient -debug 0x10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):226
          Entropy (8bit):3.983068315890039
          Encrypted:false
          SSDEEP:3:TR29QKB3JU25xecgXsGXR1fCaAOgqJEF/FFJcVM9YdRT64MbvyZuFcqkwOKDeNFR:o9fBqG/gcifNJENhklTBmVc1dVEUn
          MD5:D5BE99A24E4FA518C483C54427DCB976
          SHA1:F8DD2C1A9646CAB3F67813049C74114A06802F6B
          SHA-256:779717057FF3FB7D74E07B6C1A5A72B91923AB9660486299B24AE22716A04E88
          SHA-512:F0AFD27F8925AE2240EB3D5AEAD36B75D1B6E20F9E4AFCAC22239BAADB70E87A5BBD26CC3D457E04086A18D7DE33C7F8F641F7B9F8DF99129214D3B00B2F2EF5
          Malicious:false
          Preview:#.name.type.port..modelserv.1.24001..crntserv 3 15000..logger..4.10020..ioserv..5.12001....rcplayer 1005 10105..extclient 1007 10107..extserv 1006 10106....sysinfo 9 0..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):362
          Entropy (8bit):4.3744796318157215
          Encrypted:false
          SSDEEP:6:n/MW//Did+V6jMHeBLNmAIQ1dGJeMei1AxRADyT/A2weyyCp+ep:n0G4+V67B51Bi18RHdweyXNp
          MD5:066BD77D49DB45FA283042AB2F1BC8AE
          SHA1:FE2AFB82C819936ABB896FEEC897897120B95E91
          SHA-256:9C3B9AF44DBB2E4A147F69A33BD966E8AC61D3FEBF0A5B772BA97036E403436F
          SHA-512:26652A6ED8A0719028F1B8CE44919357DCE06707F3616B393E18B3C83447D7D76CEB7E65BD0836999897413BC592AD79786F410BA7553BBF1B31482622C6DC78
          Malicious:false
          Preview:#..# type procname command & args..#..respawn rserv rserv -debug 0x10000..respawn rcplayer rcplayer -debug 0x10000 -timeStamp 112:0x100001:10..respawn extclient extclient -debug 0x10000..respawn clientrecorder clientrecorder -ftpuser furuno -ftppass furuno -debug 0x10000 -v..respawn remoteclient remoteclient -debug 0x10000..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):680
          Entropy (8bit):4.162406236493623
          Encrypted:false
          SSDEEP:12:i+bTVheO/OI9WD33V0+PO7I4vjh+SQic0+n:i+bTD9+i1Qm+n
          MD5:DB551FA8DC64E8B58619D7D0E142F638
          SHA1:46FC47809B3AF871928E69C0CA14981EA90BB2A6
          SHA-256:4790F553AFA3E6AEF151A7C3C36EDD700A33D2C02311261CFF5D459AB258C8EA
          SHA-512:010AD9B84E78A1950A430BE45AEF3876F99B787568949D6139DCD586ADF6F65FF1834809061AE311531F85A8CAC0C28029F0DB85107C0CE090E8A2D2378079AB
          Malicious:false
          Preview:# id.type.priority [systemid].ip:port.or file..ip:port.or file..1.modelserv.0.1.localhost..2.logger..0.1.localhost:10020..1.crntserv.0.1.localhost:15000..51.ioserv .0.1.localhost:12001....15 rcplayer 0 1 localhost:10105..16 extserv 0 1 10.0.0.100:10106..17 extclient 0 1 localhost:10107......#1.modelserv.0.1.localhost..#2.logger..0.1.localhost:10020..#1.crntserv.0.1.localhost:15000..#51.ioserv .0.1.localhost:12001....#15 rcplayer 0 1 localhost:10105..#16 extserv 0 1 10.160.155.164:10106..#17 extclient 0 1 localhost:10107......
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):226
          Entropy (8bit):3.983068315890039
          Encrypted:false
          SSDEEP:3:TR29QKB3JU25xecgXsGXR1fCaAOgqJEF/FFJcVM9YdRT64MbvyZuFcqkwOKDeNFR:o9fBqG/gcifNJENhklTBmVc1dVEUn
          MD5:D5BE99A24E4FA518C483C54427DCB976
          SHA1:F8DD2C1A9646CAB3F67813049C74114A06802F6B
          SHA-256:779717057FF3FB7D74E07B6C1A5A72B91923AB9660486299B24AE22716A04E88
          SHA-512:F0AFD27F8925AE2240EB3D5AEAD36B75D1B6E20F9E4AFCAC22239BAADB70E87A5BBD26CC3D457E04086A18D7DE33C7F8F641F7B9F8DF99129214D3B00B2F2EF5
          Malicious:false
          Preview:#.name.type.port..modelserv.1.24001..crntserv 3 15000..logger..4.10020..ioserv..5.12001....rcplayer 1005 10105..extclient 1007 10107..extserv 1006 10106....sysinfo 9 0..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [drucapa]
          Category:dropped
          Size (bytes):202
          Entropy (8bit):4.696032879598639
          Encrypted:false
          SSDEEP:3:7F8zRIXKyJHSKVJ+3fsfWcYFHyeWiXAsLvsXAsNYRekGW0AsfUeov:7SzEhyM+3fTysQCEQDRepk/eov
          MD5:22C30E24367DBB6D49595D5FDD86CC43
          SHA1:19FF654DFFAB542693655C4309FB46DC442A1A56
          SHA-256:3D2633567D669EF6DD0893974361204F643A898CA70EF2181A99EEAD3F6F78CC
          SHA-512:EE63A543A85F5FCE18B87AFEEABB55444702F1D9B46B52CFF35C7982CB40BB67E9DE37C711E74A76138FB9C918E39169F2D614AC9A35F087E61A5DC5DCF8B2FE
          Malicious:false
          Preview:[extract]..restore = /opt/vr/data/restore;....[drucapa]..capacity = 30000;....[audio]..startOffset = 4600..deliveryCount = 1;..;startOffset = 7488..;startOffset = 9504..; -4896..;startOffset = 4608..;..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data
          Category:dropped
          Size (bytes):7484
          Entropy (8bit):7.847051564767458
          Encrypted:false
          SSDEEP:192:dMppwzwLLn1aMppwzwLLn1aMppwzwLLn1aMppwzwLLn1C:0Wan1FWan1FWan1FWan1C
          MD5:0977791EA51A3899F746E0AEB92D2E0F
          SHA1:65D5398F96BE48B6D77CF094D3F7C92C0F490150
          SHA-256:90F502A851317FBA03352586A3A576EE5F517665685FFBAFD6062CECF2203627
          SHA-512:20434578F31C81B1C669DA1E22504726073268418AA86B61CC4A5C6B8AA66621E0B51225A7B8C76BE481D0FF5147A3415EEFB2FFB52485A8EE54EB66588D28B4
          Malicious:false
          Preview:OggS..........xV4.&...AE.............x.l0..T&.!u.Cf.R.....i[.K.SB.g...*...wy....KzO..$...r*.Q9D.f8..z8,4...R.3F..u......B.`v,.{....=.`s.......G{W....l=}W........$..Y....=O..2........(2.><.4.......7.........)...;~...../.....w..p...\.u.:..i.......^.pF...N.M8.....x6.'.wWD...5W.y...;1FO1..d.V...G..LJ.t.y&~f.?T...V.._CC|6(.e..2..............){.,.GhmG.r.......*..o.W..O../.j./.U5.|.H......ZL2\......$..O<...._.e.....~.....e..>.^N}.kw.=.Z.O.>....8.&....-;."................+Jg.........?x...^..<...v.d.......>.{...to.7.......K.`.L}$........d..._..I'..;....;...G.v..].i..........TZ..2...6C.o.Q....qQ.M....7.7............B...pe.k.z%....~.x.%.B+.SY...&....S..=....2...*.LUq.fC..5\...\z.`}...`\\iKy#...U.x....W.?..27..E{tF.'~.Ga...?>/...@..e.....4..k..yb....]3..>&.....>?...;..b.3X.u.......t.:.m...Rw..m....7d..VJC...(."Jy+...^.....a.a. N..A....*g.W..?........?...zL..w{..K&..O. ......._+.z.^..'.F..Q.....`nj^8L<0x.X...P[..G)....!Y..>..;E.....Rhr..T..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15231
          Entropy (8bit):4.925537997543363
          Encrypted:false
          SSDEEP:96:5zDyIcDoDJ/KjcvzZBweiQOmVyVW82wqVEOg0exv4Vtvrko77ewTsDT0MdeK9Gp+:5MoDJCjc9Bw7tmkYgUpRXOwaSkkZo
          MD5:E124442EA562DF4F5A0161C90F7260B9
          SHA1:8F094E53D28AEC72A142FE6006B5FB09D57D102B
          SHA-256:AA3D53E75081C9983C038DCA5454AABA581048B35AC28F8E152108133770E13C
          SHA-512:7281D01BEA7CDBC8D19042898E02F577CCB8C656DF8EDF71B0CE7247BA7EDCDE792ECB6478330673C64059DBC49C35557C175E3A1BF614D1F279A87F16B485A4
          Malicious:false
          Preview:412951|3003|0|-|Lost Connection|B|C|0|0|0|-..412082|3003|1|-|Lost RAP|B|C|0|0|0|Restart VDR...412301|3003|2|-|Lost Serial Ch01|B|C|0|0|0|Check Ch01 connected sensor...412302|3003|3|-|Lost Serial Ch02|B|C|0|0|0|Check Ch02 connected sensor...412303|3003|4|-|Lost Serial Ch03|B|C|0|0|0|Check Ch03 connected sensor...412304|3003|5|-|Lost Serial Ch04|B|C|0|0|0|Check Ch04 connected sensor...412305|3003|6|-|Lost Serial Ch05|B|C|0|0|0|Check Ch05 connected sensor...412306|3003|7|-|Lost Serial Ch06|B|C|0|0|0|Check Ch06 connected sensor...412307|3003|8|-|Lost Serial Ch07|B|C|0|0|0|Check Ch07 connected sensor...412308|3003|9|-|Lost Serial Ch08|B|C|0|0|0|Check Ch08 connected sensor...412309|3003|10|-|Lost Serial Ch09|B|C|0|0|0|Check Ch09 connected sensor...412310|3003|11|-|Lost Serial Ch10|B|C|0|0|0|Check Ch10 connected sensor...412311|3003|12|-|Lost Serial Ch11|B|C|0|0|0|Check Ch11 connected sensor...412312|3003|13|-|Lost Serial Ch12|B|C|0|0|0|Check Ch12 connected sensor...412313|3003|14|-|Lost Seri
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:data
          Category:dropped
          Size (bytes):68960
          Entropy (8bit):4.889017390182576
          Encrypted:false
          SSDEEP:768:pmHS0+rz2TejydHTbOFVqFUCfnO5LTwnKTvUkIjXxCbv1ByUQVULap4/ukl2HI5J:pmHN+3IHTbUqFi1UkIjhCbXyU/D
          MD5:9EC77F47DC53838FC3CC7079D180E34F
          SHA1:ECB48D106FF6878A49B3F717CB12D94BFC86EAC9
          SHA-256:7AB11DEA44E4C5FF38C2A33D7C3D222E29955D1D47388B8F071F6E6F5DCB8A10
          SHA-512:1571C81EEA2F9BF07703FD79360C16CA893D6FDBBE6EFA0420FA163B7809D55D3938F7E0CB4A2A9ACA01F15315B1A48D2C1D0DACD7B000923F9657B8EF5CEDA8
          Malicious:false
          Preview:.VC.U.o`....(...(...........q..........K...........n...................n...................n...................n...........!.......n...........).......n...........1.......n...........9.......n...........A.......n...........I.......n...........Q.......n...........Y.......n...........a.......n...........i.......n...........q.......n...........y.......n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n... ...............n...!...............n..."...............n...#...............n...$.......!.......n...%.......).......n...&.......1.......n...'.......9.......n...(.......A.......n...).......I.......n...*.......Q.......n...+.......Y.......n...,.......a.......n...-.......i.......n...........q.......n.../.......y.......n...0...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Ogg data
          Category:dropped
          Size (bytes):7484
          Entropy (8bit):7.847051564767458
          Encrypted:false
          SSDEEP:192:dMppwzwLLn1aMppwzwLLn1aMppwzwLLn1aMppwzwLLn1C:0Wan1FWan1FWan1FWan1C
          MD5:0977791EA51A3899F746E0AEB92D2E0F
          SHA1:65D5398F96BE48B6D77CF094D3F7C92C0F490150
          SHA-256:90F502A851317FBA03352586A3A576EE5F517665685FFBAFD6062CECF2203627
          SHA-512:20434578F31C81B1C669DA1E22504726073268418AA86B61CC4A5C6B8AA66621E0B51225A7B8C76BE481D0FF5147A3415EEFB2FFB52485A8EE54EB66588D28B4
          Malicious:false
          Preview:OggS..........xV4.&...AE.............x.l0..T&.!u.Cf.R.....i[.K.SB.g...*...wy....KzO..$...r*.Q9D.f8..z8,4...R.3F..u......B.`v,.{....=.`s.......G{W....l=}W........$..Y....=O..2........(2.><.4.......7.........)...;~...../.....w..p...\.u.:..i.......^.pF...N.M8.....x6.'.wWD...5W.y...;1FO1..d.V...G..LJ.t.y&~f.?T...V.._CC|6(.e..2..............){.,.GhmG.r.......*..o.W..O../.j./.U5.|.H......ZL2\......$..O<...._.e.....~.....e..>.^N}.kw.=.Z.O.>....8.&....-;."................+Jg.........?x...^..<...v.d.......>.{...to.7.......K.`.L}$........d..._..I'..;....;...G.v..].i..........TZ..2...6C.o.Q....qQ.M....7.7............B...pe.k.z%....~.x.%.B+.SY...&....S..=....2...*.LUq.fC..5\...\z.`}...`\\iKy#...U.x....W.?..27..E{tF.'~.Ga...?>/...@..e.....4..k..yb....]3..>&.....>?...;..b.3X.u.......t.:.m...Rw..m....7d..VJC...(."Jy+...^.....a.a. N..A....*g.W..?........?...zL..w{..K&..O. ......._+.z.^..'.F..Q.....`nj^8L<0x.X...P[..G)....!Y..>..;E.....Rhr..T..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):66614
          Entropy (8bit):4.712231082284398
          Encrypted:false
          SSDEEP:1536:MwdHuAW61Np1wn0ZyGLOSxLlxzVL8qX7MueZrql:1dHv11Nzw0ZpLOSxLlxzVL8qXQuehql
          MD5:E566BB30590682C468E9F9AF0B4F514B
          SHA1:CFE919552115B95CAB2FB11ABAA112814BFA2014
          SHA-256:221D72A03B4C2B164D455D763484EA27712B20CF383C2B3E272F0DC9429775A4
          SHA-512:ECB0DB14DEC33640A0F59EFAADE432F1DFC4F41999C5DCDD79EA9032446976B5C9B19EF72E60CD5F23100CB18C05BC7A8DE05020AEB656A7BC309E55DC228299
          Malicious:false
          Preview:@i 0 5 0 0 0 6 778 0 0 0 0 268 2 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 3 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 4 203 0x100001 10 4|||0|||HDD:areaNo:Long Term Device.5 5 203 0x100001 12 4|||0|||HDD:SIZE:Long Term Device.6 0 110 0x100001 1 4|||0|||analog value:Raw Data:AICH001.6 1 110 0x100002 1 4|||0|||analog value:Raw Data:AICH002.6 2 110 0x100003 1 4|||0|||analog value:Raw Data:AICH003.6 3 110 0x100004 1 4|||0|||analog value:Raw Data:AICH004.6 4 110 0x100005 1 4|||0|||analog value:Raw Data:AICH005.6 5 110 0x100006 1 4|||0|||analog value:Raw Data:AICH006.6 6 110 0x100007 1 4|||0||
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:data
          Category:dropped
          Size (bytes):68960
          Entropy (8bit):4.889017390182576
          Encrypted:false
          SSDEEP:768:pmHS0+rz2TejydHTbOFVqFUCfnO5LTwnKTvUkIjXxCbv1ByUQVULap4/ukl2HI5J:pmHN+3IHTbUqFi1UkIjhCbXyU/D
          MD5:9EC77F47DC53838FC3CC7079D180E34F
          SHA1:ECB48D106FF6878A49B3F717CB12D94BFC86EAC9
          SHA-256:7AB11DEA44E4C5FF38C2A33D7C3D222E29955D1D47388B8F071F6E6F5DCB8A10
          SHA-512:1571C81EEA2F9BF07703FD79360C16CA893D6FDBBE6EFA0420FA163B7809D55D3938F7E0CB4A2A9ACA01F15315B1A48D2C1D0DACD7B000923F9657B8EF5CEDA8
          Malicious:false
          Preview:.VC.U.o`....(...(...........q..........K...........n...................n...................n...................n...........!.......n...........).......n...........1.......n...........9.......n...........A.......n...........I.......n...........Q.......n...........Y.......n...........a.......n...........i.......n...........q.......n...........y.......n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n...................n... ...............n...!...............n..."...............n...#...............n...$.......!.......n...%.......).......n...&.......1.......n...'.......9.......n...(.......A.......n...).......I.......n...*.......Q.......n...+.......Y.......n...,.......a.......n...-.......i.......n...........q.......n.../.......y.......n...0...
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):280471
          Entropy (8bit):4.825966410766605
          Encrypted:false
          SSDEEP:6144:c05idHv11NzvZpLxxLXzVL8qXRCdVijVz3hxJrj9lgWD9njTBbNv/UMJH4URnrKy:xreX
          MD5:A602B91DDC542E56F4D2A44E6D25D638
          SHA1:EC4A4C9EBDFFC358E7EA640CC39DB3532145FA88
          SHA-256:8F10D42FF5383DA8FAEEAD0C4F0B9C91AD4B1278CB8EF42884CB99300B46B1B1
          SHA-512:2D27636FB8572617B526C376CAF51B2A21C208DD29E7AEF5AB91019624C59E580E85D2AED3E2DB4DB6C9650638AABF2DA4207D7E2263804C489DCDA9D3959F32
          Malicious:false
          Preview:@i 0 5 0 0 0 278 840 0 0 476 1376 1174 35 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100001 13 4|||0|||DRU:Device Num:Fixed DRU.5 3 202 0x100001 14 4|||0|||DRU:Round Trip:Fixed DRU.5 4 202 0x100001 15 4|||0|||DRU:Index:Fixed DRU.5 5 202 0x100001 16 4|||0|||DRU:Restart Counter:Fixed DRU.5 6 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 7 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 8 202 0x100002 13 4|||0|||DRU:Device Num:Float DRU.5 9 202 0x100002 14 4|||0|||DRU:Round Trip:Float DRU.5 10 202 0x100002 15 4|||0|||DRU:Index:Float DRU.5 11 202 0x100002 16 4|||0|||DRU:Restart Counter:Float DRU.5 12 203 0x100001 10 4|||0|||HDD:areaNo:Lon
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:Generic INItialization configuration [drucapa]
          Category:dropped
          Size (bytes):202
          Entropy (8bit):4.696032879598639
          Encrypted:false
          SSDEEP:3:7F8zRIXKyJHSKVJ+3fsfWcYFHyeWiXAsLvsXAsNYRekGW0AsfUeov:7SzEhyM+3fTysQCEQDRepk/eov
          MD5:22C30E24367DBB6D49595D5FDD86CC43
          SHA1:19FF654DFFAB542693655C4309FB46DC442A1A56
          SHA-256:3D2633567D669EF6DD0893974361204F643A898CA70EF2181A99EEAD3F6F78CC
          SHA-512:EE63A543A85F5FCE18B87AFEEABB55444702F1D9B46B52CFF35C7982CB40BB67E9DE37C711E74A76138FB9C918E39169F2D614AC9A35F087E61A5DC5DCF8B2FE
          Malicious:false
          Preview:[extract]..restore = /opt/vr/data/restore;....[drucapa]..capacity = 30000;....[audio]..startOffset = 4600..deliveryCount = 1;..;startOffset = 7488..;startOffset = 9504..; -4896..;startOffset = 4608..;..
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):15231
          Entropy (8bit):4.925537997543363
          Encrypted:false
          SSDEEP:96:5zDyIcDoDJ/KjcvzZBweiQOmVyVW82wqVEOg0exv4Vtvrko77ewTsDT0MdeK9Gp+:5MoDJCjc9Bw7tmkYgUpRXOwaSkkZo
          MD5:E124442EA562DF4F5A0161C90F7260B9
          SHA1:8F094E53D28AEC72A142FE6006B5FB09D57D102B
          SHA-256:AA3D53E75081C9983C038DCA5454AABA581048B35AC28F8E152108133770E13C
          SHA-512:7281D01BEA7CDBC8D19042898E02F577CCB8C656DF8EDF71B0CE7247BA7EDCDE792ECB6478330673C64059DBC49C35557C175E3A1BF614D1F279A87F16B485A4
          Malicious:false
          Preview:412951|3003|0|-|Lost Connection|B|C|0|0|0|-..412082|3003|1|-|Lost RAP|B|C|0|0|0|Restart VDR...412301|3003|2|-|Lost Serial Ch01|B|C|0|0|0|Check Ch01 connected sensor...412302|3003|3|-|Lost Serial Ch02|B|C|0|0|0|Check Ch02 connected sensor...412303|3003|4|-|Lost Serial Ch03|B|C|0|0|0|Check Ch03 connected sensor...412304|3003|5|-|Lost Serial Ch04|B|C|0|0|0|Check Ch04 connected sensor...412305|3003|6|-|Lost Serial Ch05|B|C|0|0|0|Check Ch05 connected sensor...412306|3003|7|-|Lost Serial Ch06|B|C|0|0|0|Check Ch06 connected sensor...412307|3003|8|-|Lost Serial Ch07|B|C|0|0|0|Check Ch07 connected sensor...412308|3003|9|-|Lost Serial Ch08|B|C|0|0|0|Check Ch08 connected sensor...412309|3003|10|-|Lost Serial Ch09|B|C|0|0|0|Check Ch09 connected sensor...412310|3003|11|-|Lost Serial Ch10|B|C|0|0|0|Check Ch10 connected sensor...412311|3003|12|-|Lost Serial Ch11|B|C|0|0|0|Check Ch11 connected sensor...412312|3003|13|-|Lost Serial Ch12|B|C|0|0|0|Check Ch12 connected sensor...412313|3003|14|-|Lost Seri
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):280471
          Entropy (8bit):4.825966410766605
          Encrypted:false
          SSDEEP:6144:c05idHv11NzvZpLxxLXzVL8qXRCdVijVz3hxJrj9lgWD9njTBbNv/UMJH4URnrKy:xreX
          MD5:A602B91DDC542E56F4D2A44E6D25D638
          SHA1:EC4A4C9EBDFFC358E7EA640CC39DB3532145FA88
          SHA-256:8F10D42FF5383DA8FAEEAD0C4F0B9C91AD4B1278CB8EF42884CB99300B46B1B1
          SHA-512:2D27636FB8572617B526C376CAF51B2A21C208DD29E7AEF5AB91019624C59E580E85D2AED3E2DB4DB6C9650638AABF2DA4207D7E2263804C489DCDA9D3959F32
          Malicious:false
          Preview:@i 0 5 0 0 0 278 840 0 0 476 1376 1174 35 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100001 13 4|||0|||DRU:Device Num:Fixed DRU.5 3 202 0x100001 14 4|||0|||DRU:Round Trip:Fixed DRU.5 4 202 0x100001 15 4|||0|||DRU:Index:Fixed DRU.5 5 202 0x100001 16 4|||0|||DRU:Restart Counter:Fixed DRU.5 6 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 7 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 8 202 0x100002 13 4|||0|||DRU:Device Num:Float DRU.5 9 202 0x100002 14 4|||0|||DRU:Round Trip:Float DRU.5 10 202 0x100002 15 4|||0|||DRU:Index:Float DRU.5 11 202 0x100002 16 4|||0|||DRU:Restart Counter:Float DRU.5 12 203 0x100001 10 4|||0|||HDD:areaNo:Lon
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:ASCII text
          Category:dropped
          Size (bytes):66614
          Entropy (8bit):4.712231082284398
          Encrypted:false
          SSDEEP:1536:MwdHuAW61Np1wn0ZyGLOSxLlxzVL8qX7MueZrql:1dHv11Nzw0ZpLOSxLlxzVL8qXQuehql
          MD5:E566BB30590682C468E9F9AF0B4F514B
          SHA1:CFE919552115B95CAB2FB11ABAA112814BFA2014
          SHA-256:221D72A03B4C2B164D455D763484EA27712B20CF383C2B3E272F0DC9429775A4
          SHA-512:ECB0DB14DEC33640A0F59EFAADE432F1DFC4F41999C5DCDD79EA9032446976B5C9B19EF72E60CD5F23100CB18C05BC7A8DE05020AEB656A7BC309E55DC228299
          Malicious:false
          Preview:@i 0 5 0 0 0 6 778 0 0 0 0 268 2 0 0 0 0.1 0 502 0x100001 10 4|||0|||PowerSupply:status:AC Status.1 1 502 0x100002 10 4|||0|||PowerSupply:status:DC Status.1 2 502 0x100003 10 4|||0|||PowerSupply:status:Battery Status.1 3 503 0x100001 10 4|||1|||VdrButtons:save:Vdr Buttons.1 4 503 0x100001 12 4|||0|||VdrButtons:error:Vdr Buttons.5 0 202 0x100001 10 4|||0|||DRU:areaNo:Fixed DRU.5 1 202 0x100001 12 4|||0|||DRU:SIZE:Fixed DRU.5 2 202 0x100002 10 4|||0|||DRU:areaNo:Float DRU.5 3 202 0x100002 12 4|||0|||DRU:SIZE:Float DRU.5 4 203 0x100001 10 4|||0|||HDD:areaNo:Long Term Device.5 5 203 0x100001 12 4|||0|||HDD:SIZE:Long Term Device.6 0 110 0x100001 1 4|||0|||analog value:Raw Data:AICH001.6 1 110 0x100002 1 4|||0|||analog value:Raw Data:AICH002.6 2 110 0x100003 1 4|||0|||analog value:Raw Data:AICH003.6 3 110 0x100004 1 4|||0|||analog value:Raw Data:AICH004.6 4 110 0x100005 1 4|||0|||analog value:Raw Data:AICH005.6 5 110 0x100006 1 4|||0|||analog value:Raw Data:AICH006.6 6 110 0x100007 1 4|||0||
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:InnoSetup Log 64-bit VR-7000, version 0x30, 47187 bytes, 367706\user, "C:\Program Files (x86)\FURUNO"
          Category:dropped
          Size (bytes):47187
          Entropy (8bit):5.268681994115016
          Encrypted:false
          SSDEEP:384:rTmyYwTVQZ2wVPsxdfb7I45ahkbqrczJTYAzuu4pQcC2eRJuF3lb8MsmzMKKVOpX:BY+E2Rlb7I45ahkicDZzk
          MD5:E3ABB886BEB485F62673802958B9F5AA
          SHA1:3EE9569E25C4037E40468DD9B4619B41C0ADA5BB
          SHA-256:ED31504CF8BF8D034BA4BE429A845B43D7168B457E6FA9913C2919138B359C77
          SHA-512:2906D00EE9A3096516DFFC90B93D918322C64911BDED03650AF9FF58A19FA1E680FDC9D1771B8376FC643705111D9B5E9D65C94B89E6D5D9E9B64A150516D20D
          Malicious:false
          Preview:Inno Setup Uninstall Log (b) 64-bit.............................VR-7000.........................................................................................................................VR-7000.........................................................................................................................0.......S...%...............................................................................................................=...........4......=....367706.user.C:\Program Files (x86)\FURUNO...........,.(.P.. .......... .................................C:\Program Files (x86)\FURUNO<C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VR-7000.VR-7000.default...."........C:\Program Files (x86)\FURUNO..."...'...%C:\Program Files (x86)\FURUNO\VR-7000..."...+...)C:\Program Files (x86)\FURUNO\VR-7000\jre...".../...-C:\Program Files (x86)\FURUNO\VR-7000\jre\lib..."...6...4C:\Program Files (x86)\FURUNO\VR-7000\jre\lib\applet...".......,C:\Program Files (x86)\FURUNO\VR-7000\ser
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):717985
          Entropy (8bit):6.514892357658037
          Encrypted:false
          SSDEEP:12288:6TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyFj:SPcYn5c/rPx37/zHBA6pFptZ1CEQqMRG
          MD5:7ED0852A51DF0E4AD455F7EA3F39E596
          SHA1:113630652C21A6D5F6498E06475D89AA850A4149
          SHA-256:0BD7976242464961623A701A9744FCAD739702BC2C55FE080165E3DC33F33363
          SHA-512:201689B8BCEAA91967F3A65176756CD98618F0CAFEA7C8BAA3EF5AA06CE8F05AD858B2DD04A7D433530D2D0805E0FE302AF628B46D24A1426350223FB5B1D6E2
          Malicious:true
          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Thu Apr 25 01:44:45 2024, mtime=Thu Apr 25 01:44:47 2024, atime=Fri Feb 18 08:16:32 2022, length=35328, window=hide
          Category:dropped
          Size (bytes):1355
          Entropy (8bit):4.593907215258834
          Encrypted:false
          SSDEEP:24:8BJREjdOExePxB+RLA+aJUdyDdyAUU1vqyFm:87OjdO/BW8+aJUdYdaryF
          MD5:13CE1ADECD4649E17AE9923C1CCDE0B9
          SHA1:502D19FA8752842E371CD8D3CE301E5B4F12D6DF
          SHA-256:3C8896A85F387CFA7F995C1E527CCACC1D65F29419DB44F04A24E902E34D26F9
          SHA-512:0A17925B68FA988AFEB56652D5A0BBDF40B4CE28CE431F4B7779291E4265B1C7F990CDC19913F6D40BE297D0387578AD9D6F72318DF0E8CB8A8C3BE126550A8C
          Malicious:false
          Preview:L..................F.... .....B................7.$........................../....P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....l...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....T.1......X....FURUNO..>......X...X............................l...F.U.R.U.N.O.....V.1......X....VR-7000.@......X...X............................4N(.V.R.-.7.0.0.0.....T.1......X....Viewer..>......X...X.......+....................6[..V.i.e.w.e.r.....j.2.....RT.J .LIVEPL~1.EXE..N......X...X.......H........................l.i.v.e.p.l.a.y.e.r...e.x.e.......j...............-.......i..............Q.....C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe..J.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.\.l.i.v.e.p.l.a.y.e.r...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r...p.r.e.v.i.o.u.s
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Thu Apr 25 01:44:45 2024, mtime=Thu Apr 25 01:44:47 2024, atime=Fri Feb 18 08:16:32 2022, length=26624, window=hide
          Category:dropped
          Size (bytes):1360
          Entropy (8bit):4.587136975210344
          Encrypted:false
          SSDEEP:24:8eREjdOExePxBbIRS8AZa2WdybdyAUU1PqyFm:8eOjdO/BguZaXdodaryF
          MD5:FD1171FEE0C855311C9F1B3ACE1DBE27
          SHA1:F3B7CA08A808DA3F9653C502E95DD762786E6760
          SHA-256:7FE731FAF046D43757A845B1C97E87D2183612E02185050D37874D37B3E5CA88
          SHA-512:BFF29B9EE343A816BAD53AD35AD53813CA4E7792F16382825309A7D3FFCBF1620DC6D8A2D46B7F128F9213379E5A93EC4C5F35E6C13DC5904FD1E7052495F83B
          Malicious:false
          Preview:L..................F.... ....3E.....(K.........7.$...h......................1....P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....l...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....T.1......X....FURUNO..>......X...X............................l...F.U.R.U.N.O.....V.1......X....VR-7000.@......X...X............................4N(.V.R.-.7.0.0.0.....T.1......X....Viewer..>......X...X.......+....................6[..V.i.e.w.e.r.....l.2..h..RT.J .MAINTE~1.EXE..P......X...X.......H........................m.a.i.n.t.e.n.a.n.c.e...e.x.e.......k...............-.......j..............Q.....C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe..K.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.\.m.a.i.n.t.e.n.a.n.c.e...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r...p.r.e.v.i.
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 01:44:45 2024, mtime=Thu Apr 25 01:44:45 2024, atime=Fri Feb 18 08:16:32 2022, length=35328, window=hide
          Category:dropped
          Size (bytes):1337
          Entropy (8bit):4.593707678754647
          Encrypted:false
          SSDEEP:24:8mks+E7dOEeePxB+RLA+aJUdyDdyDUU1vqyFm:8mtx7dO+BW8+aJUdYdfryF
          MD5:1281DD603D37C5ABE3F0CADD1D313960
          SHA1:633958E7BFCAA8615F6F2F01147A5CACA659AB22
          SHA-256:E5B2A4ED91EC03A569234FA36B4895539986D1D69E0540FEA8C20DEC030F84B8
          SHA-512:3CE34177F6D7F7796842DFB69DC3B57FC9E14DC80331A5BC8CD96129D9A1C42D21CFE66DBE19882E89047E0F187AD6E0719AD0616B98C4052ABE98E07BB9C85F
          Malicious:false
          Preview:L..................F.... .....B......3E........7.$........................../....P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....?...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....T.1......X....FURUNO..>......X...X............................l...F.U.R.U.N.O.....V.1......X....VR-7000.@......X...X............................4N(.V.R.-.7.0.0.0.....T.1......X....Viewer..>......X...X.......+....................6[..V.i.e.w.e.r.....j.2.....RT.J .LIVEPL~1.EXE..N......X...X.......H........................l.i.v.e.p.l.a.y.e.r...e.x.e.......j...............-.......i..............Q.....C:\Program Files (x86)\FURUNO\VR-7000\Viewer\liveplayer.exe..J.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.\.l.i.v.e.p.l.a.y.e.r...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.........*........
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 01:44:40 2024, mtime=Thu Apr 25 01:44:40 2024, atime=Thu Apr 25 01:44:27 2024, length=717985, window=hide
          Category:dropped
          Size (bytes):1208
          Entropy (8bit):4.628404061104646
          Encrypted:false
          SSDEEP:24:8mFuPlREjdOExeP3Q1IQADavdyBHgdyFUU1rqyFm:8mFuPlOjdOm14DavdgHgdRnyF
          MD5:02338BF58D205A89AC552A6DE1BC34B4
          SHA1:D9CBD8C723A2F036210DF1B88A9717A13FAB438B
          SHA-256:81144B23A8739D1C8B2DC2E8EA4E2F49B0B7231869C0B0FEE17873FA654513D3
          SHA-512:8D2D868977B6A9698A63A462EC0829FAA4E89BCBBE8CBCC63F4FBE7CFF6663D140C0C0F519007558EDBB24186B37D8B3D524FA25023969F472E4E1ADCC4478AE
          Malicious:false
          Preview:L..................F.... ...7.4.....7.4......>i}.................................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....l...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....T.1......X....FURUNO..>......X...X............................l...F.U.R.U.N.O.....V.1......X....VR-7000.@......X...X............................4N(.V.R.-.7.0.0.0.....f.2......X.. .unins000.exe..J......X...X......r:......................k.u.n.i.n.s.0.0.0...e.x.e.......a...............-.......`..............Q.....C:\Program Files (x86)\FURUNO\VR-7000\unins000.exe..A.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.u.n.i.n.s.0.0.0...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.........*................@Z|...K.J.........`.......X.......367706...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,............
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 01:44:45 2024, mtime=Thu Apr 25 01:44:45 2024, atime=Fri Feb 18 08:16:32 2022, length=26624, window=hide
          Category:dropped
          Size (bytes):1342
          Entropy (8bit):4.581020567254097
          Encrypted:false
          SSDEEP:24:8mJREjdOExePxBbIRS8AZa2WdybdyDUU1PqyFm:8mJOjdO/BguZaXdodfryF
          MD5:0C8C8580C11F2BD955DD1CAA167D194F
          SHA1:47FFDE97FD894B84D99735CE932976B7BA0AF25D
          SHA-256:2E7456C66F61B0582CECD0261AA3F5C7B8EAEFA75DD4C9B26D6F7DA75DF6277C
          SHA-512:56FFC4BACF82967AE88A97D7E519BA6A0EFB99DE5F8FE0DF23AC2D481170B2C51F4B03AB9C3F00B0B09867395E154B40A3FFB0B3DA22C548699598CE3FA6EF1D
          Malicious:false
          Preview:L..................F.... ....3E......3E........7.$...h......................1....P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....l...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....T.1......X....FURUNO..>......X...X............................l...F.U.R.U.N.O.....V.1......X....VR-7000.@......X...X............................4N(.V.R.-.7.0.0.0.....T.1......X....Viewer..>......X...X.......+....................6[..V.i.e.w.e.r.....l.2..h..RT.J .MAINTE~1.EXE..P......X...X.......H........................m.a.i.n.t.e.n.a.n.c.e...e.x.e.......k...............-.......j..............Q.....C:\Program Files (x86)\FURUNO\VR-7000\Viewer\maintenance.exe..K.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.\.m.a.i.n.t.e.n.a.n.c.e...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.U.R.U.N.O.\.V.R.-.7.0.0.0.\.V.i.e.w.e.r.........*...
          Process:C:\Users\user\Desktop\view_01-64.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):706560
          Entropy (8bit):6.506360176420555
          Encrypted:false
          SSDEEP:12288:yTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyF:6PcYn5c/rPx37/zHBA6pFptZ1CEQqMRU
          MD5:A2C4D52C66B4B399FACADB8CC8386745
          SHA1:C326304C56A52A3E5BFBDCE2FEF54604A0C653E0
          SHA-256:6C0465CE64C07E729C399A338705941D77727C7D089430957DF3E91A416E9D2A
          SHA-512:2A66256FF8535E2B300AA0CA27B76E85D42422B0AAF5E7E6D055F7ABB9E338929C979E185C6BE8918D920FB134B7F28A76B714579CACB8ACE09000C046DD34D6
          Malicious:true
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32+ executable (console) x86-64, for MS Windows
          Category:dropped
          Size (bytes):6144
          Entropy (8bit):4.289297026665552
          Encrypted:false
          SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
          MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
          SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
          SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
          SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
          Malicious:true
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
          Category:dropped
          Size (bytes):23312
          Entropy (8bit):4.596242908851566
          Encrypted:false
          SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
          MD5:92DC6EF532FBB4A5C3201469A5B5EB63
          SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
          SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
          SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
          Malicious:false
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\cmd.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:E:E
          MD5:99621A0530658F18A5D4F84C0FF4B071
          SHA1:23ABE145CB7ADB887055EA16923A32B570272126
          SHA-256:D8F9E37F452811BF847A0D18DAB117087800C5A127E48DA1CCCC53A5EC924298
          SHA-512:6F2F7C151466252B7B1B68A3624DD57C2BE053720DB328532AC080086B98CF9A0488AF62C1EB0F7892CFD6236613557C470E2DAD30260304318D182D3C3C887D
          Malicious:false
          Preview:DONE. ..
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.999844518431257
          TrID:
          • Win32 Executable (generic) a (10002005/4) 98.73%
          • Inno Setup installer (109748/4) 1.08%
          • Windows Screen Saver (13104/52) 0.13%
          • Win16/32 Executable Delphi generic (2074/23) 0.02%
          • Generic Win/DOS Executable (2004/3) 0.02%
          File name:view_01-64.exe
          File size:15'161'609 bytes
          MD5:72ac0fb34f691758105bbc4eb920ad8a
          SHA1:6e4f9dedfeed0d06aec464584ca510ce08cbb5f4
          SHA256:ff6cc44c832e3318bc9d673f8eb053666d38002698814c23c88df9a6d357fd66
          SHA512:637ddbbfd8e384465ce3d6fe38d5d73aaf135998c4ba03db57ffad29c4d2cfdcbe5b140a6bf2920ca3e546b2e378e17c043ad5db89ccfdd44d2e7a720d2753a4
          SSDEEP:393216:FeYI9oIw52l01iwjCL3d1B/b85Mwi/n3oO:FeYI9B99w+dwiP9
          TLSH:FCE633CD322E9D70F65AE07C5B94C7981E37A92D297A1CBD039CA40D2F9FD801B9A135
          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
          Icon Hash:2d2e3797b32b2b99
          Entrypoint:0x40a5f8
          Entrypoint Section:CODE
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:1
          OS Version Minor:0
          File Version Major:1
          File Version Minor:0
          Subsystem Version Major:1
          Subsystem Version Minor:0
          Import Hash:884310b1928934402ea6fec1dbd3cf5e
          Instruction
          push ebp
          mov ebp, esp
          add esp, FFFFFFC4h
          push ebx
          push esi
          push edi
          xor eax, eax
          mov dword ptr [ebp-10h], eax
          mov dword ptr [ebp-24h], eax
          call 00007FE780AE81A3h
          call 00007FE780AE93AAh
          call 00007FE780AE9639h
          call 00007FE780AE96DCh
          call 00007FE780AEB67Bh
          call 00007FE780AEDFE6h
          call 00007FE780AEE14Dh
          xor eax, eax
          push ebp
          push 0040ACC9h
          push dword ptr fs:[eax]
          mov dword ptr fs:[eax], esp
          xor edx, edx
          push ebp
          push 0040AC92h
          push dword ptr fs:[edx]
          mov dword ptr fs:[edx], esp
          mov eax, dword ptr [0040C014h]
          call 00007FE780AEEBFBh
          call 00007FE780AEE7E6h
          cmp byte ptr [0040B234h], 00000000h
          je 00007FE780AEF6DEh
          call 00007FE780AEECF8h
          xor eax, eax
          call 00007FE780AE8E99h
          lea edx, dword ptr [ebp-10h]
          xor eax, eax
          call 00007FE780AEBC8Bh
          mov edx, dword ptr [ebp-10h]
          mov eax, 0040CE28h
          call 00007FE780AE823Ah
          push 00000002h
          push 00000000h
          push 00000001h
          mov ecx, dword ptr [0040CE28h]
          mov dl, 01h
          mov eax, 0040738Ch
          call 00007FE780AEC51Ah
          mov dword ptr [0040CE2Ch], eax
          xor edx, edx
          push ebp
          push 0040AC4Ah
          push dword ptr fs:[edx]
          mov dword ptr fs:[edx], esp
          call 00007FE780AEEC56h
          mov dword ptr [0040CE34h], eax
          mov eax, dword ptr [0040CE34h]
          cmp dword ptr [eax+0Ch], 00000000h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
          .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
          .rsrc0x110000x2c000x2c008f3fe7422f44a569a8d94bc5fbbc4e32False0.3251953125data4.493913254697086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
          RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
          RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
          RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
          RT_STRING0x125740x2f2data0.35543766578249336
          RT_STRING0x128680x30cdata0.3871794871794872
          RT_STRING0x12b740x2cedata0.42618384401114207
          RT_STRING0x12e440x68data0.75
          RT_STRING0x12eac0xb4data0.6277777777777778
          RT_STRING0x12f600xaedata0.5344827586206896
          RT_RCDATA0x130100x2cdata1.1818181818181819
          RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
          RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2547318611987382
          RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
          DLLImport
          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
          user32.dllMessageBoxA
          oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
          kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
          user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
          comctl32.dllInitCommonControls
          advapi32.dllAdjustTokenPrivileges
          Language of compilation systemCountry where language is spokenMap
          DutchNetherlands
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:04:44:27
          Start date:25/04/2024
          Path:C:\Users\user\Desktop\view_01-64.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\view_01-64.exe"
          Imagebase:0x400000
          File size:15'161'609 bytes
          MD5 hash:72AC0FB34F691758105BBC4EB920AD8A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:04:44:27
          Start date:25/04/2024
          Path:C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\is-2G7KF.tmp\view_01-64.tmp" /SL5="$7047C,14900298,56832,C:\Users\user\Desktop\view_01-64.exe"
          Imagebase:0x400000
          File size:706'560 bytes
          MD5 hash:A2C4D52C66B4B399FACADB8CC8386745
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:3
          Start time:04:44:47
          Start date:25/04/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateService.bat""
          Imagebase:0x7ff65be30000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:04:44:47
          Start date:25/04/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Windows\System32\sc.exe
          Wow64 process (32bit):false
          Commandline:sc stop "VDR Servers Service"
          Imagebase:0x7ff77f030000
          File size:72'192 bytes
          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:6
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe
          Wow64 process (32bit):true
          Commandline:server\bin\ServiceMinit.exe /UnregServer
          Imagebase:0x400000
          File size:245'760 bytes
          MD5 hash:01C338C4765202CB8D712FD7CCDF9BD1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:7
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Program Files (x86)\FURUNO\VR-7000\server\bin\ServiceMinit.exe
          Wow64 process (32bit):true
          Commandline:server\bin\ServiceMinit.exe /Service
          Imagebase:0x400000
          File size:245'760 bytes
          MD5 hash:01C338C4765202CB8D712FD7CCDF9BD1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:8
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\CreateSeverEnvironment.bat""
          Imagebase:0x7ff65be30000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:9
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:10
          Start time:04:44:48
          Start date:25/04/2024
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:wscript InstSeverEnvironment.vbs
          Imagebase:0x7ff788c80000
          File size:170'496 bytes
          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:11
          Start time:04:44:49
          Start date:25/04/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\FURUNO\VR-7000\Viewer\CreateLatestBackup.bat""
          Imagebase:0x7ff65be30000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:12
          Start time:04:44:49
          Start date:25/04/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:13
          Start time:04:44:49
          Start date:25/04/2024
          Path:C:\Windows\System32\xcopy.exe
          Wow64 process (32bit):false
          Commandline:xcopy /E /Y ..\_previous ..\_latest
          Imagebase:0x7ff77f8b0000
          File size:50'688 bytes
          MD5 hash:39FBFD3AF58238C6F9D4D408C9251FF5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:14
          Start time:04:44:49
          Start date:25/04/2024
          Path:C:\Windows\System32\xcopy.exe
          Wow64 process (32bit):false
          Commandline:xcopy /E /Y /U ..\dlls ..\_latest\dlls
          Imagebase:0x7ff77f8b0000
          File size:50'688 bytes
          MD5 hash:39FBFD3AF58238C6F9D4D408C9251FF5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:15
          Start time:04:44:50
          Start date:25/04/2024
          Path:C:\Windows\System32\xcopy.exe
          Wow64 process (32bit):false
          Commandline:xcopy /E /Y /U ..\server ..\_latest\server
          Imagebase:0x7ff77f8b0000
          File size:50'688 bytes
          MD5 hash:39FBFD3AF58238C6F9D4D408C9251FF5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:16
          Start time:04:44:50
          Start date:25/04/2024
          Path:C:\Windows\System32\xcopy.exe
          Wow64 process (32bit):false
          Commandline:xcopy /E /Y /U ..\Viewer ..\_latest\Viewer
          Imagebase:0x7ff77f8b0000
          File size:50'688 bytes
          MD5 hash:39FBFD3AF58238C6F9D4D408C9251FF5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:23.3%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:2.4%
            Total number of Nodes:1471
            Total number of Limit Nodes:21
            execution_graph 5312 407548 5313 407554 CloseHandle 5312->5313 5314 40755d 5312->5314 5313->5314 6700 402b48 RaiseException 5315 407749 5316 4076dc WriteFile 5315->5316 5321 407724 5315->5321 5317 4076e8 5316->5317 5318 4076ef 5316->5318 5319 40748c 35 API calls 5317->5319 5320 407700 5318->5320 5322 4073ec 34 API calls 5318->5322 5319->5318 5321->5315 5323 4077e0 5321->5323 5322->5320 5324 4078db InterlockedExchange 5323->5324 5326 407890 5323->5326 5325 4078e7 5324->5325 6701 40294a 6702 402952 6701->6702 6703 402967 6702->6703 6704 403554 4 API calls 6702->6704 6704->6702 6705 403f4a 6706 403f53 6705->6706 6707 403f5c 6705->6707 6708 403f07 4 API calls 6706->6708 6708->6707 5338 40ac4f 5339 40abc1 5338->5339 5342 40abed 5339->5342 5350 4094d8 5339->5350 5341 40ac06 5343 40ac1a 5341->5343 5344 40ac0f DestroyWindow 5341->5344 5342->5341 5345 40ac00 RemoveDirectoryA 5342->5345 5346 40ac42 5343->5346 5358 40357c 5343->5358 5344->5343 5345->5341 5348 40ac38 5349 4025ac 4 API calls 5348->5349 5349->5346 5351 409532 5350->5351 5355 4094eb 5350->5355 5351->5342 5352 4094f3 Sleep 5352->5355 5353 409503 Sleep 5353->5355 5355->5351 5355->5352 5355->5353 5356 40951a GetLastError 5355->5356 5371 408fbc 5355->5371 5356->5351 5357 409524 GetLastError 5356->5357 5357->5351 5357->5355 5359 4035a0 5358->5359 5360 403591 5358->5360 5361 4035b1 5359->5361 5362 4035b8 5359->5362 5363 4035d0 5360->5363 5364 40359b 5360->5364 5368 4035b6 5360->5368 5365 403198 4 API calls 5361->5365 5366 4031b8 4 API calls 5362->5366 5363->5368 5369 40357c 4 API calls 5363->5369 5364->5359 5367 4035ec 5364->5367 5365->5368 5366->5368 5367->5368 5388 403554 5367->5388 5368->5348 5369->5363 5379 408f70 5371->5379 5373 408fd2 5374 408fd6 5373->5374 5375 408ff2 DeleteFileA GetLastError 5373->5375 5374->5355 5376 409010 5375->5376 5385 408fac 5376->5385 5380 408f7a 5379->5380 5381 408f7e 5379->5381 5380->5373 5382 408fa0 SetLastError 5381->5382 5383 408f87 Wow64DisableWow64FsRedirection 5381->5383 5384 408f9b 5382->5384 5383->5384 5384->5373 5386 408fb1 Wow64RevertWow64FsRedirection 5385->5386 5387 408fbb 5385->5387 5386->5387 5387->5355 5389 403566 5388->5389 5391 403578 5389->5391 5392 403604 5389->5392 5391->5367 5393 40357c 5392->5393 5396 40359b 5393->5396 5399 4035d0 5393->5399 5400 4035a0 5393->5400 5402 4035b6 5393->5402 5394 4035b1 5397 403198 4 API calls 5394->5397 5395 4035b8 5398 4031b8 4 API calls 5395->5398 5396->5400 5401 4035ec 5396->5401 5397->5402 5398->5402 5399->5402 5403 40357c 4 API calls 5399->5403 5400->5394 5400->5395 5401->5402 5404 403554 4 API calls 5401->5404 5402->5389 5403->5399 5404->5401 6249 403a52 6250 403a74 6249->6250 6251 403a5a WriteFile 6249->6251 6251->6250 6252 403a78 GetLastError 6251->6252 6252->6250 6253 402654 6254 403154 4 API calls 6253->6254 6255 402614 6254->6255 6256 402632 6255->6256 6257 403154 4 API calls 6255->6257 6257->6256 6258 40ac56 6259 40ac5d 6258->6259 6261 40ac88 6258->6261 6268 409448 6259->6268 6263 403198 4 API calls 6261->6263 6262 40ac62 6262->6261 6265 40ac80 MessageBoxA 6262->6265 6264 40acc0 6263->6264 6266 403198 4 API calls 6264->6266 6265->6261 6267 40acc8 6266->6267 6269 409454 GetCurrentProcess OpenProcessToken 6268->6269 6270 4094af ExitWindowsEx 6268->6270 6271 409466 6269->6271 6272 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6269->6272 6270->6271 6271->6262 6272->6270 6272->6271 6717 40995e 6719 409960 6717->6719 6718 409982 6719->6718 6720 40999e CallWindowProcA 6719->6720 6720->6718 4981 409960 4982 409982 4981->4982 4984 40996f 4981->4984 4983 40999e CallWindowProcA 4983->4982 4984->4982 4984->4983 6721 405160 6722 405173 6721->6722 6723 404e58 33 API calls 6722->6723 6724 405187 6723->6724 6273 402e64 6274 402e69 6273->6274 6275 402e7a RtlUnwind 6274->6275 6276 402e5e 6274->6276 6277 402e9d 6275->6277 5327 40766c SetFilePointer 5328 4076a3 5327->5328 5329 407693 GetLastError 5327->5329 5329->5328 5330 40769c 5329->5330 5331 40748c 35 API calls 5330->5331 5331->5328 6290 40667c IsDBCSLeadByte 6291 406694 6290->6291 6737 403f7d 6738 403fa2 6737->6738 6741 403f84 6737->6741 6740 403e8e 4 API calls 6738->6740 6738->6741 6739 403f8c 6740->6741 6741->6739 6742 402674 4 API calls 6741->6742 6743 403fca 6742->6743 4985 403d02 4987 403d12 4985->4987 4986 403ddf ExitProcess 4987->4986 4988 403db8 4987->4988 4992 403dea 4987->4992 4995 403da4 4987->4995 4996 403d8f MessageBoxA 4987->4996 5001 403cc8 4988->5001 4991 403cc8 4 API calls 4993 403dcc 4991->4993 5005 4019dc 4993->5005 5017 403fe4 4995->5017 4996->4988 4997 403dd1 4997->4986 4997->4992 5002 403cd6 5001->5002 5004 403ceb 5002->5004 5021 402674 5002->5021 5004->4991 5006 401abb 5005->5006 5007 4019ed 5005->5007 5006->4997 5008 401a04 RtlEnterCriticalSection 5007->5008 5009 401a0e LocalFree 5007->5009 5008->5009 5010 401a41 5009->5010 5011 401a2f VirtualFree 5010->5011 5012 401a49 5010->5012 5011->5010 5013 401a70 LocalFree 5012->5013 5014 401a87 5012->5014 5013->5013 5013->5014 5015 401aa9 RtlDeleteCriticalSection 5014->5015 5016 401a9f RtlLeaveCriticalSection 5014->5016 5015->4997 5016->5015 5018 403fe8 5017->5018 5037 403f07 5018->5037 5020 404006 5024 403154 5021->5024 5023 40267a 5023->5004 5025 403164 5024->5025 5026 40318c TlsGetValue 5024->5026 5025->5023 5027 403196 5026->5027 5028 40316f 5026->5028 5027->5023 5032 40310c 5028->5032 5030 403174 TlsGetValue 5031 403184 5030->5031 5031->5023 5033 403120 LocalAlloc 5032->5033 5034 403116 5032->5034 5035 40313e TlsSetValue 5033->5035 5036 403132 5033->5036 5034->5033 5035->5036 5036->5030 5040 403f09 5037->5040 5039 403f3c 5039->5020 5041 403154 4 API calls 5040->5041 5043 403e9c 5040->5043 5046 403f3d 5040->5046 5060 403e9c 5040->5060 5041->5040 5042 403ef2 5045 402674 4 API calls 5042->5045 5043->5039 5043->5042 5048 403ea9 5043->5048 5051 403e8e 5043->5051 5050 403ecf 5045->5050 5046->5020 5049 402674 4 API calls 5048->5049 5048->5050 5049->5050 5050->5020 5052 403e4c 5051->5052 5053 403e62 5052->5053 5054 403e7b 5052->5054 5057 403e67 5052->5057 5056 403cc8 4 API calls 5053->5056 5055 402674 4 API calls 5054->5055 5058 403e78 5055->5058 5056->5057 5057->5058 5059 402674 4 API calls 5057->5059 5058->5042 5058->5048 5059->5058 5061 403ed7 5060->5061 5067 403ea9 5060->5067 5062 403ef2 5061->5062 5064 403e8e 4 API calls 5061->5064 5065 402674 4 API calls 5062->5065 5063 403ecf 5063->5040 5066 403ee6 5064->5066 5065->5063 5066->5062 5066->5067 5067->5063 5068 402674 4 API calls 5067->5068 5068->5063 6296 404206 6297 4041cc 6296->6297 6300 40420a 6296->6300 6298 403154 4 API calls 6301 404323 6298->6301 6299 404282 6300->6298 6300->6299 6302 402c08 6303 402c82 6302->6303 6306 402c19 6302->6306 6304 402c56 RtlUnwind 6305 403154 4 API calls 6304->6305 6305->6303 6306->6303 6306->6304 6309 402b28 6306->6309 6310 402b31 RaiseException 6309->6310 6311 402b47 6309->6311 6310->6311 6311->6304 6312 408c10 6313 408c17 6312->6313 6314 403198 4 API calls 6313->6314 6322 408cb1 6314->6322 6315 408cdc 6316 4031b8 4 API calls 6315->6316 6317 408d69 6316->6317 6318 408cc8 6320 4032fc 18 API calls 6318->6320 6319 403278 18 API calls 6319->6322 6320->6315 6321 4032fc 18 API calls 6321->6322 6322->6315 6322->6318 6322->6319 6322->6321 6327 40a814 6328 40a839 6327->6328 6329 40993c 29 API calls 6328->6329 6332 40a83e 6329->6332 6330 40a891 6361 4026c4 GetSystemTime 6330->6361 6332->6330 6335 408dd8 18 API calls 6332->6335 6333 40a896 6334 409330 46 API calls 6333->6334 6336 40a89e 6334->6336 6337 40a86d 6335->6337 6338 4031e8 18 API calls 6336->6338 6341 40a875 MessageBoxA 6337->6341 6339 40a8ab 6338->6339 6340 406928 19 API calls 6339->6340 6342 40a8b8 6340->6342 6341->6330 6343 40a882 6341->6343 6344 4066c0 19 API calls 6342->6344 6345 405864 19 API calls 6343->6345 6346 40a8c8 6344->6346 6345->6330 6347 406638 19 API calls 6346->6347 6348 40a8d9 6347->6348 6349 403340 18 API calls 6348->6349 6350 40a8e7 6349->6350 6351 4031e8 18 API calls 6350->6351 6352 40a8f7 6351->6352 6353 4074e0 37 API calls 6352->6353 6354 40a936 6353->6354 6355 402594 18 API calls 6354->6355 6356 40a956 6355->6356 6357 407a28 19 API calls 6356->6357 6358 40a998 6357->6358 6359 407cb8 35 API calls 6358->6359 6360 40a9bf 6359->6360 6361->6333 5995 407017 5996 407008 SetErrorMode 5995->5996 6362 403018 6363 403070 6362->6363 6364 403025 6362->6364 6365 40302a RtlUnwind 6364->6365 6366 40304e 6365->6366 6368 402f78 6366->6368 6369 402be8 6366->6369 6370 402bf1 RaiseException 6369->6370 6371 402c04 6369->6371 6370->6371 6371->6363 6376 40901e 6377 409010 6376->6377 6378 408fac Wow64RevertWow64FsRedirection 6377->6378 6379 409018 6378->6379 6380 409020 SetLastError 6381 409029 6380->6381 6396 403a28 ReadFile 6397 403a46 6396->6397 6398 403a49 GetLastError 6396->6398 5332 40762c ReadFile 5333 407663 5332->5333 5334 40764c 5332->5334 5335 407652 GetLastError 5334->5335 5336 40765c 5334->5336 5335->5333 5335->5336 5337 40748c 35 API calls 5336->5337 5337->5333 6754 40712e 6755 407118 6754->6755 6756 403198 4 API calls 6755->6756 6757 407120 6756->6757 6758 403198 4 API calls 6757->6758 6759 407128 6758->6759 5405 40a82f 5442 409ae8 5405->5442 5407 40a834 5408 40a839 5407->5408 5532 402f24 5407->5532 5449 40993c 5408->5449 5411 40a891 5454 4026c4 GetSystemTime 5411->5454 5413 40a83e 5413->5411 5537 408dd8 5413->5537 5414 40a896 5455 409330 5414->5455 5418 40a86d 5422 40a875 MessageBoxA 5418->5422 5419 4031e8 18 API calls 5420 40a8ab 5419->5420 5473 406928 5420->5473 5422->5411 5424 40a882 5422->5424 5540 405864 5424->5540 5429 40a8d9 5500 403340 5429->5500 5431 40a8e7 5432 4031e8 18 API calls 5431->5432 5433 40a8f7 5432->5433 5515 4074e0 5433->5515 5436 402594 18 API calls 5437 40a956 5436->5437 5522 407a28 5437->5522 5439 40a998 5544 407cb8 5439->5544 5441 40a9bf 5443 409af1 5442->5443 5444 409b09 5442->5444 5446 405890 18 API calls 5443->5446 5445 405890 18 API calls 5444->5445 5447 409b1a 5445->5447 5448 409b03 5446->5448 5447->5407 5448->5407 5550 40953c 5449->5550 5454->5414 5464 409350 5455->5464 5458 409375 CreateDirectoryA 5459 4093ed 5458->5459 5460 40937f GetLastError 5458->5460 5461 40322c 4 API calls 5459->5461 5460->5464 5462 4093f7 5461->5462 5466 4031b8 4 API calls 5462->5466 5463 408dd8 18 API calls 5463->5464 5464->5458 5464->5463 5468 407284 19 API calls 5464->5468 5472 405890 18 API calls 5464->5472 5670 406cf4 5464->5670 5693 409224 5464->5693 5712 404c94 5464->5712 5715 408da8 5464->5715 5467 409411 5466->5467 5469 4031b8 4 API calls 5467->5469 5468->5464 5470 40941e 5469->5470 5470->5419 5472->5464 5824 406820 5473->5824 5476 403454 18 API calls 5477 40694a 5476->5477 5478 4066c0 5477->5478 5829 4068e4 5478->5829 5481 4066f0 5483 403340 18 API calls 5481->5483 5482 4066fe 5484 403454 18 API calls 5482->5484 5486 4066fc 5483->5486 5485 406711 5484->5485 5487 403340 18 API calls 5485->5487 5488 403198 4 API calls 5486->5488 5487->5486 5489 406733 5488->5489 5490 406638 5489->5490 5491 406642 5490->5491 5492 406665 5490->5492 5835 406950 5491->5835 5494 40322c 4 API calls 5492->5494 5496 40666e 5494->5496 5495 406649 5495->5492 5497 406654 5495->5497 5496->5429 5498 403340 18 API calls 5497->5498 5499 406662 5498->5499 5499->5429 5501 403344 5500->5501 5502 4033a5 5500->5502 5503 4031e8 5501->5503 5504 40334c 5501->5504 5508 403254 18 API calls 5503->5508 5510 4031fc 5503->5510 5504->5502 5505 40335b 5504->5505 5509 4031e8 18 API calls 5504->5509 5507 403254 18 API calls 5505->5507 5506 403228 5506->5431 5512 403375 5507->5512 5508->5510 5509->5505 5510->5506 5511 4025ac 4 API calls 5510->5511 5511->5506 5513 4031e8 18 API calls 5512->5513 5514 4033a1 5513->5514 5514->5431 5516 4074ea 5515->5516 5841 407576 5516->5841 5844 407578 5516->5844 5517 407516 5518 40752a 5517->5518 5519 40748c 35 API calls 5517->5519 5518->5436 5519->5518 5523 407a35 5522->5523 5524 405890 18 API calls 5523->5524 5525 407a89 5523->5525 5524->5525 5526 407918 InterlockedExchange 5525->5526 5527 407a9b 5526->5527 5528 405890 18 API calls 5527->5528 5529 407ab1 5527->5529 5528->5529 5530 405890 18 API calls 5529->5530 5531 407af4 5529->5531 5530->5531 5531->5439 5533 403154 4 API calls 5532->5533 5534 402f29 5533->5534 5847 402bcc 5534->5847 5536 402f51 5536->5536 5538 408da8 18 API calls 5537->5538 5539 408df4 5538->5539 5539->5418 5541 405869 5540->5541 5542 405940 19 API calls 5541->5542 5543 40587b 5542->5543 5543->5543 5545 407cd3 5544->5545 5547 407cc8 5544->5547 5850 407c5c 5545->5850 5547->5441 5549 405890 18 API calls 5549->5547 5557 40955b 5550->5557 5551 409590 5553 40959d GetUserDefaultLangID 5551->5553 5558 409592 5551->5558 5552 409594 5568 407024 GetModuleHandleA GetProcAddress 5552->5568 5553->5558 5556 40956f 5562 4098cc 5556->5562 5557->5551 5557->5552 5557->5556 5558->5556 5559 4095cb GetACP 5558->5559 5560 4095ef 5558->5560 5559->5556 5559->5558 5560->5556 5561 409615 GetACP 5560->5561 5561->5556 5561->5560 5563 40990e 5562->5563 5564 4098d4 5562->5564 5563->5413 5564->5563 5565 403420 18 API calls 5564->5565 5566 409908 5565->5566 5647 408e80 5566->5647 5569 407067 5568->5569 5570 40705e 5568->5570 5571 407070 5569->5571 5572 4070a8 5569->5572 5579 403198 4 API calls 5570->5579 5589 406f68 5571->5589 5573 406f68 RegOpenKeyExA 5572->5573 5577 4070c1 5573->5577 5575 407089 5576 4070de 5575->5576 5592 406f5c 5575->5592 5595 40322c 5576->5595 5577->5576 5580 406f5c 20 API calls 5577->5580 5583 407120 5579->5583 5584 4070d5 RegCloseKey 5580->5584 5586 403198 4 API calls 5583->5586 5584->5576 5588 407128 5586->5588 5588->5558 5590 406f73 5589->5590 5591 406f79 RegOpenKeyExA 5589->5591 5590->5591 5591->5575 5613 406e10 5592->5613 5597 403230 5595->5597 5596 403252 5599 4032fc 5596->5599 5597->5596 5598 4025ac 4 API calls 5597->5598 5598->5596 5600 403300 5599->5600 5601 40333f 5599->5601 5602 4031e8 5600->5602 5603 40330a 5600->5603 5601->5570 5609 403254 18 API calls 5602->5609 5610 4031fc 5602->5610 5604 403334 5603->5604 5605 40331d 5603->5605 5606 4034f0 18 API calls 5604->5606 5608 4034f0 18 API calls 5605->5608 5612 403322 5606->5612 5607 403228 5607->5570 5608->5612 5609->5610 5610->5607 5611 4025ac 4 API calls 5610->5611 5611->5607 5612->5570 5614 406e36 RegQueryValueExA 5613->5614 5615 406e59 5614->5615 5620 406e7b 5614->5620 5616 406e73 5615->5616 5615->5620 5621 403278 18 API calls 5615->5621 5630 403420 5615->5630 5618 403198 4 API calls 5616->5618 5617 403198 4 API calls 5619 406f47 RegCloseKey 5617->5619 5618->5620 5619->5576 5620->5617 5621->5615 5623 406eb0 RegQueryValueExA 5623->5614 5624 406ecc 5623->5624 5624->5620 5634 4034f0 5624->5634 5627 406f20 5628 4031e8 18 API calls 5627->5628 5628->5620 5629 403420 18 API calls 5629->5627 5631 403426 5630->5631 5633 403437 5630->5633 5632 403254 18 API calls 5631->5632 5631->5633 5632->5633 5633->5623 5635 4034fd 5634->5635 5642 40352d 5634->5642 5637 403526 5635->5637 5640 403509 5635->5640 5636 403198 4 API calls 5639 403517 5636->5639 5638 403254 18 API calls 5637->5638 5638->5642 5639->5627 5639->5629 5643 4025c4 5640->5643 5642->5636 5645 4025ca 5643->5645 5644 4025dc 5644->5639 5644->5644 5645->5644 5646 403154 4 API calls 5645->5646 5646->5644 5648 408e8e 5647->5648 5650 408ea6 5648->5650 5660 408e18 5648->5660 5651 408e18 18 API calls 5650->5651 5652 408eca 5650->5652 5651->5652 5663 407918 5652->5663 5655 408e18 18 API calls 5657 408ef8 5655->5657 5656 408e18 18 API calls 5656->5657 5657->5656 5658 403278 18 API calls 5657->5658 5659 408f27 5657->5659 5658->5657 5659->5563 5661 405890 18 API calls 5660->5661 5662 408e29 5661->5662 5662->5650 5666 4078c4 5663->5666 5667 4078d6 5666->5667 5668 4078e7 5666->5668 5669 4078db InterlockedExchange 5667->5669 5668->5655 5668->5657 5669->5668 5719 406a58 5670->5719 5674 406a58 19 API calls 5676 406d36 5674->5676 5675 406d26 5675->5674 5677 406d72 5675->5677 5678 406d42 5676->5678 5680 406a34 21 API calls 5676->5680 5727 406888 5677->5727 5678->5677 5681 406d67 5678->5681 5684 406a58 19 API calls 5678->5684 5680->5678 5681->5677 5739 406cc8 GetWindowsDirectoryA 5681->5739 5686 406d5b 5684->5686 5685 406638 19 API calls 5687 406d87 5685->5687 5686->5681 5688 406a34 21 API calls 5686->5688 5689 40322c 4 API calls 5687->5689 5688->5681 5690 406d91 5689->5690 5691 4031b8 4 API calls 5690->5691 5692 406dab 5691->5692 5692->5464 5694 409244 5693->5694 5695 406638 19 API calls 5694->5695 5696 40925d 5695->5696 5697 40322c 4 API calls 5696->5697 5704 409268 5697->5704 5698 406978 20 API calls 5698->5704 5700 408dd8 18 API calls 5700->5704 5702 405890 18 API calls 5702->5704 5704->5698 5704->5700 5704->5702 5705 4092e4 5704->5705 5781 4091b0 5704->5781 5789 4033b4 5704->5789 5795 409034 5704->5795 5706 40322c 4 API calls 5705->5706 5707 4092ef 5706->5707 5708 4031b8 4 API calls 5707->5708 5709 409309 5708->5709 5710 403198 4 API calls 5709->5710 5711 409311 5710->5711 5711->5464 5713 4051a8 33 API calls 5712->5713 5714 404cb2 5713->5714 5714->5464 5716 408dc8 5715->5716 5814 408c80 5716->5814 5720 4034f0 18 API calls 5719->5720 5721 406a6b 5720->5721 5722 406a82 GetEnvironmentVariableA 5721->5722 5726 406a95 5721->5726 5741 406dec 5721->5741 5722->5721 5723 406a8e 5722->5723 5724 403198 4 API calls 5723->5724 5724->5726 5726->5675 5736 406a34 5726->5736 5745 403414 5727->5745 5730 4068b7 5731 4068ce 5730->5731 5732 4068bf 5730->5732 5733 40322c 4 API calls 5731->5733 5734 403278 18 API calls 5732->5734 5735 4068cc 5733->5735 5734->5735 5735->5685 5747 4069dc 5736->5747 5740 406ce9 5739->5740 5740->5677 5742 406dfa 5741->5742 5743 4034f0 18 API calls 5742->5743 5744 406e08 5743->5744 5744->5721 5746 403418 GetFullPathNameA 5745->5746 5746->5730 5746->5731 5754 406978 5747->5754 5749 4069fe 5750 406a06 GetFileAttributesA 5749->5750 5751 406a1b 5750->5751 5752 403198 4 API calls 5751->5752 5753 406a23 5752->5753 5753->5675 5764 406744 5754->5764 5756 4069b0 5759 4069c6 5756->5759 5760 4069bb 5756->5760 5758 406989 5758->5756 5771 406970 CharPrevA 5758->5771 5772 403454 5759->5772 5761 40322c 4 API calls 5760->5761 5763 4069c4 5761->5763 5763->5749 5767 406755 5764->5767 5765 4067b9 5766 406680 IsDBCSLeadByte 5765->5766 5768 4067b4 5765->5768 5766->5768 5767->5765 5770 406773 5767->5770 5768->5758 5770->5768 5779 406680 IsDBCSLeadByte 5770->5779 5771->5758 5773 403486 5772->5773 5774 403459 5772->5774 5775 403198 4 API calls 5773->5775 5774->5773 5777 40346d 5774->5777 5776 40347c 5775->5776 5776->5763 5778 403278 18 API calls 5777->5778 5778->5776 5780 406694 5779->5780 5780->5770 5782 403198 4 API calls 5781->5782 5784 4091d1 5782->5784 5786 4091fe 5784->5786 5804 4032a8 5784->5804 5807 403494 5784->5807 5787 403198 4 API calls 5786->5787 5788 409213 5787->5788 5788->5704 5790 4033bc 5789->5790 5791 403254 18 API calls 5790->5791 5792 4033cf 5791->5792 5793 4031e8 18 API calls 5792->5793 5794 4033f7 5793->5794 5796 408f70 2 API calls 5795->5796 5797 40904a 5796->5797 5798 40904e 5797->5798 5811 406a48 5797->5811 5798->5704 5801 409081 5802 408fac Wow64RevertWow64FsRedirection 5801->5802 5803 409089 5802->5803 5803->5704 5805 403278 18 API calls 5804->5805 5806 4032b5 5805->5806 5806->5784 5808 403498 5807->5808 5810 4034c3 5807->5810 5809 4034f0 18 API calls 5808->5809 5809->5810 5810->5784 5812 4069dc 21 API calls 5811->5812 5813 406a52 GetLastError 5812->5813 5813->5801 5815 403198 4 API calls 5814->5815 5817 408cb1 5814->5817 5815->5817 5816 4031b8 4 API calls 5818 408d69 5816->5818 5819 408cc8 5817->5819 5820 403278 18 API calls 5817->5820 5822 408cdc 5817->5822 5823 4032fc 18 API calls 5817->5823 5818->5464 5821 4032fc 18 API calls 5819->5821 5820->5817 5821->5822 5822->5816 5823->5817 5825 406744 IsDBCSLeadByte 5824->5825 5827 406835 5825->5827 5826 40687f 5826->5476 5827->5826 5828 406680 IsDBCSLeadByte 5827->5828 5828->5827 5830 4068f3 5829->5830 5831 406820 IsDBCSLeadByte 5830->5831 5833 4068fe 5831->5833 5832 4066ea 5832->5481 5832->5482 5833->5832 5834 406680 IsDBCSLeadByte 5833->5834 5834->5833 5836 406957 5835->5836 5837 40695b 5835->5837 5836->5495 5840 406970 CharPrevA 5837->5840 5839 40696c 5839->5495 5840->5839 5842 407578 5841->5842 5843 4075b7 CreateFileA 5842->5843 5843->5517 5845 403414 5844->5845 5846 4075b7 CreateFileA 5845->5846 5846->5517 5848 402bd5 RaiseException 5847->5848 5849 402be6 5847->5849 5848->5849 5849->5536 5851 407c70 5850->5851 5852 407caf 5850->5852 5851->5852 5854 407bac 5851->5854 5852->5547 5852->5549 5855 407bb7 5854->5855 5856 407bc8 5854->5856 5857 405890 18 API calls 5855->5857 5866 4074a0 5856->5866 5857->5856 5860 4074a0 34 API calls 5861 407bfd 5860->5861 5862 407918 InterlockedExchange 5861->5862 5863 407c12 5862->5863 5864 407c28 5863->5864 5865 405890 18 API calls 5863->5865 5864->5851 5865->5864 5867 4074b4 5866->5867 5868 4074c4 5867->5868 5869 4073ec 34 API calls 5867->5869 5868->5860 5869->5868 6760 408f30 6763 408dfc 6760->6763 6764 408e05 6763->6764 6765 403198 4 API calls 6764->6765 6766 408e13 6764->6766 6765->6764 6767 403932 6768 403924 6767->6768 6769 40374c VariantClear 6768->6769 6770 40392c 6769->6770 5069 4075c4 SetFilePointer 5070 4075f7 5069->5070 5071 4075e7 GetLastError 5069->5071 5071->5070 5072 4075f0 5071->5072 5074 40748c GetLastError 5072->5074 5077 4073ec 5074->5077 5086 407284 FormatMessageA 5077->5086 5080 407434 5093 405890 5080->5093 5083 407443 5097 403198 5083->5097 5087 4072aa 5086->5087 5101 403278 5087->5101 5090 405194 5180 4051a8 5090->5180 5094 405897 5093->5094 5095 4031e8 18 API calls 5094->5095 5096 4058af 5095->5096 5096->5083 5098 4031b7 5097->5098 5099 40319e 5097->5099 5098->5070 5099->5098 5308 4025ac 5099->5308 5106 403254 5101->5106 5103 403288 5104 403198 4 API calls 5103->5104 5105 4032a0 5104->5105 5105->5080 5105->5090 5107 403274 5106->5107 5108 403258 5106->5108 5107->5103 5111 402594 5108->5111 5110 403261 5110->5103 5112 402598 5111->5112 5114 4025a2 5111->5114 5117 401fd4 5112->5117 5113 40259e 5113->5114 5115 403154 4 API calls 5113->5115 5114->5110 5114->5114 5115->5114 5118 401fe8 5117->5118 5119 401fed 5117->5119 5128 401918 RtlInitializeCriticalSection 5118->5128 5121 402012 RtlEnterCriticalSection 5119->5121 5122 40201c 5119->5122 5127 401ff1 5119->5127 5121->5122 5122->5127 5135 401ee0 5122->5135 5125 402147 5125->5113 5126 40213d RtlLeaveCriticalSection 5126->5125 5127->5113 5129 40193c RtlEnterCriticalSection 5128->5129 5130 401946 5128->5130 5129->5130 5131 401964 LocalAlloc 5130->5131 5132 40197e 5131->5132 5133 4019c3 RtlLeaveCriticalSection 5132->5133 5134 4019cd 5132->5134 5133->5134 5134->5119 5138 401ef0 5135->5138 5136 401f1c 5140 401f40 5136->5140 5146 401d00 5136->5146 5138->5136 5138->5140 5141 401e58 5138->5141 5140->5125 5140->5126 5150 4016d8 5141->5150 5144 401e75 5144->5138 5147 401d4e 5146->5147 5148 401d1e 5146->5148 5147->5148 5167 401c68 5147->5167 5148->5140 5153 4016f4 5150->5153 5151 401430 LocalAlloc VirtualAlloc VirtualFree 5151->5153 5152 4016fe 5154 4015c4 VirtualAlloc 5152->5154 5153->5151 5153->5152 5155 40175b 5153->5155 5156 40132c LocalAlloc 5153->5156 5158 40174f 5153->5158 5157 40170a 5154->5157 5155->5144 5160 401dcc 5155->5160 5156->5153 5157->5155 5159 40150c VirtualFree 5158->5159 5159->5155 5161 401d80 9 API calls 5160->5161 5162 401de0 5161->5162 5163 40132c LocalAlloc 5162->5163 5165 401df0 5163->5165 5164 401df8 5164->5144 5165->5164 5166 401b44 9 API calls 5165->5166 5166->5164 5168 401c7a 5167->5168 5169 401c9d 5168->5169 5170 401caf 5168->5170 5171 40188c LocalAlloc VirtualFree VirtualFree 5169->5171 5172 40188c LocalAlloc VirtualFree VirtualFree 5170->5172 5173 401cad 5171->5173 5172->5173 5174 401b44 9 API calls 5173->5174 5179 401cc5 5173->5179 5175 401cd4 5174->5175 5176 401cee 5175->5176 5177 401b98 9 API calls 5175->5177 5178 4013a0 LocalAlloc 5176->5178 5177->5176 5178->5179 5179->5148 5181 4051c5 5180->5181 5188 404e58 5181->5188 5184 4051f1 5186 403278 18 API calls 5184->5186 5187 4051a3 5186->5187 5187->5080 5190 404e73 5188->5190 5189 404e85 5189->5184 5193 404be4 5189->5193 5190->5189 5196 404f7a 5190->5196 5203 404e4c 5190->5203 5300 405940 5193->5300 5195 404bf5 5195->5184 5197 404f8b 5196->5197 5200 404fd9 5196->5200 5197->5200 5201 40505f 5197->5201 5199 404ff7 5199->5190 5200->5199 5206 404df4 5200->5206 5201->5199 5210 404e38 5201->5210 5204 403198 4 API calls 5203->5204 5205 404e56 5204->5205 5205->5190 5207 404e02 5206->5207 5213 404bfc 5207->5213 5209 404e30 5209->5200 5239 4039a4 5210->5239 5216 4059b0 5213->5216 5215 404c15 5215->5209 5217 4059be 5216->5217 5226 404cdc LoadStringA 5217->5226 5220 405194 33 API calls 5221 4059f6 5220->5221 5229 4031e8 5221->5229 5227 403278 18 API calls 5226->5227 5228 404d09 5227->5228 5228->5220 5230 4031ec 5229->5230 5233 4031fc 5229->5233 5232 403254 18 API calls 5230->5232 5230->5233 5231 403228 5235 4031b8 5231->5235 5232->5233 5233->5231 5234 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5233->5234 5234->5231 5237 4031be 5235->5237 5236 4031e3 5236->5215 5237->5236 5238 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5237->5238 5238->5237 5240 4039ab 5239->5240 5245 4038b4 5240->5245 5242 4039cb 5243 403198 4 API calls 5242->5243 5244 4039d2 5243->5244 5244->5199 5246 4038d5 5245->5246 5247 4038c8 5245->5247 5249 403934 5246->5249 5250 4038db 5246->5250 5273 403780 5247->5273 5251 403993 5249->5251 5252 40393b 5249->5252 5253 4038e1 5250->5253 5254 4038ee 5250->5254 5255 4037f4 3 API calls 5251->5255 5256 403941 5252->5256 5257 40394b 5252->5257 5280 403894 5253->5280 5259 403894 6 API calls 5254->5259 5262 4038d0 5255->5262 5295 403864 5256->5295 5261 4037f4 3 API calls 5257->5261 5263 4038fc 5259->5263 5264 40395d 5261->5264 5262->5242 5285 4037f4 5263->5285 5267 403864 23 API calls 5264->5267 5266 403917 5291 40374c 5266->5291 5268 403976 5267->5268 5271 40374c VariantClear 5268->5271 5270 40392c 5270->5242 5272 40398b 5271->5272 5272->5242 5274 4037f0 5273->5274 5279 403744 5273->5279 5274->5262 5275 4037ab 5275->5262 5276 403793 VariantClear 5276->5279 5277 4037dc VariantCopyInd 5277->5274 5277->5279 5278 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5278->5279 5279->5273 5279->5275 5279->5276 5279->5277 5279->5278 5281 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5280->5281 5282 4038a0 5281->5282 5283 40374c VariantClear 5282->5283 5284 4038a9 5283->5284 5284->5262 5286 403845 VariantChangeTypeEx 5285->5286 5287 40380a VariantChangeTypeEx 5285->5287 5289 403832 5286->5289 5288 403826 5287->5288 5290 40374c VariantClear 5288->5290 5289->5266 5290->5289 5292 403766 5291->5292 5293 403759 5291->5293 5292->5270 5293->5292 5294 403779 VariantClear 5293->5294 5294->5270 5296 40369c 22 API calls 5295->5296 5297 40387b 5296->5297 5298 40374c VariantClear 5297->5298 5299 403882 5298->5299 5299->5262 5301 40594c 5300->5301 5302 404cdc 19 API calls 5301->5302 5303 405972 5302->5303 5304 4031e8 18 API calls 5303->5304 5305 40597d 5304->5305 5306 403198 4 API calls 5305->5306 5307 405992 5306->5307 5307->5195 5309 4025b0 5308->5309 5311 4025ba 5308->5311 5310 403154 4 API calls 5309->5310 5309->5311 5310->5311 5311->5098 6407 4076c8 WriteFile 6408 4076e8 6407->6408 6409 4076ef 6407->6409 6410 40748c 35 API calls 6408->6410 6411 407700 6409->6411 6412 4073ec 34 API calls 6409->6412 6410->6409 6412->6411 6413 402ccc 6416 402cfe 6413->6416 6417 402cdd 6413->6417 6414 402d88 RtlUnwind 6415 403154 4 API calls 6414->6415 6415->6416 6417->6414 6417->6416 6418 402b28 RaiseException 6417->6418 6419 402d7f 6418->6419 6419->6414 6779 403fcd 6780 403f07 4 API calls 6779->6780 6781 403fd6 6780->6781 6782 403e9c 4 API calls 6781->6782 6783 403fe2 6782->6783 6426 4024d0 6427 4024e4 6426->6427 6428 4024e9 6426->6428 6431 401918 4 API calls 6427->6431 6429 402518 6428->6429 6430 40250e RtlEnterCriticalSection 6428->6430 6433 4024ed 6428->6433 6441 402300 6429->6441 6430->6429 6431->6428 6434 402525 6437 402581 6434->6437 6438 402577 RtlLeaveCriticalSection 6434->6438 6436 401fd4 14 API calls 6439 402531 6436->6439 6438->6437 6439->6434 6451 40215c 6439->6451 6442 402314 6441->6442 6444 4023b8 6442->6444 6445 402335 6442->6445 6443 402344 6443->6434 6443->6436 6444->6443 6449 402455 6444->6449 6468 401d80 6444->6468 6472 401e84 6444->6472 6445->6443 6465 401b74 6445->6465 6449->6443 6450 401d00 9 API calls 6449->6450 6450->6443 6452 40217a 6451->6452 6453 402175 6451->6453 6455 4021ab RtlEnterCriticalSection 6452->6455 6456 40217e 6452->6456 6463 4021b5 6452->6463 6454 401918 4 API calls 6453->6454 6454->6452 6455->6463 6456->6434 6457 4021c1 6459 4022e3 RtlLeaveCriticalSection 6457->6459 6460 4022ed 6457->6460 6458 402244 6458->6456 6461 401d80 7 API calls 6458->6461 6459->6460 6460->6434 6461->6456 6462 402270 6462->6457 6464 401d00 7 API calls 6462->6464 6463->6457 6463->6458 6463->6462 6464->6457 6466 40215c 9 API calls 6465->6466 6467 401b95 6466->6467 6467->6443 6469 401d92 6468->6469 6470 401d89 6468->6470 6469->6444 6470->6469 6471 401b74 9 API calls 6470->6471 6471->6469 6477 401768 6472->6477 6474 401e99 6475 401ea6 6474->6475 6476 401dcc 9 API calls 6474->6476 6475->6444 6476->6475 6478 401787 6477->6478 6479 40183b 6478->6479 6480 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6478->6480 6481 40132c LocalAlloc 6478->6481 6483 401821 6478->6483 6485 4017d6 6478->6485 6486 4017e7 6479->6486 6492 4015c4 6479->6492 6480->6478 6481->6478 6484 40150c VirtualFree 6483->6484 6484->6486 6488 40150c 6485->6488 6486->6474 6491 40153b 6488->6491 6489 401594 6489->6486 6490 401568 VirtualFree 6490->6491 6491->6489 6491->6490 6494 40160a 6492->6494 6493 40163a 6493->6486 6494->6493 6495 401626 VirtualAlloc 6494->6495 6495->6493 6495->6494 6496 4028d2 6497 4028da 6496->6497 6498 403554 4 API calls 6497->6498 6499 4028ef 6497->6499 6498->6497 6500 4025ac 4 API calls 6499->6500 6501 4028f4 6500->6501 6784 4019d3 6785 4019ba 6784->6785 6786 4019c3 RtlLeaveCriticalSection 6785->6786 6787 4019cd 6785->6787 6786->6787 5949 407fd4 5950 407fe6 5949->5950 5952 407fed 5949->5952 5960 407f10 5950->5960 5954 408015 5952->5954 5955 408017 5952->5955 5958 408021 5952->5958 5953 40804e 5974 407e2c 5954->5974 5971 407d7c 5955->5971 5957 407d7c 33 API calls 5957->5953 5958->5953 5958->5957 5961 407f25 5960->5961 5962 407d7c 33 API calls 5961->5962 5963 407f34 5961->5963 5962->5963 5964 407f6e 5963->5964 5966 407d7c 33 API calls 5963->5966 5965 407f82 5964->5965 5967 407d7c 33 API calls 5964->5967 5970 407fae 5965->5970 5981 407eb8 5965->5981 5966->5964 5967->5965 5970->5952 5984 4058c4 5971->5984 5973 407d9e 5973->5958 5975 405194 33 API calls 5974->5975 5976 407e57 5975->5976 5992 407de4 5976->5992 5978 407e5f 5979 403198 4 API calls 5978->5979 5980 407e74 5979->5980 5980->5958 5982 407ec7 VirtualFree 5981->5982 5983 407ed9 VirtualAlloc 5981->5983 5982->5983 5983->5970 5986 4058d0 5984->5986 5985 405194 33 API calls 5987 4058fd 5985->5987 5986->5985 5988 4031e8 18 API calls 5987->5988 5989 405908 5988->5989 5990 403198 4 API calls 5989->5990 5991 40591d 5990->5991 5991->5973 5993 4058c4 33 API calls 5992->5993 5994 407e06 5993->5994 5994->5978 6502 405ad4 6503 405adc 6502->6503 6506 405ae4 6502->6506 6504 405ae2 6503->6504 6505 405aeb 6503->6505 6509 405a4c 6504->6509 6507 405940 19 API calls 6505->6507 6507->6506 6510 405a54 6509->6510 6511 405a6e 6510->6511 6512 403154 4 API calls 6510->6512 6513 405a73 6511->6513 6514 405a8a 6511->6514 6512->6510 6515 405940 19 API calls 6513->6515 6516 403154 4 API calls 6514->6516 6517 405a86 6515->6517 6518 405a8f 6516->6518 6520 403154 4 API calls 6517->6520 6519 4059b0 33 API calls 6518->6519 6519->6517 6521 405ab8 6520->6521 6522 403154 4 API calls 6521->6522 6523 405ac6 6522->6523 6523->6506 6230 40a9de 6231 40aa03 6230->6231 6232 407918 InterlockedExchange 6231->6232 6233 40aa2d 6232->6233 6234 40aa3d 6233->6234 6235 409ae8 18 API calls 6233->6235 6240 4076ac SetEndOfFile 6234->6240 6235->6234 6237 40aa59 6238 4025ac 4 API calls 6237->6238 6239 40aa90 6238->6239 6241 4076c3 6240->6241 6242 4076bc 6240->6242 6241->6237 6243 40748c 35 API calls 6242->6243 6243->6241 6791 402be9 RaiseException 6792 402c04 6791->6792 6534 402af2 6535 402afe 6534->6535 6538 402ed0 6535->6538 6539 403154 4 API calls 6538->6539 6541 402ee0 6539->6541 6540 402b03 6541->6540 6543 402b0c 6541->6543 6544 402b25 6543->6544 6545 402b15 RaiseException 6543->6545 6544->6540 6545->6544 5997 40a5f8 6040 4030dc 5997->6040 5999 40a60e 6043 4042e8 5999->6043 6001 40a613 6046 40457c GetModuleHandleA GetProcAddress 6001->6046 6005 40a61d 6054 4065c8 6005->6054 6007 40a622 6063 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 6007->6063 6016 40a665 6085 406c2c 6016->6085 6018 4031e8 18 API calls 6019 40a683 6018->6019 6020 4074e0 37 API calls 6019->6020 6021 40a69b 6020->6021 6099 409c34 FindResourceA 6021->6099 6024 409ae8 18 API calls 6026 40a710 6024->6026 6025 407918 InterlockedExchange 6027 40a6d2 6025->6027 6028 4074a0 34 API calls 6026->6028 6027->6024 6027->6026 6030 40a736 6028->6030 6029 40a751 6032 407a28 19 API calls 6029->6032 6030->6029 6031 409ae8 18 API calls 6030->6031 6031->6029 6033 40a776 6032->6033 6112 408b08 6033->6112 6037 40a7bc 6038 408b08 35 API calls 6037->6038 6039 40a7f5 6037->6039 6038->6037 6138 403094 6040->6138 6042 4030e1 GetModuleHandleA GetCommandLineA 6042->5999 6044 403154 4 API calls 6043->6044 6045 404323 6043->6045 6044->6045 6045->6001 6047 404598 6046->6047 6048 40459f GetProcAddress 6046->6048 6047->6048 6049 4045b5 GetProcAddress 6048->6049 6050 4045ae 6048->6050 6051 4045c4 SetProcessDEPPolicy 6049->6051 6052 4045c8 6049->6052 6050->6049 6051->6052 6053 404624 6F571CD0 6052->6053 6053->6005 6139 405ca8 6054->6139 6064 4090f7 6063->6064 6219 406fa0 SetErrorMode 6064->6219 6067 407284 19 API calls 6068 409127 6067->6068 6069 403198 4 API calls 6068->6069 6070 40913c 6069->6070 6071 409b78 GetSystemInfo VirtualQuery 6070->6071 6072 409c2c 6071->6072 6075 409ba2 6071->6075 6077 409768 6072->6077 6073 409c0d VirtualQuery 6073->6072 6073->6075 6074 409bcc VirtualProtect 6074->6075 6075->6072 6075->6073 6075->6074 6076 409bfb VirtualProtect 6075->6076 6076->6073 6223 406bd0 GetCommandLineA 6077->6223 6079 409850 6080 4031b8 4 API calls 6079->6080 6082 40986a 6080->6082 6081 406c2c 20 API calls 6084 409785 6081->6084 6082->6016 6128 409c88 6082->6128 6083 403454 18 API calls 6083->6084 6084->6079 6084->6081 6084->6083 6086 406c53 GetModuleFileNameA 6085->6086 6087 406c77 GetCommandLineA 6085->6087 6088 403278 18 API calls 6086->6088 6095 406c7c 6087->6095 6089 406c75 6088->6089 6093 406ca4 6089->6093 6090 406c81 6091 403198 4 API calls 6090->6091 6094 406c89 6091->6094 6092 406af0 18 API calls 6092->6095 6096 403198 4 API calls 6093->6096 6097 40322c 4 API calls 6094->6097 6095->6090 6095->6092 6095->6094 6098 406cb9 6096->6098 6097->6093 6098->6018 6100 409c49 6099->6100 6101 409c4e SizeofResource 6099->6101 6102 409ae8 18 API calls 6100->6102 6103 409c60 LoadResource 6101->6103 6104 409c5b 6101->6104 6102->6101 6106 409c73 LockResource 6103->6106 6107 409c6e 6103->6107 6105 409ae8 18 API calls 6104->6105 6105->6103 6109 409c84 6106->6109 6110 409c7f 6106->6110 6108 409ae8 18 API calls 6107->6108 6108->6106 6109->6025 6109->6027 6111 409ae8 18 API calls 6110->6111 6111->6109 6117 408b82 6112->6117 6124 408b39 6112->6124 6113 408bcd 6114 407cb8 35 API calls 6113->6114 6116 408be4 6114->6116 6115 4034f0 18 API calls 6115->6124 6119 4031b8 4 API calls 6116->6119 6117->6113 6118 4034f0 18 API calls 6117->6118 6123 403420 18 API calls 6117->6123 6125 4031e8 18 API calls 6117->6125 6127 407cb8 35 API calls 6117->6127 6118->6117 6122 408bfe 6119->6122 6120 403420 18 API calls 6120->6124 6121 4031e8 18 API calls 6121->6124 6135 404c20 6122->6135 6123->6117 6124->6115 6124->6117 6124->6120 6124->6121 6126 407cb8 35 API calls 6124->6126 6125->6117 6126->6124 6127->6117 6129 40322c 4 API calls 6128->6129 6130 409cab 6129->6130 6131 409cba MessageBoxA 6130->6131 6132 409ccf 6131->6132 6133 403198 4 API calls 6132->6133 6134 409cd7 6133->6134 6134->6016 6136 402594 18 API calls 6135->6136 6137 404c2b 6136->6137 6137->6037 6138->6042 6140 405940 19 API calls 6139->6140 6141 405cb9 6140->6141 6142 405280 GetSystemDefaultLCID 6141->6142 6146 4052b6 6142->6146 6143 40520c 19 API calls 6143->6146 6144 4031e8 18 API calls 6144->6146 6145 404cdc 19 API calls 6145->6146 6146->6143 6146->6144 6146->6145 6150 405318 6146->6150 6147 4031e8 18 API calls 6147->6150 6148 404cdc 19 API calls 6148->6150 6149 40520c 19 API calls 6149->6150 6150->6147 6150->6148 6150->6149 6151 40539b 6150->6151 6152 4031b8 4 API calls 6151->6152 6153 4053b5 6152->6153 6154 4053c4 GetSystemDefaultLCID 6153->6154 6211 40520c GetLocaleInfoA 6154->6211 6157 4031e8 18 API calls 6158 405404 6157->6158 6159 40520c 19 API calls 6158->6159 6160 405419 6159->6160 6161 40520c 19 API calls 6160->6161 6162 40543d 6161->6162 6217 405258 GetLocaleInfoA 6162->6217 6165 405258 GetLocaleInfoA 6166 40546d 6165->6166 6167 40520c 19 API calls 6166->6167 6168 405487 6167->6168 6169 405258 GetLocaleInfoA 6168->6169 6170 4054a4 6169->6170 6171 40520c 19 API calls 6170->6171 6172 4054be 6171->6172 6173 4031e8 18 API calls 6172->6173 6174 4054cb 6173->6174 6175 40520c 19 API calls 6174->6175 6176 4054e0 6175->6176 6177 4031e8 18 API calls 6176->6177 6178 4054ed 6177->6178 6179 405258 GetLocaleInfoA 6178->6179 6180 4054fb 6179->6180 6181 40520c 19 API calls 6180->6181 6182 405515 6181->6182 6183 4031e8 18 API calls 6182->6183 6184 405522 6183->6184 6185 40520c 19 API calls 6184->6185 6186 405537 6185->6186 6187 4031e8 18 API calls 6186->6187 6188 405544 6187->6188 6189 40520c 19 API calls 6188->6189 6190 405559 6189->6190 6191 405576 6190->6191 6192 405567 6190->6192 6194 40322c 4 API calls 6191->6194 6193 40322c 4 API calls 6192->6193 6195 405574 6193->6195 6194->6195 6196 40520c 19 API calls 6195->6196 6197 405598 6196->6197 6198 4055b5 6197->6198 6199 4055a6 6197->6199 6201 403198 4 API calls 6198->6201 6200 40322c 4 API calls 6199->6200 6202 4055b3 6200->6202 6201->6202 6203 4033b4 18 API calls 6202->6203 6204 4055d7 6203->6204 6205 4033b4 18 API calls 6204->6205 6206 4055f1 6205->6206 6207 4031b8 4 API calls 6206->6207 6208 40560b 6207->6208 6209 405cf4 GetVersionExA 6208->6209 6210 405d0b 6209->6210 6210->6007 6212 405233 6211->6212 6213 405245 6211->6213 6214 403278 18 API calls 6212->6214 6215 40322c 4 API calls 6213->6215 6216 405243 6214->6216 6215->6216 6216->6157 6218 405274 6217->6218 6218->6165 6220 403414 6219->6220 6221 406fd8 LoadLibraryA 6220->6221 6222 406fee 6221->6222 6222->6067 6224 406af0 18 API calls 6223->6224 6225 406bf3 6224->6225 6226 406c05 6225->6226 6227 406af0 18 API calls 6225->6227 6228 403198 4 API calls 6226->6228 6227->6225 6229 406c1a 6228->6229 6229->6084 6793 402dfa 6794 402e0d 6793->6794 6796 402e26 6793->6796 6797 402ba4 6794->6797 6798 402bc9 6797->6798 6799 402bad 6797->6799 6798->6796 6800 402bb5 RaiseException 6799->6800 6800->6798 6801 4075fa GetFileSize 6802 407626 6801->6802 6803 407616 GetLastError 6801->6803 6803->6802 6804 40761f 6803->6804 6805 40748c 35 API calls 6804->6805 6805->6802 6806 406ffb 6807 407008 SetErrorMode 6806->6807 6550 403a80 CloseHandle 6551 403a90 6550->6551 6552 403a91 GetLastError 6550->6552 6553 404283 6554 4042c3 6553->6554 6555 403154 4 API calls 6554->6555 6556 404323 6555->6556 6808 404185 6809 4041ff 6808->6809 6810 403154 4 API calls 6809->6810 6811 4041cc 6809->6811 6812 404323 6810->6812 6557 403e87 6558 403e4c 6557->6558 6559 403e62 6558->6559 6560 403e7b 6558->6560 6563 403e67 6558->6563 6562 403cc8 4 API calls 6559->6562 6561 402674 4 API calls 6560->6561 6564 403e78 6561->6564 6562->6563 6563->6564 6565 402674 4 API calls 6563->6565 6565->6564 6574 407e90 6575 407eb8 VirtualFree 6574->6575 6576 407e9d 6575->6576 6588 40ac97 6597 4096fc 6588->6597 6591 402f24 5 API calls 6592 40aca1 6591->6592 6593 403198 4 API calls 6592->6593 6594 40acc0 6593->6594 6595 403198 4 API calls 6594->6595 6596 40acc8 6595->6596 6606 4056ac 6597->6606 6599 409745 6602 403198 4 API calls 6599->6602 6600 409717 6600->6599 6612 40720c 6600->6612 6604 40975a 6602->6604 6603 409735 6605 40973d MessageBoxA 6603->6605 6604->6591 6604->6592 6605->6599 6607 403154 4 API calls 6606->6607 6609 4056b1 6607->6609 6608 4056c9 6608->6600 6609->6608 6610 403154 4 API calls 6609->6610 6611 4056bf 6610->6611 6611->6600 6613 4056ac 4 API calls 6612->6613 6614 40721b 6613->6614 6615 407221 6614->6615 6618 40722f 6614->6618 6616 40322c 4 API calls 6615->6616 6617 40722d 6616->6617 6617->6603 6619 40724b 6618->6619 6620 40723f 6618->6620 6630 4032b8 6619->6630 6623 4071d0 6620->6623 6624 40322c 4 API calls 6623->6624 6625 4071df 6624->6625 6626 4071fc 6625->6626 6627 406950 CharPrevA 6625->6627 6626->6617 6628 4071eb 6627->6628 6628->6626 6629 4032fc 18 API calls 6628->6629 6629->6626 6631 403278 18 API calls 6630->6631 6632 4032c2 6631->6632 6632->6617 6633 403a97 6634 403aac 6633->6634 6635 403ab2 6634->6635 6636 403bbc GetStdHandle 6634->6636 6637 403b0e CreateFileA 6634->6637 6638 403c17 GetLastError 6636->6638 6650 403bba 6636->6650 6637->6638 6639 403b2c 6637->6639 6638->6635 6641 403b3b GetFileSize 6639->6641 6639->6650 6641->6638 6642 403b4e SetFilePointer 6641->6642 6642->6638 6646 403b6a ReadFile 6642->6646 6643 403be7 GetFileType 6643->6635 6645 403c02 CloseHandle 6643->6645 6645->6635 6646->6638 6647 403b8c 6646->6647 6648 403b9f SetFilePointer 6647->6648 6647->6650 6648->6638 6649 403bb0 SetEndOfFile 6648->6649 6649->6638 6649->6650 6650->6635 6650->6643 6655 40aaa2 6656 40aad2 6655->6656 6657 40aadc CreateWindowExA SetWindowLongA 6656->6657 6658 405194 33 API calls 6657->6658 6659 40ab5f 6658->6659 6660 4032fc 18 API calls 6659->6660 6661 40ab6d 6660->6661 6662 4032fc 18 API calls 6661->6662 6663 40ab7a 6662->6663 6664 406b7c 19 API calls 6663->6664 6665 40ab86 6664->6665 6666 4032fc 18 API calls 6665->6666 6667 40ab8f 6666->6667 6668 4099ec 43 API calls 6667->6668 6669 40aba1 6668->6669 6670 4098cc 19 API calls 6669->6670 6671 40abb4 6669->6671 6670->6671 6672 40abed 6671->6672 6673 4094d8 9 API calls 6671->6673 6674 40ac06 6672->6674 6677 40ac00 RemoveDirectoryA 6672->6677 6673->6672 6675 40ac1a 6674->6675 6676 40ac0f DestroyWindow 6674->6676 6678 40ac42 6675->6678 6679 40357c 4 API calls 6675->6679 6676->6675 6677->6674 6680 40ac38 6679->6680 6681 4025ac 4 API calls 6680->6681 6681->6678 6825 405ba2 6827 405ba4 6825->6827 6826 405be0 6828 405940 19 API calls 6826->6828 6827->6826 6829 405bf7 6827->6829 6830 405bda 6827->6830 6838 405bf3 6828->6838 6833 404cdc 19 API calls 6829->6833 6830->6826 6831 405c4c 6830->6831 6832 4059b0 33 API calls 6831->6832 6832->6838 6834 405c20 6833->6834 6836 4059b0 33 API calls 6834->6836 6835 403198 4 API calls 6837 405c86 6835->6837 6836->6838 6838->6835 6839 408da4 6840 408dc8 6839->6840 6841 408c80 18 API calls 6840->6841 6842 408dd1 6841->6842 6682 402caa 6683 403154 4 API calls 6682->6683 6684 402caf 6683->6684 6857 4011aa 6858 4011ac GetStdHandle 6857->6858 6685 4028ac 6686 402594 18 API calls 6685->6686 6687 4028b6 6686->6687 5870 40aab4 5871 40aab8 SetLastError 5870->5871 5901 409648 GetLastError 5871->5901 5874 40aad2 5876 40aadc CreateWindowExA SetWindowLongA 5874->5876 5875 402f24 5 API calls 5875->5874 5877 405194 33 API calls 5876->5877 5878 40ab5f 5877->5878 5879 4032fc 18 API calls 5878->5879 5880 40ab6d 5879->5880 5881 4032fc 18 API calls 5880->5881 5882 40ab7a 5881->5882 5914 406b7c GetCommandLineA 5882->5914 5885 4032fc 18 API calls 5886 40ab8f 5885->5886 5919 4099ec 5886->5919 5889 4098cc 19 API calls 5890 40abb4 5889->5890 5891 40abed 5890->5891 5892 4094d8 9 API calls 5890->5892 5893 40ac06 5891->5893 5896 40ac00 RemoveDirectoryA 5891->5896 5892->5891 5894 40ac1a 5893->5894 5895 40ac0f DestroyWindow 5893->5895 5897 40357c 4 API calls 5894->5897 5900 40ac42 5894->5900 5895->5894 5896->5893 5898 40ac38 5897->5898 5899 4025ac 4 API calls 5898->5899 5899->5900 5902 404c94 33 API calls 5901->5902 5903 40968f 5902->5903 5904 407284 19 API calls 5903->5904 5905 40969f 5904->5905 5906 408da8 18 API calls 5905->5906 5907 4096b4 5906->5907 5908 405890 18 API calls 5907->5908 5909 4096c3 5908->5909 5910 4031b8 4 API calls 5909->5910 5911 4096e2 5910->5911 5912 403198 4 API calls 5911->5912 5913 4096ea 5912->5913 5913->5874 5913->5875 5935 406af0 5914->5935 5916 406ba1 5917 403198 4 API calls 5916->5917 5918 406bbf 5917->5918 5918->5885 5920 4033b4 18 API calls 5919->5920 5921 409a27 5920->5921 5922 409a59 CreateProcessA 5921->5922 5923 409a65 5922->5923 5924 409a6c CloseHandle 5922->5924 5925 409648 35 API calls 5923->5925 5926 409a75 5924->5926 5925->5924 5945 4099c0 5926->5945 5929 409a91 5930 4099c0 3 API calls 5929->5930 5931 409a96 GetExitCodeProcess CloseHandle 5930->5931 5932 409ab6 5931->5932 5933 403198 4 API calls 5932->5933 5934 409abe 5933->5934 5934->5889 5934->5890 5936 406b1c 5935->5936 5937 403278 18 API calls 5936->5937 5938 406b29 5937->5938 5939 403420 18 API calls 5938->5939 5940 406b31 5939->5940 5941 4031e8 18 API calls 5940->5941 5942 406b49 5941->5942 5943 403198 4 API calls 5942->5943 5944 406b6b 5943->5944 5944->5916 5946 4099d4 PeekMessageA 5945->5946 5947 4099e6 MsgWaitForMultipleObjects 5946->5947 5948 4099c8 TranslateMessage DispatchMessageA 5946->5948 5947->5926 5947->5929 5948->5946 6688 401ab9 6689 401a96 6688->6689 6690 401aa9 RtlDeleteCriticalSection 6689->6690 6691 401a9f RtlLeaveCriticalSection 6689->6691 6691->6690

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 135 409b78-409b9c GetSystemInfo VirtualQuery 136 409ba2 135->136 137 409c2c-409c33 135->137 138 409c21-409c26 136->138 138->137 139 409ba4-409bab 138->139 140 409c0d-409c1f VirtualQuery 139->140 141 409bad-409bb1 139->141 140->137 140->138 141->140 142 409bb3-409bbb 141->142 143 409bcc-409bdd VirtualProtect 142->143 144 409bbd-409bc0 142->144 146 409be1-409be3 143->146 147 409bdf 143->147 144->143 145 409bc2-409bc5 144->145 145->143 148 409bc7-409bca 145->148 149 409bf2-409bf5 146->149 147->146 148->143 148->146 150 409be5-409bee call 409b70 149->150 151 409bf7-409bf9 149->151 150->149 151->140 152 409bfb-409c08 VirtualProtect 151->152 152->140
            APIs
            • GetSystemInfo.KERNEL32(?), ref: 00409B8A
            • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
            • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
            • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
            • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Virtual$ProtectQuery$InfoSystem
            • String ID:
            • API String ID: 2441996862-0
            • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
            • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
            • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
            • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
            • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
            • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
            • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModulePolicyProcess
            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
            • API String ID: 3256987805-3653653586
            • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
            • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
            • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
            • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • SetLastError.KERNEL32 ref: 0040AAC1
              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020F7B98), ref: 0040966C
            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
            • SetWindowLongA.USER32(0007047C,000000FC,00409960), ref: 0040AB15
            • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
            • DestroyWindow.USER32(0007047C,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
            • API String ID: 3757039580-3001827809
            • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
            • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
            • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
            • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
            • API String ID: 1646373207-2130885113
            • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
            • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
            • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
            • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
            • SetWindowLongA.USER32(0007047C,000000FC,00409960), ref: 0040AB15
              • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
              • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8,00000000,00409ABF), ref: 00409A5C
              • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8,00000000), ref: 00409A70
              • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
              • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
              • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8), ref: 00409AA4
            • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
            • DestroyWindow.USER32(0007047C,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
            • API String ID: 3586484885-3001827809
            • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
            • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
            • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
            • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8,00000000,00409ABF), ref: 00409A5C
            • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8,00000000), ref: 00409A70
            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
            • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
            • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020F7B98,00409AD8), ref: 00409AA4
              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020F7B98), ref: 0040966C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
            • String ID: D
            • API String ID: 3356880605-2746444292
            • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
            • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
            • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
            • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 116 4019dc-4019e7 117 401abb-401abd 116->117 118 4019ed-401a02 116->118 119 401a04-401a09 RtlEnterCriticalSection 118->119 120 401a0e-401a2d LocalFree 118->120 119->120 121 401a41-401a47 120->121 122 401a49-401a6e call 4012dc * 3 121->122 123 401a2f-401a3f VirtualFree 121->123 130 401a70-401a85 LocalFree 122->130 131 401a87-401a9d 122->131 123->121 130->130 130->131 133 401aa9-401ab3 RtlDeleteCriticalSection 131->133 134 401a9f-401aa4 RtlLeaveCriticalSection 131->134 134->133
            APIs
            • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
            • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
            • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
            • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
            • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
            • String ID:
            • API String ID: 3782394904-0
            • Opcode ID: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
            • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
            • Opcode Fuzzy Hash: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
            • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 155 403d02-403d10 156 403d12-403d19 155->156 157 403d29-403d30 155->157 158 403ddf-403de5 ExitProcess 156->158 159 403d1f 156->159 160 403d32-403d3c 157->160 161 403d3e-403d45 157->161 159->157 162 403d21-403d23 159->162 160->157 163 403d47-403d51 161->163 164 403db8-403dcc call 403cc8 * 2 call 4019dc 161->164 162->157 165 403dea-403e19 call 4030b4 162->165 168 403d56-403d62 163->168 180 403dd1-403dd8 164->180 168->168 170 403d64-403d6e 168->170 173 403d73-403d84 170->173 173->173 176 403d86-403d8d 173->176 178 403da4-403db3 call 403fe4 call 403f67 176->178 179 403d8f-403da2 MessageBoxA 176->179 178->164 179->164 180->165 183 403dda call 4030b4 180->183 183->158
            APIs
            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
            • ExitProcess.KERNEL32 ref: 00403DE5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ExitMessageProcess
            • String ID: Error$Runtime error at 00000000
            • API String ID: 1220098344-2970929446
            • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
            • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
            • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
            • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 186 401918-40193a RtlInitializeCriticalSection 187 401946-40197c call 4012dc * 3 LocalAlloc 186->187 188 40193c-401941 RtlEnterCriticalSection 186->188 195 4019ad-4019c1 187->195 196 40197e 187->196 188->187 200 4019c3-4019c8 RtlLeaveCriticalSection 195->200 201 4019cd 195->201 197 401983-401995 196->197 197->197 199 401997-4019a6 197->199 199->195 200->201
            APIs
            • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
            • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
            • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
            • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
            • String ID:
            • API String ID: 730355536-0
            • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
            • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
            • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
            • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message
            • String ID: .tmp$y@
            • API String ID: 2030045667-2396523267
            • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
            • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
            • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
            • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message
            • String ID: .tmp$y@
            • API String ID: 2030045667-2396523267
            • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
            • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
            • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
            • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
            • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLast
            • String ID: .tmp
            • API String ID: 1375471231-2986845003
            • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
            • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
            • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
            • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 327 4094d8-4094e9 328 409532-409537 327->328 329 4094eb-4094ec 327->329 330 4094ee-4094f1 329->330 331 4094f3-4094fc Sleep 330->331 332 4094fe-409501 330->332 333 40950c-409511 call 408fbc 331->333 332->333 334 409503-409507 Sleep 332->334 336 409516-409518 333->336 334->333 336->328 337 40951a-409522 GetLastError 336->337 337->328 338 409524-40952c GetLastError 337->338 338->328 339 40952e-409530 338->339 339->328 339->330
            APIs
            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLastSleep
            • String ID:
            • API String ID: 1458359878-0
            • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
            • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
            • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
            • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 340 4099c0-4099c6 341 4099d4-4099e4 PeekMessageA 340->341 342 4099e6-4099ea 341->342 343 4099c8-4099cf TranslateMessage DispatchMessageA 341->343 343->341
            APIs
            • TranslateMessage.USER32 ref: 004099C9
            • DispatchMessageA.USER32 ref: 004099CF
            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004099DD
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslate
            • String ID:
            • API String ID: 4217535847-0
            • Opcode ID: 1802b87248827978fc4904d3dad91f1bd0b0d0248e3ce7d919b28dce25163666
            • Instruction ID: 1f5564cf95287219c4939fbd1766d219a06dd5c17758edf6696d0a01df122bc8
            • Opcode Fuzzy Hash: 1802b87248827978fc4904d3dad91f1bd0b0d0248e3ce7d919b28dce25163666
            • Instruction Fuzzy Hash: B6D012D178030033E82031721CC3F5B100C079172CF24157B7B02792D3E6BDA510506D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
            • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
            • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
            • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
              • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
              • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
              • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
              • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
            • String ID:
            • API String ID: 296031713-0
            • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
            • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
            • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
            • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DeleteFileA.KERNEL32(00000000,00000000,00409019,?,0000000D,00000000), ref: 00408FF3
            • GetLastError.KERNEL32(00000000,00000000,00409019,?,0000000D,00000000), ref: 00408FFB
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DeleteErrorFileLast
            • String ID:
            • API String ID: 2018770650-0
            • Opcode ID: 51b14d3c2f7fde5c1a6bb776c84878c326085b2b0be15ffc15f9635c9f9f5f18
            • Instruction ID: 1f0403e6899a51d1d5356f81b6020870d4ad1054c4e625117792cee712869c3b
            • Opcode Fuzzy Hash: 51b14d3c2f7fde5c1a6bb776c84878c326085b2b0be15ffc15f9635c9f9f5f18
            • Instruction Fuzzy Hash: 16F0C871A04704ABCB01DF759D4159DB3E8DB8831475045BBF814F3682EA385E108599
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
            • DestroyWindow.USER32(0007047C,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
              • Part of subcall function 004094D8: Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
              • Part of subcall function 004094D8: GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
              • Part of subcall function 004094D8: GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$DestroyDirectoryRemoveSleepWindow
            • String ID:
            • API String ID: 2192421792-0
            • Opcode ID: 2c973cdf999bbb1192929a8364406a109d64bb88cfdea17aa602a860d5632052
            • Instruction ID: be585450a05658aa0cbbe96fcd01bcdb7ec8c3c433658d061b63fb0e61c88a9e
            • Opcode Fuzzy Hash: 2c973cdf999bbb1192929a8364406a109d64bb88cfdea17aa602a860d5632052
            • Instruction Fuzzy Hash: 24F03170244200DBD724EB69EEC9B1632A5A784305F10423BF500B72F1C7FC98A1CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
            • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLibraryLoadMode
            • String ID:
            • API String ID: 2987862817-0
            • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
            • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
            • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
            • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$FilePointer
            • String ID:
            • API String ID: 1156039329-0
            • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
            • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
            • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
            • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
            • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileLastRead
            • String ID:
            • API String ID: 1948546556-0
            • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
            • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
            • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
            • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
            • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$FilePointer
            • String ID:
            • API String ID: 1156039329-0
            • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
            • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
            • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
            • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
            • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
            • Opcode Fuzzy Hash: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
            • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
              • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
              • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DefaultInfoLoadLocaleStringSystem
            • String ID:
            • API String ID: 1658689577-0
            • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
            • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
            • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
            • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CallWindowProcA.USER32(FFFF0489,?,?,?,?), ref: 004099B1
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallProcWindow
            • String ID:
            • API String ID: 2714655100-0
            • Opcode ID: d47673c21cdf8bedaefe554fec503b575a75a474267a2dbf9455b1d63e9c71b8
            • Instruction ID: e57f10db922cec4d4aa75c49cba833a2d307090ecd0f1caf60a141382681e8b2
            • Opcode Fuzzy Hash: d47673c21cdf8bedaefe554fec503b575a75a474267a2dbf9455b1d63e9c71b8
            • Instruction Fuzzy Hash: 8DF096B02042089BDB10CE5DCD449AB33D8EB8C300F44853EB505A7395C37CDC118BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
            • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
            • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
            • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
            • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
            • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
            • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
            • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
            • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
            • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID:
            • API String ID: 442123175-0
            • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
            • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
            • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
            • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FormatMessage
            • String ID:
            • API String ID: 1306739567-0
            • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
            • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
            • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
            • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CallWindowProcA.USER32(FFFF0489,?,?,?,?), ref: 004099B1
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallProcWindow
            • String ID:
            • API String ID: 2714655100-0
            • Opcode ID: cd8b3a923812b403d100148a9a9efe44a0198c26f302b53ce8b31bb20f351b7a
            • Instruction ID: 5aacb6b592f2088f07acfaa9316de6eac8589a4f62fc3c725c92bc6cd7e99d3e
            • Opcode Fuzzy Hash: cd8b3a923812b403d100148a9a9efe44a0198c26f302b53ce8b31bb20f351b7a
            • Instruction Fuzzy Hash: 05E01AB13001086BD704DEADCD54D7B73DD9BCC300B04C52A7609D7399D534EC014768
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetEndOfFile.KERNEL32(?,020F7BEC,0040AA59,00000000), ref: 004076B3
              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileLast
            • String ID:
            • API String ID: 734332943-0
            • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
            • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
            • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
            • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorMode
            • String ID:
            • API String ID: 2340568224-0
            • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
            • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
            • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
            • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorMode
            • String ID:
            • API String ID: 2340568224-0
            • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
            • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
            • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
            • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CharPrev
            • String ID:
            • API String ID: 122130370-0
            • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
            • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
            • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
            • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
            • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
            • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
            • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
            • Opcode Fuzzy Hash: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
            • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
            • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
            • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
            • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
            • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
            • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
            • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
            • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 107509674-3733053543
            • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
            • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
            • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
            • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
            • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
            • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
            • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Resource$FindLoadLockSizeof
            • String ID:
            • API String ID: 3473537107-0
            • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
            • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
            • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
            • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
            • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
            • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
            • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemTime.KERNEL32(?), ref: 004026CE
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: SystemTime
            • String ID:
            • API String ID: 2656138-0
            • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
            • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
            • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
            • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Version
            • String ID:
            • API String ID: 1889659487-0
            • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
            • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
            • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
            • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
            • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
            • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
            • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressCloseHandleModuleProc
            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
            • API String ID: 4190037839-2401316094
            • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
            • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
            • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
            • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
            • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
            • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
            • GetLastError.KERNEL32(000000F5), ref: 00403C1E
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
            • String ID:
            • API String ID: 1694776339-0
            • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
            • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
            • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
            • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
              • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
              • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoLocale$DefaultSystem
            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
            • API String ID: 1044490935-665933166
            • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
            • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
            • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
            • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ByteCharMultiWide$AllocString
            • String ID:
            • API String ID: 262959230-0
            • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
            • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
            • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
            • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
            • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CommandHandleLineModule
            • String ID: U1hd.@$%d
            • API String ID: 2123368496-819127239
            • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
            • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
            • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
            • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: QueryValue
            • String ID: )q@
            • API String ID: 3660427363-2284170586
            • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
            • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
            • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
            • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
            Strings
            • Setup, xrefs: 00409CAD
            • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
            Memory Dump Source
            • Source File: 00000000.00000002.1947836225.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1947805035.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947857775.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1947877521.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message
            • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
            • API String ID: 2030045667-3271211647
            • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
            • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
            • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
            • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:13.8%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:7.2%
            Total number of Nodes:2000
            Total number of Limit Nodes:113
            execution_graph 49915 416b42 49916 416bea 49915->49916 49917 416b5a 49915->49917 49934 41531c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49916->49934 49919 416b74 SendMessageA 49917->49919 49920 416b68 49917->49920 49921 416bc8 49919->49921 49922 416b72 CallWindowProcA 49920->49922 49923 416b8e 49920->49923 49922->49921 49931 41a058 GetSysColor 49923->49931 49926 416b99 SetTextColor 49927 416bae 49926->49927 49932 41a058 GetSysColor 49927->49932 49929 416bb3 SetBkColor 49933 41a6e0 GetSysColor CreateBrushIndirect 49929->49933 49931->49926 49932->49929 49933->49921 49934->49921 49935 402584 49936 402598 49935->49936 49937 4025ab 49935->49937 49965 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49936->49965 49938 4025c2 RtlEnterCriticalSection 49937->49938 49939 4025cc 49937->49939 49938->49939 49951 4023b4 13 API calls 49939->49951 49941 40259d 49941->49937 49943 4025a1 49941->49943 49944 4025d5 49945 4025d9 49944->49945 49952 402088 49944->49952 49947 402635 49945->49947 49948 40262b RtlLeaveCriticalSection 49945->49948 49948->49947 49949 4025e5 49949->49945 49966 402210 9 API calls 49949->49966 49951->49944 49953 40209c 49952->49953 49954 4020af 49952->49954 49973 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49953->49973 49956 4020c6 RtlEnterCriticalSection 49954->49956 49959 4020d0 49954->49959 49956->49959 49957 4020a1 49957->49954 49958 4020a5 49957->49958 49962 402106 49958->49962 49959->49962 49967 401f94 49959->49967 49962->49949 49963 4021f1 RtlLeaveCriticalSection 49964 4021fb 49963->49964 49964->49949 49965->49941 49966->49945 49970 401fa4 49967->49970 49968 401fd0 49972 401ff4 49968->49972 49979 401db4 49968->49979 49970->49968 49970->49972 49974 401f0c 49970->49974 49972->49963 49972->49964 49973->49957 49983 40178c 49974->49983 49977 401f29 49977->49970 49980 401dd2 49979->49980 49981 401e02 49979->49981 49980->49972 49981->49980 50011 401d1c 49981->50011 49986 4017a8 49983->49986 49984 4017b2 50002 401678 VirtualAlloc 49984->50002 49986->49984 49988 40180f 49986->49988 49990 401803 49986->49990 49994 4014e4 49986->49994 50003 4013e0 LocalAlloc 49986->50003 49988->49977 49993 401e80 9 API calls 49988->49993 50004 4015c0 VirtualFree 49990->50004 49991 4017be 49991->49988 49993->49977 49995 4014f3 VirtualAlloc 49994->49995 49997 401520 49995->49997 49998 401543 49995->49998 50005 401398 49997->50005 49998->49986 50001 401530 VirtualFree 50001->49998 50002->49991 50003->49986 50004->49988 50008 401340 50005->50008 50009 40134c LocalAlloc 50008->50009 50010 40135e 50008->50010 50009->50010 50010->49998 50010->50001 50012 401d2e 50011->50012 50013 401d51 50012->50013 50014 401d63 50012->50014 50024 401940 50013->50024 50016 401940 3 API calls 50014->50016 50017 401d61 50016->50017 50018 401d79 50017->50018 50034 401bf8 9 API calls 50017->50034 50018->49980 50020 401d88 50021 401da2 50020->50021 50035 401c4c 9 API calls 50020->50035 50036 401454 LocalAlloc 50021->50036 50025 401966 50024->50025 50027 4019bf 50024->50027 50037 40170c 50025->50037 50027->50017 50030 401983 50031 40199a 50030->50031 50042 4015c0 VirtualFree 50030->50042 50031->50027 50043 401454 LocalAlloc 50031->50043 50034->50020 50035->50021 50036->50018 50039 401743 50037->50039 50038 401783 50041 4013e0 LocalAlloc 50038->50041 50039->50038 50040 40175d VirtualFree 50039->50040 50040->50039 50041->50030 50042->50031 50043->50027 50044 416644 50045 416651 50044->50045 50046 4166ab 50044->50046 50051 416550 CreateWindowExA 50045->50051 50047 416658 SetPropA SetPropA 50047->50046 50048 41668b 50047->50048 50049 41669e SetWindowPos 50048->50049 50049->50046 50051->50047 50052 4162ca 50053 4162d6 GetClassInfoA 50052->50053 50054 4162f6 50052->50054 50053->50054 50055 4162ea GetClassInfoA 50053->50055 50055->50054 50056 423c0c 50061 423c42 50056->50061 50059 423cec 50062 423cf3 50059->50062 50063 423d27 50059->50063 50060 423c8d 50064 423c93 50060->50064 50065 423d50 50060->50065 50076 423c63 50061->50076 50150 423b68 50061->50150 50066 423cf9 50062->50066 50108 423fb1 50062->50108 50069 423d32 50063->50069 50070 42409a IsIconic 50063->50070 50067 423cc5 50064->50067 50068 423c98 50064->50068 50071 423d62 50065->50071 50072 423d6b 50065->50072 50074 423f13 SendMessageA 50066->50074 50075 423d07 50066->50075 50067->50076 50098 423cde 50067->50098 50099 423e3f 50067->50099 50078 423df6 50068->50078 50079 423c9e 50068->50079 50080 4240d6 50069->50080 50081 423d3b 50069->50081 50070->50076 50077 4240ae GetFocus 50070->50077 50082 423d78 50071->50082 50083 423d69 50071->50083 50173 424194 11 API calls 50072->50173 50074->50076 50075->50076 50109 423cc0 50075->50109 50129 423f56 50075->50129 50077->50076 50085 4240bf 50077->50085 50186 423b84 NtdllDefWindowProc_A 50078->50186 50086 423ca7 50079->50086 50087 423e1e PostMessageA 50079->50087 50206 424850 WinHelpA PostMessageA 50080->50206 50090 4240ed 50081->50090 50081->50109 50174 4241dc IsIconic 50082->50174 50182 423b84 NtdllDefWindowProc_A 50083->50182 50204 41eff4 GetCurrentThreadId EnumThreadWindows 50085->50204 50093 423cb0 50086->50093 50094 423ea5 50086->50094 50154 423b84 NtdllDefWindowProc_A 50087->50154 50096 4240f6 50090->50096 50097 42410b 50090->50097 50103 423cb9 50093->50103 50104 423dce IsIconic 50093->50104 50105 423eae 50094->50105 50106 423edf 50094->50106 50095 4240eb 50095->50076 50207 4244d4 50096->50207 50213 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50097->50213 50098->50109 50110 423e0b 50098->50110 50155 423b84 NtdllDefWindowProc_A 50099->50155 50103->50109 50114 423d91 50103->50114 50116 423dea 50104->50116 50117 423dde 50104->50117 50115 423b14 5 API calls 50105->50115 50169 423b84 NtdllDefWindowProc_A 50106->50169 50108->50076 50124 423fd7 IsWindowEnabled 50108->50124 50109->50076 50172 423b84 NtdllDefWindowProc_A 50109->50172 50187 424178 50110->50187 50112 423e45 50121 423e83 50112->50121 50122 423e61 50112->50122 50113 4240ce SetFocus 50113->50076 50114->50076 50183 422c4c ShowWindow PostMessageA PostQuitMessage 50114->50183 50123 423eb6 50115->50123 50185 423b84 NtdllDefWindowProc_A 50116->50185 50184 423bc0 15 API calls 50117->50184 50162 423a84 50121->50162 50156 423b14 50122->50156 50132 423ec8 50123->50132 50192 41ef58 50123->50192 50124->50076 50133 423fe5 50124->50133 50127 423ee5 50134 423efd 50127->50134 50170 41eea4 GetCurrentThreadId EnumThreadWindows 50127->50170 50129->50076 50136 423f78 IsWindowEnabled 50129->50136 50198 423b84 NtdllDefWindowProc_A 50132->50198 50143 423fec IsWindowVisible 50133->50143 50141 423a84 6 API calls 50134->50141 50136->50076 50142 423f86 50136->50142 50141->50076 50199 412310 7 API calls 50142->50199 50143->50076 50145 423ffa GetFocus 50143->50145 50200 4181e0 50145->50200 50147 42400f SetFocus 50202 415240 50147->50202 50151 423b72 50150->50151 50152 423b7d 50150->50152 50151->50152 50214 408720 GetSystemDefaultLCID 50151->50214 50152->50059 50152->50060 50154->50076 50155->50112 50157 423b62 PostMessageA 50156->50157 50159 423b23 50156->50159 50157->50076 50158 423b5a 50317 40b1d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50158->50317 50159->50157 50159->50158 50161 423b4e SetWindowPos 50159->50161 50161->50158 50161->50159 50163 423b0d PostMessageA 50162->50163 50164 423a94 50162->50164 50163->50076 50164->50163 50165 423a9a EnumWindows 50164->50165 50165->50163 50166 423ab6 GetWindow GetWindowLongA 50165->50166 50318 423a1c GetWindow 50165->50318 50167 423ad5 50166->50167 50167->50163 50168 423b01 SetWindowPos 50167->50168 50168->50163 50168->50167 50169->50127 50171 41ef29 50170->50171 50171->50134 50172->50076 50173->50076 50175 424223 50174->50175 50176 4241ed SetActiveWindow 50174->50176 50175->50076 50321 42364c 50176->50321 50179 423b14 5 API calls 50180 42420a 50179->50180 50180->50175 50181 42421d SetFocus 50180->50181 50181->50175 50182->50076 50183->50076 50184->50076 50185->50076 50186->50076 50333 41db30 50187->50333 50190 424190 50190->50076 50191 424184 LoadIconA 50191->50190 50193 41ef60 IsWindow 50192->50193 50194 41ef8c 50192->50194 50195 41ef6f EnableWindow 50193->50195 50197 41ef7a 50193->50197 50194->50132 50195->50197 50196 402660 4 API calls 50196->50197 50197->50193 50197->50194 50197->50196 50198->50076 50199->50076 50201 4181ea 50200->50201 50201->50147 50203 41525b SetFocus 50202->50203 50203->50076 50205 41f022 50204->50205 50205->50076 50205->50113 50206->50095 50208 4244e0 50207->50208 50209 4244fa 50207->50209 50210 42450f 50208->50210 50211 4244e7 SendMessageA 50208->50211 50212 402648 4 API calls 50209->50212 50210->50076 50211->50210 50212->50210 50213->50095 50269 408568 GetLocaleInfoA 50214->50269 50219 408568 5 API calls 50220 408775 50219->50220 50221 408568 5 API calls 50220->50221 50222 408799 50221->50222 50281 4085b4 GetLocaleInfoA 50222->50281 50225 4085b4 GetLocaleInfoA 50226 4087c9 50225->50226 50227 408568 5 API calls 50226->50227 50228 4087e3 50227->50228 50229 4085b4 GetLocaleInfoA 50228->50229 50230 408800 50229->50230 50231 408568 5 API calls 50230->50231 50232 40881a 50231->50232 50233 403450 4 API calls 50232->50233 50234 408827 50233->50234 50235 408568 5 API calls 50234->50235 50236 40883c 50235->50236 50237 403450 4 API calls 50236->50237 50238 408849 50237->50238 50239 4085b4 GetLocaleInfoA 50238->50239 50240 408857 50239->50240 50241 408568 5 API calls 50240->50241 50242 408871 50241->50242 50243 403450 4 API calls 50242->50243 50244 40887e 50243->50244 50245 408568 5 API calls 50244->50245 50246 408893 50245->50246 50247 403450 4 API calls 50246->50247 50248 4088a0 50247->50248 50249 408568 5 API calls 50248->50249 50250 4088b5 50249->50250 50251 4088d2 50250->50251 50252 4088c3 50250->50252 50253 403494 4 API calls 50251->50253 50289 403494 50252->50289 50255 4088d0 50253->50255 50256 408568 5 API calls 50255->50256 50257 4088f4 50256->50257 50270 4085a1 50269->50270 50271 40858f 50269->50271 50273 403494 4 API calls 50270->50273 50297 4034e0 50271->50297 50274 40859f 50273->50274 50275 403450 50274->50275 50276 403454 50275->50276 50278 403464 50275->50278 50276->50278 50279 4034bc 4 API calls 50276->50279 50277 403490 50277->50219 50278->50277 50312 402660 50278->50312 50279->50278 50282 4085d0 50281->50282 50282->50225 50291 403498 50289->50291 50290 4034ba 50290->50255 50291->50290 50292 402660 4 API calls 50291->50292 50292->50290 50302 4034bc 50297->50302 50299 4034f0 50300 403400 4 API calls 50299->50300 50301 403508 50300->50301 50301->50274 50303 4034c0 50302->50303 50304 4034dc 50302->50304 50307 402648 50303->50307 50304->50299 50306 4034c9 50306->50299 50308 40264c 50307->50308 50309 402656 50307->50309 50308->50309 50311 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50308->50311 50309->50306 50309->50309 50311->50309 50313 402664 50312->50313 50315 40266e 50312->50315 50313->50315 50316 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50313->50316 50315->50277 50316->50315 50317->50157 50319 423a3d GetWindowLongA 50318->50319 50320 423a49 50318->50320 50319->50320 50329 4235f8 SystemParametersInfoA 50321->50329 50324 423665 ShowWindow 50326 423670 50324->50326 50327 423677 50324->50327 50332 423628 SystemParametersInfoA 50326->50332 50327->50179 50330 423616 50329->50330 50330->50324 50331 423628 SystemParametersInfoA 50330->50331 50331->50324 50332->50327 50336 41db54 50333->50336 50337 41db61 50336->50337 50343 41db3a 50336->50343 50337->50343 50345 40ca80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50337->50345 50339 41db7e 50340 41db98 50339->50340 50341 41db8b 50339->50341 50339->50343 50346 41bd8c 11 API calls 50340->50346 50347 41b388 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50341->50347 50343->50190 50343->50191 50345->50339 50346->50343 50347->50343 50348 47cd48 50349 47cd53 50348->50349 50351 47cd94 50349->50351 50352 47cd69 GetLastError 50349->50352 50356 452908 50349->50356 50352->50351 50353 47cd73 GetLastError 50352->50353 50353->50351 50354 47cd7d GetTickCount 50353->50354 50354->50351 50355 47cd8b Sleep 50354->50355 50355->50349 50362 452724 50356->50362 50358 45291e 50359 452922 50358->50359 50360 45293e DeleteFileA GetLastError 50358->50360 50359->50349 50368 452760 50360->50368 50363 452732 50362->50363 50364 45272e 50362->50364 50365 452754 SetLastError 50363->50365 50366 45273b Wow64DisableWow64FsRedirection 50363->50366 50364->50358 50367 45274f 50365->50367 50366->50367 50367->50358 50369 452765 Wow64RevertWow64FsRedirection 50368->50369 50370 45276f 50368->50370 50369->50370 50370->50359 50371 48095d 50376 451004 50371->50376 50373 480971 50386 47fa0c 50373->50386 50375 480995 50377 451011 50376->50377 50379 451065 50377->50379 50395 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50377->50395 50392 450e88 50379->50392 50383 45108d 50384 4510d0 50383->50384 50397 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50383->50397 50384->50373 50402 40b3c8 50386->50402 50388 47fa2e 50389 47fa79 50388->50389 50406 4069dc 50388->50406 50409 476994 50388->50409 50389->50375 50398 450e34 50392->50398 50395->50379 50396 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50396->50383 50397->50384 50399 450e57 50398->50399 50400 450e46 50398->50400 50399->50383 50399->50396 50401 450e4b InterlockedExchange 50400->50401 50401->50399 50403 40b3d3 50402->50403 50404 40b3f3 50403->50404 50425 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50403->50425 50404->50388 50407 402648 4 API calls 50406->50407 50408 4069e7 50407->50408 50408->50388 50419 476a0e 50409->50419 50422 4769c5 50409->50422 50410 476a59 50426 451294 50410->50426 50411 451294 21 API calls 50411->50422 50413 476a70 50432 403420 50413->50432 50416 4038a4 4 API calls 50416->50419 50418 403450 4 API calls 50418->50422 50419->50410 50419->50416 50421 403450 4 API calls 50419->50421 50423 403744 4 API calls 50419->50423 50424 451294 21 API calls 50419->50424 50421->50419 50422->50411 50422->50418 50422->50419 50436 4038a4 50422->50436 50445 403744 50422->50445 50423->50419 50424->50419 50425->50404 50427 4512af 50426->50427 50431 4512a4 50426->50431 50449 451238 21 API calls 50427->50449 50429 4512ba 50429->50431 50450 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50429->50450 50431->50413 50434 403426 50432->50434 50433 40344b 50433->50388 50434->50433 50435 402660 4 API calls 50434->50435 50435->50434 50437 4038b1 50436->50437 50444 4038e1 50436->50444 50439 4038da 50437->50439 50442 4038bd 50437->50442 50438 403400 4 API calls 50441 4038cb 50438->50441 50440 4034bc 4 API calls 50439->50440 50440->50444 50441->50422 50451 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50442->50451 50444->50438 50446 40374a 50445->50446 50448 40375b 50445->50448 50447 4034bc 4 API calls 50446->50447 50446->50448 50447->50448 50448->50422 50449->50429 50450->50431 50451->50441 50452 41ee54 50453 41ee63 IsWindowVisible 50452->50453 50454 41ee99 50452->50454 50453->50454 50455 41ee6d IsWindowEnabled 50453->50455 50455->50454 50456 41ee77 50455->50456 50457 402648 4 API calls 50456->50457 50458 41ee81 EnableWindow 50457->50458 50458->50454 50459 46bb10 50460 46bb44 50459->50460 50491 46bfad 50459->50491 50461 46bb80 50460->50461 50464 46bbdc 50460->50464 50465 46bbba 50460->50465 50466 46bbcb 50460->50466 50467 46bb98 50460->50467 50468 46bba9 50460->50468 50461->50491 50549 468c74 50461->50549 50462 403400 4 API calls 50463 46bfec 50462->50463 50470 403400 4 API calls 50463->50470 50805 46baa0 45 API calls 50464->50805 50514 46b6d0 50465->50514 50804 46b890 68 API calls 50466->50804 50802 46b420 47 API calls 50467->50802 50803 46b588 42 API calls 50468->50803 50476 46bff4 50470->50476 50477 46bb9e 50477->50461 50477->50491 50478 46bc18 50482 46bc5b 50478->50482 50478->50491 50806 494da0 18 API calls 50478->50806 50484 42cbc0 6 API calls 50482->50484 50486 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50482->50486 50487 46af68 23 API calls 50482->50487 50490 414ae8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50482->50490 50482->50491 50493 46bdd7 50482->50493 50510 46be9f 50482->50510 50552 468bb0 50482->50552 50560 48358c 50482->50560 50585 46acd4 50482->50585 50730 483084 50482->50730 50823 46b1dc 19 API calls 50482->50823 50484->50482 50486->50482 50487->50482 50490->50482 50491->50462 50492 46af68 23 API calls 50492->50491 50592 469f1c 50493->50592 50495 46be3d 50496 403450 4 API calls 50495->50496 50497 46be4d 50496->50497 50498 46bea9 50497->50498 50499 46be59 50497->50499 50504 46bf6b 50498->50504 50653 46af68 50498->50653 50807 457f1c 50499->50807 50503 457f1c 24 API calls 50503->50510 50510->50492 50824 46c424 50514->50824 50517 46b852 50518 403420 4 API calls 50517->50518 50520 46b86c 50518->50520 50522 403400 4 API calls 50520->50522 50521 46b71e 50548 46b83e 50521->50548 50831 455f84 50521->50831 50523 46b874 50522->50523 50526 403400 4 API calls 50523->50526 50525 403450 4 API calls 50525->50517 50527 46b87c 50526->50527 50527->50461 50528 46b7a1 50528->50517 50542 46b801 50528->50542 50849 42cd48 50528->50849 50531 46b73c 50531->50528 50840 466600 50531->50840 50533 42cd48 7 API calls 50536 46b817 50533->50536 50541 451458 4 API calls 50536->50541 50536->50548 50538 466600 19 API calls 50540 46b77c 50538->50540 50544 46b82e 50541->50544 50542->50517 50542->50533 50542->50548 50856 47efd0 42 API calls 50544->50856 50548->50517 50548->50525 50550 468bb0 19 API calls 50549->50550 50551 468c83 50550->50551 50551->50478 50556 468bdf 50552->50556 50553 4078f4 19 API calls 50554 468c18 50553->50554 51148 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50554->51148 50556->50553 50557 468c20 50556->50557 50558 403400 4 API calls 50557->50558 50559 468c38 50558->50559 50559->50482 50561 4181e0 50560->50561 50562 4835c3 GetForegroundWindow 50561->50562 50563 4835ce SetActiveWindow 50562->50563 50564 4835dc 50562->50564 50563->50564 50565 4835f3 50564->50565 50567 4835fd 50564->50567 51149 483488 106 API calls 50565->51149 50569 483629 50567->50569 50572 483688 50567->50572 50573 4836be 50567->50573 50568 4835f8 51175 4824b4 50568->51175 50569->50568 51154 457d10 50569->51154 51150 466800 50572->51150 50576 466800 20 API calls 50573->50576 50577 4836bc 50576->50577 51153 47efd0 42 API calls 50577->51153 50581 403634 4 API calls 50581->50577 50582 48373c 50583 403420 4 API calls 50582->50583 50584 46bd99 KiUserCallbackDispatcher 50583->50584 50584->50482 50586 46ace5 50585->50586 50587 46ace0 50585->50587 51306 469a80 46 API calls 50586->51306 50591 46ace3 50587->50591 51221 46a740 50587->51221 50589 46aced 50589->50482 50591->50482 50593 403400 4 API calls 50592->50593 50594 469f4a 50593->50594 51664 47dd00 50594->51664 50596 469fad 50597 469fb1 50596->50597 50598 469fca 50596->50598 50599 466800 20 API calls 50597->50599 50600 469fbb 50598->50600 51671 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50598->51671 50599->50600 50602 46a154 50600->50602 50603 46a0e9 50600->50603 50652 46a25e 50600->50652 50607 403494 4 API calls 50602->50607 50606 403494 4 API calls 50603->50606 50604 403420 4 API calls 50608 46a288 50604->50608 50605 469fe6 50605->50600 50609 469fee 50605->50609 50610 46a0f6 50606->50610 50611 46a161 50607->50611 50608->50495 50612 46af68 23 API calls 50609->50612 50613 40357c 4 API calls 50610->50613 50614 40357c 4 API calls 50611->50614 50619 469ffb 50612->50619 50615 46a103 50613->50615 50616 46a16e 50614->50616 50617 40357c 4 API calls 50615->50617 50618 40357c 4 API calls 50616->50618 50620 46a110 50617->50620 50621 46a17b 50618->50621 50624 46a024 SetActiveWindow 50619->50624 50625 46a03c 50619->50625 50622 40357c 4 API calls 50620->50622 50623 40357c 4 API calls 50621->50623 50626 46a11d 50622->50626 50627 46a188 50623->50627 50624->50625 51672 42f560 50625->51672 50628 466800 20 API calls 50626->50628 50629 40357c 4 API calls 50627->50629 50630 46a12b 50628->50630 50631 46a196 50629->50631 50633 40357c 4 API calls 50630->50633 50634 414b18 4 API calls 50631->50634 50636 46a134 50633->50636 50637 46a152 50634->50637 50639 40357c 4 API calls 50636->50639 51689 466b38 50637->51689 50642 46a141 50639->50642 50641 46a08d 50644 46ade4 21 API calls 50641->50644 50643 414b18 4 API calls 50642->50643 50643->50637 50645 46a0bf 50644->50645 50645->50495 50646 46a1b8 50646->50652 50652->50604 50654 468c74 19 API calls 50653->50654 50655 46af80 50654->50655 50656 46afa2 50655->50656 50658 4652cc 7 API calls 50655->50658 51841 4652cc 50656->51841 50658->50656 50661 46afba 50662 46ade4 21 API calls 50661->50662 50663 46aff2 50662->50663 50664 414b18 4 API calls 50663->50664 50665 46b006 50664->50665 50666 46b012 50665->50666 50667 46b03c 50665->50667 50668 414b18 4 API calls 50666->50668 50670 46b05b 50667->50670 50671 46b085 50667->50671 50669 46b026 50668->50669 50672 414b18 4 API calls 50669->50672 50673 414b18 4 API calls 50670->50673 50674 414b18 4 API calls 50671->50674 50675 46b03a 50672->50675 50676 46b06f 50673->50676 50677 46b099 50674->50677 51858 46acfc 50675->51858 50679 414b18 4 API calls 50676->50679 50678 414b18 4 API calls 50677->50678 50678->50675 50679->50675 50684 46b0d7 50731 46c424 48 API calls 50730->50731 50732 4830c7 50731->50732 50733 4830d0 50732->50733 52115 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50732->52115 50735 414ae8 4 API calls 50733->50735 50736 4830e0 50735->50736 50737 403450 4 API calls 50736->50737 50738 4830ed 50737->50738 51930 46c77c 50738->51930 50741 4830fd 50743 414ae8 4 API calls 50741->50743 50744 48310d 50743->50744 50745 403450 4 API calls 50744->50745 50746 48311a 50745->50746 50747 469868 SendMessageA 50746->50747 50748 483133 50747->50748 50749 483184 50748->50749 52117 479e18 23 API calls 50748->52117 50751 4241dc 11 API calls 50749->50751 50752 48318e 50751->50752 50753 48319f SetActiveWindow 50752->50753 50754 4831b4 50752->50754 50753->50754 50755 4824b4 18 API calls 50754->50755 50756 4831c7 50755->50756 51959 475bd0 50756->51959 50802->50477 50803->50461 50804->50461 50805->50461 50806->50482 50808 457f41 50807->50808 50809 457f61 50808->50809 50810 4078f4 19 API calls 50808->50810 50812 403400 4 API calls 50809->50812 50811 457f59 50810->50811 50813 457d10 24 API calls 50811->50813 50814 457f76 50812->50814 50813->50809 50814->50503 50823->50482 50857 46c4bc 50824->50857 50827 414ae8 50828 414af6 50827->50828 50829 4034e0 4 API calls 50828->50829 50830 414b03 50829->50830 50830->50521 50832 42cbc0 6 API calls 50831->50832 50837 455fb2 50832->50837 50833 455fca 50834 403420 4 API calls 50833->50834 50836 456016 50834->50836 50836->50531 50837->50833 50839 403494 4 API calls 50837->50839 51052 455e0c GetModuleHandleA GetProcAddress 50837->51052 51077 42c8a4 50837->51077 50839->50837 50841 46661a 50840->50841 51099 4078f4 50841->51099 51142 42cccc 50849->51142 50852 451458 50853 451428 4 API calls 50852->50853 50854 451474 50853->50854 50855 47efd0 42 API calls 50854->50855 50855->50542 50856->50548 50858 414ae8 4 API calls 50857->50858 50859 46c4f0 50858->50859 50918 466898 50859->50918 50863 46c502 50864 46c511 50863->50864 50868 46c52a 50863->50868 50987 47efd0 42 API calls 50864->50987 50866 46c525 50867 403420 4 API calls 50866->50867 50870 46b702 50867->50870 50869 46c571 50868->50869 50871 46c558 50868->50871 50872 46c5d6 50869->50872 50885 46c575 50869->50885 50870->50517 50870->50827 50988 47efd0 42 API calls 50871->50988 50990 42cb4c CharNextA 50872->50990 50875 46c5e5 50876 46c5e9 50875->50876 50881 46c602 50875->50881 50991 47efd0 42 API calls 50876->50991 50878 46c5bd 50989 47efd0 42 API calls 50878->50989 50880 46c626 50992 47efd0 42 API calls 50880->50992 50881->50880 50932 466a08 50881->50932 50885->50878 50885->50881 50888 46c63f 50940 403778 50888->50940 50893 46c666 50993 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50893->50993 50894 46c697 50951 42c8cc 50894->50951 50898 46c679 50899 451458 4 API calls 50898->50899 50901 46c686 50899->50901 50994 47efd0 42 API calls 50901->50994 50923 4668b2 50918->50923 50919 406bb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50919->50923 50921 42cbc0 6 API calls 50921->50923 50922 403450 4 API calls 50922->50923 50923->50919 50923->50921 50923->50922 50924 4668fb 50923->50924 50997 42caac 50923->50997 50925 403420 4 API calls 50924->50925 50926 466915 50925->50926 50927 414b18 50926->50927 50928 414ae8 4 API calls 50927->50928 50929 414b3c 50928->50929 50930 403400 4 API calls 50929->50930 50931 414b6d 50930->50931 50931->50863 50933 466a12 50932->50933 50934 466a25 50933->50934 51013 42cb3c CharNextA 50933->51013 50934->50880 50936 466a38 50934->50936 50937 466a42 50936->50937 50938 466a6f 50937->50938 51014 42cb3c CharNextA 50937->51014 50938->50880 50938->50888 50941 4037aa 50940->50941 50942 40377d 50940->50942 50943 403400 4 API calls 50941->50943 50942->50941 50945 403791 50942->50945 50944 4037a0 50943->50944 50947 42c99c 50944->50947 50946 4034e0 4 API calls 50945->50946 50946->50944 50948 42c9f5 50947->50948 50949 42c9b2 50947->50949 50948->50893 50948->50894 50949->50948 51015 42cb3c CharNextA 50949->51015 51016 42c674 50951->51016 50954 42c8e0 50956 403400 4 API calls 50954->50956 50955 42c8e9 50957 403778 4 API calls 50955->50957 50958 42c8e7 50956->50958 50957->50958 50959 42c3fc 50958->50959 50960 42c406 50959->50960 50987->50866 50988->50866 50989->50866 50990->50875 50991->50866 50992->50866 50993->50898 50994->50866 50998 403494 4 API calls 50997->50998 50999 42cabc 50998->50999 51000 403744 4 API calls 50999->51000 51003 42caf2 50999->51003 51006 42c444 IsDBCSLeadByte 50999->51006 51000->50999 51002 42cb36 51002->50923 51003->51002 51007 4037b8 51003->51007 51012 42c444 IsDBCSLeadByte 51003->51012 51006->50999 51008 403744 4 API calls 51007->51008 51010 4037c6 51008->51010 51009 4037fc 51009->51003 51010->51009 51011 4038a4 4 API calls 51010->51011 51011->51009 51012->51003 51013->50933 51014->50937 51015->50949 51019 42c67c 51016->51019 51018 42c67b 51018->50954 51018->50955 51023 42c68d 51019->51023 51020 42c6f1 51021 42c6ec 51020->51021 51027 42c444 IsDBCSLeadByte 51020->51027 51021->51018 51023->51020 51025 42c6ab 51023->51025 51025->51021 51026 42c444 IsDBCSLeadByte 51025->51026 51026->51025 51027->51021 51053 452724 2 API calls 51052->51053 51054 455e54 51053->51054 51055 455e61 51054->51055 51056 455e58 51054->51056 51057 455ea5 51055->51057 51058 455e73 51055->51058 51060 403420 4 API calls 51056->51060 51061 42c804 5 API calls 51057->51061 51082 42c804 51058->51082 51063 455f4a 51060->51063 51064 455ebf 51061->51064 51063->50837 51066 42c8cc 5 API calls 51064->51066 51065 42c3fc 5 API calls 51067 455e8f 51065->51067 51068 455eca 51066->51068 51070 455e97 GetDiskFreeSpaceExA 51067->51070 51069 42c3fc 5 API calls 51068->51069 51071 455ed5 51069->51071 51072 455f13 51070->51072 51073 455edd GetDiskFreeSpaceA 51071->51073 51074 452760 Wow64RevertWow64FsRedirection 51072->51074 51073->51072 51076 455ef2 51073->51076 51075 455f28 51074->51075 51075->50837 51076->51072 51093 42c79c 51077->51093 51080 403778 4 API calls 51081 42c8c5 51080->51081 51081->50837 51091 403738 51082->51091 51085 42c833 51086 42c84a 51085->51086 51088 42c83b 51085->51088 51087 403494 4 API calls 51086->51087 51089 42c848 51087->51089 51090 4034e0 4 API calls 51088->51090 51089->51065 51090->51089 51092 40373c GetFullPathNameA 51091->51092 51092->51085 51092->51086 51094 42c67c IsDBCSLeadByte 51093->51094 51096 42c7b1 51094->51096 51095 42c7fb 51095->51080 51096->51095 51098 42c444 IsDBCSLeadByte 51096->51098 51098->51096 51102 407908 51099->51102 51103 407925 51102->51103 51110 4075b8 51103->51110 51106 407951 51108 4034e0 4 API calls 51106->51108 51109 407903 51108->51109 51109->50538 51112 4075d3 51110->51112 51111 4075e5 51111->51106 51115 4069a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51111->51115 51112->51111 51116 4076da 19 API calls 51112->51116 51117 4075ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51112->51117 51115->51106 51116->51112 51117->51112 51143 42cbc0 6 API calls 51142->51143 51144 42ccee 51143->51144 51145 42ccf6 GetFileAttributesA 51144->51145 51146 403400 4 API calls 51145->51146 51147 42cd13 51146->51147 51147->50542 51147->50852 51148->50557 51149->50568 51180 466714 51150->51180 51153->50569 51155 457e44 51154->51155 51156 457d3c 51154->51156 51157 457e95 51155->51157 51219 45757c 6 API calls 51155->51219 51215 457a0c GetSystemTimeAsFileTime FileTimeToSystemTime 51156->51215 51160 403400 4 API calls 51157->51160 51162 457eaa 51160->51162 51161 457d44 51163 4078f4 19 API calls 51161->51163 51162->50568 51164 457db5 51163->51164 51216 457d00 20 API calls 51164->51216 51166 457e0b 51167 457e3a 51166->51167 51171 403778 4 API calls 51166->51171 51218 457d00 20 API calls 51167->51218 51168 403778 4 API calls 51170 457dbd 51168->51170 51170->51166 51170->51168 51173 457d00 20 API calls 51170->51173 51172 457e32 51171->51172 51217 457d00 20 API calls 51172->51217 51173->51170 51176 4824d7 51175->51176 51178 482505 51175->51178 51220 494cec 18 API calls 51176->51220 51179 481c6c PostMessageA 51178->51179 51179->50582 51181 403494 4 API calls 51180->51181 51182 466742 51181->51182 51197 42dbc8 51182->51197 51185 42dbc8 5 API calls 51186 466766 51185->51186 51187 466600 19 API calls 51186->51187 51188 466770 51187->51188 51189 42dbc8 5 API calls 51188->51189 51190 46677f 51189->51190 51200 466678 51190->51200 51193 42dbc8 5 API calls 51194 466798 51193->51194 51195 403400 4 API calls 51194->51195 51196 4667ad 51195->51196 51196->50581 51204 42db10 51197->51204 51201 466698 51200->51201 51202 4078f4 19 API calls 51201->51202 51203 4666e2 51202->51203 51203->51193 51205 42dbbb 51204->51205 51207 42db30 51204->51207 51205->51185 51206 4037b8 4 API calls 51206->51207 51207->51205 51207->51206 51210 403800 51207->51210 51214 42c444 IsDBCSLeadByte 51207->51214 51211 403804 51210->51211 51213 40382f 51210->51213 51212 4038a4 4 API calls 51211->51212 51212->51213 51213->51207 51214->51207 51215->51161 51216->51170 51217->51167 51218->51155 51219->51157 51220->51178 51223 46a787 51221->51223 51222 46abff 51225 46ac1a 51222->51225 51226 46ac4b 51222->51226 51223->51222 51224 46a842 51223->51224 51227 403494 4 API calls 51223->51227 51230 46a863 51224->51230 51235 46a8a4 51224->51235 51228 403494 4 API calls 51225->51228 51229 403494 4 API calls 51226->51229 51232 46a7c6 51227->51232 51233 46ac28 51228->51233 51234 46ac59 51229->51234 51231 403494 4 API calls 51230->51231 51236 46a871 51231->51236 51237 414ae8 4 API calls 51232->51237 51327 46915c 12 API calls 51233->51327 51328 46915c 12 API calls 51234->51328 51239 403400 4 API calls 51235->51239 51241 414ae8 4 API calls 51236->51241 51242 46a7e7 51237->51242 51243 46a8a2 51239->51243 51245 46a892 51241->51245 51246 403634 4 API calls 51242->51246 51263 46a988 51243->51263 51307 469868 51243->51307 51244 46ac36 51247 403400 4 API calls 51244->51247 51248 403634 4 API calls 51245->51248 51249 46a7f7 51246->51249 51251 46ac7c 51247->51251 51248->51243 51253 414ae8 4 API calls 51249->51253 51256 403400 4 API calls 51251->51256 51252 46aa10 51254 403400 4 API calls 51252->51254 51257 46a80b 51253->51257 51258 46aa0e 51254->51258 51255 46a8c4 51259 46a902 51255->51259 51260 46a8ca 51255->51260 51261 46ac84 51256->51261 51257->51224 51269 414ae8 4 API calls 51257->51269 51322 469ca4 43 API calls 51258->51322 51264 403400 4 API calls 51259->51264 51265 403494 4 API calls 51260->51265 51262 403420 4 API calls 51261->51262 51266 46ac91 51262->51266 51263->51252 51267 46a9cf 51263->51267 51268 46a900 51264->51268 51270 46a8d8 51265->51270 51266->50591 51272 403494 4 API calls 51267->51272 51316 469b5c 51268->51316 51273 46a832 51269->51273 51313 47c26c 51270->51313 51277 46a9dd 51272->51277 51278 403634 4 API calls 51273->51278 51275 46aa39 51284 46aa44 51275->51284 51285 46aa9a 51275->51285 51276 46a8f0 51279 403634 4 API calls 51276->51279 51280 414ae8 4 API calls 51277->51280 51278->51224 51279->51268 51282 46a9fe 51280->51282 51286 403634 4 API calls 51282->51286 51283 46a929 51289 46a934 51283->51289 51290 46a98a 51283->51290 51288 403494 4 API calls 51284->51288 51287 403400 4 API calls 51285->51287 51286->51258 51293 46aaa2 51287->51293 51295 46aa52 51288->51295 51292 403494 4 API calls 51289->51292 51291 403400 4 API calls 51290->51291 51291->51263 51297 46a942 51292->51297 51305 46ab4b 51293->51305 51323 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51293->51323 51295->51293 51299 403634 4 API calls 51295->51299 51301 46aa98 51295->51301 51296 46aac5 51296->51305 51324 494f3c 18 API calls 51296->51324 51297->51263 51300 403634 4 API calls 51297->51300 51299->51295 51300->51297 51301->51293 51303 46abec 51326 429144 SendMessageA SendMessageA 51303->51326 51325 4290f4 SendMessageA 51305->51325 51306->50589 51329 42a040 SendMessageA 51307->51329 51309 469877 51310 469897 51309->51310 51330 42a040 SendMessageA 51309->51330 51310->51255 51312 469887 51312->51255 51331 47c2b4 51313->51331 51321 469b89 51316->51321 51317 469beb 51318 403400 4 API calls 51317->51318 51319 469c00 51318->51319 51319->51283 51321->51317 51663 469ae0 43 API calls 51321->51663 51322->51275 51323->51296 51324->51305 51325->51303 51326->51222 51327->51244 51328->51244 51329->51309 51330->51312 51332 403494 4 API calls 51331->51332 51340 47c2e7 51332->51340 51333 47c3f9 51334 403420 4 API calls 51333->51334 51335 47c289 51334->51335 51335->51276 51337 403778 4 API calls 51337->51340 51339 403800 4 API calls 51339->51340 51340->51333 51340->51337 51340->51339 51342 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51340->51342 51343 47b100 51340->51343 51587 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51340->51587 51588 42c97c CharPrevA 51340->51588 51342->51340 51344 47b152 51343->51344 51345 47b130 51343->51345 51346 47b172 51344->51346 51347 47b160 51344->51347 51345->51344 51593 47a030 19 API calls 51345->51593 51350 47b1d5 51346->51350 51351 47b180 51346->51351 51348 403494 4 API calls 51347->51348 51432 47b16d 51348->51432 51359 47b1f6 51350->51359 51360 47b1e3 51350->51360 51353 47b1af 51351->51353 51354 47b189 51351->51354 51352 403400 4 API calls 51355 47baf8 51352->51355 51357 47b1c2 51353->51357 51595 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51353->51595 51356 47b19c 51354->51356 51594 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51354->51594 51358 403400 4 API calls 51355->51358 51362 403494 4 API calls 51356->51362 51364 403494 4 API calls 51357->51364 51365 47bb00 51358->51365 51367 47b217 51359->51367 51368 47b204 51359->51368 51366 403494 4 API calls 51360->51366 51362->51432 51364->51432 51365->51340 51366->51432 51370 47b267 51367->51370 51371 47b225 51367->51371 51369 403494 4 API calls 51368->51369 51369->51432 51378 47b275 51370->51378 51379 47b288 51370->51379 51372 47b241 51371->51372 51373 47b22e 51371->51373 51375 47b254 51372->51375 51596 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51372->51596 51374 403494 4 API calls 51373->51374 51374->51432 51377 403494 4 API calls 51375->51377 51377->51432 51380 403494 4 API calls 51378->51380 51381 47b296 51379->51381 51382 47b2a9 51379->51382 51380->51432 51383 403494 4 API calls 51381->51383 51384 47b2b7 51382->51384 51385 47b2ca 51382->51385 51383->51432 51386 403494 4 API calls 51384->51386 51387 47b2eb 51385->51387 51388 47b2d8 51385->51388 51386->51432 51390 47b327 51387->51390 51391 47b2f9 51387->51391 51389 403494 4 API calls 51388->51389 51389->51432 51396 47b335 51390->51396 51397 47b364 51390->51397 51392 47b315 51391->51392 51393 47b302 51391->51393 51395 47c26c 43 API calls 51392->51395 51394 403494 4 API calls 51393->51394 51394->51432 51395->51432 51398 47b351 51396->51398 51399 47b33e 51396->51399 51402 47b372 51397->51402 51403 47b3a0 51397->51403 51401 403494 4 API calls 51398->51401 51400 403494 4 API calls 51399->51400 51400->51432 51401->51432 51404 47b38e 51402->51404 51405 47b37b 51402->51405 51408 47b3ae 51403->51408 51409 47b3dd 51403->51409 51407 47c26c 43 API calls 51404->51407 51406 403494 4 API calls 51405->51406 51406->51432 51407->51432 51410 47b3b7 51408->51410 51411 47b3ca 51408->51411 51414 47b3fe 51409->51414 51415 47b3eb 51409->51415 51412 403494 4 API calls 51410->51412 51413 403494 4 API calls 51411->51413 51412->51432 51413->51432 51417 47b41f 51414->51417 51418 47b40c 51414->51418 51416 403494 4 API calls 51415->51416 51416->51432 51420 47b42d 51417->51420 51421 47b458 51417->51421 51419 403494 4 API calls 51418->51419 51419->51432 51422 47b436 51420->51422 51423 47b449 51420->51423 51426 47b466 51421->51426 51429 47b491 51421->51429 51424 403494 4 API calls 51422->51424 51597 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51423->51597 51424->51432 51427 47b482 51426->51427 51428 47b46f 51426->51428 51598 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51427->51598 51430 403494 4 API calls 51428->51430 51433 47b4b1 51429->51433 51434 47b49f 51429->51434 51430->51432 51432->51352 51436 47b4d2 51433->51436 51437 47b4bf 51433->51437 51435 47c26c 43 API calls 51434->51435 51435->51432 51587->51340 51588->51340 51593->51345 51594->51356 51595->51357 51596->51375 51597->51432 51598->51432 51663->51321 51665 47dd19 51664->51665 51668 47dd56 51664->51668 51693 455d0c 51665->51693 51668->50596 51670 47dd6d 51670->50596 51671->50605 51673 42f56c 51672->51673 51674 42f58f GetActiveWindow GetFocus 51673->51674 51675 41eea4 2 API calls 51674->51675 51676 42f5a6 51675->51676 51677 42f5c3 51676->51677 51678 42f5b3 RegisterClassA 51676->51678 51679 42f652 SetFocus 51677->51679 51680 42f5d1 CreateWindowExA 51677->51680 51678->51677 51682 403400 4 API calls 51679->51682 51680->51679 51681 42f604 51680->51681 51799 42427c 51681->51799 51684 42f66e 51682->51684 51688 494f3c 18 API calls 51684->51688 51685 42f62c 51686 42f634 CreateWindowExA 51685->51686 51686->51679 51687 42f64a ShowWindow 51686->51687 51687->51679 51688->50641 51805 44b514 51689->51805 51691 466b3f 51691->50646 51694 455d1d 51693->51694 51695 455d21 51694->51695 51696 455d2a 51694->51696 51718 455a10 51695->51718 51726 455af0 29 API calls 51696->51726 51699 455d27 51699->51668 51700 47d970 51699->51700 51705 47d9b0 51700->51705 51706 47da6c 51700->51706 51701 403420 4 API calls 51702 47db4f 51701->51702 51702->51670 51705->51706 51709 47c26c 43 API calls 51705->51709 51712 47da0f 51705->51712 51715 47da18 51705->51715 51755 479770 51705->51755 51766 4798d4 51705->51766 51708 47c26c 43 API calls 51706->51708 51711 454100 20 API calls 51706->51711 51706->51712 51781 479630 51706->51781 51708->51706 51709->51705 51710 47c26c 43 API calls 51710->51715 51711->51706 51712->51701 51715->51705 51715->51710 51717 47da59 51715->51717 51770 42c92c 51715->51770 51775 42c954 51715->51775 51780 47d67c 52 API calls 51715->51780 51717->51712 51727 42de1c 51718->51727 51720 455a2d 51721 455a7b 51720->51721 51730 455944 51720->51730 51721->51699 51724 455944 6 API calls 51725 455a5c RegCloseKey 51724->51725 51725->51699 51726->51699 51728 42de27 51727->51728 51729 42de2d RegOpenKeyExA 51727->51729 51728->51729 51729->51720 51735 42dd58 51730->51735 51732 403420 4 API calls 51733 4559f6 51732->51733 51733->51724 51734 45596c 51734->51732 51738 42dc00 51735->51738 51739 42dc26 RegQueryValueExA 51738->51739 51740 42dc49 51739->51740 51745 42dc6b 51739->51745 51742 42dc63 51740->51742 51740->51745 51746 4034e0 4 API calls 51740->51746 51747 403744 4 API calls 51740->51747 51741 403400 4 API calls 51743 42dd37 51741->51743 51744 403400 4 API calls 51742->51744 51743->51734 51744->51745 51745->51741 51746->51740 51748 42dca0 RegQueryValueExA 51747->51748 51748->51739 51749 42dcbc 51748->51749 51749->51745 51750 4038a4 4 API calls 51749->51750 51751 42dcfe 51750->51751 51752 42dd10 51751->51752 51754 403744 4 API calls 51751->51754 51753 403450 4 API calls 51752->51753 51753->51745 51754->51752 51756 479786 51755->51756 51757 479782 51755->51757 51758 403450 4 API calls 51756->51758 51757->51705 51759 479793 51758->51759 51760 4797b3 51759->51760 51761 479799 51759->51761 51763 479630 19 API calls 51760->51763 51762 479630 19 API calls 51761->51762 51764 4797af 51762->51764 51763->51764 51765 403400 4 API calls 51764->51765 51765->51757 51767 4798e0 51766->51767 51768 4798fb 51767->51768 51793 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51767->51793 51768->51705 51771 42c79c IsDBCSLeadByte 51770->51771 51772 42c93c 51771->51772 51773 403778 4 API calls 51772->51773 51774 42c94e 51773->51774 51774->51715 51776 42c79c IsDBCSLeadByte 51775->51776 51777 42c964 51776->51777 51778 403778 4 API calls 51777->51778 51779 42c975 51778->51779 51779->51715 51780->51715 51782 47964b 51781->51782 51784 47967c 51782->51784 51792 47970a 51782->51792 51794 4794e4 19 API calls 51782->51794 51785 4796a1 51784->51785 51795 4794e4 19 API calls 51784->51795 51788 4796c2 51785->51788 51796 4794e4 19 API calls 51785->51796 51789 479702 51788->51789 51788->51792 51797 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51788->51797 51798 479368 19 API calls 51789->51798 51792->51706 51793->51768 51794->51784 51795->51785 51796->51788 51797->51789 51798->51792 51800 4242ae 51799->51800 51801 42428e GetWindowTextA 51799->51801 51803 403494 4 API calls 51800->51803 51802 4034e0 4 API calls 51801->51802 51804 4242ac 51802->51804 51803->51804 51804->51685 51808 44b38c 51805->51808 51807 44b527 51807->51691 51809 44b3bf 51808->51809 51810 414ae8 4 API calls 51809->51810 51811 44b3d2 51810->51811 51812 40357c 4 API calls 51811->51812 51813 44b3ff GetDC 51811->51813 51812->51813 51819 41a1e8 51813->51819 51816 44b430 51827 44b0c0 51816->51827 51818 44b444 ReleaseDC 51818->51807 51820 41a213 51819->51820 51821 41a2af 51819->51821 51838 403520 51820->51838 51822 403400 4 API calls 51821->51822 51823 41a2c7 SelectObject 51822->51823 51823->51816 51825 41a26b 51826 41a2a3 CreateFontIndirectA 51825->51826 51826->51821 51828 44b0d7 51827->51828 51829 44b16a 51828->51829 51830 44b153 51828->51830 51831 44b0ea 51828->51831 51829->51818 51833 44b163 DrawTextA 51830->51833 51831->51829 51832 402648 4 API calls 51831->51832 51834 44b0fb 51832->51834 51833->51829 51835 44b119 MultiByteToWideChar DrawTextW 51834->51835 51839 4034e0 4 API calls 51838->51839 51840 40352a 51839->51840 51840->51825 51843 4652d7 51841->51843 51842 4653b2 51852 46708c 51842->51852 51843->51842 51847 465327 51843->51847 51864 421a1c 51843->51864 51844 46536a 51844->51842 51870 4185b8 7 API calls 51844->51870 51847->51844 51848 465361 51847->51848 51849 46536c 51847->51849 51850 421a1c 7 API calls 51848->51850 51851 421a1c 7 API calls 51849->51851 51850->51844 51851->51844 51853 4670bc 51852->51853 51854 46709d 51852->51854 51853->50661 51855 414b18 4 API calls 51854->51855 51856 4670ab 51855->51856 51857 414b18 4 API calls 51856->51857 51857->51853 51860 46ad09 51858->51860 51859 421a1c 7 API calls 51861 46ad94 51859->51861 51860->51859 51861->50684 51862 466b60 18 API calls 51861->51862 51862->50684 51865 421a74 51864->51865 51869 421a2a 51864->51869 51865->51847 51868 421a59 51868->51865 51879 421d28 SetFocus GetFocus 51868->51879 51869->51868 51871 408cbc 51869->51871 51870->51842 51872 408cc8 51871->51872 51880 406dec LoadStringA 51872->51880 51875 403450 4 API calls 51876 408cf9 51875->51876 51877 403400 4 API calls 51876->51877 51878 408d0e 51877->51878 51878->51868 51879->51865 51881 4034e0 4 API calls 51880->51881 51882 406e19 51881->51882 51882->51875 51931 46c7a5 51930->51931 51932 414ae8 4 API calls 51931->51932 51942 46c7f2 51931->51942 51933 46c7bb 51932->51933 52124 466924 6 API calls 51933->52124 51934 403420 4 API calls 51936 46c89c 51934->51936 51936->50741 52116 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51936->52116 51937 46c7c3 51938 414b18 4 API calls 51937->51938 51939 46c7d1 51938->51939 51940 46c7de 51939->51940 51943 46c7f7 51939->51943 52125 47efd0 42 API calls 51940->52125 51942->51934 51944 46c80f 51943->51944 51946 466a08 CharNextA 51943->51946 52126 47efd0 42 API calls 51944->52126 51947 46c80b 51946->51947 51947->51944 51948 46c825 51947->51948 51949 46c841 51948->51949 51950 46c82b 51948->51950 51952 42c99c CharNextA 51949->51952 52127 47efd0 42 API calls 51950->52127 51953 46c84e 51952->51953 51953->51942 52128 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51953->52128 51955 46c865 51956 451458 4 API calls 51955->51956 51957 46c872 51956->51957 52129 47efd0 42 API calls 51957->52129 51960 457d10 24 API calls 51959->51960 51961 475c1c 51960->51961 52130 4072a8 51961->52130 51963 475c26 52133 46e308 51963->52133 52117->50749 52124->51937 52125->51942 52126->51942 52127->51942 52128->51955 52129->51942 52131 403738 52130->52131 52132 4072b2 SetCurrentDirectoryA 52131->52132 52132->51963 52134 46e37b 52133->52134 52136 46e325 52133->52136 52137 46e380 52134->52137 52135 479770 19 API calls 52135->52136 52136->52134 52136->52135 52138 46e3a6 52137->52138 52672 44fb1c 52138->52672 52675 44fb30 52672->52675 52676 44fb41 52675->52676 52677 44fb2d 52676->52677 52678 44fb6b MulDiv 52676->52678 54018 417218 54019 417231 54018->54019 54028 4172e7 54018->54028 54020 4172b1 54019->54020 54021 41723b 54019->54021 54022 4172c4 GetLastActivePopup GetForegroundWindow 54020->54022 54020->54028 54024 41724b 54021->54024 54025 41725f GetCursorPos 54021->54025 54021->54028 54023 4172dd 54022->54023 54022->54028 54032 424240 GetLastActivePopup IsWindowVisible IsWindowEnabled SetForegroundWindow 54023->54032 54024->54028 54029 4172a2 SetCursor 54024->54029 54027 417272 54025->54027 54031 4168d0 PtInRect 54027->54031 54029->54028 54031->54024 54032->54028 54033 41fb58 54034 41fb61 54033->54034 54037 41fdfc 54034->54037 54036 41fb6e 54038 41feee 54037->54038 54039 41fe13 54037->54039 54038->54036 54039->54038 54058 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 54039->54058 54041 41fe49 54042 41fe73 54041->54042 54043 41fe4d 54041->54043 54068 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 54042->54068 54059 41fb9c 54043->54059 54047 41fe81 54049 41fe85 54047->54049 54050 41feab 54047->54050 54048 41fb9c 10 API calls 54053 41fe71 54048->54053 54051 41fb9c 10 API calls 54049->54051 54052 41fb9c 10 API calls 54050->54052 54054 41fe97 54051->54054 54055 41febd 54052->54055 54053->54036 54056 41fb9c 10 API calls 54054->54056 54057 41fb9c 10 API calls 54055->54057 54056->54053 54057->54053 54058->54041 54060 41fbb7 54059->54060 54061 41fbcd 54060->54061 54062 41f93c 4 API calls 54060->54062 54069 41f93c 54061->54069 54062->54061 54064 41fc15 54065 41fc38 SetScrollInfo 54064->54065 54077 41fa9c 54065->54077 54068->54047 54070 4181e0 54069->54070 54071 41f959 GetWindowLongA 54070->54071 54072 41f996 54071->54072 54073 41f976 54071->54073 54089 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 54072->54089 54088 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 54073->54088 54076 41f982 54076->54064 54078 41fab2 54077->54078 54079 41faaa 54077->54079 54080 41faef 54078->54080 54081 41faf1 54078->54081 54082 41fae1 54078->54082 54079->54048 54083 41fb31 GetScrollPos 54080->54083 54091 417e48 IsWindowVisible ScrollWindow SetWindowPos 54081->54091 54090 417e48 IsWindowVisible ScrollWindow SetWindowPos 54082->54090 54083->54079 54086 41fb3c 54083->54086 54087 41fb4b SetScrollPos 54086->54087 54087->54079 54088->54076 54089->54076 54090->54080 54091->54080 54092 420598 54093 4205ab 54092->54093 54113 415b30 54093->54113 54095 4206f2 54096 420709 54095->54096 54120 4146d4 KiUserCallbackDispatcher 54095->54120 54100 420720 54096->54100 54121 414718 KiUserCallbackDispatcher 54096->54121 54097 420651 54118 420848 20 API calls 54097->54118 54098 4205e6 54098->54095 54098->54097 54105 420642 MulDiv 54098->54105 54107 420742 54100->54107 54122 420060 12 API calls 54100->54122 54103 42066a 54103->54095 54119 420060 12 API calls 54103->54119 54117 41a304 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 54105->54117 54109 420687 54110 4206a3 MulDiv 54109->54110 54111 4206c6 54109->54111 54110->54111 54111->54095 54112 4206cf MulDiv 54111->54112 54112->54095 54114 415b42 54113->54114 54123 414470 54114->54123 54116 415b5a 54116->54098 54117->54097 54118->54103 54119->54109 54120->54096 54121->54100 54122->54107 54124 41448a 54123->54124 54127 410458 54124->54127 54126 4144a0 54126->54116 54130 40dca4 54127->54130 54129 41045e 54129->54126 54131 40dd06 54130->54131 54134 40dcb7 54130->54134 54137 40dd14 54131->54137 54135 40dd14 19 API calls 54134->54135 54136 40dce1 54135->54136 54136->54129 54138 40dd24 54137->54138 54140 40dd3a 54138->54140 54149 40e09c 54138->54149 54165 40d5e0 54138->54165 54168 40df4c 54140->54168 54143 40d5e0 5 API calls 54144 40dd42 54143->54144 54144->54143 54145 40ddae 54144->54145 54171 40db60 54144->54171 54147 40df4c 5 API calls 54145->54147 54148 40dd10 54147->54148 54148->54129 54185 40e96c 54149->54185 54151 403778 4 API calls 54158 40e0d7 54151->54158 54152 40e18d 54153 40e1b7 54152->54153 54154 40e1a8 54152->54154 54245 40ba24 54153->54245 54194 40e3c0 54154->54194 54158->54151 54158->54152 54248 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54158->54248 54249 40e080 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54158->54249 54161 40e1b5 54162 403400 4 API calls 54161->54162 54163 40e25c 54162->54163 54163->54138 54166 40ea08 5 API calls 54165->54166 54167 40d5ea 54166->54167 54167->54138 54282 40d4bc 54168->54282 54291 40df54 54171->54291 54174 40e96c 5 API calls 54175 40db9e 54174->54175 54176 40e96c 5 API calls 54175->54176 54177 40dba9 54176->54177 54178 40dbc4 54177->54178 54179 40dbbb 54177->54179 54181 40dbc1 54177->54181 54298 40d9d8 54178->54298 54301 40dac8 19 API calls 54179->54301 54183 403420 4 API calls 54181->54183 54184 40dc8f 54183->54184 54184->54144 54251 40d780 54185->54251 54188 4034e0 4 API calls 54189 40e98f 54188->54189 54190 403744 4 API calls 54189->54190 54191 40e996 54190->54191 54192 40d780 5 API calls 54191->54192 54193 40e9a4 54192->54193 54193->54158 54195 40e3f6 54194->54195 54196 40e3ec 54194->54196 54198 40e511 54195->54198 54199 40e495 54195->54199 54200 40e4f6 54195->54200 54201 40e576 54195->54201 54202 40e438 54195->54202 54203 40e4d9 54195->54203 54204 40e47a 54195->54204 54205 40e4bb 54195->54205 54238 40e45c 54195->54238 54256 40d440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54196->54256 54213 40d764 5 API calls 54198->54213 54264 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54199->54264 54269 40e890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54200->54269 54208 40d764 5 API calls 54201->54208 54257 40d764 54202->54257 54267 40e9a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54203->54267 54263 40d818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54204->54263 54266 40dde4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54205->54266 54207 403400 4 API calls 54215 40e5eb 54207->54215 54216 40e57e 54208->54216 54220 40e519 54213->54220 54215->54161 54221 40e582 54216->54221 54222 40e59b 54216->54222 54217 40e4e4 54268 409d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54217->54268 54219 40e4a0 54265 40d470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54219->54265 54227 40e523 54220->54227 54228 40e51d 54220->54228 54232 40ea08 5 API calls 54221->54232 54276 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54222->54276 54224 40e461 54262 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54224->54262 54225 40e444 54260 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54225->54260 54270 40ea08 54227->54270 54229 40e521 54228->54229 54230 40e53c 54228->54230 54274 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54229->54274 54236 40ea08 5 API calls 54230->54236 54232->54238 54239 40e544 54236->54239 54237 40e44f 54261 40e26c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54237->54261 54238->54207 54273 40d8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54239->54273 54242 40e566 54275 40e2d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54242->54275 54277 40b9d0 54245->54277 54248->54158 54249->54158 54250 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54250->54161 54254 40d78b 54251->54254 54252 40d7c5 54252->54188 54254->54252 54255 40d7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54254->54255 54255->54254 54256->54195 54258 40ea08 5 API calls 54257->54258 54259 40d76e 54258->54259 54259->54224 54259->54225 54260->54237 54261->54238 54262->54238 54263->54238 54264->54219 54265->54238 54266->54238 54267->54217 54268->54238 54269->54238 54271 40d780 5 API calls 54270->54271 54272 40ea15 54271->54272 54272->54238 54273->54238 54274->54242 54275->54238 54276->54238 54278 40b9e2 54277->54278 54279 40ba07 54277->54279 54278->54279 54281 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54278->54281 54279->54161 54279->54250 54281->54279 54283 40ea08 5 API calls 54282->54283 54284 40d4c9 54283->54284 54285 40d4dc 54284->54285 54289 40eb0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54284->54289 54285->54144 54287 40d4d7 54290 40d458 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54287->54290 54289->54287 54290->54285 54292 40d764 5 API calls 54291->54292 54293 40df6b 54292->54293 54294 40db93 54293->54294 54295 40ea08 5 API calls 54293->54295 54294->54174 54296 40df78 54295->54296 54296->54294 54302 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54296->54302 54303 40ab7c 19 API calls 54298->54303 54300 40da00 54300->54181 54301->54181 54302->54294 54303->54300 54304 416a1c 54305 416a47 54304->54305 54306 416a2f 54304->54306 54309 416a42 54305->54309 54329 416990 PtInRect GetCapture 54305->54329 54307 416a31 54306->54307 54308 416a9a 54306->54308 54312 416a64 54307->54312 54315 416a36 54307->54315 54321 415270 54308->54321 54313 415270 59 API calls 54309->54313 54314 416ad1 54309->54314 54312->54309 54320 421aec 6 API calls 54312->54320 54313->54314 54315->54309 54317 416b01 GetCapture 54315->54317 54317->54309 54318 416aa3 54318->54314 54328 4168d0 PtInRect 54318->54328 54320->54309 54322 41527d 54321->54322 54323 4152e3 54322->54323 54325 4152d8 54322->54325 54327 4152e1 54322->54327 54330 424b8c 13 API calls 54323->54330 54325->54327 54331 41505c 46 API calls 54325->54331 54327->54318 54328->54314 54329->54309 54330->54327 54331->54327 54332 42285c 54333 42286f 54332->54333 54335 42288c 54332->54335 54334 408cbc 5 API calls 54333->54334 54333->54335 54334->54335 54336 422aa1 54335->54336 54337 4228c6 54335->54337 54343 422aff 54335->54343 54338 422af3 54336->54338 54339 422ae9 54336->54339 54355 42291d 54337->54355 54372 4231a8 GetSystemMetrics 54337->54372 54338->54343 54344 422b37 54338->54344 54345 422b18 54338->54345 54375 421e2c 11 API calls 54339->54375 54340 4229c9 54346 4229d5 54340->54346 54347 422a0b 54340->54347 54341 422a7c 54349 422a96 ShowWindow 54341->54349 54352 422b41 GetActiveWindow 54344->54352 54351 422b2f SetWindowPos 54345->54351 54353 4229df SendMessageA 54346->54353 54354 422a25 ShowWindow 54347->54354 54349->54343 54350 422961 54373 4231a0 GetSystemMetrics 54350->54373 54351->54343 54356 422b4c 54352->54356 54357 422b6b 54352->54357 54358 4181e0 54353->54358 54360 4181e0 54354->54360 54355->54340 54355->54341 54366 422b54 IsIconic 54356->54366 54361 422b71 54357->54361 54362 422b96 54357->54362 54364 422a03 ShowWindow 54358->54364 54363 422a47 CallWindowProcA 54360->54363 54368 422b88 SetWindowPos SetActiveWindow 54361->54368 54369 422ba0 ShowWindow 54362->54369 54374 414cc4 54363->54374 54367 422a5a SendMessageA 54364->54367 54366->54357 54370 422b5e 54366->54370 54367->54343 54368->54343 54369->54343 54371 41eff4 2 API calls 54370->54371 54371->54357 54372->54350 54373->54355 54374->54367 54375->54338 54376 498ba8 54434 403344 54376->54434 54378 498bb6 54437 4056a0 54378->54437 54380 498bbb 54440 40631c GetModuleHandleA GetProcAddress 54380->54440 54384 498bc5 54448 40994c 54384->54448 54388 498bcf 54461 412928 54388->54461 54390 498bd9 54466 419040 GetVersion 54390->54466 54746 4032fc 54434->54746 54436 403349 GetModuleHandleA GetCommandLineA 54436->54378 54439 4056db 54437->54439 54747 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54437->54747 54439->54380 54441 406338 54440->54441 54442 40633f GetProcAddress 54440->54442 54441->54442 54443 406355 GetProcAddress 54442->54443 54444 40634e 54442->54444 54445 406364 SetProcessDEPPolicy 54443->54445 54446 406368 54443->54446 54444->54443 54445->54446 54447 4063c4 6F571CD0 54446->54447 54447->54384 54748 409024 54448->54748 54453 408720 7 API calls 54454 40996f 54453->54454 54763 409070 GetVersionExA 54454->54763 54457 410764 54458 41076e 54457->54458 54459 4107ad GetCurrentThreadId 54458->54459 54460 4107c8 54459->54460 54460->54388 54765 40ad0c 54461->54765 54465 412954 54465->54390 54777 41de24 8 API calls 54466->54777 54468 419059 54746->54436 54747->54439 54749 408cbc 5 API calls 54748->54749 54750 409035 54749->54750 54751 4085dc GetSystemDefaultLCID 54750->54751 54755 408612 54751->54755 54752 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54752->54755 54753 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54753->54755 54754 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54754->54755 54755->54752 54755->54753 54755->54754 54759 408674 54755->54759 54756 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54756->54759 54757 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54757->54759 54758 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54758->54759 54759->54756 54759->54757 54759->54758 54760 4086f7 54759->54760 54761 403420 4 API calls 54760->54761 54762 408711 54761->54762 54762->54453 54764 409087 54763->54764 54764->54457 54766 40ad13 54765->54766 54766->54766 54767 40ad32 54766->54767 54776 40ac44 19 API calls 54766->54776 54769 41100c 54767->54769 54772 41102e 54769->54772 54770 406dec 5 API calls 54770->54772 54771 403450 4 API calls 54771->54772 54772->54770 54772->54771 54773 41104d 54772->54773 54774 403400 4 API calls 54773->54774 54775 411062 54774->54775 54775->54465 54776->54766 54778 41de9e 54777->54778 54778->54468 56175 4222e4 56176 4222f3 56175->56176 56181 421274 56176->56181 56179 422313 56182 4212e3 56181->56182 56195 421283 56181->56195 56185 4212f4 56182->56185 56206 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 56182->56206 56184 421322 56188 421395 56184->56188 56193 42133d 56184->56193 56185->56184 56187 4213ba 56185->56187 56186 421393 56189 4213e6 56186->56189 56208 421e2c 11 API calls 56186->56208 56187->56186 56190 4213ce SetMenu 56187->56190 56188->56186 56196 4213a9 56188->56196 56209 4211bc 10 API calls 56189->56209 56190->56186 56193->56186 56199 421360 GetMenu 56193->56199 56194 4213ed 56194->56179 56204 4221e8 10 API calls 56194->56204 56195->56182 56205 408d2c 19 API calls 56195->56205 56198 4213b2 SetMenu 56196->56198 56198->56186 56200 421383 56199->56200 56201 42136a 56199->56201 56207 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 56200->56207 56203 42137d SetMenu 56201->56203 56203->56200 56204->56179 56205->56195 56206->56185 56207->56186 56208->56189 56209->56194 56210 404d2a 56218 404d3a 56210->56218 56211 404e07 ExitProcess 56212 404de0 56226 404cf0 56212->56226 56215 404e12 56216 404cf0 4 API calls 56217 404df4 56216->56217 56230 401a90 56217->56230 56218->56211 56218->56212 56218->56215 56220 404db7 MessageBoxA 56218->56220 56221 404dcc 56218->56221 56220->56212 56242 40500c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56221->56242 56223 404df9 56223->56211 56223->56215 56227 404cfe 56226->56227 56228 404d13 56227->56228 56243 402728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56227->56243 56228->56216 56231 401aa1 56230->56231 56232 401b6f 56230->56232 56233 401ac2 LocalFree 56231->56233 56234 401ab8 RtlEnterCriticalSection 56231->56234 56232->56223 56235 401af5 56233->56235 56234->56233 56236 401ae3 VirtualFree 56235->56236 56237 401afd 56235->56237 56236->56235 56238 401b24 LocalFree 56237->56238 56239 401b3b 56237->56239 56238->56238 56238->56239 56240 401b53 RtlLeaveCriticalSection 56239->56240 56241 401b5d RtlDeleteCriticalSection 56239->56241 56240->56241 56241->56223 56243->56228 56244 44b4a8 56245 44b4b6 56244->56245 56247 44b4d5 56244->56247 56246 44b38c 11 API calls 56245->56246 56245->56247 56246->56247 56248 4165ec DestroyWindow 56249 42e3ef SetErrorMode 56250 491bf8 56251 491c32 56250->56251 56252 491c3e 56251->56252 56253 491c34 56251->56253 56255 491c4d 56252->56255 56256 491c76 56252->56256 56447 409098 MessageBeep 56253->56447 56448 446ff8 18 API calls 56255->56448 56261 491cae 56256->56261 56262 491c85 56256->56262 56257 403420 4 API calls 56259 49228a 56257->56259 56263 403400 4 API calls 56259->56263 56260 491c5a 56449 406bb0 56260->56449 56271 491cbd 56261->56271 56274 491ce6 56261->56274 56457 446ff8 18 API calls 56262->56457 56266 492292 56263->56266 56268 491c92 56458 406c00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56268->56458 56460 446ff8 18 API calls 56271->56460 56272 491c9d 56459 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56272->56459 56277 491d0e 56274->56277 56278 491cf5 56274->56278 56276 491cca 56461 406c34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56276->56461 56286 491d1d 56277->56286 56287 491d42 56277->56287 56463 407280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 56278->56463 56279 491c39 56279->56257 56281 491cd5 56462 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56281->56462 56284 491cfd 56464 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56284->56464 56465 446ff8 18 API calls 56286->56465 56291 491d7a 56287->56291 56292 491d51 56287->56292 56289 491d2a 56290 4072a8 SetCurrentDirectoryA 56289->56290 56293 491d32 56290->56293 56297 491d89 56291->56297 56298 491db2 56291->56298 56467 446ff8 18 API calls 56292->56467 56466 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56293->56466 56296 491d5e 56299 42c804 5 API calls 56296->56299 56469 446ff8 18 API calls 56297->56469 56305 491dfe 56298->56305 56306 491dc1 56298->56306 56301 491d69 56299->56301 56468 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56301->56468 56302 491d96 56470 4071f8 8 API calls 56302->56470 56311 491e0d 56305->56311 56312 491e36 56305->56312 56472 446ff8 18 API calls 56306->56472 56307 491da1 56471 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56307->56471 56310 491dd0 56473 446ff8 18 API calls 56310->56473 56476 446ff8 18 API calls 56311->56476 56318 491e6e 56312->56318 56319 491e45 56312->56319 56314 491de1 56474 4918fc 8 API calls 56314->56474 56317 491e1a 56321 42c8a4 5 API calls 56317->56321 56328 491e7d 56318->56328 56329 491ea6 56318->56329 56478 446ff8 18 API calls 56319->56478 56320 491ded 56475 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56320->56475 56324 491e25 56321->56324 56477 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56324->56477 56325 491e52 56327 42c8cc 5 API calls 56325->56327 56330 491e5d 56327->56330 56480 446ff8 18 API calls 56328->56480 56334 491ede 56329->56334 56335 491eb5 56329->56335 56479 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56330->56479 56333 491e8a 56481 42c8fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56333->56481 56341 491eed 56334->56341 56342 491f16 56334->56342 56483 446ff8 18 API calls 56335->56483 56337 491e95 56482 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56337->56482 56340 491ec2 56343 42c92c 5 API calls 56340->56343 56485 446ff8 18 API calls 56341->56485 56349 491f62 56342->56349 56350 491f25 56342->56350 56345 491ecd 56343->56345 56484 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56345->56484 56346 491efa 56348 42c954 5 API calls 56346->56348 56351 491f05 56348->56351 56355 491f71 56349->56355 56356 491fb4 56349->56356 56487 446ff8 18 API calls 56350->56487 56486 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56351->56486 56354 491f34 56488 446ff8 18 API calls 56354->56488 56491 446ff8 18 API calls 56355->56491 56363 491fc3 56356->56363 56364 492027 56356->56364 56359 491f45 56489 42c4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56359->56489 56360 491f84 56492 446ff8 18 API calls 56360->56492 56362 491f51 56490 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56362->56490 56437 446ff8 18 API calls 56363->56437 56371 492066 56364->56371 56372 492036 56364->56372 56368 491f95 56493 491af4 12 API calls 56368->56493 56369 491fd0 56438 42c608 7 API calls 56369->56438 56383 4920a5 56371->56383 56384 492075 56371->56384 56497 446ff8 18 API calls 56372->56497 56374 491fa3 56494 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56374->56494 56376 491fde 56379 491fe2 56376->56379 56380 492017 56376->56380 56378 492043 56381 452908 5 API calls 56378->56381 56439 446ff8 18 API calls 56379->56439 56496 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56380->56496 56386 492050 56381->56386 56393 4920e4 56383->56393 56394 4920b4 56383->56394 56499 446ff8 18 API calls 56384->56499 56498 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56386->56498 56387 491ff1 56440 452c80 56387->56440 56389 492082 56392 452770 5 API calls 56389->56392 56396 49208f 56392->56396 56401 49212c 56393->56401 56402 4920f3 56393->56402 56501 446ff8 18 API calls 56394->56501 56395 492001 56495 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56395->56495 56500 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56396->56500 56400 4920c1 56403 452e10 5 API calls 56400->56403 56409 49213b 56401->56409 56410 492174 56401->56410 56503 446ff8 18 API calls 56402->56503 56405 4920ce 56403->56405 56502 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56405->56502 56406 492102 56504 446ff8 18 API calls 56406->56504 56506 446ff8 18 API calls 56409->56506 56415 492187 56410->56415 56421 49223d 56410->56421 56411 492113 56505 447278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56411->56505 56413 49214a 56507 446ff8 18 API calls 56413->56507 56509 446ff8 18 API calls 56415->56509 56416 49215b 56508 447278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56416->56508 56419 4921b4 56510 446ff8 18 API calls 56419->56510 56421->56279 56515 446f9c 18 API calls 56421->56515 56423 4921cb 56511 407ddc 7 API calls 56423->56511 56425 492256 56426 42e8c8 5 API calls 56425->56426 56427 49225e 56426->56427 56516 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56427->56516 56430 4921ed 56512 446ff8 18 API calls 56430->56512 56432 492201 56513 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56432->56513 56434 49220c 56514 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56434->56514 56436 492218 56437->56369 56438->56376 56439->56387 56441 452724 2 API calls 56440->56441 56443 452c99 56441->56443 56442 452c9d 56442->56395 56443->56442 56444 452cc1 MoveFileA GetLastError 56443->56444 56445 452760 Wow64RevertWow64FsRedirection 56444->56445 56446 452ce7 56445->56446 56446->56395 56447->56279 56448->56260 56450 406bbf 56449->56450 56451 406be1 56450->56451 56452 406bd8 56450->56452 56454 403778 4 API calls 56451->56454 56453 403400 4 API calls 56452->56453 56455 406bdf 56453->56455 56454->56455 56456 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56455->56456 56456->56279 56457->56268 56458->56272 56459->56279 56460->56276 56461->56281 56462->56279 56463->56284 56464->56279 56465->56289 56466->56279 56467->56296 56468->56279 56469->56302 56470->56307 56471->56279 56472->56310 56473->56314 56474->56320 56475->56279 56476->56317 56477->56279 56478->56325 56479->56279 56480->56333 56481->56337 56482->56279 56483->56340 56484->56279 56485->56346 56486->56279 56487->56354 56488->56359 56489->56362 56490->56279 56491->56360 56492->56368 56493->56374 56494->56279 56495->56279 56496->56279 56497->56378 56498->56279 56499->56389 56500->56279 56501->56400 56502->56279 56503->56406 56504->56411 56505->56279 56506->56413 56507->56416 56508->56279 56509->56419 56510->56423 56511->56430 56512->56432 56513->56434 56514->56436 56515->56425 56516->56279 56517 40cc34 56520 406f10 WriteFile 56517->56520 56521 406f2d 56520->56521 56522 416bf8 56525 4136f4 56522->56525 56524 416c04 56526 413724 56525->56526 56527 4136ff GetWindowThreadProcessId 56525->56527 56526->56524 56527->56526 56528 41370a GetCurrentProcessId 56527->56528 56528->56526 56529 413714 GetPropA 56528->56529 56529->56526 56530 40ce7c 56531 40ce84 56530->56531 56532 40ceb2 56531->56532 56533 40cea7 56531->56533 56537 40ceae 56531->56537 56535 40ceb6 56532->56535 56536 40cec8 56532->56536 56543 406288 GlobalHandle GlobalUnWire GlobalFree 56533->56543 56544 40625c GlobalAlloc GlobalFix 56535->56544 56545 40626c GlobalHandle GlobalUnWire GlobalReAlloc GlobalFix 56536->56545 56540 40cec4 56541 40ced8 56540->56541 56541->56537 56542 408cbc 5 API calls 56541->56542 56542->56537 56543->56537 56544->56540 56545->56541 56546 41363c SetWindowLongA GetWindowLongA 56547 413699 SetPropA SetPropA 56546->56547 56548 41367b GetWindowLongA 56546->56548 56553 41f39c KiUserCallbackDispatcher 56547->56553 56548->56547 56549 41368a SetWindowLongA 56548->56549 56549->56547 56551 4136e9 56553->56551 56554 4809f7 56555 480a00 56554->56555 56556 480a2b 56554->56556 56555->56556 56557 480a1d 56555->56557 56559 480a6a 56556->56559 56877 47f4a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56556->56877 56875 476c50 189 API calls 56557->56875 56560 480a8e 56559->56560 56563 480a81 56559->56563 56564 480a83 56559->56564 56566 480aca 56560->56566 56567 480aac 56560->56567 56562 480a5d 56878 47f50c 42 API calls 56562->56878 56570 47f4e8 42 API calls 56563->56570 56879 47f57c 42 API calls 56564->56879 56565 480a22 56565->56556 56876 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56565->56876 56882 47f33c 24 API calls 56566->56882 56571 480ac1 56567->56571 56880 47f50c 42 API calls 56567->56880 56570->56560 56881 47f33c 24 API calls 56571->56881 56576 480ac8 56577 480ada 56576->56577 56578 480ae0 56576->56578 56579 480ade 56577->56579 56582 47f4e8 42 API calls 56577->56582 56578->56579 56580 47f4e8 42 API calls 56578->56580 56680 47c66c 56579->56680 56580->56579 56582->56579 56583 480b07 56754 47cb94 56583->56754 56681 42d898 GetWindowsDirectoryA 56680->56681 56682 47c690 56681->56682 56683 403450 4 API calls 56682->56683 56684 47c69d 56683->56684 56685 42d8c4 GetSystemDirectoryA 56684->56685 56686 47c6a5 56685->56686 56687 403450 4 API calls 56686->56687 56688 47c6b2 56687->56688 56689 42d8f0 6 API calls 56688->56689 56690 47c6ba 56689->56690 56691 403450 4 API calls 56690->56691 56692 47c6c7 56691->56692 56693 47c6d0 56692->56693 56694 47c6ec 56692->56694 56921 42d208 56693->56921 56696 403400 4 API calls 56694->56696 56698 47c6ea 56696->56698 56700 47c731 56698->56700 56701 42c8cc 5 API calls 56698->56701 56699 403450 4 API calls 56699->56698 56901 47c4f4 56700->56901 56704 47c70c 56701->56704 56706 403450 4 API calls 56704->56706 56705 403450 4 API calls 56707 47c74d 56705->56707 56708 47c719 56706->56708 56709 47c76b 56707->56709 56710 4035c0 4 API calls 56707->56710 56708->56700 56712 403450 4 API calls 56708->56712 56711 47c4f4 8 API calls 56709->56711 56710->56709 56713 47c77a 56711->56713 56712->56700 56714 403450 4 API calls 56713->56714 56715 47c787 56714->56715 56716 47c7af 56715->56716 56717 42c3fc 5 API calls 56715->56717 56718 47c816 56716->56718 56719 47c4f4 8 API calls 56716->56719 56720 47c79d 56717->56720 56721 47c8de 56718->56721 56726 47c836 SHGetKnownFolderPath 56718->56726 56722 47c7c7 56719->56722 56725 4035c0 4 API calls 56720->56725 56723 47c8e7 56721->56723 56724 47c908 56721->56724 56729 403450 4 API calls 56722->56729 56730 42c3fc 5 API calls 56723->56730 56731 42c3fc 5 API calls 56724->56731 56725->56716 56727 47c850 56726->56727 56728 47c88b SHGetKnownFolderPath 56726->56728 56931 403ba4 7 API calls 56727->56931 56728->56721 56734 47c8a5 56728->56734 56733 47c7d4 56729->56733 56735 47c8f4 56730->56735 56736 47c915 56731->56736 56739 47c7e7 56733->56739 56929 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56733->56929 56932 403ba4 7 API calls 56734->56932 56741 4035c0 4 API calls 56735->56741 56737 4035c0 4 API calls 56736->56737 56742 47c906 56737->56742 56738 47c86b 757283B0 56738->56583 56745 47c4f4 8 API calls 56739->56745 56741->56742 56912 47c5d8 56742->56912 56744 47c8c0 757283B0 56744->56583 56747 47c7f6 56745->56747 56749 403450 4 API calls 56747->56749 56751 47c803 56749->56751 56751->56718 56755 47cb9c 56754->56755 56755->56755 56934 453a24 56755->56934 56875->56565 56877->56562 56878->56559 56879->56560 56880->56571 56881->56576 56882->56576 56902 42de1c RegOpenKeyExA 56901->56902 56903 47c51a 56902->56903 56904 47c540 56903->56904 56905 47c51e 56903->56905 56906 403400 4 API calls 56904->56906 56907 42dd4c 6 API calls 56905->56907 56908 47c547 56906->56908 56909 47c52a 56907->56909 56908->56705 56910 47c535 RegCloseKey 56909->56910 56911 403400 4 API calls 56909->56911 56910->56908 56911->56910 56913 47c5e6 56912->56913 56922 4038a4 4 API calls 56921->56922 56923 42d21b 56922->56923 56924 42d232 GetEnvironmentVariableA 56923->56924 56928 42d245 56923->56928 56933 42dbd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56923->56933 56924->56923 56925 42d23e 56924->56925 56926 403400 4 API calls 56925->56926 56926->56928 56928->56699 56929->56739 56931->56738 56932->56744 56933->56923
            Strings
            • Dest file exists., xrefs: 004709BB
            • Existing file is a newer version. Skipping., xrefs: 00470C02
            • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
            • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
            • Will register the file (a DLL/OCX) later., xrefs: 0047151F
            • @, xrefs: 004707B0
            • Incrementing shared file count (64-bit)., xrefs: 0047158C
            • Installing into GAC, xrefs: 00471714
            • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
            • Same version. Skipping., xrefs: 00470CE5
            • Couldn't read time stamp. Skipping., xrefs: 00470D35
            • Time stamp of existing file: (failed to read), xrefs: 00470A37
            • Time stamp of our file: %s, xrefs: 0047099B
            • Will register the file (a type library) later., xrefs: 00471513
            • Version of existing file: (none), xrefs: 00470CFA
            • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
            • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
            • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
            • Version of our file: (none), xrefs: 00470AFC
            • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
            • Time stamp of our file: (failed to read), xrefs: 004709A7
            • Stripped read-only attribute., xrefs: 00470EC7
            • -- File entry --, xrefs: 004706FB
            • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
            • Incrementing shared file count (32-bit)., xrefs: 004715A5
            • Time stamp of existing file: %s, xrefs: 00470A2B
            • .tmp, xrefs: 00470FB7
            • Uninstaller requires administrator: %s, xrefs: 0047118F
            • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
            • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
            • Failed to strip read-only attribute., xrefs: 00470ED3
            • Non-default bitness: 64-bit, xrefs: 004708AF
            • Non-default bitness: 32-bit, xrefs: 004708BB
            • Same time stamp. Skipping., xrefs: 00470D55
            • Installing the file., xrefs: 00470F09
            • InUn, xrefs: 0047115F
            • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
            • , xrefs: 00470BCF, 00470DA0, 00470E1E
            • Dest filename: %s, xrefs: 00470894
            • Dest file is protected by Windows File Protection., xrefs: 004708ED
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
            • API String ID: 0-4021121268
            • Opcode ID: a27af26e7e39879e55e12172b3fa09cc2b88a96f453993cfd7508716b919e6cb
            • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
            • Opcode Fuzzy Hash: a27af26e7e39879e55e12172b3fa09cc2b88a96f453993cfd7508716b919e6cb
            • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1381 42e09c-42e0ad 1382 42e0b8-42e0dd AllocateAndInitializeSid 1381->1382 1383 42e0af-42e0b3 1381->1383 1384 42e287-42e28f 1382->1384 1385 42e0e3-42e100 GetVersion 1382->1385 1383->1384 1386 42e102-42e117 GetModuleHandleA GetProcAddress 1385->1386 1387 42e119-42e11b 1385->1387 1386->1387 1388 42e142-42e15c GetCurrentThread OpenThreadToken 1387->1388 1389 42e11d-42e12b CheckTokenMembership 1387->1389 1392 42e193-42e1bb GetTokenInformation 1388->1392 1393 42e15e-42e168 GetLastError 1388->1393 1390 42e131-42e13d 1389->1390 1391 42e269-42e27f FreeSid 1389->1391 1390->1391 1394 42e1d6-42e1fa call 402648 GetTokenInformation 1392->1394 1395 42e1bd-42e1c5 GetLastError 1392->1395 1396 42e174-42e187 GetCurrentProcess OpenProcessToken 1393->1396 1397 42e16a-42e16f call 4031bc 1393->1397 1408 42e208-42e210 1394->1408 1409 42e1fc-42e206 call 4031bc * 2 1394->1409 1395->1394 1399 42e1c7-42e1d1 call 4031bc * 2 1395->1399 1396->1392 1398 42e189-42e18e call 4031bc 1396->1398 1397->1384 1398->1384 1399->1384 1410 42e212-42e213 1408->1410 1411 42e243-42e261 call 402660 CloseHandle 1408->1411 1409->1384 1414 42e215-42e228 EqualSid 1410->1414 1419 42e22a-42e237 1414->1419 1420 42e23f-42e241 1414->1420 1419->1420 1423 42e239-42e23d 1419->1423 1420->1411 1420->1414 1423->1411
            APIs
            • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
            • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
            • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
            • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
            • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
            • String ID: CheckTokenMembership$advapi32.dll
            • API String ID: 2252812187-1888249752
            • Opcode ID: ddfde2249367763e4ec650b3d771d1987385f17006922e03e7cb49a40b8ec1f8
            • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
            • Opcode Fuzzy Hash: ddfde2249367763e4ec650b3d771d1987385f17006922e03e7cb49a40b8ec1f8
            • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1553 4502c0-4502cd 1554 4502d3-4502e0 GetVersion 1553->1554 1555 45037c-450386 1553->1555 1554->1555 1556 4502e6-4502fc LoadLibraryA 1554->1556 1556->1555 1557 4502fe-450377 GetProcAddress * 6 1556->1557 1557->1555
            APIs
            • GetVersion.KERNEL32(00480B52), ref: 004502D3
            • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
            • GetProcAddress.KERNEL32(00000000,RmStartSession), ref: 00450309
            • GetProcAddress.KERNEL32(00000000,RmRegisterResources), ref: 0045031E
            • GetProcAddress.KERNEL32(00000000,RmGetList), ref: 00450333
            • GetProcAddress.KERNEL32(00000000,RmShutdown), ref: 00450348
            • GetProcAddress.KERNEL32(00000000,RmRestart), ref: 0045035D
            • GetProcAddress.KERNEL32(00000000,RmEndSession), ref: 00450372
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoadVersion
            • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
            • API String ID: 1968650500-3419246398
            • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
            • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
            • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
            • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1908 423c0c-423c40 1909 423c42-423c43 1908->1909 1910 423c74-423c8b call 423b68 1908->1910 1912 423c45-423c61 call 40b24c 1909->1912 1915 423cec-423cf1 1910->1915 1916 423c8d 1910->1916 1945 423c63-423c6b 1912->1945 1946 423c70-423c72 1912->1946 1918 423cf3 1915->1918 1919 423d27-423d2c 1915->1919 1920 423c93-423c96 1916->1920 1921 423d50-423d60 1916->1921 1922 423fb1-423fb9 1918->1922 1923 423cf9-423d01 1918->1923 1926 423d32-423d35 1919->1926 1927 42409a-4240a8 IsIconic 1919->1927 1924 423cc5-423cc8 1920->1924 1925 423c98 1920->1925 1928 423d62-423d67 1921->1928 1929 423d6b-423d73 call 424194 1921->1929 1934 424152-42415a 1922->1934 1940 423fbf-423fca call 4181e0 1922->1940 1932 423f13-423f3a SendMessageA 1923->1932 1933 423d07-423d0c 1923->1933 1941 423da9-423db0 1924->1941 1942 423cce-423ccf 1924->1942 1936 423df6-423e06 call 423b84 1925->1936 1937 423c9e-423ca1 1925->1937 1938 4240d6-4240eb call 424850 1926->1938 1939 423d3b-423d3c 1926->1939 1927->1934 1935 4240ae-4240b9 GetFocus 1927->1935 1943 423d78-423d80 call 4241dc 1928->1943 1944 423d69-423d8c call 423b84 1928->1944 1929->1934 1932->1934 1957 423d12-423d13 1933->1957 1958 42404a-424055 1933->1958 1959 424171-424177 1934->1959 1935->1934 1949 4240bf-4240c8 call 41eff4 1935->1949 1936->1934 1950 423ca7-423caa 1937->1950 1951 423e1e-423e34 PostMessageA call 423b84 1937->1951 1938->1934 1961 423d42-423d45 1939->1961 1962 4240ed-4240f4 1939->1962 1940->1934 1994 423fd0-423fdf call 4181e0 IsWindowEnabled 1940->1994 1941->1934 1954 423db6-423dbd 1941->1954 1955 423cd5-423cd8 1942->1955 1956 423f3f-423f46 1942->1956 1943->1934 1944->1934 1945->1959 1946->1910 1946->1912 1949->1934 2007 4240ce-4240d4 SetFocus 1949->2007 1967 423cb0-423cb3 1950->1967 1968 423ea5-423eac 1950->1968 1984 423e39-423e3a 1951->1984 1954->1934 1973 423dc3-423dc9 1954->1973 1974 423cde-423ce1 1955->1974 1975 423e3f-423e5f call 423b84 1955->1975 1956->1934 1983 423f4c-423f51 call 404e54 1956->1983 1976 424072-42407d 1957->1976 1977 423d19-423d1c 1957->1977 1958->1934 1979 42405b-42406d 1958->1979 1980 424120-424127 1961->1980 1981 423d4b 1961->1981 1970 4240f6-424109 call 4244d4 1962->1970 1971 42410b-42411e call 42452c 1962->1971 1989 423cb9-423cba 1967->1989 1990 423dce-423ddc IsIconic 1967->1990 1991 423eae-423ec1 call 423b14 1968->1991 1992 423edf-423ef0 call 423b84 1968->1992 1970->1934 1971->1934 1973->1934 1995 423ce7 1974->1995 1996 423e0b-423e19 call 424178 1974->1996 2022 423e83-423ea0 call 423a84 PostMessageA 1975->2022 2023 423e61-423e7e call 423b14 PostMessageA 1975->2023 1976->1934 2003 424083-424095 1976->2003 2000 423d22 1977->2000 2001 423f56-423f5e 1977->2001 1979->1934 1998 42413a-424149 1980->1998 1999 424129-424138 1980->1999 2002 42414b-42414c call 423b84 1981->2002 1983->1934 1984->1934 2008 423cc0 1989->2008 2009 423d91-423d99 1989->2009 2015 423dea-423df1 call 423b84 1990->2015 2016 423dde-423de5 call 423bc0 1990->2016 2037 423ed3-423eda call 423b84 1991->2037 2038 423ec3-423ecd call 41ef58 1991->2038 2042 423ef2-423ef8 call 41eea4 1992->2042 2043 423f06-423f0e call 423a84 1992->2043 1994->1934 2039 423fe5-423ff4 call 4181e0 IsWindowVisible 1994->2039 1995->2002 1996->1934 1998->1934 1999->1934 2000->2002 2001->1934 2006 423f64-423f6b 2001->2006 2031 424151 2002->2031 2003->1934 2006->1934 2024 423f71-423f80 call 4181e0 IsWindowEnabled 2006->2024 2007->1934 2008->2002 2009->1934 2025 423d9f-423da4 call 422c4c 2009->2025 2015->1934 2016->1934 2022->1934 2023->1934 2024->1934 2053 423f86-423f9c call 412310 2024->2053 2025->1934 2031->1934 2037->1934 2038->2037 2039->1934 2060 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 2039->2060 2057 423efd-423f00 2042->2057 2043->1934 2053->1934 2063 423fa2-423fac 2053->2063 2057->2043 2060->1934 2063->1934
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a8f88a0fad56de9c729f2995427ba7f602706c1c2dd85511d5f0d29e6fe2ee61
            • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
            • Opcode Fuzzy Hash: a8f88a0fad56de9c729f2995427ba7f602706c1c2dd85511d5f0d29e6fe2ee61
            • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2233 42285c-42286d 2234 422891-4228b0 2233->2234 2235 42286f-422879 2233->2235 2237 422ba6-422bbd 2234->2237 2238 4228b6-4228c0 2234->2238 2235->2234 2236 42287b-42288c call 408cbc call 40311c 2235->2236 2236->2234 2240 422aa1-422ae7 call 402c00 2238->2240 2241 4228c6-42290b call 402c00 2238->2241 2250 422af3-422afd 2240->2250 2251 422ae9-422aee call 421e2c 2240->2251 2252 422911-42291b 2241->2252 2253 4229af-4229c3 2241->2253 2257 422aff-422b07 call 4166b0 2250->2257 2258 422b0c-422b16 2250->2258 2251->2250 2259 422957-42296b call 4231a8 2252->2259 2260 42291d-422934 call 4146bc 2252->2260 2254 4229c9-4229d3 2253->2254 2255 422a7c-422a9c call 4181e0 ShowWindow 2253->2255 2265 4229d5-422a09 call 4181e0 SendMessageA call 4181e0 ShowWindow 2254->2265 2266 422a0b-422a55 call 4181e0 ShowWindow call 4181e0 CallWindowProcA call 414cc4 2254->2266 2255->2237 2257->2237 2262 422b37-422b4a call 4181e0 GetActiveWindow 2258->2262 2263 422b18-422b35 call 4181e0 SetWindowPos 2258->2263 2282 422970-422984 call 4231a0 2259->2282 2283 42296d 2259->2283 2277 422936 2260->2277 2278 422939-422950 call 414700 2260->2278 2286 422b4c-422b5c call 4181e0 IsIconic 2262->2286 2287 422b6d-422b6f 2262->2287 2263->2237 2304 422a5a-422a77 SendMessageA 2265->2304 2266->2304 2277->2278 2301 422952-422955 2278->2301 2302 422989-42298b 2278->2302 2282->2302 2305 422986 2282->2305 2283->2282 2286->2287 2310 422b5e-422b6b call 4181e0 call 41eff4 2286->2310 2291 422b71-422b94 call 4181e0 SetWindowPos SetActiveWindow 2287->2291 2292 422b96-422ba1 call 4181e0 ShowWindow 2287->2292 2291->2237 2292->2237 2301->2302 2306 42298f-422991 2302->2306 2307 42298d 2302->2307 2304->2237 2305->2302 2311 422993 2306->2311 2312 422995-4229aa 2306->2312 2307->2306 2310->2287 2311->2312 2312->2253
            APIs
            • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
            • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessageSendShowWindow
            • String ID:
            • API String ID: 1631623395-0
            • Opcode ID: 3fc7cefd77d309d2013a8afda780c24615e088d2c333d8c3c434309d64232e3f
            • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
            • Opcode Fuzzy Hash: 3fc7cefd77d309d2013a8afda780c24615e088d2c333d8c3c434309d64232e3f
            • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
            • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
              • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
              • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
              • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
              • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
              • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
              • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
              • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
              • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
              • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
              • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
              • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
              • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
            • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,00000000,?), ref: 004683FD
            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
              • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
            • String ID: $(Default)$STOPIMAGE$%H
            • API String ID: 3231140908-2624782221
            • Opcode ID: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
            • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
            • Opcode Fuzzy Hash: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
            • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
            • GetDiskFreeSpaceExA.KERNELBASE(00000000,?,?,00000000,00000000,00455F29,?,00000000,kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E98
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressDiskFreeHandleModuleProcSpace
            • String ID: GetDiskFreeSpaceExA$kernel32.dll
            • API String ID: 1197914913-3712701948
            • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
            • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
            • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
            • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
            • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
            • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID: unins$unins???.*
            • API String ID: 3541575487-1009660736
            • Opcode ID: a279201f9e697c0a7e05849c7d3b952df7516ca14a76b18e0d077e96bcfe2de0
            • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
            • Opcode Fuzzy Hash: a279201f9e697c0a7e05849c7d3b952df7516ca14a76b18e0d077e96bcfe2de0
            • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
            • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileFindFirstLast
            • String ID:
            • API String ID: 873889042-0
            • Opcode ID: 77a4f9a42a9b182eca9a30cb1eee9c943385d3d0e7805387745d9337962f8593
            • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
            • Opcode Fuzzy Hash: 77a4f9a42a9b182eca9a30cb1eee9c943385d3d0e7805387745d9337962f8593
            • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
            • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
            • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
            • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: NtdllProc_Window
            • String ID:
            • API String ID: 4255912815-0
            • Opcode ID: 88ecfa13f3ee270e805d5ccef1650ee506ec8760b8390f8b6ad1d401d880426f
            • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
            • Opcode Fuzzy Hash: 88ecfa13f3ee270e805d5ccef1650ee506ec8760b8390f8b6ad1d401d880426f
            • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
            • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
            • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
            • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 849 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->849 847 46f095-46f09c 846->847 848 46f09e-46f0a5 846->848 847->845 847->848 848->849 856 46f101-46f12a call 403738 call 42dde4 849->856 857 46f0e8-46f0fc call 403738 call 42dec0 849->857 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f296 call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 927 46f29b 894->927 899 46f2e4-46f309 call 40b24c call 46ee44 895->899 900 46f2a5-46f2e3 call 46ee44 * 3 895->900 918 46f30b-46f316 call 47c26c 899->918 919 46f318-46f321 call 403494 899->919 900->899 929 46f326-46f331 call 478e04 918->929 919->929 927->895 934 46f333-46f338 929->934 935 46f33a 929->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f5a1 call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1017->1016 1022 46f5be-46f5c5 1019->1022 1023 46f629-46f638 1019->1023 1024 46f687-46f6bd call 494cec 1020->1024 1025 46f6df-46f6f5 RegCloseKey 1020->1025 1022->1023 1029 46f5c7-46f5eb call 430bcc 1022->1029 1028 46f63b-46f648 1023->1028 1024->1025 1032 46f65f-46f678 call 430c08 call 46eeb4 1028->1032 1033 46f64a-46f657 1028->1033 1029->1028 1039 46f5ed-46f5ee 1029->1039 1042 46f67d 1032->1042 1033->1032 1035 46f659-46f65d 1033->1035 1035->1020 1035->1032 1041 46f5f0-46f616 call 40b24c call 479630 1039->1041 1047 46f623-46f625 1041->1047 1048 46f618-46f61e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f627 1047->1050 1048->1047 1050->1028
            APIs
              • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
              • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
            • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Value$Close
            • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
            • API String ID: 3391052094-3342197833
            • Opcode ID: 20177b5e09bda3d39b0f5a3b3099d0b20d53ab700288e26487c926a63f738ffb
            • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
            • Opcode Fuzzy Hash: 20177b5e09bda3d39b0f5a3b3099d0b20d53ab700288e26487c926a63f738ffb
            • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1424 456638-45666a call 403728 1427 456685 1424->1427 1428 45666c-456683 756FE550 1424->1428 1429 45668a-45668c 1427->1429 1428->1429 1430 45668e-4566ab 756FE550 1429->1430 1431 4566b9-4566fd call 403738 * 2 1429->1431 1430->1431 1432 4566ad-4566b4 call 4534b0 1430->1432 1440 4566ff-456705 call 45645c 1431->1440 1441 45670a-45670e 1431->1441 1432->1431 1440->1441 1443 456710-456717 1441->1443 1444 45674e-45675d 1441->1444 1445 456719-456733 call 47c26c call 42db10 1443->1445 1446 456738-456749 call 403738 1443->1446 1452 456770-456775 1444->1452 1453 45675f-45676b call 403738 1444->1453 1445->1446 1446->1444 1454 456785-45678c call 45643c 1452->1454 1455 456777-456780 1452->1455 1453->1452 1461 456792-45679a 1454->1461 1462 4568ed-456900 1454->1462 1455->1454 1463 4567a6-4567b9 1461->1463 1464 45679c-4567a0 1461->1464 1466 456902-456909 call 4534b0 1462->1466 1467 45690e-456912 1462->1467 1472 4567c7-4567cb 1463->1472 1473 4567bb-4567c2 call 4534b0 1463->1473 1464->1462 1464->1463 1466->1467 1470 456914-45691b call 45641c 1467->1470 1471 456937-45693f call 403ca4 1467->1471 1470->1471 1488 45691d-456935 call 42c4f8 call 403ca4 1470->1488 1486 456942-456946 1471->1486 1474 4567cd-4567ed 1472->1474 1475 4567fb-4567fd 1472->1475 1473->1472 1474->1475 1489 4567ef-4567f6 call 4534b0 1474->1489 1480 4567ff-456813 call 403ca4 1475->1480 1481 456868-45686c 1475->1481 1498 456815 call 408c00 1480->1498 1499 45681a-45683c 1480->1499 1484 4568d4-4568df 1481->1484 1485 45686e-45688e 1481->1485 1484->1462 1502 4568e1-4568e8 call 4534b0 1484->1502 1503 456890-456897 call 4534b0 1485->1503 1504 45689c-4568a3 call 45644c 1485->1504 1490 45694d-456957 1486->1490 1491 456948 call 408c00 1486->1491 1488->1486 1489->1475 1505 45695c-45695e 1490->1505 1491->1490 1498->1499 1517 45683e-456845 call 4534b0 1499->1517 1518 45684a-456860 SysFreeString 1499->1518 1502->1462 1503->1504 1504->1484 1519 4568a5-4568c6 1504->1519 1511 456960-456967 call 4534b0 1505->1511 1512 45696c-45698b call 456550 1505->1512 1511->1512 1522 456996-45699a 1512->1522 1523 45698d-456991 SysFreeString 1512->1523 1517->1518 1519->1484 1529 4568c8-4568cf call 4534b0 1519->1529 1524 4569a5-4569a9 1522->1524 1525 45699c-4569a0 1522->1525 1523->1522 1527 4569b4-4569bd 1524->1527 1528 4569ab-4569af 1524->1528 1525->1524 1528->1527 1529->1484
            APIs
            • 756FE550.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
            • 756FE550.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
            • SysFreeString.OLEAUT32(00000000), ref: 0045685B
            Strings
            • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
            • CoCreateInstance, xrefs: 004566AF
            • IPersistFile::Save, xrefs: 00456962
            • IPropertyStore::Commit, xrefs: 004568E3
            • %ProgramFiles(x86)%\, xrefs: 0045672E
            • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
            • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
            • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
            • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
            • {pf32}\, xrefs: 0045671E
            • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: E550$FreeString
            • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
            • API String ID: 491012016-2363233914
            • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
            • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
            • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
            • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1532 483a7c-483aa1 GetModuleHandleA GetProcAddress 1533 483b08-483b0d GetSystemInfo 1532->1533 1534 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1532->1534 1536 483b12-483b1b 1533->1536 1535 483abb-483ac6 GetCurrentProcess 1534->1535 1534->1536 1535->1536 1545 483ac8-483acc 1535->1545 1537 483b2b-483b32 1536->1537 1538 483b1d-483b21 1536->1538 1541 483b4d-483b52 1537->1541 1539 483b23-483b27 1538->1539 1540 483b34-483b3b 1538->1540 1543 483b29-483b46 1539->1543 1544 483b3d-483b44 1539->1544 1540->1541 1543->1541 1544->1541 1545->1536 1547 483ace-483ad5 call 45271c 1545->1547 1547->1536 1550 483ad7-483ae4 GetProcAddress 1547->1550 1550->1536 1551 483ae6-483afd GetModuleHandleA GetProcAddress 1550->1551 1551->1536 1552 483aff-483b06 1551->1552 1552->1536
            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
            • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
            • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
            • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
            • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
            • API String ID: 2230631259-2623177817
            • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
            • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
            • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
            • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1558 473784-4737b7 1559 473ea2-473ed6 call 46e4c4 call 403400 * 2 call 403420 1558->1559 1560 4737bd-4737c1 1558->1560 1561 4737c8-473805 call 40b24c call 479630 1560->1561 1571 473e96-473e9c 1561->1571 1572 47380b-47384a call 47e1b8 call 4792a4 call 47c26c * 2 1561->1572 1571->1559 1571->1561 1584 473850-473857 1572->1584 1585 47384c 1572->1585 1586 473870-473889 1584->1586 1587 473859-473860 1584->1587 1585->1584 1590 4738af-4738b6 1586->1590 1591 47388b-473895 call 4735b4 1586->1591 1588 473862-473867 call 453344 1587->1588 1589 47386c 1587->1589 1588->1589 1589->1586 1594 4738c5-4738cc 1590->1594 1595 4738b8-4738bf 1590->1595 1591->1590 1601 473897-4738aa call 403738 call 42dec0 1591->1601 1596 47391f-47393f call 4735d8 1594->1596 1597 4738ce-4738d5 1594->1597 1595->1594 1599 473d73-473da9 1595->1599 1612 4739b2-4739b9 1596->1612 1613 473941-473966 call 403738 call 42dde4 1596->1613 1597->1596 1600 4738d7-4738f9 call 403738 call 42de1c 1597->1600 1599->1586 1604 473daf-473db6 1599->1604 1600->1599 1633 4738ff-47391a call 403738 RegDeleteValueA RegCloseKey 1600->1633 1601->1590 1608 473de9-473df0 1604->1608 1609 473db8-473dc2 call 4735b4 1604->1609 1616 473e23-473e2a 1608->1616 1617 473df2-473dfc call 4735b4 1608->1617 1609->1608 1632 473dc4-473de4 call 45a3b4 1609->1632 1618 473a02 1612->1618 1619 4739bb-4739df call 403738 call 42de1c 1612->1619 1639 47396b-47396f 1613->1639 1627 473e57-473e5e 1616->1627 1628 473e2c-473e52 call 45a3b4 1616->1628 1617->1616 1646 473dfe-473e1e call 45a3b4 1617->1646 1624 473a07-473a09 1618->1624 1619->1624 1661 4739e1-4739e4 1619->1661 1624->1599 1634 473a0f-473a24 1624->1634 1630 473e60-473e86 call 45a3b4 1627->1630 1631 473e8b-473e91 call 4792d0 1627->1631 1628->1627 1630->1631 1631->1571 1632->1608 1633->1599 1644 473a26-473a33 call 403738 RegDeleteValueA 1634->1644 1645 473a38-473a3f 1634->1645 1648 473996-47399d 1639->1648 1649 473971-473975 1639->1649 1644->1645 1652 473d55-473d6b RegCloseKey 1645->1652 1653 473a45-473a4c 1645->1653 1646->1616 1648->1624 1657 47399f-4739b0 call 46ed28 1648->1657 1649->1624 1656 47397b-473994 call 4735d8 1649->1656 1659 473a4e-473a62 call 403738 call 42dd64 1653->1659 1660 473a68-473a75 1653->1660 1656->1624 1657->1624 1659->1652 1659->1660 1660->1652 1663 473a7b 1660->1663 1661->1624 1662 4739e6-4739ed 1661->1662 1662->1624 1667 4739ef-473a00 call 46ed28 1662->1667 1663->1652 1668 473d07-473d39 call 403574 call 403738 * 2 RegSetValueExA 1663->1668 1669 473ca2-473cbd call 47c26c call 430c58 1663->1669 1670 473c40-473c79 call 47c26c call 406d98 call 403738 RegSetValueExA 1663->1670 1671 473a9e-473aa8 1663->1671 1667->1624 1668->1652 1718 473d3b-473d42 1668->1718 1701 473cbf-473cc4 call 453344 1669->1701 1702 473cc9-473ce9 call 403738 RegSetValueExA 1669->1702 1670->1652 1715 473c7f-473c86 1670->1715 1677 473ab1-473ab6 1671->1677 1678 473aaa-473aad 1671->1678 1687 473abd-473abf 1677->1687 1685 473aaf 1678->1685 1686 473ab8 1678->1686 1685->1687 1686->1687 1692 473ac5-473ad7 call 40385c 1687->1692 1693 473b5c-473b6e call 40385c 1687->1693 1711 473af2-473af5 call 403400 1692->1711 1712 473ad9-473af0 call 403738 call 42dd4c 1692->1712 1706 473b70-473b87 call 403738 call 42dd58 1693->1706 1707 473b89-473b8c call 403400 1693->1707 1701->1702 1702->1652 1727 473ceb-473cf2 1702->1727 1706->1707 1724 473b91-473bca call 47c290 1706->1724 1707->1724 1723 473afa-473b01 1711->1723 1712->1711 1712->1723 1715->1652 1722 473c8c-473c9d call 46ed28 1715->1722 1718->1652 1725 473d44-473d50 call 46ed28 1718->1725 1722->1652 1731 473b03-473b21 call 403738 RegQueryValueExA 1723->1731 1732 473b32-473b57 call 47c290 1723->1732 1745 473bcc-473bdc call 403574 1724->1745 1746 473beb-473c17 call 403574 call 403738 * 2 RegSetValueExA 1724->1746 1725->1652 1727->1652 1728 473cf4-473d05 call 46ed28 1727->1728 1728->1652 1731->1732 1749 473b23-473b27 1731->1749 1732->1746 1745->1746 1756 473bde-473be6 call 40357c 1745->1756 1746->1652 1761 473c1d-473c24 1746->1761 1752 473b2f 1749->1752 1753 473b29-473b2d 1749->1753 1752->1732 1753->1732 1753->1752 1756->1746 1761->1652 1762 473c2a-473c3b call 46ed28 1761->1762 1762->1652
            APIs
            • RegDeleteValueA.ADVAPI32(?,00000000,?,00000002,00000000,00000000,00473D7D,?,?,?,?,00000000,00473ED7,?,?,0049C1E0), ref: 0047390C
            • RegCloseKey.ADVAPI32(?,?,00000000,?,00000002,00000000,00000000,00473D7D,?,?,?,?,00000000,00473ED7), ref: 00473915
              • Part of subcall function 004735D8: GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
            • RegDeleteValueA.ADVAPI32(?,00000000,00000000,00473D6C,?,?,00000000,00473D7D,?,?,?,?,00000000,00473ED7), ref: 00473A33
              • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
              • Part of subcall function 004735D8: GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DeleteErrorLastValue$CloseCreate
            • String ID: Cannot access 64-bit registry keys on this version of Windows$Failed to parse "qword" value$break$olddata${olddata}
            • API String ID: 2638610037-3092547568
            • Opcode ID: 356c3b5b8d8f4929bc56c1983a8e1045bff08dcde48a4cf0f614ea1849d18e3c
            • Instruction ID: 3e2b9752622e9f4493cacab5286c5da74f492e684211289e8b809de7765dc76f
            • Opcode Fuzzy Hash: 356c3b5b8d8f4929bc56c1983a8e1045bff08dcde48a4cf0f614ea1849d18e3c
            • Instruction Fuzzy Hash: 41321D74E00248AFDB15DFA9D481BDEBBF5AF08305F048066F914AB362DB38AD45DB58
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1765 468d88-468dc0 call 47c26c 1768 468dc6-468dd6 call 478e24 1765->1768 1769 468fa2-468fbc call 403420 1765->1769 1774 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1768->1774 1780 468e25-468e27 1774->1780 1781 468e2d-468e42 1780->1781 1782 468f98-468f9c 1780->1782 1783 468e57-468e5e 1781->1783 1784 468e44-468e52 call 42dd4c 1781->1784 1782->1769 1782->1774 1786 468e60-468e82 call 42dd4c call 42dd64 1783->1786 1787 468e8b-468e92 1783->1787 1784->1783 1786->1787 1804 468e84 1786->1804 1788 468e94-468eb9 call 42dd4c * 2 1787->1788 1789 468eeb-468ef2 1787->1789 1811 468ebb-468ec4 call 4314f8 1788->1811 1812 468ec9-468edb call 42dd4c 1788->1812 1791 468ef4-468f06 call 42dd4c 1789->1791 1792 468f38-468f3f 1789->1792 1805 468f16-468f28 call 42dd4c 1791->1805 1806 468f08-468f11 call 4314f8 1791->1806 1797 468f41-468f75 call 42dd4c * 3 1792->1797 1798 468f7a-468f90 RegCloseKey 1792->1798 1797->1798 1804->1787 1805->1792 1819 468f2a-468f33 call 4314f8 1805->1819 1806->1805 1811->1812 1812->1789 1822 468edd-468ee6 call 4314f8 1812->1822 1819->1792 1822->1789
            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
            Strings
            • Inno Setup: App Path, xrefs: 00468E4A
            • Inno Setup: No Icons, xrefs: 00468E73
            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
            • Inno Setup: Icon Group, xrefs: 00468E66
            • Inno Setup: Deselected Tasks, xrefs: 00468F19
            • %s\%s_is1, xrefs: 00468E05
            • Inno Setup: Selected Components, xrefs: 00468EAA
            • Inno Setup: Setup Type, xrefs: 00468E9A
            • Inno Setup: Deselected Components, xrefs: 00468ECC
            • Inno Setup: User Info: Serial, xrefs: 00468F6D
            • Inno Setup: Selected Tasks, xrefs: 00468EF7
            • Inno Setup: User Info: Name, xrefs: 00468F47
            • Inno Setup: User Info: Organization, xrefs: 00468F5A
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
            • API String ID: 47109696-1093091907
            • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
            • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
            • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
            • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
              • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
              • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
            • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
            • 757283B0.OLE32(?,0047C88B), ref: 0047C87E
              • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Directory$757283AddressEnvironmentFolderHandleKnownModulePathProcSystemVariableWindows
            • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
            • API String ID: 795111782-544719455
            • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
            • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
            • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
            • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2067 472b48-472c44 call 403728 call 403778 call 403684 call 47c26c call 403494 * 2 call 40357c call 42c804 call 403494 call 40357c call 42c804 call 403494 call 40357c call 42c804 * 2 2098 472c46-472c49 2067->2098 2099 472c4b-472c4f 2067->2099 2100 472c54-472c58 2098->2100 2099->2100 2101 472c51 2099->2101 2102 472c6b-472c79 call 472818 2100->2102 2103 472c5a-472c65 call 478e04 2100->2103 2101->2100 2109 472c7b-472c86 call 403494 2102->2109 2110 472c88-472c8e call 403494 2102->2110 2103->2102 2108 472c67 2103->2108 2108->2102 2114 472c93-472cef call 457f1c call 46e220 call 42c8a4 call 46fadc call 406f50 * 2 call 42cd24 2109->2114 2110->2114 2129 472d05-472d19 call 406f50 call 4729f8 2114->2129 2130 472cf1-472d00 call 403738 WritePrivateProfileStringA 2114->2130 2137 472d1f-472d51 call 456638 2129->2137 2138 472dcc-472de7 call 4728b4 call 403494 2129->2138 2130->2129 2141 472d56-472d5a 2137->2141 2149 472deb-472df6 2138->2149 2143 472d5c-472d66 call 42cd48 2141->2143 2144 472d68-472d6a 2141->2144 2143->2144 2152 472d6c 2143->2152 2147 472d6e-472d75 2144->2147 2147->2149 2150 472d77-472d7b 2147->2150 2153 472e0e-472e1d call 403738 SHChangeNotify 2149->2153 2154 472df8-472e0c call 403738 SHChangeNotify 2149->2154 2150->2149 2155 472d7d-472d97 call 42c8fc call 406ac4 2150->2155 2152->2147 2162 472e22-472e4b call 42c8a4 call 403738 SHChangeNotify 2153->2162 2154->2162 2155->2149 2166 472d99-472dbe call 4554a8 2155->2166 2172 472e51-472e55 2162->2172 2173 472f4f-472f83 call 46e4c4 call 403400 call 403420 call 403400 2162->2173 2166->2149 2175 472e5b-472ee8 call 45a204 call 42c3fc call 40357c call 45a204 call 42c3fc call 40357c call 45a204 2172->2175 2176 472eea-472eee 2172->2176 2175->2173 2178 472f11-472f4a call 45a204 * 2 2176->2178 2179 472ef0-472f0f call 45a204 2176->2179 2178->2173 2179->2173
            APIs
              • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
            • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
            • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
            • API String ID: 971782779-3668018701
            • Opcode ID: 7a5ae740bf12d7c0914506075995ef9616c65b722964304fe64b2cd854615d78
            • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
            • Opcode Fuzzy Hash: 7a5ae740bf12d7c0914506075995ef9616c65b722964304fe64b2cd854615d78
            • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2205 423874-42387e 2206 4239a7-4239ab 2205->2206 2207 423884-4238a6 call 41f3c4 GetClassInfoA 2205->2207 2210 4238d7-4238e0 GetSystemMetrics 2207->2210 2211 4238a8-4238bf RegisterClassA 2207->2211 2213 4238e2 2210->2213 2214 4238e5-4238ef GetSystemMetrics 2210->2214 2211->2210 2212 4238c1-4238d2 call 408cbc call 40311c 2211->2212 2212->2210 2213->2214 2216 4238f1 2214->2216 2217 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 2214->2217 2216->2217 2228 423952-423965 call 424178 SendMessageA 2217->2228 2229 42396a-423998 GetSystemMenu DeleteMenu * 2 2217->2229 2228->2229 2229->2206 2231 42399a-4239a2 DeleteMenu 2229->2231 2231->2206
            APIs
              • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
            • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
            • RegisterClassA.USER32(00499630), ref: 004238B7
            • GetSystemMetrics.USER32(00000000), ref: 004238D9
            • GetSystemMetrics.USER32(00000001), ref: 004238E8
            • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
            • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
            • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
            • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
            • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
            • String ID: |6B
            • API String ID: 183575631-3009739247
            • Opcode ID: 5571f2138a9ea83ce0d9c1dcd1b3cc51cb16f92404a0700befc21e2951ab6ca0
            • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
            • Opcode Fuzzy Hash: 5571f2138a9ea83ce0d9c1dcd1b3cc51cb16f92404a0700befc21e2951ab6ca0
            • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2317 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 2326 47ced0-47ced5 call 453344 2317->2326 2327 47ceda-47cee9 call 4525d8 2317->2327 2326->2327 2331 47cf03-47cf09 2327->2331 2332 47ceeb-47cef1 2327->2332 2335 47cf20-47cf48 call 42e394 * 2 2331->2335 2336 47cf0b-47cf11 2331->2336 2333 47cf13-47cf1b call 403494 2332->2333 2334 47cef3-47cef9 2332->2334 2333->2335 2334->2331 2337 47cefb-47cf01 2334->2337 2343 47cf6f-47cf89 GetProcAddress 2335->2343 2344 47cf4a-47cf6a call 4078f4 call 453344 2335->2344 2336->2333 2336->2335 2337->2331 2337->2333 2345 47cf95-47cfb2 call 403400 * 2 2343->2345 2346 47cf8b-47cf90 call 453344 2343->2346 2344->2343 2346->2345
            APIs
            • GetProcAddress.KERNEL32(00000000,SHGetFolderPathA), ref: 0047CF7A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$]xI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
            • API String ID: 190572456-256906917
            • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
            • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
            • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
            • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModulePolicyProcess
            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
            • API String ID: 3256987805-3653653586
            • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
            • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
            • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
            • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
            • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
            • GetWindowLongA.USER32(?,000000F4), ref: 00413681
            • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
            • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
            • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: LongWindow$Prop
            • String ID: 3A$yA
            • API String ID: 3887896539-3278460822
            • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
            • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
            • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
            • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FreeLibrary.KERNEL32(00000000), ref: 00481A11
            • FreeLibrary.KERNEL32(00000000), ref: 00481A25
            • SendNotifyMessageA.USER32(0007047C,00000496,00002710,00000000), ref: 00481A97
            Strings
            • GetCustomSetupExitCode, xrefs: 004818B1
            • DeinitializeSetup, xrefs: 0048190D
            • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
            • Deinitializing Setup., xrefs: 00481872
            • Restarting Windows., xrefs: 00481A72
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FreeLibrary$MessageNotifySend
            • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
            • API String ID: 3817813901-1884538726
            • Opcode ID: 050724d5784164bcc6f320fb88d14c1ed674207e07551f10b43b093d89fd870c
            • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
            • Opcode Fuzzy Hash: 050724d5784164bcc6f320fb88d14c1ed674207e07551f10b43b093d89fd870c
            • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
              • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
              • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
            • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
            • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
            • String ID: c:\directory$shell32.dll$%H
            • API String ID: 3376378930-166502273
            • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
            • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
            • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
            • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetActiveWindow.USER32 ref: 0042F58F
            • GetFocus.USER32 ref: 0042F597
            • RegisterClassA.USER32(004997AC), ref: 0042F5B8
            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
            • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
            • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$CreateFocus$ActiveClassRegisterShow
            • String ID: TWindowDisabler-Window
            • API String ID: 3167913817-1824977358
            • Opcode ID: 6457ecc35c2f1d364d6e716b0d71ec85e57c583cde0b886464f42e17a697c21b
            • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
            • Opcode Fuzzy Hash: 6457ecc35c2f1d364d6e716b0d71ec85e57c583cde0b886464f42e17a697c21b
            • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
              • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
              • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
            • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
            • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
            • API String ID: 884541143-1710247218
            • Opcode ID: d8d5a0be0440fc7cb79ca7a1d8c05833802e09f0bac54326b854a3cb5eabaf25
            • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
            • Opcode Fuzzy Hash: d8d5a0be0440fc7cb79ca7a1d8c05833802e09f0bac54326b854a3cb5eabaf25
            • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
            • API String ID: 1646373207-2130885113
            • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
            • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
            • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
            • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
            • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
            • GetCurrentThreadId.KERNEL32 ref: 00430971
            • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
            • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
            • API String ID: 4130936913-2943970505
            • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
            • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
            • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
            • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
              • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
              • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
              • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
              • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
            • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
            • API String ID: 854858120-615399546
            • Opcode ID: 33a21594b2f272348ca173e1bf8fbb29317a3fdaed0398a7107b4f02c3bab763
            • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
            • Opcode Fuzzy Hash: 33a21594b2f272348ca173e1bf8fbb29317a3fdaed0398a7107b4f02c3bab763
            • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
            • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
            • OemToCharA.USER32(?,?), ref: 0042375C
            • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Char$FileIconLoadLowerModuleName
            • String ID: 2$MAINICON
            • API String ID: 3935243913-3181700818
            • Opcode ID: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
            • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
            • Opcode Fuzzy Hash: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
            • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
            • GetCurrentThreadId.KERNEL32 ref: 00418F79
            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
              • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
              • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
              • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
              • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
              • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
              • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
              • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
              • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
              • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
              • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
              • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
              • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
              • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
            • String ID: ControlOfs%.8X%.8X$Delphi%.8X
            • API String ID: 316262546-2767913252
            • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
            • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
            • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
            • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,0049785D), ref: 0042DE6B
            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
            • RegDeleteKeyExA.KERNELBASE(00000000,00000000,00000100,00000000,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000), ref: 0042DE8D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Delete$AddressHandleModuleProc
            • String ID: RegDeleteKeyExA$advapi32.dll
            • API String ID: 636244128-1846899949
            • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
            • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
            • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
            • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
            • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
            • GetWindowLongA.USER32(?,000000F4), ref: 00413681
            • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
            • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
            • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: LongWindow$Prop
            • String ID:
            • API String ID: 3887896539-0
            • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
            • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
            • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
            • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
            • LocalFree.KERNEL32(00000000,00000000,00401B68), ref: 00401ACF
            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401AEE
            • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401B2D
            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
            • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
            • String ID:
            • API String ID: 3782394904-0
            • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
            • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
            • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
            • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
            • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLast
            • String ID: Created temporary directory: $\_setup64.tmp$_isetup
            • API String ID: 1375471231-2952887711
            • Opcode ID: 15246a7260a354d37efc87005b8c751c01ee3b74e4206f1c0260e9ccc9d04e3e
            • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
            • Opcode Fuzzy Hash: 15246a7260a354d37efc87005b8c751c01ee3b74e4206f1c0260e9ccc9d04e3e
            • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EnumWindows.USER32(00423A1C), ref: 00423AA8
            • GetWindow.USER32(?,00000003), ref: 00423ABD
            • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
            • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$EnumLongWindows
            • String ID: \AB
            • API String ID: 4191631535-3948367934
            • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
            • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
            • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
            • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • Need to restart Windows? %s, xrefs: 0046BE95
            • PrepareToInstall failed: %s, xrefs: 0046BE6E
            • NextButtonClick, xrefs: 0046BC4C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
            • API String ID: 0-2329492092
            • Opcode ID: 5d17874146d60b75ad460dbe0a65a057f1b706e416996ea922dce04c170435bc
            • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
            • Opcode Fuzzy Hash: 5d17874146d60b75ad460dbe0a65a057f1b706e416996ea922dce04c170435bc
            • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
            • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ActiveChangeNotifyWindow
            • String ID: $Need to restart Windows? %s
            • API String ID: 1160245247-4200181552
            • Opcode ID: f3164b8d1c7f9ae2aabe4aebf04c2bbf0d3651d11bf05fff97eb65ef8f772e24
            • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
            • Opcode Fuzzy Hash: f3164b8d1c7f9ae2aabe4aebf04c2bbf0d3651d11bf05fff97eb65ef8f772e24
            • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
            • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ChangeNotify$ErrorFullLastNamePath
            • String ID: Creating directory: %s
            • API String ID: 2451617938-483064649
            • Opcode ID: b081b5451f9253bf7df266bab53e6145b6a86aabad9903036a0d0a35cf4a9b86
            • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
            • Opcode Fuzzy Hash: b081b5451f9253bf7df266bab53e6145b6a86aabad9903036a0d0a35cf4a9b86
            • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressByteCharMultiProcWide
            • String ID: SfcIsFileProtected$sfc.dll
            • API String ID: 2508298434-591603554
            • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
            • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
            • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
            • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • 74D41520.VERSION(00000000,?,?,?,00497900), ref: 00452530
            • 74D41500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 0045255D
            • 74D41540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 00452577
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: D41500D41520D41540
            • String ID: %E
            • API String ID: 2153611984-175436132
            • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
            • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
            • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
            • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0044B401
            • SelectObject.GDI32(?,00000000), ref: 0044B424
            • ReleaseDC.USER32(00000000,?), ref: 0044B457
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ObjectReleaseSelect
            • String ID: %H
            • API String ID: 1831053106-1959103961
            • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
            • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
            • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
            • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
            • ExitProcess.KERNEL32 ref: 00404E0D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ExitMessageProcess
            • String ID: Error$Runtime error at 00000000
            • API String ID: 1220098344-2970929446
            • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
            • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
            • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
            • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
            • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
            • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DrawText$ByteCharMultiWide
            • String ID: %H
            • API String ID: 65125430-1959103961
            • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
            • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
            • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
            • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
              • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
              • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
            • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
            • String ID: SHAutoComplete$shlwapi.dll
            • API String ID: 395431579-1506664499
            • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
            • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
            • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
            • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
            Strings
            • PendingFileRenameOperations2, xrefs: 00455A4F
            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
            • PendingFileRenameOperations, xrefs: 00455A40
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
            • API String ID: 47109696-2115312317
            • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
            • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
            • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
            • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
            • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
            • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
            • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$CloseFileNext
            • String ID:
            • API String ID: 2066263336-0
            • Opcode ID: 65dc353f2030dd18e07aaeef7864a9d66aca62f19fb7e6a9d2780936c582d727
            • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
            • Opcode Fuzzy Hash: 65dc353f2030dd18e07aaeef7864a9d66aca62f19fb7e6a9d2780936c582d727
            • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
            • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
            • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$CloseFileNext
            • String ID:
            • API String ID: 2066263336-0
            • Opcode ID: 7885f72f33c927dd17ab6110890c22dfa466a1eb5677d5fc3a671adfc4768c66
            • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
            • Opcode Fuzzy Hash: 7885f72f33c927dd17ab6110890c22dfa466a1eb5677d5fc3a671adfc4768c66
            • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetMenu.USER32(00000000), ref: 00421361
            • SetMenu.USER32(00000000,00000000), ref: 0042137E
            • SetMenu.USER32(00000000,00000000), ref: 004213B3
            • SetMenu.USER32(00000000,00000000), ref: 004213CF
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu
            • String ID:
            • API String ID: 3711407533-0
            • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
            • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
            • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
            • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCursorPos.USER32 ref: 00417260
            • SetCursor.USER32(00000000), ref: 004172A3
            • GetLastActivePopup.USER32(?), ref: 004172CD
            • GetForegroundWindow.USER32(?), ref: 004172D4
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Cursor$ActiveForegroundLastPopupWindow
            • String ID:
            • API String ID: 1959210111-0
            • Opcode ID: 242b528dc0661d8a8af5a0610b9d1e2f1ff1289e875425a5f099e83dad9ec218
            • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
            • Opcode Fuzzy Hash: 242b528dc0661d8a8af5a0610b9d1e2f1ff1289e875425a5f099e83dad9ec218
            • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(?,?,?,?), ref: 00416B84
            • SetTextColor.GDI32(?,00000000), ref: 00416B9E
            • SetBkColor.GDI32(?,00000000), ref: 00416BB8
            • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Color$CallMessageProcSendTextWindow
            • String ID:
            • API String ID: 601730667-0
            • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
            • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
            • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
            • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
            • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
            • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
            • String ID:
            • API String ID: 4071923889-0
            • Opcode ID: e6feda7d3358a80d2693463bb1cb51aaf78648cef31b4280cf5022ab190105ae
            • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
            • Opcode Fuzzy Hash: e6feda7d3358a80d2693463bb1cb51aaf78648cef31b4280cf5022ab190105ae
            • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0042311E
            • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
            • ReleaseDC.USER32(00000000,00000000), ref: 00423144
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CapsDeviceEnumFontsRelease
            • String ID:
            • API String ID: 2698912916-0
            • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
            • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
            • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
            • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$CountSleepTick
            • String ID:
            • API String ID: 2227064392-0
            • Opcode ID: 81c97dbf5948de899416f6368447fdcf0451c727da6d5f131c1a33ac7977f59e
            • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
            • Opcode Fuzzy Hash: 81c97dbf5948de899416f6368447fdcf0451c727da6d5f131c1a33ac7977f59e
            • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
            • FlushFileBuffers.KERNEL32(?), ref: 0045C499
            Strings
            • NumRecs range exceeded, xrefs: 0045C396
            • EndOffset range exceeded, xrefs: 0045C3CD
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$BuffersFlush
            • String ID: EndOffset range exceeded$NumRecs range exceeded
            • API String ID: 3593489403-659731555
            • Opcode ID: 801dcd038e335b265826125cf8ff6a7c252aa7dfa969982b1ed0869fe0f6d4ae
            • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
            • Opcode Fuzzy Hash: 801dcd038e335b265826125cf8ff6a7c252aa7dfa969982b1ed0869fe0f6d4ae
            • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
            • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
            Strings
            • Will not restart Windows automatically., xrefs: 004836F6
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ActiveForeground
            • String ID: Will not restart Windows automatically.
            • API String ID: 307657957-4169339592
            • Opcode ID: 6a85ffbd85d05442efd69aeba4e15de951a42de5f6e0288b431692a2a75d33eb
            • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
            • Opcode Fuzzy Hash: 6a85ffbd85d05442efd69aeba4e15de951a42de5f6e0288b431692a2a75d33eb
            • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
              • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
              • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
              • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
              • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
              • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
              • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
              • Part of subcall function 004063C4: 6F571CD0.COMCTL32(00498BC5), ref: 004063C4
              • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
              • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
              • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
              • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
              • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
              • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
              • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
              • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
              • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
              • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
              • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
              • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
              • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
              • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
              • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
              • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
              • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
              • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
            • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
              • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
              • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
              • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
              • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
            • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
              • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF571FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
            • String ID: Setup
            • API String ID: 3527831634-3839654196
            • Opcode ID: b35466028edd7e3a1b236c6640422c08041f3fa3d34e6d3560873e5a4108b4d0
            • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
            • Opcode Fuzzy Hash: b35466028edd7e3a1b236c6640422c08041f3fa3d34e6d3560873e5a4108b4d0
            • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: QueryValue
            • String ID: $=H
            • API String ID: 3660427363-3538597426
            • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
            • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
            • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
            • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
            • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLast
            • String ID: .tmp
            • API String ID: 1375471231-2986845003
            • Opcode ID: ad15d04db016d8ec48b224cf88302df48740c9a9b896926c32662353b3187fec
            • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
            • Opcode Fuzzy Hash: ad15d04db016d8ec48b224cf88302df48740c9a9b896926c32662353b3187fec
            • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
              • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
              • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
              • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
              • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
              • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
              • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
              • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
              • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
              • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
              • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
              • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
            • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
            • String ID: SHGetKnownFolderPath$shell32.dll
            • API String ID: 3869789854-2936008475
            • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
            • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
            • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
            • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
            • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DeleteErrorFileLast
            • String ID: T$H
            • API String ID: 2018770650-488339322
            • Opcode ID: fbcc140a81a3acb9c96393828f2cc587f034b3ec3a8bc9b7824854e1d547cdb8
            • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
            • Opcode Fuzzy Hash: fbcc140a81a3acb9c96393828f2cc587f034b3ec3a8bc9b7824854e1d547cdb8
            • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
            • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DirectoryErrorLastRemove
            • String ID: T$H
            • API String ID: 377330604-488339322
            • Opcode ID: 8769a646033274a50feaa89106c60670f2dbad91017c501587ea10a2b48d2d14
            • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
            • Opcode Fuzzy Hash: 8769a646033274a50feaa89106c60670f2dbad91017c501587ea10a2b48d2d14
            • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Close
            • String ID: RegisteredOrganization$RegisteredOwner
            • API String ID: 3535843008-1113070880
            • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
            • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
            • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
            • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
              • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseCreateErrorFileHandleLast
            • String ID: CreateFile
            • API String ID: 2528220319-823142352
            • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
            • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
            • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
            • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Open
            • String ID: System\CurrentControlSet\Control\Windows$;H
            • API String ID: 71445658-2565060666
            • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
            • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
            • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
            • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
              • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
              • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
            • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressErrorInitializeLibraryLoadModeProc
            • String ID: SHCreateItemFromParsingName$shell32.dll
            • API String ID: 2906209438-2320870614
            • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
            • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
            • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
            • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
              • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
            • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressErrorLibraryLoadModeProc
            • String ID: SHPathPrepareForWriteA$shell32.dll
            • API String ID: 2492108670-2683653824
            • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
            • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
            • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
            • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu$Append$System
            • String ID:
            • API String ID: 1489644407-0
            • Opcode ID: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
            • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
            • Opcode Fuzzy Hash: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
            • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
            • TranslateMessage.USER32(?), ref: 0042448F
            • DispatchMessageA.USER32(?), ref: 00424499
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslate
            • String ID:
            • API String ID: 4217535847-0
            • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
            • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
            • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
            • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetPropA.USER32(00000000,00000000), ref: 0041666A
            • SetPropA.USER32(00000000,00000000), ref: 0041667F
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Prop$Window
            • String ID:
            • API String ID: 3363284559-0
            • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
            • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
            • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
            • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsWindowVisible.USER32(?), ref: 0041EE64
            • IsWindowEnabled.USER32(?), ref: 0041EE6E
            • EnableWindow.USER32(?,00000000), ref: 0041EE94
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$EnableEnabledVisible
            • String ID:
            • API String ID: 3234591441-0
            • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
            • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
            • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
            • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GlobalHandle.KERNEL32 ref: 00406289
            • GlobalUnWire.KERNEL32(00000000), ref: 00406290
            • GlobalFree.KERNEL32(00000000), ref: 00406295
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Global$FreeHandleWire
            • String ID:
            • API String ID: 318822183-0
            • Opcode ID: 6fb441d58b367f32f482df158d6c8a90520777f868e58a6b13673b60c2f5b21c
            • Instruction ID: 0bd3332245bc481727117fba3a6c85ee4c387b864c86d5f24a339be909c9c9d3
            • Opcode Fuzzy Hash: 6fb441d58b367f32f482df158d6c8a90520777f868e58a6b13673b60c2f5b21c
            • Instruction Fuzzy Hash: 4FA001C4800A01A9DC0432B2080B93B200CD84122C390096B3408BA182887C88401A3D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetActiveWindow.USER32(?), ref: 0046A02D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ActiveWindow
            • String ID: PrepareToInstall
            • API String ID: 2558294473-1101760603
            • Opcode ID: 30e11ce9976a3a5fd6352dee54882fc084dc5e436ff3c9a7e429a444cfd2bee3
            • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
            • Opcode Fuzzy Hash: 30e11ce9976a3a5fd6352dee54882fc084dc5e436ff3c9a7e429a444cfd2bee3
            • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID: /:*?"<>|
            • API String ID: 0-4078764451
            • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
            • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
            • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
            • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetActiveWindow.USER32(?), ref: 00482676
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ActiveWindow
            • String ID: InitializeWizard
            • API String ID: 2558294473-2356795471
            • Opcode ID: 610dba628312dcddd63cee716be368e1ad8af3103a0d365a4a52240be508be69
            • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
            • Opcode Fuzzy Hash: 610dba628312dcddd63cee716be368e1ad8af3103a0d365a4a52240be508be69
            • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • Failed to remove temporary directory: , xrefs: 0047CDFF
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CountTick
            • String ID: Failed to remove temporary directory:
            • API String ID: 536389180-3544197614
            • Opcode ID: 45da43fd3ae20599d6e25ac9ed9d33e8d604a7859b1119de6f2a098991fc0130
            • Instruction ID: ec3213607a6b09ae82705bdd380353c192e2de6e0dbfdfb704aaf67811413441
            • Opcode Fuzzy Hash: 45da43fd3ae20599d6e25ac9ed9d33e8d604a7859b1119de6f2a098991fc0130
            • Instruction Fuzzy Hash: 0F01B930644604BADB21EB72ED87BDA7798DB45709F60847FB804A7192EA7CA904C95C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
            Strings
            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: Software\Microsoft\Windows\CurrentVersion
            • API String ID: 47109696-1019749484
            • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
            • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
            • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
            • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
            Strings
            • Inno Setup: Setup Version, xrefs: 0046EE65
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Value
            • String ID: Inno Setup: Setup Version
            • API String ID: 3702945584-4166306022
            • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
            • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
            • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
            • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Value
            • String ID: NoModify
            • API String ID: 3702945584-1699962838
            • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
            • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
            • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
            • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindNextFileA.KERNEL32(000000FF,?,00000000,00454346,?,00000000,004543BA,?,?,-00000001,00000000,?,0047CDFB,00000000,0047CD48,00000000), ref: 00454322
            • FindClose.KERNEL32(000000FF,0045434D,00454346,?,00000000,004543BA,?,?,-00000001,00000000,?,0047CDFB,00000000,0047CD48,00000000,00000000), ref: 00454340
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$CloseFileNext
            • String ID:
            • API String ID: 2066263336-0
            • Opcode ID: 07b889b83a7295c6f73e667f2b380822f62956f362989e6861c4cee483300a21
            • Instruction ID: 54d7d993b90550b5414970fc4389b15b7902a372ed294bc13edf2f45dfba5a61
            • Opcode Fuzzy Hash: 07b889b83a7295c6f73e667f2b380822f62956f362989e6861c4cee483300a21
            • Instruction Fuzzy Hash: BE817430A0424D9FCF11DFA5C8457EFBB74AF49309F1440A6EC546B3A2D3399A8ACB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
              • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
              • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
              • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
            • SendNotifyMessageA.USER32(0007047C,00000496,00002711,-00000001), ref: 0047E6BA
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: EnumFontsMessageNotifyReleaseSend
            • String ID:
            • API String ID: 2649214853-0
            • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
            • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
            • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
            • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
              • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ByteCharMetricsMultiSystemWide
            • String ID: /G
            • API String ID: 224039744-2088674125
            • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
            • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
            • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
            • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
            • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseEnum
            • String ID:
            • API String ID: 2818636725-0
            • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
            • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
            • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
            • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
            • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateErrorLastProcess
            • String ID:
            • API String ID: 2919029540-0
            • Opcode ID: c95f5f81879e10580f0beb684fbefc560c00cfbc54ddd80bc382dcc14dc7984f
            • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
            • Opcode Fuzzy Hash: c95f5f81879e10580f0beb684fbefc560c00cfbc54ddd80bc382dcc14dc7984f
            • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
            • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Resource$FindFree
            • String ID:
            • API String ID: 4097029671-0
            • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
            • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
            • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
            • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
            • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Thread$CurrentEnumWindows
            • String ID:
            • API String ID: 2396873506-0
            • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
            • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
            • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
            • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
            • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileLastMove
            • String ID:
            • API String ID: 55378915-0
            • Opcode ID: bd02338dff925e1bcf0a80027825a402961c9c10eaaecac7b210e684feb30c76
            • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
            • Opcode Fuzzy Hash: bd02338dff925e1bcf0a80027825a402961c9c10eaaecac7b210e684feb30c76
            • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
            • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLast
            • String ID:
            • API String ID: 1375471231-0
            • Opcode ID: 903dc6f46ae0353656b5ef1fe2250cc8cd8775a19ac3db80fd29e7e5856ea863
            • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
            • Opcode Fuzzy Hash: 903dc6f46ae0353656b5ef1fe2250cc8cd8775a19ac3db80fd29e7e5856ea863
            • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
            • LoadCursorA.USER32(00000000,00000000), ref: 00423273
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CursorLoad
            • String ID:
            • API String ID: 3238433803-0
            • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
            • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
            • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
            • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
            • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLibraryLoadMode
            • String ID:
            • API String ID: 2987862817-0
            • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
            • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
            • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
            • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
            • 756FE550.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: E550Version
            • String ID:
            • API String ID: 1323609852-0
            • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
            • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
            • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
            • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetClassInfoA.USER32(00400000,?,?), ref: 004162E1
            • GetClassInfoA.USER32(00000000,?,?), ref: 004162F1
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ClassInfo
            • String ID:
            • API String ID: 3534257612-0
            • Opcode ID: 1299c1a0664136db271893dd0cc50e967199de2eea8caf0295a053f4b6d41932
            • Instruction ID: 8e3ee469ef83f81d8c71ae4630d2e8c7c449d5c480d74fd2e2a5eda3e874073d
            • Opcode Fuzzy Hash: 1299c1a0664136db271893dd0cc50e967199de2eea8caf0295a053f4b6d41932
            • Instruction Fuzzy Hash: BDE012B26015155ED710DBA89D81EE736DCDB08350B210177BE08CA256D364DD008BA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C89B
            • 757283B0.OLE32(?,0047C8DE), ref: 0047C8D1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: 757283FolderKnownPath
            • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
            • API String ID: 733073498-544719455
            • Opcode ID: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
            • Instruction ID: f48ec61de784b6bea0373c7a91bc006da4a0813e938d35ae17fa89473a65de5f
            • Opcode Fuzzy Hash: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
            • Instruction Fuzzy Hash: 22E09230340604BFEB15EB61DC92F6977A8EB48B01B72847BF504E2680D67CAD00DB1C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
            • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
              • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$FilePointer
            • String ID:
            • API String ID: 1156039329-0
            • Opcode ID: da9b101d890a5785f8a9e71de1b90467d9f3c90ee8d89fa87e0c2c0eb401b44d
            • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
            • Opcode Fuzzy Hash: da9b101d890a5785f8a9e71de1b90467d9f3c90ee8d89fa87e0c2c0eb401b44d
            • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentThreadId.KERNEL32 ref: 0041F00E
            • EnumThreadWindows.USER32(00000000,0041EF90,00000000), ref: 0041F014
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Thread$CurrentEnumWindows
            • String ID:
            • API String ID: 2396873506-0
            • Opcode ID: 28faba8d13260114aebe4435219a546304dde162066a62bc81d999aa95987238
            • Instruction ID: 1bd0ab66c6aeceffdc4f5e21b8af03a27ec20acb013402289ac5ff21683637d0
            • Opcode Fuzzy Hash: 28faba8d13260114aebe4435219a546304dde162066a62bc81d999aa95987238
            • Instruction Fuzzy Hash: EBE02676600200AEDB12DF7AAD4575B37D0A394314F12483FA904D61A1D2745C84DB19
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
            • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
            • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
            • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
              • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
              • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DefaultInfoLoadLocaleStringSystem
            • String ID:
            • API String ID: 1658689577-0
            • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
            • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
            • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
            • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoScroll
            • String ID:
            • API String ID: 629608716-0
            • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
            • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
            • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
            • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
              • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
            • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
              • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
              • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
            • String ID:
            • API String ID: 3319771486-0
            • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
            • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
            • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
            • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
            • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
            • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
            • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallbackDispatcherUser
            • String ID:
            • API String ID: 2492992576-0
            • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
            • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
            • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
            • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
            • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
            • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
            • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: 93d9079c03dc8f32fd5285902e105fc94467d2f9586780870fbde36cd9cf365c
            • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
            • Opcode Fuzzy Hash: 93d9079c03dc8f32fd5285902e105fc94467d2f9586780870fbde36cd9cf365c
            • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FormatMessage
            • String ID:
            • API String ID: 1306739567-0
            • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
            • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
            • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
            • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF9B
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ExtentPointText
            • String ID:
            • API String ID: 566491939-0
            • Opcode ID: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
            • Instruction ID: 6b43be1268843882f9474f888990ee0a0f71ddbfb678ee1088bae751a0726d8f
            • Opcode Fuzzy Hash: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
            • Instruction Fuzzy Hash: E3E086F13097102BD600E67E1DC19DB77DC8A483697148177F458E7392D62DDE1A43AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateWindow
            • String ID:
            • API String ID: 716092398-0
            • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
            • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
            • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
            • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
            • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
            • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
            • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseFind
            • String ID:
            • API String ID: 1863332320-0
            • Opcode ID: 5fa30469d5901369cae71ef69ad319006633826a63df018e1b1487f7861a22f8
            • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
            • Opcode Fuzzy Hash: 5fa30469d5901369cae71ef69ad319006633826a63df018e1b1487f7861a22f8
            • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallbackDispatcherUser
            • String ID:
            • API String ID: 2492992576-0
            • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
            • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
            • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
            • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
            • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
            • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
            • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
            • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
              • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoParametersSystem$ShowWindow
            • String ID:
            • API String ID: 3202724764-0
            • Opcode ID: 5ea0717b5a237d90ae3b60c45d238232e42852dd61880cea7560cbd7bb09fbd7
            • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
            • Opcode Fuzzy Hash: 5ea0717b5a237d90ae3b60c45d238232e42852dd61880cea7560cbd7bb09fbd7
            • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowTextA.USER32(?,00000000), ref: 004242DC
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: TextWindow
            • String ID:
            • API String ID: 530164218-0
            • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
            • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
            • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
            • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,?,00452C55,00000000,00452C6E,?,-00000001,00000000), ref: 0042CD77
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: abded0c002ebc78192aa504463f5e40d8ea57a748cef45cf468d0a982b541a78
            • Instruction ID: 2eab32a2699244162946c929296992ee32eb3599f5fc22494aed3d9886f7b4af
            • Opcode Fuzzy Hash: abded0c002ebc78192aa504463f5e40d8ea57a748cef45cf468d0a982b541a78
            • Instruction Fuzzy Hash: 51D012D036121015DF1455BD28C535F05884B65375BA82F37B66DE62E2D23D8857281C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallbackDispatcherUser
            • String ID:
            • API String ID: 2492992576-0
            • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
            • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
            • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
            • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: a2c5bb09e392fd69b508e639abd752817b5c1d67cf81785bd365d6d583db0f26
            • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
            • Opcode Fuzzy Hash: a2c5bb09e392fd69b508e639abd752817b5c1d67cf81785bd365d6d583db0f26
            • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
            • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
            • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
            • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • KiUserCallbackDispatcher.NTDLL(?,?,?,00000000), ref: 0041F3B0
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CallbackDispatcherUser
            • String ID:
            • API String ID: 2492992576-0
            • Opcode ID: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
            • Instruction ID: 48f25c4fc7afed193c39a16cc91a0304f94a1296cd048c63733264e3b5f0309e
            • Opcode Fuzzy Hash: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
            • Instruction Fuzzy Hash: D2D0C932100108AFDB018E94AC018677B69EB48210B148815FD0485221D633E831AA91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
              • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorFileLast
            • String ID:
            • API String ID: 734332943-0
            • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
            • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
            • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
            • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DeleteFile
            • String ID:
            • API String ID: 4033686569-0
            • Opcode ID: 974406c8209f5f2baf9aa7f60898e2c16b4dbb69ce3e1bfb04616041c36a0a4c
            • Instruction ID: 1cff4f98fe1f8e2c1d524c72e998173d896329315b0501cca3ecf0a0fad01fcd
            • Opcode Fuzzy Hash: 974406c8209f5f2baf9aa7f60898e2c16b4dbb69ce3e1bfb04616041c36a0a4c
            • Instruction Fuzzy Hash: E4B012E13D224A26CB0079FE4CC1D1A00CC4A293063406A3A3006F72C3D83CC8180014
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CurrentDirectory
            • String ID:
            • API String ID: 1611563598-0
            • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
            • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
            • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
            • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorMode
            • String ID:
            • API String ID: 2340568224-0
            • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
            • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
            • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
            • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FreeLibrary.KERNEL32(00000000,00481A2F), ref: 0047D0E2
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID:
            • API String ID: 3664257935-0
            • Opcode ID: 798a4a0ef963ce7c9d3a16661f4bde20b6947b212f410e13b3a4d6eab8997eff
            • Instruction ID: 195a0cc7c2ab23ef077b9fe4dc52bf4a0a1d122fd989c5672d6e5019e3023c1d
            • Opcode Fuzzy Hash: 798a4a0ef963ce7c9d3a16661f4bde20b6947b212f410e13b3a4d6eab8997eff
            • Instruction Fuzzy Hash: D2C00271B902018FC754EB759DD4B6536E49715305F1144775424EB164D6746484CF29
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageA.USER32(00000000,00000012,00000000,00000000), ref: 00481C74
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessagePost
            • String ID:
            • API String ID: 410705778-0
            • Opcode ID: 1bc723d2fafea9f50f28bdb772eb68fb7ee591a9533dee5a29c72c4421e393ba
            • Instruction ID: fbd2fd99f2342ae97ce2e912f06b4f6775a0193fa59faa32ac81747571f1ea96
            • Opcode Fuzzy Hash: 1bc723d2fafea9f50f28bdb772eb68fb7ee591a9533dee5a29c72c4421e393ba
            • Instruction Fuzzy Hash: E2A002343C430430F47462511D03F4400441744F05EE1909573053C0C704D82520201E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID:
            • API String ID: 3375834691-0
            • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
            • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
            • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
            • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
            • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
            • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
            • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID:
            • API String ID: 1452528299-0
            • Opcode ID: 9b36e42861a8e97045d3d1c2d68090febbf4b925d95e27d87fd5eab6f39d8911
            • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
            • Opcode Fuzzy Hash: 9b36e42861a8e97045d3d1c2d68090febbf4b925d95e27d87fd5eab6f39d8911
            • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,00401973), ref: 00401766
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
            • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
            • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
            • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LocalAlloc.KERNEL32(00000000,00000644,?,0049B450,004013A3,?,?,00401443,?,?,?,?,?,00401983), ref: 00401353
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AllocLocal
            • String ID:
            • API String ID: 3494564517-0
            • Opcode ID: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
            • Instruction ID: 71c91fbc4c3ed8fd369fb1531a6952d3d9178ec9d6227f0a2e7a8dd8dab45303
            • Opcode Fuzzy Hash: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
            • Instruction Fuzzy Hash: 0CF05E717013018FE724CF29D980656B7E1EBA9365F24807EE5C5D7761D3358C419B94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
            • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
            • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
            • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
            • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
            • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
            • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
            • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
            • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
            • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
            • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
            • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
            • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
            • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
            • API String ID: 2323315520-3614243559
            • Opcode ID: 671fdaa251972b62047104a2fe9ad863bdd7b53d79a33238f475940deae409a8
            • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
            • Opcode Fuzzy Hash: 671fdaa251972b62047104a2fe9ad863bdd7b53d79a33238f475940deae409a8
            • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetTickCount.KERNEL32 ref: 0045862F
            • QueryPerformanceCounter.KERNEL32(00000000,00000000,004588C2,?,?,00000000,00000000,?,00458FBE,?,00000000,00000000), ref: 00458638
            • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00458642
            • GetCurrentProcessId.KERNEL32(?,00000000,00000000,004588C2,?,?,00000000,00000000,?,00458FBE,?,00000000,00000000), ref: 0045864B
            • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
            • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 004586CF
            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
            • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
            • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
            • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
            • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
              • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
            • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
            • API String ID: 770386003-3271284199
            • Opcode ID: be3e2aad74af535179bad2a73bbdbce7deeedee64d3617dbf3cbed6bd2dfb7d8
            • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
            • Opcode Fuzzy Hash: be3e2aad74af535179bad2a73bbdbce7deeedee64d3617dbf3cbed6bd2dfb7d8
            • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
              • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
              • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
              • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC), ref: 004783CC
              • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
              • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,02382BDC,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
            • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
            • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
            • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
            • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
            • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
            • API String ID: 883996979-221126205
            • Opcode ID: 79d3e53d443c3b79e7afe342da530abadc549f51104da72aa591649ec2f08439
            • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
            • Opcode Fuzzy Hash: 79d3e53d443c3b79e7afe342da530abadc549f51104da72aa591649ec2f08439
            • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 00418393
            • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
            • GetWindowRect.USER32(?), ref: 004183CC
            • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
            • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
            • ScreenToClient.USER32(00000000), ref: 004183F8
            • ScreenToClient.USER32(00000000,?), ref: 00418403
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ClientLongScreen$IconicPlacementRect
            • String ID: ,
            • API String ID: 2266315723-3772416878
            • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
            • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
            • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
            • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
            • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 107509674-3733053543
            • Opcode ID: df5f2c4a541694cd1c04f8324160b67a3be1538f30066156bb5e3b01538ef1f2
            • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
            • Opcode Fuzzy Hash: df5f2c4a541694cd1c04f8324160b67a3be1538f30066156bb5e3b01538ef1f2
            • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
            • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
            • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
            • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirstNext
            • String ID: isRS-$isRS-???.tmp
            • API String ID: 134685335-3422211394
            • Opcode ID: cf57b069758ae0ba75426c42834bf48102169a3864c26a2386e50379bf8921c1
            • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
            • Opcode Fuzzy Hash: cf57b069758ae0ba75426c42834bf48102169a3864c26a2386e50379bf8921c1
            • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
            • SetForegroundWindow.USER32(?), ref: 00457649
            • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
            Strings
            • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessagePostWindow$ForegroundNtdllProc_
            • String ID: Cannot evaluate variable because [Code] isn't running yet
            • API String ID: 2236967946-3182603685
            • Opcode ID: 07d9476e03c8d7360a343fdd7a71a2d4d0b169a7e8f0ef14eb54f7c401357684
            • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
            • Opcode Fuzzy Hash: 07d9476e03c8d7360a343fdd7a71a2d4d0b169a7e8f0ef14eb54f7c401357684
            • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 00417D0F
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$Placement$Iconic
            • String ID: ,
            • API String ID: 568898626-3772416878
            • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
            • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
            • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
            • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
            • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
            • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
            • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$File$CloseErrorFirstModeNext
            • String ID:
            • API String ID: 4011626565-0
            • Opcode ID: 2d6811fa06900ad868c15e275c3b50514c610b3d34fade445412cb0d57d1262e
            • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
            • Opcode Fuzzy Hash: 2d6811fa06900ad868c15e275c3b50514c610b3d34fade445412cb0d57d1262e
            • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
            • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
            • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
            • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$File$CloseErrorFirstModeNext
            • String ID:
            • API String ID: 4011626565-0
            • Opcode ID: bf31d160fcf7ce285bb47ef6c8bba3702c3fba93d44b2e30540216d9a5e040f5
            • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
            • Opcode Fuzzy Hash: bf31d160fcf7ce285bb47ef6c8bba3702c3fba93d44b2e30540216d9a5e040f5
            • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
            • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
            • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
            • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
            • String ID:
            • API String ID: 1177325624-0
            • Opcode ID: ca7e64f53124eee773614f4530e241cea0742e07ac6524e5167bff1d6a405f94
            • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
            • Opcode Fuzzy Hash: ca7e64f53124eee773614f4530e241cea0742e07ac6524e5167bff1d6a405f94
            • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 0048397A
            • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
            • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
            • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$Show$IconicLong
            • String ID:
            • API String ID: 2754861897-0
            • Opcode ID: eced40890854bebd7317fa2d6d43d84d766b7a93c8695781d913d3e5347b8eed
            • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
            • Opcode Fuzzy Hash: eced40890854bebd7317fa2d6d43d84d766b7a93c8695781d913d3e5347b8eed
            • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
            • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
            • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID:
            • API String ID: 3541575487-0
            • Opcode ID: 954d581f0cf53edc7e6b10ce46170be6f6e28a3b9bd67e1e89236dd13880fd9e
            • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
            • Opcode Fuzzy Hash: 954d581f0cf53edc7e6b10ce46170be6f6e28a3b9bd67e1e89236dd13880fd9e
            • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 004241E4
            • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
              • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
              • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,023825AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
            • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ActiveFocusIconicShow
            • String ID:
            • API String ID: 649377781-0
            • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
            • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
            • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
            • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 00417D0F
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$Placement$Iconic
            • String ID:
            • API String ID: 568898626-0
            • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
            • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
            • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
            • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CaptureIconic
            • String ID:
            • API String ID: 2277910766-0
            • Opcode ID: c8f0edb1377470e81cbec4a2b95b5efcfd9f911131a56f14dd142127f01798ba
            • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
            • Opcode Fuzzy Hash: c8f0edb1377470e81cbec4a2b95b5efcfd9f911131a56f14dd142127f01798ba
            • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsIconic.USER32(?), ref: 0042419B
              • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
              • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
              • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
              • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
            • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
              • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ActiveEnumIconicLongShowWindows
            • String ID:
            • API String ID: 2671590913-0
            • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
            • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
            • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
            • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: NtdllProc_Window
            • String ID:
            • API String ID: 4255912815-0
            • Opcode ID: 52e37b400ef70ce07d55a0833d187e2ce83493dd1eac51222033d67a41acb98e
            • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
            • Opcode Fuzzy Hash: 52e37b400ef70ce07d55a0833d187e2ce83493dd1eac51222033d67a41acb98e
            • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: NtdllProc_Window
            • String ID:
            • API String ID: 4255912815-0
            • Opcode ID: 844696e8b897343bdf835c25a6a000e65cc716b27902cfddd3917abf911a0a20
            • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
            • Opcode Fuzzy Hash: 844696e8b897343bdf835c25a6a000e65cc716b27902cfddd3917abf911a0a20
            • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: NtdllProc_Window
            • String ID:
            • API String ID: 4255912815-0
            • Opcode ID: 84fa915654b0e9cabe4af8b3610e56d273e883bd018482bfacacc2813b1fcd3b
            • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
            • Opcode Fuzzy Hash: 84fa915654b0e9cabe4af8b3610e56d273e883bd018482bfacacc2813b1fcd3b
            • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
            • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
            • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
            • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
            • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
            • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
            • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
            • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
            • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
            • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
            • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
            • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
            • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
            • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
            • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
            • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
            • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
            • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
            • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
            • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
            • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
            • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
            • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
            • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
            • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
            • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
            • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
            • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
            • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
            • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
            • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
            • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
            • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
            • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
            • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
            • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
            • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
            • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
            • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
            • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
            • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
            • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
            • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoadVersion
            • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
            • API String ID: 1968650500-2910565190
            • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
            • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
            • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
            • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • Sleep.KERNEL32(00000000,00000000,00492D3D,?,?,?,?,00000000,00000000,00000000), ref: 00492888
            • FindWindowA.USER32(00000000,00000000), ref: 004928B9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FindSleepWindow
            • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
            • API String ID: 3078808852-3310373309
            • Opcode ID: fe0993328b1714d090c62d4b65a95ce68cbab2884a00f13d32d38987ffe254b3
            • Instruction ID: 092cd3663c6e49ee7eb77a287a3c2ed341282e51176ce6ebc4a466309821376d
            • Opcode Fuzzy Hash: fe0993328b1714d090c62d4b65a95ce68cbab2884a00f13d32d38987ffe254b3
            • Instruction Fuzzy Hash: D9C182A0B042003BDB14BF3E9D4551F59A99F95708B119A3FB446EB78BCE7CEC0A4359
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0041CA40
            • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
            • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
            • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
            • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
            • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
            • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
            • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
            • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
            • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
            • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
            • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
            • RealizePalette.GDI32(00000000), ref: 0041CB7D
            • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
            • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
            • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
            • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
            • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
            • SelectObject.GDI32(00000000,?), ref: 0041CBEE
            • DeleteDC.GDI32(00000000), ref: 0041CC04
              • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
            • String ID:
            • API String ID: 269503290-0
            • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
            • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
            • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
            • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
            • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
            • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
            • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
              • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
            • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
            • API String ID: 2000705611-3672972446
            • Opcode ID: 6acfce5c0d266c00f3cb08664922df7ad17872da4bad7acadb5bfb626d6c80a7
            • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
            • Opcode Fuzzy Hash: 6acfce5c0d266c00f3cb08664922df7ad17872da4bad7acadb5bfb626d6c80a7
            • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 0045A846
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
            • API String ID: 1452528299-3112430753
            • Opcode ID: 43171a4fcbad40929b381a5514e069f0f32426cb02f36866d449381604384e36
            • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
            • Opcode Fuzzy Hash: 43171a4fcbad40929b381a5514e069f0f32426cb02f36866d449381604384e36
            • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32 ref: 0045CBDA
            • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
            • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
            • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
            • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
              • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
            • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
            • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
            • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
            • API String ID: 59345061-4263478283
            • Opcode ID: 428efc784f41d3aa7d264c2f262ec685fe65e126583ce7bbd5579cd36a3925cf
            • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
            • Opcode Fuzzy Hash: 428efc784f41d3aa7d264c2f262ec685fe65e126583ce7bbd5579cd36a3925cf
            • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
            • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
            • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
            • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
            • GetDC.USER32(00000000), ref: 0041B402
            • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
            • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
            • SelectObject.GDI32(00000000,?), ref: 0041B470
            • SelectObject.GDI32(?,00000000), ref: 0041B47F
            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
            • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
            • SelectObject.GDI32(?,00000000), ref: 0041B4C7
            • DeleteDC.GDI32(00000000), ref: 0041B4D0
            • DeleteDC.GDI32(?), ref: 0041B4D9
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
            • String ID:
            • API String ID: 644427674-0
            • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
            • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
            • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
            • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
              • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
            • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
            • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
            Strings
            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
            • RegOpenKeyEx, xrefs: 00454910
            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
            • , xrefs: 004548FE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: QueryValue$FormatMessageOpen
            • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
            • API String ID: 2812809588-1577016196
            • Opcode ID: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
            • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
            • Opcode Fuzzy Hash: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
            • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
            Strings
            • v2.0.50727, xrefs: 0045955B
            • v1.1.4322, xrefs: 004595C2
            • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
            • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
            • .NET Framework not found, xrefs: 0045961D
            • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
            • v4.0.30319, xrefs: 004594F1
            • .NET Framework version %s not found, xrefs: 00459609
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Close$Open
            • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
            • API String ID: 2976201327-446240816
            • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
            • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
            • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
            • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CloseHandle.KERNEL32(?), ref: 00458A7B
            • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
            • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
            • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
            • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
            • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
            Strings
            • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
            • Helper isn't responding; killing it., xrefs: 00458A87
            • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
            • Helper process exited, but failed to get exit code., xrefs: 00458AEF
            • Helper process exited., xrefs: 00458AC5
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
            • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
            • API String ID: 3355656108-1243109208
            • Opcode ID: 8d11a9d6b8ebfffa9e94c3bd241da5180e5b7166b03f76cd8ec90a905d120898
            • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
            • Opcode Fuzzy Hash: 8d11a9d6b8ebfffa9e94c3bd241da5180e5b7166b03f76cd8ec90a905d120898
            • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
              • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
            Strings
            • RegCreateKeyEx, xrefs: 004545C3
            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
            • , xrefs: 004545B1
            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseCreateFormatMessageQueryValue
            • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
            • API String ID: 2481121983-1280779767
            • Opcode ID: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
            • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
            • Opcode Fuzzy Hash: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
            • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
              • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
            • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
            • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
            • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
              • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
            • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
            • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
            • API String ID: 1549857992-2312673372
            • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
            • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
            • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
            • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressCloseHandleModuleProc
            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
            • API String ID: 4190037839-2312295185
            • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
            • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
            • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
            • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetActiveWindow.USER32 ref: 004629FC
            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
            • GetWindowRect.USER32(?,00000000), ref: 00462A76
            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$AddressProc$ActiveHandleModuleRect
            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
            • API String ID: 2610873146-3407710046
            • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
            • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
            • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
            • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetActiveWindow.USER32 ref: 0042F194
            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
            • GetWindowRect.USER32(?,00000000), ref: 0042F20E
            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$AddressProc$ActiveHandleModuleRect
            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
            • API String ID: 2610873146-3407710046
            • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
            • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
            • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
            • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,00000000,00000000), ref: 00458C79
            • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
            • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
            • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000), ref: 00458D55
            • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000), ref: 00458D5C
              • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
            • String ID: CreateEvent$TransactNamedPipe
            • API String ID: 2182916169-3012584893
            • Opcode ID: ef16c20a6daf1f887f3bc2a9a4f4fdabf826d35dd2b72c43caf5f800eb3833ff
            • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
            • Opcode Fuzzy Hash: ef16c20a6daf1f887f3bc2a9a4f4fdabf826d35dd2b72c43caf5f800eb3833ff
            • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
            • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
            • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
              • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressErrorHandleLastLoadModuleProcType
            • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
            • API String ID: 1914119943-2711329623
            • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
            • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
            • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
            • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RectVisible.GDI32(?,?), ref: 00416E13
            • SaveDC.GDI32(?), ref: 00416E27
            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
            • RestoreDC.GDI32(?,?), ref: 00416E65
            • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
            • FrameRect.USER32(?,?,?), ref: 00416F18
            • DeleteObject.GDI32(?), ref: 00416F22
            • CreateSolidBrush.GDI32(00000000), ref: 00416F32
            • FrameRect.USER32(?,?,?), ref: 00416F65
            • DeleteObject.GDI32(?), ref: 00416F6F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
            • String ID:
            • API String ID: 375863564-0
            • Opcode ID: 31305b42e63a20fe9f9ee5f73744d5e2f5e6a90e84c308e69de84060d35988a9
            • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
            • Opcode Fuzzy Hash: 31305b42e63a20fe9f9ee5f73744d5e2f5e6a90e84c308e69de84060d35988a9
            • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
            • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
            • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
            • GetLastError.KERNEL32(000000F5), ref: 00404C46
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
            • String ID:
            • API String ID: 1694776339-0
            • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
            • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
            • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
            • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
            • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
            • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
            • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
            • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
            • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
            • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
            • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
            • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu$Delete$EnableItem$System
            • String ID:
            • API String ID: 3985193851-0
            • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
            • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
            • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
            • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SHGetMalloc.SHELL32(?), ref: 004616C7
            • GetActiveWindow.USER32 ref: 0046172B
            • CoInitialize.OLE32(00000000), ref: 0046173F
            • SHBrowseForFolder.SHELL32(?), ref: 00461756
            • 756CD120.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
            • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
            • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ActiveWindow$BrowseD120FolderInitializeMalloc
            • String ID: A
            • API String ID: 2698730301-3554254475
            • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
            • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
            • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
            • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
            • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
            • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
            • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: inflate$inflateEnd$inflateInit_$inflateReset
            • API String ID: 190572456-3516654456
            • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
            • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
            • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
            • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
            • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
            • SetBkColor.GDI32(?,?), ref: 0041AA08
            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
            • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
            • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
            • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
            • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Color$StretchText
            • String ID:
            • API String ID: 2984075790-0
            • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
            • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
            • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
            • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseDirectoryHandleSystem
            • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
            • API String ID: 2051275411-1862435767
            • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
            • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
            • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
            • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
            • GetSysColor.USER32(00000014), ref: 0044D1B0
            • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
            • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
            • GetSysColor.USER32(00000010), ref: 0044D202
            • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Text$Color$Draw$OffsetRect
            • String ID:
            • API String ID: 1005981011-0
            • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
            • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
            • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
            • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFocus.USER32 ref: 0041B745
            • GetDC.USER32(?), ref: 0041B751
            • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
            • RealizePalette.GDI32(00000000), ref: 0041B792
            • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
            • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Palette$Select$BitmapCreateFocusRealize
            • String ID: %H
            • API String ID: 3275473261-1959103961
            • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
            • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
            • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
            • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFocus.USER32 ref: 0041BA17
            • GetDC.USER32(?), ref: 0041BA23
            • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
            • RealizePalette.GDI32(00000000), ref: 0041BA69
            • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
            • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Palette$Select$BitmapCreateFocusRealize
            • String ID: %H
            • API String ID: 3275473261-1959103961
            • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
            • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
            • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
            • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
              • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
            • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
            • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
            • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
            • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
            Strings
            • Deleting Uninstall data files., xrefs: 004964FB
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
            • String ID: Deleting Uninstall data files.
            • API String ID: 1570157960-2568741658
            • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
            • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
            • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
            • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
            • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
            • AddFontResourceA.GDI32(00000000), ref: 00470297
            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
            Strings
            • Failed to open Fonts registry key., xrefs: 00470281
            • Failed to set value in Fonts registry key., xrefs: 0047026C
            • AddFontResource, xrefs: 004702B5
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseFontMessageNotifyOpenResourceSendValue
            • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
            • API String ID: 955540645-649663873
            • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
            • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
            • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
            • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
              • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
              • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
            • GetVersion.KERNEL32 ref: 00462E60
            • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
            • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
            • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
            • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
            • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
            • String ID: Explorer
            • API String ID: 2594429197-512347832
            • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
            • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
            • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
            • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
            • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
            • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02382BDC,?,?,?,02382BDC), ref: 004783CC
            • CloseHandle.KERNEL32(00000000,?,?,?,02382BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
            • String ID: GetFinalPathNameByHandleA$kernel32.dll
            • API String ID: 2704155762-2318956294
            • Opcode ID: 6bc275baaa87b820f83455aa3780e808e355a1b98666f0b165ca17ab90bcbd73
            • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
            • Opcode Fuzzy Hash: 6bc275baaa87b820f83455aa3780e808e355a1b98666f0b165ca17ab90bcbd73
            • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 00459ED2
              • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
            Strings
            • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
            • Stripped read-only attribute., xrefs: 00459E94
            • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
            • Failed to strip read-only attribute., xrefs: 00459EA0
            • Failed to delete directory (%d)., xrefs: 00459F68
            • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
            • Deleting directory: %s, xrefs: 00459E5B
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseErrorFindLast
            • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
            • API String ID: 754982922-1448842058
            • Opcode ID: 825b69e71020358a2790d5b66baca682891f253eb20f6d4b4ab0a73fce46c835
            • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
            • Opcode Fuzzy Hash: 825b69e71020358a2790d5b66baca682891f253eb20f6d4b4ab0a73fce46c835
            • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCapture.USER32 ref: 00422EA4
            • GetCapture.USER32 ref: 00422EB3
            • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
            • ReleaseCapture.USER32 ref: 00422EBE
            • GetActiveWindow.USER32 ref: 00422ECD
            • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
            • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
            • GetActiveWindow.USER32 ref: 00422FBF
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CaptureMessageSend$ActiveWindow$Release
            • String ID:
            • API String ID: 862346643-0
            • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
            • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
            • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
            • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
            • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
            • GetActiveWindow.USER32 ref: 0042F2DA
            • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
            • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ActiveLong$Message
            • String ID:
            • API String ID: 2785966331-0
            • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
            • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
            • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
            • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0042948A
            • GetTextMetricsA.GDI32(00000000), ref: 00429493
              • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
            • SelectObject.GDI32(00000000,00000000), ref: 004294A2
            • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
            • SelectObject.GDI32(00000000,00000000), ref: 004294B6
            • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
            • GetSystemMetrics.USER32(00000006), ref: 004294E3
            • GetSystemMetrics.USER32(00000006), ref: 004294FD
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
            • String ID:
            • API String ID: 1583807278-0
            • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
            • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
            • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
            • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0041DE27
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
            • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
            • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
            • GetStockObject.GDI32(00000007), ref: 0041DE5B
            • GetStockObject.GDI32(00000005), ref: 0041DE67
            • GetStockObject.GDI32(0000000D), ref: 0041DE73
            • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ObjectStock$CapsDeviceIconLoadRelease
            • String ID:
            • API String ID: 225703358-0
            • Opcode ID: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
            • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
            • Opcode Fuzzy Hash: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
            • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
            • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
            • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Cursor$Load
            • String ID: $ $Internal error: Item already expanding
            • API String ID: 1675784387-1948079669
            • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
            • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
            • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
            • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: PrivateProfileStringWrite
            • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
            • API String ID: 390214022-3304407042
            • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
            • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
            • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
            • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
            • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
            • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ClassInfoLongMessageSendWindow
            • String ID: COMBOBOX$Inno Setup: Language
            • API String ID: 3391662889-4234151509
            • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
            • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
            • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
            • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
              • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
              • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: InfoLocale$DefaultSystem
            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
            • API String ID: 1044490935-665933166
            • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
            • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
            • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
            • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
            • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
              • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
            • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
              • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
            • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Menu$Insert$Create$ItemPopupVersion
            • String ID: ,$?
            • API String ID: 2359071979-2308483597
            • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
            • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
            • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
            • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
            • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
            • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
            • DeleteObject.GDI32(?), ref: 0041BF9F
            • DeleteObject.GDI32(?), ref: 0041BFA8
            • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Object$BitmapBitsDelete$CreateIcon
            • String ID:
            • API String ID: 1030595962-0
            • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
            • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
            • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
            • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
            • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
            • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
            • RealizePalette.GDI32(?), ref: 0041CF92
            • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
            • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
            • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
            • String ID:
            • API String ID: 2222416421-0
            • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
            • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
            • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
            • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(00000000,?,?), ref: 0045732E
              • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
              • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
              • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
              • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
            • TranslateMessage.USER32(?), ref: 004573B3
            • DispatchMessageA.USER32(?), ref: 004573BC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
            • String ID: [Paused]
            • API String ID: 1007367021-4230553315
            • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
            • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
            • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
            • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
            • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
            • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
            • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
            • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Cursor$LoadSleep
            • String ID: CheckPassword
            • API String ID: 4023313301-1302249611
            • Opcode ID: a15a8593e9f633b5a85a0686193dd54b7b5146f7df37d6bd0e19c7d70d8febf0
            • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
            • Opcode Fuzzy Hash: a15a8593e9f633b5a85a0686193dd54b7b5146f7df37d6bd0e19c7d70d8febf0
            • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
              • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
              • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
            • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
            • GetTickCount.KERNEL32 ref: 00477CE6
            • GetTickCount.KERNEL32 ref: 00477CF0
            • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
            Strings
            • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
            • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
            • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
            • API String ID: 613034392-3771334282
            • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
            • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
            • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
            • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
            Strings
            • Fusion.dll, xrefs: 004597DF
            • CreateAssemblyCache, xrefs: 00459836
            • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
            • Failed to load .NET Framework DLL "%s", xrefs: 00459824
            • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
            • API String ID: 190572456-3990135632
            • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
            • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
            • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
            • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
            • GetFocus.USER32 ref: 0041C168
            • GetDC.USER32(?), ref: 0041C174
            • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
            • RealizePalette.GDI32(?), ref: 0041C1A1
            • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
            • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
            • ReleaseDC.USER32(?,?), ref: 0041C1ED
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Palette$Select$BitsFocusObjectRealizeRelease
            • String ID:
            • API String ID: 3303097818-0
            • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
            • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
            • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
            • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMetrics.USER32(0000000E), ref: 00418C70
            • GetSystemMetrics.USER32(0000000D), ref: 00418C78
            • 6F552980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
              • Part of subcall function 004107F8: 6F54C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
            • 6F5BCB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
            • 6F5BC740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
            • 6F5BCB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
            • 6F550860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MetricsSystem$C400C740F550860F552980
            • String ID:
            • API String ID: 1828538299-0
            • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
            • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
            • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
            • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
            • API String ID: 47109696-2530820420
            • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
            • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
            • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
            • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SelectObject.GDI32(00000000,?), ref: 0041B470
            • SelectObject.GDI32(?,00000000), ref: 0041B47F
            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
            • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
            • SelectObject.GDI32(?,00000000), ref: 0041B4C7
            • DeleteDC.GDI32(00000000), ref: 0041B4D0
            • DeleteDC.GDI32(?), ref: 0041B4D9
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ObjectSelect$Delete$Stretch
            • String ID:
            • API String ID: 1458357782-0
            • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
            • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
            • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
            • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 00495519
              • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
            • SelectObject.GDI32(00000000,00000000), ref: 0049553B
            • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
            • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
            • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
            Strings
            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
            • API String ID: 2948443157-222967699
            • Opcode ID: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
            • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
            • Opcode Fuzzy Hash: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
            • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCursorPos.USER32 ref: 004233AF
            • WindowFromPoint.USER32(?,?), ref: 004233BC
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
            • GetCurrentThreadId.KERNEL32 ref: 004233D1
            • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
            • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
            • SetCursor.USER32(00000000), ref: 00423413
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
            • String ID:
            • API String ID: 1770779139-0
            • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
            • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
            • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
            • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
            • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
            • API String ID: 667068680-2254406584
            • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
            • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
            • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
            • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045D191
            • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045D1A1
            • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045D1B1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
            • API String ID: 190572456-508647305
            • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
            • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
            • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
            • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
            • API String ID: 190572456-212574377
            • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
            • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
            • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
            • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
            • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
              • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
              • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
              • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
            • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
            • String ID: ChangeWindowMessageFilterEx$user32.dll
            • API String ID: 142928637-2676053874
            • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
            • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
            • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
            • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
            • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
            • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
            • API String ID: 2238633743-1050967733
            • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
            • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
            • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
            • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
            • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
            • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
            • API String ID: 667068680-222143506
            • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
            • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
            • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
            • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFocus.USER32 ref: 0041B57E
            • GetDC.USER32(?), ref: 0041B58A
            • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
            • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
            • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
            • ReleaseDC.USER32(?,?), ref: 0041B626
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
            • String ID:
            • API String ID: 2502006586-0
            • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
            • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
            • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
            • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
            • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
            • API String ID: 1452528299-1580325520
            • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
            • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
            • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
            • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
            • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
            • GetDC.USER32(00000000), ref: 0041BDE9
            • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
            • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CapsDeviceMetricsSystem$Release
            • String ID:
            • API String ID: 447804332-0
            • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
            • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
            • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
            • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
            • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
            • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$Long$Show
            • String ID:
            • API String ID: 3609083571-0
            • Opcode ID: 761baba5ea275c4f8ba8f3b2538ab5f77c1d2b06cda4c3ad0feadca871259e14
            • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
            • Opcode Fuzzy Hash: 761baba5ea275c4f8ba8f3b2538ab5f77c1d2b06cda4c3ad0feadca871259e14
            • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
            • UnrealizeObject.GDI32(00000000), ref: 0041B27C
            • SelectObject.GDI32(?,00000000), ref: 0041B28E
            • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
            • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
            • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
            • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
              • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
            • String ID:
            • API String ID: 3527656728-0
            • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
            • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
            • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
            • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
            Strings
            • WININIT.INI, xrefs: 004557E4
            • PendingFileRenameOperations2, xrefs: 00455784
            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
            • PendingFileRenameOperations, xrefs: 00455754
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
            • API String ID: 47109696-2199428270
            • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
            • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
            • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
            • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseCreateFileHandle
            • String ID: !nI$.tmp$_iu
            • API String ID: 3498533004-584216493
            • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
            • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
            • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
            • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
            • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
              • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
              • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
            • String ID: .dat$.msg$IMsg$Uninstall
            • API String ID: 3312786188-1660910688
            • Opcode ID: d050b8c65b09966d21fe0fc985d660f82682418f1ef04ac2b8f2793e44e24393
            • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
            • Opcode Fuzzy Hash: d050b8c65b09966d21fe0fc985d660f82682418f1ef04ac2b8f2793e44e24393
            • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressByteCharHandleModuleMultiProcWide
            • String ID: ShutdownBlockReasonCreate$user32.dll
            • API String ID: 828529508-2866557904
            • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
            • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
            • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
            • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
            • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
            • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
            • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
            • API String ID: 2573145106-3235461205
            • Opcode ID: 0165f3f1031fc1aa6e60b3a9799ba1014783226e14f241c311df118ccfede771
            • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
            • Opcode Fuzzy Hash: 0165f3f1031fc1aa6e60b3a9799ba1014783226e14f241c311df118ccfede771
            • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
            • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressExchangeHandleInterlockedModuleProc
            • String ID: ChangeWindowMessageFilter$user32.dll
            • API String ID: 3478007392-2498399450
            • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
            • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
            • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
            • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
            • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProcProcessThreadWindow
            • String ID: AllowSetForegroundWindow$user32.dll
            • API String ID: 1782028327-3855017861
            • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
            • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
            • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
            • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • BeginPaint.USER32(00000000,?), ref: 00416C52
            • SaveDC.GDI32(?), ref: 00416C83
            • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
            • RestoreDC.GDI32(?,?), ref: 00416D0B
            • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Paint$BeginClipExcludeRectRestoreSave
            • String ID:
            • API String ID: 3808407030-0
            • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
            • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
            • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
            • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
            • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
            • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
            • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
            • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
            • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
            • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
            • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
            • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
            • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
            • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
            • GetDC.USER32(00000000), ref: 0041BC12
            • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
            • DeleteObject.GDI32(00000000), ref: 0041BC9A
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MetricsSystem$BitmapCreateDeleteObject
            • String ID:
            • API String ID: 1095203571-0
            • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
            • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
            • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
            • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
            • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
            • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
            Strings
            • Setting permissions on registry key: %s\%s, xrefs: 0047362A
            • Failed to set permissions on registry key (%d)., xrefs: 0047368C
            • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
            • API String ID: 1452528299-4018462623
            • Opcode ID: f83a2768d3c65ea5df61b415147cb4a980a2a4da2a2eeea125c2e66a17c72d68
            • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
            • Opcode Fuzzy Hash: f83a2768d3c65ea5df61b415147cb4a980a2a4da2a2eeea125c2e66a17c72d68
            • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ByteCharMultiWide$AllocString
            • String ID:
            • API String ID: 262959230-0
            • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
            • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
            • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
            • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
            • RealizePalette.GDI32(00000000), ref: 00414421
            • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
            • RealizePalette.GDI32(00000000), ref: 0041443B
            • ReleaseDC.USER32(00000000,00000000), ref: 00414446
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Palette$RealizeSelect$Release
            • String ID:
            • API String ID: 2261976640-0
            • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
            • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
            • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
            • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
              • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
              • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
              • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
            • OffsetRect.USER32(?,?,?), ref: 00424DC9
            • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
            • OffsetRect.USER32(?,?,?), ref: 00424E9D
              • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
              • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
              • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
              • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
            • String ID: vLB
            • API String ID: 1477829881-1797516613
            • Opcode ID: b071e8f690a675b1b5ec03376c9d1dc0568a9cea913d7d114b2f1dd6f13c8b48
            • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
            • Opcode Fuzzy Hash: b071e8f690a675b1b5ec03376c9d1dc0568a9cea913d7d114b2f1dd6f13c8b48
            • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
            • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
            • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Enum$NameOpenResourceUniversal
            • String ID: Z
            • API String ID: 3604996873-1505515367
            • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
            • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
            • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
            • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetRectEmpty.USER32(?), ref: 0044D04E
            • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
            • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DrawText$EmptyRect
            • String ID:
            • API String ID: 182455014-2867612384
            • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
            • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
            • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
            • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDC.USER32(00000000), ref: 0042EF9E
              • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
            • SelectObject.GDI32(?,00000000), ref: 0042EFC1
            • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CreateFontIndirectObjectReleaseSelect
            • String ID: ...\
            • API String ID: 3133960002-983595016
            • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
            • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
            • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
            • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
            • UnregisterClassA.USER32(?,00400000), ref: 004164AB
            • RegisterClassA.USER32(?), ref: 004164CE
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Class$InfoRegisterUnregister
            • String ID: @
            • API String ID: 3749476976-2766056989
            • Opcode ID: 3b6f74928dbe25e833ba5f094c78e46ad4264582666b3af08ebad3e49732e910
            • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
            • Opcode Fuzzy Hash: 3b6f74928dbe25e833ba5f094c78e46ad4264582666b3af08ebad3e49732e910
            • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$Attributes$Move
            • String ID: isRS-%.3u.tmp
            • API String ID: 3839737484-3657609586
            • Opcode ID: caa082c947593af69ac399f5aa69a479bfa54a7c4d0fec8f0c1611cec8706775
            • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
            • Opcode Fuzzy Hash: caa082c947593af69ac399f5aa69a479bfa54a7c4d0fec8f0c1611cec8706775
            • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
            • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
            • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
            • String ID: LoadTypeLib$RegisterTypeLib
            • API String ID: 1312246647-2435364021
            • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
            • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
            • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
            • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
            • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
            Strings
            • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
            • Failed to create DebugClientWnd, xrefs: 004571D4
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
            • API String ID: 3850602802-3720027226
            • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
            • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
            • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
            • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
            • GetFocus.USER32 ref: 00478757
            • GetKeyState.USER32(0000007A), ref: 00478769
            • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FocusMessageStateTextWaitWindow
            • String ID: Wnd=$%x
            • API String ID: 1381870634-2927251529
            • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
            • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
            • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
            • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Time$File$LocalSystem
            • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
            • API String ID: 1748579591-1013271723
            • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
            • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
            • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
            • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
              • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
            • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
              • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: File$AttributesDeleteErrorLastMove
            • String ID: DeleteFile$MoveFile
            • API String ID: 3024442154-139070271
            • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
            • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
            • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
            • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
            • API String ID: 47109696-2631785700
            • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
            • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
            • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
            • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
            • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
            Strings
            • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
            • CSDVersion, xrefs: 00483BFC
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
            • API String ID: 3677997916-1910633163
            • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
            • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
            • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
            • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: GetSystemWow64DirectoryA$kernel32.dll
            • API String ID: 1646373207-4063490227
            • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
            • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
            • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
            • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: ShutdownBlockReasonDestroy$user32.dll
            • API String ID: 1646373207-260599015
            • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
            • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
            • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
            • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: NotifyWinEvent$user32.dll
            • API String ID: 1646373207-597752486
            • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
            • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
            • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
            • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: DisableProcessWindowsGhosting$user32.dll
            • API String ID: 1646373207-834958232
            • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
            • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
            • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
            • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
              • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
            • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
            • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID: SHPathPrepareForWriteA$shell32.dll
            • API String ID: 2238633743-2683653824
            • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
            • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
            • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
            • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
            • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Find$CloseFileNext
            • String ID:
            • API String ID: 2066263336-0
            • Opcode ID: aed5ff881d9cd74b79ade3454e116a6c1ede96761b74de0710c412a42c079b2d
            • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
            • Opcode Fuzzy Hash: aed5ff881d9cd74b79ade3454e116a6c1ede96761b74de0710c412a42c079b2d
            • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
              • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
            • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CountErrorFileLastMoveTick
            • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
            • API String ID: 2406187244-2685451598
            • Opcode ID: a13b4d41162069bde37ca5ba37a3bfc16fb44220c5afb8832f1568bbfa6ce935
            • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
            • Opcode Fuzzy Hash: a13b4d41162069bde37ca5ba37a3bfc16fb44220c5afb8832f1568bbfa6ce935
            • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDesktopWindow.USER32 ref: 00413D46
            • GetDesktopWindow.USER32 ref: 00413DFE
              • Part of subcall function 00418EC0: 6F5BC6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
              • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
            • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CursorDesktopWindow$Show
            • String ID:
            • API String ID: 2074268717-0
            • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
            • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
            • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
            • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
            • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
            • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: LoadString$FileMessageModuleName
            • String ID:
            • API String ID: 704749118-0
            • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
            • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
            • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
            • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
              • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
            • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
              • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
            • IsRectEmpty.USER32(?), ref: 0044E953
            • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
            • String ID:
            • API String ID: 855768636-0
            • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
            • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
            • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
            • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • OffsetRect.USER32(?,?,00000000), ref: 00495988
            • OffsetRect.USER32(?,00000000,?), ref: 004959A3
            • OffsetRect.USER32(?,?,00000000), ref: 004959BD
            • OffsetRect.USER32(?,00000000,?), ref: 004959D8
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: OffsetRect
            • String ID:
            • API String ID: 177026234-0
            • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
            • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
            • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
            • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
            • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
            • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
            • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
            • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
            • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
            • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
            • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
            • RegisterClassA.USER32(00499598), ref: 0041F4D4
            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Class$InfoLongRegisterUnregisterWindow
            • String ID:
            • API String ID: 4025006896-0
            • Opcode ID: f5329bc195fe8fc87e14c8434c73e300a75752ca243df2a436e9fb21fcb0b6a1
            • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
            • Opcode Fuzzy Hash: f5329bc195fe8fc87e14c8434c73e300a75752ca243df2a436e9fb21fcb0b6a1
            • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
            • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
            • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
            • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Resource$FindLoadLockSizeof
            • String ID:
            • API String ID: 3473537107-0
            • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
            • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
            • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
            • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
            • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
            • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
            • String ID:
            • API String ID: 730355536-0
            • Opcode ID: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
            • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
            • Opcode Fuzzy Hash: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
            • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,00000000), ref: 004705F1
            Strings
            • Setting NTFS compression on file: %s, xrefs: 004705BF
            • Unsetting NTFS compression on file: %s, xrefs: 004705D7
            • Failed to set NTFS compression state (%d)., xrefs: 00470602
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
            • API String ID: 1452528299-3038984924
            • Opcode ID: e534bd073bd99d1ffd8d8a7551bf23dca8ffa9a0f38022b87dc0121eb45f3a98
            • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
            • Opcode Fuzzy Hash: e534bd073bd99d1ffd8d8a7551bf23dca8ffa9a0f38022b87dc0121eb45f3a98
            • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
            Strings
            • Setting NTFS compression on directory: %s, xrefs: 0046FE13
            • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
            • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
            • API String ID: 1452528299-1392080489
            • Opcode ID: f57c8121f87b7cbe45d24f1443a8c943819022774a47ae68e03ba31a404fe09e
            • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
            • Opcode Fuzzy Hash: f57c8121f87b7cbe45d24f1443a8c943819022774a47ae68e03ba31a404fe09e
            • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
            • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
            • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
            • String ID:
            • API String ID: 4283692357-0
            • Opcode ID: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
            • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
            • Opcode Fuzzy Hash: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
            • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
            • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
            • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
            • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
            • String ID:
            • API String ID: 215268677-0
            • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
            • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
            • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
            • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastActivePopup.USER32(?), ref: 0042424C
            • IsWindowVisible.USER32(?), ref: 0042425D
            • IsWindowEnabled.USER32(?), ref: 00424267
            • SetForegroundWindow.USER32(?), ref: 00424271
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window$ActiveEnabledForegroundLastPopupVisible
            • String ID:
            • API String ID: 2280970139-0
            • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
            • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
            • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
            • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GlobalHandle.KERNEL32 ref: 0040626F
            • GlobalUnWire.KERNEL32(00000000), ref: 00406276
            • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
            • GlobalFix.KERNEL32(00000000), ref: 00406281
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Global$AllocHandleWire
            • String ID:
            • API String ID: 2210401237-0
            • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
            • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
            • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
            • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
            Strings
            • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
            • Failed to parse "reg" constant, xrefs: 0047A480
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Close
            • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
            • API String ID: 3535843008-1938159461
            • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
            • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
            • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
            • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
            • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
            Strings
            • Extracting temporary file: , xrefs: 004763EC
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: FileTime$Local
            • String ID: Extracting temporary file:
            • API String ID: 791338737-4171118009
            • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
            • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
            • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
            • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
            • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID:
            • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
            • API String ID: 0-1974262853
            • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
            • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
            • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
            • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
            • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
            Strings
            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
            • %s\%s_is1, xrefs: 00478F10
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
            • API String ID: 47109696-1598650737
            • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
            • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
            • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
            • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
            • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ExecuteMessageSendShell
            • String ID: open
            • API String ID: 812272486-2758837156
            • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
            • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
            • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
            • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
            • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
              • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: DirectoryErrorExecuteLastShellSystem
            • String ID: <
            • API String ID: 893404051-4251816714
            • Opcode ID: 397510d247cb734b7669861417dbfcfbd251f2c0a68ff4605259e86b5c29478d
            • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
            • Opcode Fuzzy Hash: 397510d247cb734b7669861417dbfcfbd251f2c0a68ff4605259e86b5c29478d
            • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
            • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0238D36C,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
            • String ID: )
            • API String ID: 2227675388-1084416617
            • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
            • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
            • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
            • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Window
            • String ID: /INITPROCWND=$%x $@
            • API String ID: 2353593579-4169826103
            • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
            • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
            • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
            • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
            • SysFreeString.OLEAUT32(?), ref: 004474C6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: String$AllocByteCharFreeMultiWide
            • String ID: NIL Interface Exception$Unknown Method
            • API String ID: 3952431833-1023667238
            • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
            • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
            • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
            • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
            • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
              • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CloseCreateErrorHandleLastProcess
            • String ID: 0nI
            • API String ID: 3798668922-794067871
            • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
            • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
            • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
            • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Value$EnumQuery
            • String ID: Inno Setup: No Icons
            • API String ID: 1576479698-2016326496
            • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
            • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
            • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
            • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
            • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: AttributesErrorFileLast
            • String ID: T$H
            • API String ID: 1799206407-488339322
            • Opcode ID: 5d86fcf9b6e052d8a24a57bf4ef79df3c2f35f3d819ce0a4394afd1f6d7b89dc
            • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
            • Opcode Fuzzy Hash: 5d86fcf9b6e052d8a24a57bf4ef79df3c2f35f3d819ce0a4394afd1f6d7b89dc
            • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(00000000,00481A2F), ref: 0047D0E2
              • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
              • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
            • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
            • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
            Strings
            • Detected restart. Removing temporary directory., xrefs: 00498013
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
            • String ID: Detected restart. Removing temporary directory.
            • API String ID: 1717587489-3199836293
            • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
            • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
            • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
            • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
            • GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: CommandHandleLineModule
            • String ID: P6a
            • API String ID: 2123368496-542390041
            • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
            • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
            • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
            • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1946339227.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.1946320495.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946396480.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946417224.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946438660.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.1946457059.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_view_01-64.jbxd
            Similarity
            • API ID: ErrorLastSleep
            • String ID:
            • API String ID: 1458359878-0
            • Opcode ID: 124e83ad3764f0425cc9cce0cec047ecc2156a8e27ad070cfe64c44283ad0992
            • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
            • Opcode Fuzzy Hash: 124e83ad3764f0425cc9cce0cec047ecc2156a8e27ad070cfe64c44283ad0992
            • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:6%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:9%
            Total number of Nodes:1510
            Total number of Limit Nodes:161
            execution_graph 23575 413763 23619 413950 23575->23619 23577 41376f GetStartupInfoA GetProcessHeap HeapAlloc 23578 4137a1 23577->23578 23579 4137ae GetVersionExA 23577->23579 23799 4136fe 67 API calls 3 library calls 23578->23799 23581 4137cc GetProcessHeap HeapFree 23579->23581 23582 4137be GetProcessHeap HeapFree 23579->23582 23584 4137f8 23581->23584 23583 4137a8 __getstream 23582->23583 23620 41d7a7 HeapCreate 23584->23620 23586 413839 23587 413845 23586->23587 23800 4136fe 67 API calls 3 library calls 23586->23800 23630 4199cf GetModuleHandleA 23587->23630 23590 41384b 23591 413856 __RTC_Initialize 23590->23591 23801 4136fe 67 API calls 3 library calls 23590->23801 23663 41438e 23591->23663 23594 413864 23595 413870 GetCommandLineA 23594->23595 23802 40e805 67 API calls 3 library calls 23594->23802 23680 41f529 23595->23680 23598 41386f 23598->23595 23602 413895 23719 41f1f3 23602->23719 23606 4138a6 23734 40ea43 23606->23734 23609 4138ad 23610 4138b8 23609->23610 23805 40e805 67 API calls 3 library calls 23609->23805 23740 41f196 23610->23740 23616 4138e9 23806 40ebc5 67 API calls _doexit 23616->23806 23619->23577 23621 41d7c7 23620->23621 23622 41d7ca 23620->23622 23621->23586 23807 41d74c 67 API calls 3 library calls 23622->23807 23624 41d7cf 23625 41d7d9 23624->23625 23626 41d7fd 23624->23626 23808 41d91e HeapAlloc 23625->23808 23626->23586 23628 41d7e3 23628->23626 23629 41d7e8 HeapDestroy 23628->23629 23629->23621 23631 4199e1 23630->23631 23632 4199ea GetProcAddress GetProcAddress GetProcAddress GetProcAddress 23630->23632 23809 4196ad 5 API calls __decode_pointer 23631->23809 23633 419a34 TlsAlloc 23632->23633 23637 419a82 TlsSetValue 23633->23637 23638 419b4e 23633->23638 23637->23638 23639 419a93 23637->23639 23638->23590 23810 40ebe3 4 API calls 2 library calls 23639->23810 23641 419a98 23811 419577 TlsGetValue 23641->23811 23644 419577 __encode_pointer 4 API calls 23645 419ab3 23644->23645 23646 419577 __encode_pointer 4 API calls 23645->23646 23647 419ac3 23646->23647 23648 419577 __encode_pointer 4 API calls 23647->23648 23649 419ad3 23648->23649 23818 41880b 67 API calls ___crtInitCritSecAndSpinCount 23649->23818 23651 419ae0 23652 419b49 23651->23652 23819 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 23651->23819 23828 4196ad 5 API calls __decode_pointer 23652->23828 23655 419af4 23655->23652 23820 41a0e6 23655->23820 23659 419b27 23659->23652 23660 419b2e 23659->23660 23827 4196ea 67 API calls 4 library calls 23660->23827 23662 419b36 GetCurrentThreadId 23662->23638 23928 413950 23663->23928 23665 41439a GetStartupInfoA 23666 41a0e6 __calloc_crt 67 API calls 23665->23666 23668 4143bb 23666->23668 23667 4145c5 __getstream 23667->23594 23668->23667 23670 41a0e6 __calloc_crt 67 API calls 23668->23670 23673 41448f 23668->23673 23674 41450c 23668->23674 23669 414542 GetStdHandle 23669->23674 23670->23668 23671 4145a7 SetHandleCount 23671->23667 23672 414554 GetFileType 23672->23674 23673->23674 23675 4144c3 23673->23675 23676 4144b8 GetFileType 23673->23676 23674->23669 23674->23671 23674->23672 23679 41456b 23674->23679 23675->23667 23675->23673 23929 41a9ba 67 API calls 5 library calls 23675->23929 23676->23673 23676->23675 23679->23667 23679->23674 23930 41a9ba 67 API calls 5 library calls 23679->23930 23681 41f564 23680->23681 23682 41f545 GetEnvironmentStringsW 23680->23682 23684 41f54d 23681->23684 23685 41f5ff 23681->23685 23683 41f559 GetLastError 23682->23683 23682->23684 23683->23681 23686 41f57f GetEnvironmentStringsW 23684->23686 23689 41f58e 23684->23689 23687 41f607 GetEnvironmentStrings 23685->23687 23690 413880 23685->23690 23686->23689 23686->23690 23687->23690 23692 41f617 23687->23692 23688 41f5a3 WideCharToMultiByte 23693 41f5c2 23688->23693 23694 41f5f4 FreeEnvironmentStringsW 23688->23694 23689->23688 23689->23689 23706 41f470 23690->23706 23691 41f625 23933 41a0a6 67 API calls _malloc 23691->23933 23692->23691 23692->23692 23931 41a0a6 67 API calls _malloc 23693->23931 23694->23690 23697 41f630 23699 41f643 ___crtGetEnvironmentStringsA 23697->23699 23700 41f637 FreeEnvironmentStringsA 23697->23700 23698 41f5c8 23698->23694 23701 41f5d1 WideCharToMultiByte 23698->23701 23704 41f64b FreeEnvironmentStringsA 23699->23704 23700->23690 23702 41f5eb 23701->23702 23703 41f5e2 23701->23703 23702->23694 23932 40fdcf 67 API calls 6 library calls 23703->23932 23704->23690 23707 41f483 23706->23707 23708 41f488 GetModuleFileNameA 23706->23708 23940 41b19f 110 API calls __setmbcp 23707->23940 23710 41f4af 23708->23710 23934 41f2d8 23710->23934 23713 41388a 23713->23602 23803 40e805 67 API calls 3 library calls 23713->23803 23714 41f4eb 23941 41a0a6 67 API calls _malloc 23714->23941 23716 41f4f1 23716->23713 23717 41f2d8 _parse_cmdline 77 API calls 23716->23717 23718 41f50b 23717->23718 23718->23713 23720 41f200 23719->23720 23724 41f205 _strlen 23719->23724 23943 41b19f 110 API calls __setmbcp 23720->23943 23722 41389b 23722->23606 23804 40e805 67 API calls 3 library calls 23722->23804 23723 41a0e6 __calloc_crt 67 API calls 23727 41f238 _strlen 23723->23727 23724->23722 23724->23723 23725 41f293 23946 40fdcf 67 API calls 6 library calls 23725->23946 23727->23722 23727->23725 23728 41a0e6 __calloc_crt 67 API calls 23727->23728 23729 41f2b8 23727->23729 23732 41f27d 23727->23732 23944 413106 67 API calls __setmode 23727->23944 23728->23727 23947 40fdcf 67 API calls 6 library calls 23729->23947 23732->23727 23945 413e36 10 API calls 3 library calls 23732->23945 23735 40ea4c __cinit 23734->23735 23948 41a622 23735->23948 23737 40ea6b __initterm_e 23739 40ea8c __cinit 23737->23739 23952 4133bd 74 API calls __cinit 23737->23952 23739->23609 23741 41f1a2 23740->23741 23743 41f1a7 23740->23743 23953 41b19f 110 API calls __setmbcp 23741->23953 23744 4138be 23743->23744 23954 42c8f9 77 API calls x_ismbbtype_l 23743->23954 23746 403970 GetCommandLineA 23744->23746 23955 405bb0 23746->23955 23749 4039d5 InitializeCriticalSection 23750 4039e7 EnterCriticalSection 23749->23750 24000 401220 23750->24000 23754 403a33 lstrcmpiA 23756 403a55 lstrcmpiA 23754->23756 23757 403a46 23754->23757 23755 403abc 24057 404c80 RegOpenKeyExA 23755->24057 23758 403a68 23756->23758 23759 403a7b lstrcmpiA 23756->23759 24042 405a60 23757->24042 24055 404e50 269 API calls 23758->24055 23762 403a8e 23759->23762 23769 403a23 23759->23769 24056 404e50 269 API calls 23762->24056 23765 4010b0 3 API calls 23765->23769 23767 403a50 24068 40d11e 23767->24068 23769->23754 23769->23755 23769->23765 23770 403ae4 23771 403b01 EnterCriticalSection 23770->23771 23772 403aef InitializeCriticalSection 23770->23772 23774 401220 209 API calls 23771->23774 23772->23771 23773 403c57 23773->23616 23796 40eba3 23773->23796 23775 403b2a 23774->23775 24061 404c10 RegCloseKey 23775->24061 23776 403b49 23778 404c80 2 API calls 23776->23778 23779 403b6c 23778->23779 23780 403b75 23779->23780 23781 403bdf 23779->23781 23783 403b80 InitializeCriticalSection 23780->23783 23784 403b92 EnterCriticalSection 23780->23784 24064 404cd0 RegQueryValueExA RaiseException 23781->24064 23783->23784 23785 401220 209 API calls 23784->23785 23787 403bbb 23785->23787 23786 403c04 24065 406280 264 API calls 23786->24065 24062 404c10 RegCloseKey 23787->24062 23790 403bcf 24063 404c10 RegCloseKey 23790->24063 23791 403c2b 24066 404c10 RegCloseKey 23791->24066 23794 403c3f 24067 404c10 RegCloseKey 23794->24067 25292 40ead5 23796->25292 23798 40ebb0 23798->23616 23799->23583 23800->23587 23801->23591 23802->23598 23803->23602 23804->23606 23805->23610 23806->23583 23807->23624 23808->23628 23810->23641 23812 4195ab GetModuleHandleA 23811->23812 23813 41958a 23811->23813 23815 4195ba GetProcAddress 23812->23815 23817 4195a3 23812->23817 23813->23812 23814 419594 TlsGetValue 23813->23814 23816 41959f 23814->23816 23815->23817 23816->23812 23816->23817 23817->23644 23818->23651 23819->23655 23822 41a0ea 23820->23822 23823 419b0d 23822->23823 23824 41a10a Sleep 23822->23824 23829 4186ae 23822->23829 23823->23652 23826 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 23823->23826 23825 41a11f 23824->23825 23825->23822 23825->23823 23826->23659 23827->23662 23830 4186ba __getstream 23829->23830 23831 4186d2 23830->23831 23839 4186f1 _memset 23830->23839 23842 40dfe0 23831->23842 23835 418763 HeapAlloc 23835->23839 23837 4186e7 __getstream 23837->23822 23839->23835 23839->23837 23848 418999 23839->23848 23855 41e591 5 API calls 2 library calls 23839->23855 23856 4187aa LeaveCriticalSection _doexit 23839->23856 23857 41aad0 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __decode_pointer 23839->23857 23858 41979e GetLastError 23842->23858 23844 40dfe5 23845 413f6a 23844->23845 23883 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 23845->23883 23847 413f78 __invoke_watson 23849 4189ac 23848->23849 23850 4189bf EnterCriticalSection 23848->23850 23884 4188d6 23849->23884 23850->23839 23852 4189b2 23852->23850 23913 40e805 67 API calls 3 library calls 23852->23913 23854 4189be 23854->23850 23855->23839 23856->23839 23857->23839 23874 41966a TlsGetValue 23858->23874 23861 4197c1 23862 419815 SetLastError 23861->23862 23863 41a0e6 __calloc_crt 63 API calls 23861->23863 23862->23844 23864 4197d3 23863->23864 23864->23862 23865 4197db 23864->23865 23879 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 23865->23879 23867 4197ed 23868 4197f4 23867->23868 23869 41980c 23867->23869 23880 4196ea 67 API calls 4 library calls 23868->23880 23881 40fdcf 67 API calls 6 library calls 23869->23881 23872 4197fc GetCurrentThreadId 23872->23862 23873 419812 23873->23862 23875 419693 TlsGetValue 23874->23875 23876 41967a 23874->23876 23875->23861 23882 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 23876->23882 23878 419685 TlsSetValue 23878->23875 23879->23867 23880->23872 23881->23873 23882->23878 23883->23847 23885 4188e2 __getstream 23884->23885 23886 4188f2 23885->23886 23887 41890a 23885->23887 23914 41a5a1 67 API calls 2 library calls 23886->23914 23893 418918 __getstream 23887->23893 23901 418908 23887->23901 23889 4188f7 23915 41a3e1 67 API calls 7 library calls 23889->23915 23892 418923 23895 418939 23892->23895 23896 41892a 23892->23896 23893->23852 23894 4188fe 23916 40e84f 23894->23916 23897 418999 __lock 67 API calls 23895->23897 23899 40dfe0 __setmode 67 API calls 23896->23899 23900 418940 23897->23900 23902 41892f 23899->23902 23903 418974 23900->23903 23904 418948 23900->23904 23901->23887 23919 41a0a6 67 API calls _malloc 23901->23919 23902->23893 23922 40fdcf 67 API calls 6 library calls 23903->23922 23920 41a9ba 67 API calls 5 library calls 23904->23920 23907 418953 23908 418965 23907->23908 23921 40fdcf 67 API calls 6 library calls 23907->23921 23923 418990 LeaveCriticalSection _doexit 23908->23923 23911 41895f 23912 40dfe0 __setmode 67 API calls 23911->23912 23912->23908 23913->23854 23914->23889 23915->23894 23924 40e829 GetModuleHandleA 23916->23924 23919->23892 23920->23907 23921->23911 23922->23908 23923->23902 23925 40e838 GetProcAddress 23924->23925 23926 40e84e ExitProcess 23924->23926 23925->23926 23927 40e848 23925->23927 23927->23926 23928->23665 23929->23675 23930->23679 23931->23698 23932->23702 23933->23697 23936 41f2f5 23934->23936 23938 41f362 23936->23938 23942 42c8f9 77 API calls x_ismbbtype_l 23936->23942 23937 41f460 23937->23713 23937->23714 23938->23937 23939 42c8f9 77 API calls _parse_cmdline 23938->23939 23939->23938 23940->23708 23941->23716 23942->23936 23943->23724 23944->23727 23945->23732 23946->23722 23947->23722 23949 41a626 23948->23949 23950 419577 __encode_pointer 4 API calls 23949->23950 23951 41a63e 23949->23951 23950->23949 23951->23737 23952->23739 23953->23743 23954->23743 23956 405bc4 InitializeCriticalSection 23955->23956 23957 405bd6 EnterCriticalSection 23955->23957 23956->23957 23958 401220 209 API calls 23957->23958 23959 405bff 23958->23959 23960 405c0d InitializeCriticalSection 23959->23960 23961 405c1f EnterCriticalSection 23959->23961 23960->23961 23962 401220 209 API calls 23961->23962 23963 405c48 23962->23963 24076 40db1e 23963->24076 23965 405c5c 23966 405cb3 23965->23966 23967 405c68 23965->23967 23970 405cd0 EnterCriticalSection 23966->23970 23971 405cbe InitializeCriticalSection 23966->23971 23968 405c73 InitializeCriticalSection 23967->23968 23969 405c85 EnterCriticalSection 23967->23969 23968->23969 23972 401220 209 API calls 23969->23972 23973 401220 209 API calls 23970->23973 23971->23970 23974 405cae 23972->23974 23973->23974 23975 40db1e _getenv 120 API calls 23974->23975 23976 405d0a 23975->23976 23977 405d61 23976->23977 23978 405d16 23976->23978 23981 405d6c InitializeCriticalSection 23977->23981 23982 405d7e EnterCriticalSection 23977->23982 23979 405d21 InitializeCriticalSection 23978->23979 23980 405d33 EnterCriticalSection 23978->23980 23979->23980 23983 401220 209 API calls 23980->23983 23981->23982 23984 401220 209 API calls 23982->23984 23985 405d5c 23983->23985 23984->23985 23986 40db1e _getenv 120 API calls 23985->23986 23987 405db8 23986->23987 23988 405dc4 23987->23988 23989 405e0f 23987->23989 23992 405de1 EnterCriticalSection 23988->23992 23993 405dcf InitializeCriticalSection 23988->23993 23990 405e1a InitializeCriticalSection 23989->23990 23991 405e2c EnterCriticalSection 23989->23991 23990->23991 23995 401220 209 API calls 23991->23995 23994 401220 209 API calls 23992->23994 23993->23992 23996 405e0a 23994->23996 23995->23996 23997 405e70 LoadStringA 23996->23997 23998 405f0a InitializeCriticalSection 23997->23998 23999 4039a6 23997->23999 23998->23999 23999->23749 23999->23750 24001 40122d __resetstkoflw 24000->24001 24099 401500 24001->24099 24005 40124e _memset 24115 4014e0 24005->24115 24008 401286 24011 40cf8a _sprintf 103 API calls 24008->24011 24009 4012db 24118 40cda8 24009->24118 24012 40129e 24011->24012 24173 40ceef 69 API calls __spawnve 24012->24173 24015 40130e 24121 4014a0 24015->24121 24016 4012fe LeaveCriticalSection 24018 40148c 24016->24018 24017 4012af 24019 4012c2 24017->24019 24174 40ce39 69 API calls __dosmaperr 24017->24174 24020 40d11e __putwch_nolock 5 API calls 24018->24020 24175 40ce0b 69 API calls __dosmaperr 24019->24175 24023 401496 24020->24023 24036 4010b0 24023->24036 24025 4012d8 24025->24009 24026 401341 24027 401391 GetCurrentThreadId 24026->24027 24028 40cf8a _sprintf 103 API calls 24027->24028 24029 401402 24028->24029 24124 40cc14 24029->24124 24031 401425 24127 40c94f 24031->24127 24033 40146f 24160 40c8d3 24033->24160 24035 40147e LeaveCriticalSection 24035->24018 24039 4010b4 24036->24039 24037 401114 24037->23769 24038 401105 CharNextA 24038->24039 24039->24037 24039->24038 24040 4010f6 CharNextA 24039->24040 24041 4010ea CharNextA 24039->24041 24040->24039 24041->24037 24043 405a74 InitializeCriticalSection 24042->24043 24044 405a86 EnterCriticalSection 24042->24044 24043->24044 24045 401220 209 API calls 24044->24045 24046 405aaf CoInitialize 24045->24046 24047 405ac3 24046->24047 24048 405ac8 24046->24048 24047->23767 24739 4073a0 24048->24739 24055->23767 24056->23767 24058 404cb1 24057->24058 24059 403adb 24057->24059 25290 404c40 RegCloseKey 24058->25290 24059->23770 24059->23776 24061->23767 24062->23790 24063->23767 24064->23786 24065->23791 24066->23794 24067->23767 24069 40d126 24068->24069 24070 40d128 IsDebuggerPresent 24068->24070 24069->23773 25291 41fc57 24070->25291 24073 416d64 SetUnhandledExceptionFilter UnhandledExceptionFilter 24074 416d81 __invoke_watson 24073->24074 24075 416d89 GetCurrentProcess TerminateProcess 24073->24075 24074->24075 24075->23773 24077 40db2a _strnlen __getstream 24076->24077 24078 40db38 24077->24078 24082 40db6c 24077->24082 24079 40dfe0 __setmode 67 API calls 24078->24079 24080 40db3d 24079->24080 24081 413f6a __setmode 4 API calls 24080->24081 24086 40db4d __getstream 24081->24086 24083 418999 __lock 67 API calls 24082->24083 24084 40db73 24083->24084 24089 40d968 24084->24089 24086->23965 24087 40db7f 24096 40db98 LeaveCriticalSection _doexit 24087->24096 24090 40d978 24089->24090 24091 40d97c 24089->24091 24090->24087 24092 40d98f _strlen 24091->24092 24095 40d9db 24091->24095 24097 418619 120 API calls 3 library calls 24091->24097 24092->24095 24098 418602 111 API calls __mbsnbicoll_l 24092->24098 24095->24087 24096->24086 24097->24092 24098->24092 24100 40db1e _getenv 120 API calls 24099->24100 24101 40150e 24100->24101 24102 40123c 24101->24102 24103 40cf8a _sprintf 103 API calls 24101->24103 24104 40cf8a 24102->24104 24103->24102 24105 40cfb5 24104->24105 24106 40cf98 24104->24106 24105->24106 24107 40cfbc 24105->24107 24108 40dfe0 __setmode 67 API calls 24106->24108 24176 414846 103 API calls 13 library calls 24107->24176 24110 40cf9d 24108->24110 24112 413f6a __setmode 4 API calls 24110->24112 24111 40cfe2 24113 40cfad 24111->24113 24177 41461a 24111->24177 24112->24113 24113->24005 24296 40d61a 24115->24296 24399 40cce4 24118->24399 24120 4012ec 24120->24015 24120->24016 24637 40d3c9 24121->24637 24123 4014ac 24123->24026 24645 40cb98 24124->24645 24129 40c95b __getstream 24127->24129 24128 40c969 24130 40dfe0 __setmode 67 API calls 24128->24130 24129->24128 24131 40ca2f _strlen 24129->24131 24133 413bf9 __output_l 67 API calls 24129->24133 24132 40c96e 24130->24132 24657 41407e 24131->24657 24134 413f6a __setmode 4 API calls 24132->24134 24135 40c9a7 24133->24135 24141 40c97e __getstream 24134->24141 24138 413bf9 __output_l 67 API calls 24135->24138 24153 40c9cf 24135->24153 24137 40ca40 24663 414122 24137->24663 24140 40c9b3 24138->24140 24146 413bf9 __output_l 67 API calls 24140->24146 24140->24153 24141->24033 24142 413bf9 __output_l 67 API calls 24144 40c9ec 24142->24144 24149 413bf9 __output_l 67 API calls 24144->24149 24159 40ca14 24144->24159 24148 40c9bf 24146->24148 24151 413bf9 __output_l 67 API calls 24148->24151 24154 40c9f8 24149->24154 24151->24153 24152 40ca65 24680 40ca89 LeaveCriticalSection LeaveCriticalSection _fprintf 24152->24680 24153->24128 24153->24142 24156 413bf9 __output_l 67 API calls 24154->24156 24154->24159 24157 40ca04 24156->24157 24158 413bf9 __output_l 67 API calls 24157->24158 24158->24159 24159->24128 24159->24131 24161 40c8df __getstream 24160->24161 24162 40c910 24161->24162 24163 40c8f3 24161->24163 24165 41407e _vprintf_helper 68 API calls 24162->24165 24172 40c908 __getstream 24162->24172 24164 40dfe0 __setmode 67 API calls 24163->24164 24166 40c8f8 24164->24166 24167 40c928 24165->24167 24168 413f6a __setmode 4 API calls 24166->24168 24690 40c860 24167->24690 24168->24172 24172->24035 24173->24017 24174->24019 24175->24025 24176->24111 24198 413bf9 24177->24198 24179 414628 24180 414633 24179->24180 24181 41464a 24179->24181 24182 40dfe0 __setmode 67 API calls 24180->24182 24183 41464e 24181->24183 24192 41465b _vprintf_helper 24181->24192 24191 414638 24182->24191 24184 40dfe0 __setmode 67 API calls 24183->24184 24184->24191 24185 4146bb 24186 414749 24185->24186 24187 4146c9 24185->24187 24249 41949b 101 API calls 6 library calls 24186->24249 24189 4146e0 24187->24189 24194 4146fd 24187->24194 24248 41949b 101 API calls 6 library calls 24189->24248 24191->24113 24192->24185 24192->24191 24195 4146b0 24192->24195 24237 41fcfe 24192->24237 24194->24191 24205 41fddf 24194->24205 24195->24185 24247 41fef8 67 API calls __malloc_crt 24195->24247 24199 413c21 24198->24199 24200 413c04 24198->24200 24199->24179 24201 40dfe0 __setmode 67 API calls 24200->24201 24202 413c09 24201->24202 24203 413f6a __setmode 4 API calls 24202->24203 24204 413c19 24203->24204 24204->24179 24206 41fdeb __getstream 24205->24206 24207 41fe18 24206->24207 24208 41fdfc 24206->24208 24209 41fe26 24207->24209 24211 41fe47 24207->24211 24272 40dff3 67 API calls __getptd_noexit 24208->24272 24273 40dff3 67 API calls __getptd_noexit 24209->24273 24215 41fe67 24211->24215 24216 41fe8d 24211->24216 24213 41fe01 24217 40dfe0 __setmode 67 API calls 24213->24217 24214 41fe2b 24219 40dfe0 __setmode 67 API calls 24214->24219 24274 40dff3 67 API calls __getptd_noexit 24215->24274 24250 418b5f 24216->24250 24230 41fe09 __getstream 24217->24230 24222 41fe32 24219->24222 24221 41fe93 24224 41fea0 24221->24224 24225 41febc 24221->24225 24226 413f6a __setmode 4 API calls 24222->24226 24223 41fe6c 24227 40dfe0 __setmode 67 API calls 24223->24227 24262 41fd5c 24224->24262 24229 40dfe0 __setmode 67 API calls 24225->24229 24226->24230 24231 41fe73 24227->24231 24233 41fec1 24229->24233 24230->24191 24234 413f6a __setmode 4 API calls 24231->24234 24232 41feb1 24276 41feee LeaveCriticalSection __unlock_fhandle 24232->24276 24275 40dff3 67 API calls __getptd_noexit 24233->24275 24234->24230 24238 41fd15 24237->24238 24239 41fd07 24237->24239 24242 41fd40 24238->24242 24243 40dfe0 __setmode 67 API calls 24238->24243 24240 40dfe0 __setmode 67 API calls 24239->24240 24241 41fd0c 24240->24241 24241->24195 24242->24195 24244 41fd29 24243->24244 24245 413f6a __setmode 4 API calls 24244->24245 24246 41fd39 24245->24246 24246->24195 24247->24185 24248->24191 24249->24191 24251 418b6b __getstream 24250->24251 24252 418bc6 24251->24252 24255 418999 __lock 67 API calls 24251->24255 24253 418be8 __getstream 24252->24253 24254 418bcb EnterCriticalSection 24252->24254 24253->24221 24254->24253 24256 418b97 24255->24256 24257 418ba0 24256->24257 24258 418bba 24256->24258 24277 41a9ba 67 API calls 5 library calls 24257->24277 24278 418bf6 LeaveCriticalSection _doexit 24258->24278 24261 418bae 24261->24258 24279 418aee 24262->24279 24264 41fd78 24265 41fd91 SetFilePointer 24264->24265 24266 41fd80 24264->24266 24268 41fda9 GetLastError 24265->24268 24269 41fd85 24265->24269 24267 40dfe0 __setmode 67 API calls 24266->24267 24267->24269 24268->24269 24270 41fdb3 24268->24270 24269->24232 24293 40e006 67 API calls 3 library calls 24270->24293 24272->24213 24273->24214 24274->24223 24275->24232 24276->24230 24277->24261 24278->24252 24280 418af7 24279->24280 24281 418b0e 24279->24281 24294 40dff3 67 API calls __getptd_noexit 24280->24294 24287 418b5b 24281->24287 24295 40dff3 67 API calls __getptd_noexit 24281->24295 24284 418afc 24286 40dfe0 __setmode 67 API calls 24284->24286 24285 418b3c 24288 40dfe0 __setmode 67 API calls 24285->24288 24289 418b04 24286->24289 24287->24264 24290 418b43 24288->24290 24289->24264 24291 413f6a __setmode 4 API calls 24290->24291 24292 418b53 24291->24292 24292->24264 24293->24269 24294->24284 24295->24285 24297 40d671 24296->24297 24298 40d64d 24296->24298 24297->24298 24300 40d675 24297->24300 24362 40dff3 67 API calls __getptd_noexit 24298->24362 24359 418503 24300->24359 24301 40d652 24304 40dfe0 __setmode 67 API calls 24301->24304 24306 40d659 24304->24306 24305 40d686 24307 40dfe0 __setmode 67 API calls 24305->24307 24310 413f6a __setmode 4 API calls 24306->24310 24311 40d68b 24307->24311 24308 40d6a2 24308->24305 24364 41842b 102 API calls __mbctolower_l 24308->24364 24309 40d6bc 24365 418220 104 API calls 5 library calls 24309->24365 24312 40d669 24310->24312 24363 40dff3 67 API calls __getptd_noexit 24311->24363 24321 40d11e __putwch_nolock 5 API calls 24312->24321 24316 40d6c1 FindFirstFileA 24318 40d7b2 24316->24318 24319 40d6db 24316->24319 24317 40d6b6 24317->24316 24322 40d7c4 FileTimeToLocalFileTime 24318->24322 24324 40d7bc 24318->24324 24320 418503 __stat32 77 API calls 24319->24320 24325 40d6e9 24320->24325 24323 401277 24321->24323 24326 40d937 GetLastError 24322->24326 24327 40d7da FileTimeToSystemTime 24322->24327 24323->24008 24323->24009 24332 40d836 FileTimeToLocalFileTime 24324->24332 24335 40d828 24324->24335 24325->24305 24366 4179f8 111 API calls 5 library calls 24325->24366 24375 40e006 67 API calls 3 library calls 24326->24375 24327->24326 24328 40d7f0 24327->24328 24371 417f92 123 API calls 7 library calls 24328->24371 24332->24326 24336 40d84c FileTimeToSystemTime 24332->24336 24333 40d943 FindClose 24333->24312 24334 40d701 24338 40dfe0 __setmode 67 API calls 24334->24338 24345 40d71e _IsRootUNCName _strlen 24334->24345 24341 40d8a8 FileTimeToLocalFileTime 24335->24341 24342 40d89a FindClose 24335->24342 24336->24326 24337 40d862 24336->24337 24372 417f92 123 API calls 7 library calls 24337->24372 24344 40d70d 24338->24344 24339 40d79b 24339->24305 24370 40fdcf 67 API calls 6 library calls 24339->24370 24341->24326 24343 40d8ba FileTimeToSystemTime 24341->24343 24350 40d903 24342->24350 24343->24326 24347 40d8cc 24343->24347 24344->24305 24367 4179f8 111 API calls 5 library calls 24344->24367 24345->24339 24352 40d73f GetDriveTypeA 24345->24352 24373 417f92 123 API calls 7 library calls 24347->24373 24374 417b00 102 API calls 2 library calls 24350->24374 24352->24339 24354 40d74b 24352->24354 24355 40d758 24354->24355 24368 40fdcf 67 API calls 6 library calls 24354->24368 24369 417f92 123 API calls 7 library calls 24355->24369 24358 40d77c 24358->24350 24376 418439 24359->24376 24361 40d680 24361->24305 24361->24308 24361->24309 24362->24301 24363->24312 24364->24317 24365->24316 24366->24334 24367->24345 24368->24355 24369->24358 24370->24305 24371->24324 24372->24335 24373->24342 24374->24312 24375->24333 24383 40ec6b 24376->24383 24379 40dfe0 __setmode 67 API calls 24380 418474 24379->24380 24381 413f6a __setmode 4 API calls 24380->24381 24382 418456 _strpbrk 24381->24382 24382->24361 24384 40ec7a 24383->24384 24389 40ecc7 24383->24389 24391 419821 24384->24391 24386 40ec7f 24388 40eca7 24386->24388 24396 41b47d 75 API calls 6 library calls 24386->24396 24388->24389 24397 41ad00 69 API calls 5 library calls 24388->24397 24389->24379 24389->24382 24392 41979e __getptd_noexit 67 API calls 24391->24392 24393 419827 24392->24393 24395 419834 24393->24395 24398 40e805 67 API calls 3 library calls 24393->24398 24395->24386 24396->24388 24397->24389 24398->24395 24402 40ccf0 __getstream 24399->24402 24400 40cd03 24401 40dfe0 __setmode 67 API calls 24400->24401 24403 40cd08 24401->24403 24402->24400 24404 40cd38 24402->24404 24405 413f6a __setmode 4 API calls 24403->24405 24418 4165e6 24404->24418 24416 40cd18 @_EH4_CallFilterFunc@8 __getstream 24405->24416 24407 40cd3d 24408 40cd51 24407->24408 24409 40cd44 24407->24409 24410 40cd78 24408->24410 24411 40cd58 24408->24411 24412 40dfe0 __setmode 67 API calls 24409->24412 24437 416344 24410->24437 24413 40dfe0 __setmode 67 API calls 24411->24413 24412->24416 24413->24416 24416->24120 24419 4165f2 __getstream 24418->24419 24420 418999 __lock 67 API calls 24419->24420 24431 416600 24420->24431 24421 41666d 24460 416703 24421->24460 24422 416671 24465 41a0a6 67 API calls _malloc 24422->24465 24425 4166f8 __getstream 24425->24407 24426 41667b 24426->24421 24466 41a9ba 67 API calls 5 library calls 24426->24466 24427 4188d6 __mtinitlocknum 67 API calls 24427->24431 24430 4166a0 24432 4166ab 24430->24432 24433 4166be EnterCriticalSection 24430->24433 24431->24421 24431->24422 24431->24427 24463 4140ad 68 API calls __lock 24431->24463 24464 4140ff LeaveCriticalSection LeaveCriticalSection _doexit 24431->24464 24467 40fdcf 67 API calls 6 library calls 24432->24467 24433->24421 24436 4166b3 24436->24421 24438 416364 24437->24438 24439 416378 24438->24439 24451 416397 24438->24451 24441 40dfe0 __setmode 67 API calls 24439->24441 24440 416535 24443 416585 24440->24443 24444 41659f 24440->24444 24442 41637d 24441->24442 24445 413f6a __setmode 4 API calls 24442->24445 24446 40dfe0 __setmode 67 API calls 24443->24446 24469 421a7a 24444->24469 24449 40cd83 24445->24449 24448 41658a 24446->24448 24450 413f6a __setmode 4 API calls 24448->24450 24459 40cd9e LeaveCriticalSection LeaveCriticalSection _fprintf 24449->24459 24450->24449 24451->24440 24451->24443 24472 421e2e 77 API calls __mbsnbcmp_l 24451->24472 24453 41651a 24453->24443 24473 421cb2 102 API calls __mbsicmp_l 24453->24473 24455 41652f 24455->24440 24474 421cb2 102 API calls __mbsicmp_l 24455->24474 24457 41654c 24457->24440 24475 421cb2 102 API calls __mbsicmp_l 24457->24475 24459->24416 24468 4188a9 LeaveCriticalSection 24460->24468 24462 41670a 24462->24425 24463->24431 24464->24431 24465->24426 24466->24430 24467->24436 24468->24462 24476 42197e 24469->24476 24471 421a93 24471->24449 24472->24453 24473->24455 24474->24457 24475->24440 24477 42198a __getstream 24476->24477 24478 42199d 24477->24478 24481 4219db 24477->24481 24479 40dfe0 __setmode 67 API calls 24478->24479 24480 4219a2 24479->24480 24482 413f6a __setmode 4 API calls 24480->24482 24487 42128a 24481->24487 24486 4219b1 __getstream 24482->24486 24486->24471 24488 4212b3 24487->24488 24569 42d0b9 24488->24569 24490 4212cf 24491 4212e1 24490->24491 24492 4212d4 24490->24492 24576 40e8ae 24491->24576 24602 413e36 10 API calls 3 library calls 24492->24602 24495 4212de 24495->24491 24496 4212ea 24497 4212ef 24496->24497 24504 4212fc 24496->24504 24603 413e36 10 API calls 3 library calls 24497->24603 24499 4212f9 24499->24504 24500 42132f 24604 40dff3 67 API calls __getptd_noexit 24500->24604 24502 421334 24503 40dfe0 __setmode 67 API calls 24502->24503 24505 42133e 24503->24505 24504->24500 24507 4213df 24504->24507 24506 413f6a __setmode 4 API calls 24505->24506 24524 42134d 24506->24524 24583 418c21 24507->24583 24509 421485 24510 4214a3 CreateFileA 24509->24510 24511 42148c 24509->24511 24513 4214cb 24510->24513 24514 4214ff GetFileType 24510->24514 24605 40dff3 67 API calls __getptd_noexit 24511->24605 24516 4214e6 GetLastError 24513->24516 24517 42150a CloseHandle 24514->24517 24518 42152e 24514->24518 24515 421491 24519 40dfe0 __setmode 67 API calls 24515->24519 24606 40e006 67 API calls 3 library calls 24516->24606 24517->24516 24607 4189f0 68 API calls 2 library calls 24518->24607 24540 42149b 24519->24540 24522 42154a 24522->24524 24525 4215a4 24522->24525 24531 421615 24522->24531 24523 40dfe0 __setmode 67 API calls 24523->24524 24568 421a1c LeaveCriticalSection __unlock_fhandle 24524->24568 24608 42ce69 69 API calls 3 library calls 24525->24608 24527 4215b1 24528 4215d4 24527->24528 24529 4215bb 24527->24529 24625 426951 77 API calls 6 library calls 24528->24625 24609 40dff3 67 API calls __getptd_noexit 24529->24609 24531->24524 24541 4216bc 24531->24541 24543 421773 24531->24543 24533 4215e4 24536 4215fe 24533->24536 24626 42cbb0 105 API calls 6 library calls 24533->24626 24534 4215c0 24534->24531 24563 4215c8 24534->24563 24535 42173a 24628 426951 77 API calls 6 library calls 24535->24628 24536->24563 24627 42ce69 69 API calls 3 library calls 24536->24627 24540->24523 24541->24524 24541->24535 24549 4216e0 24541->24549 24552 41fd5c __lseeki64_nolock 69 API calls 24541->24552 24543->24524 24544 41fd5c __lseeki64_nolock 69 API calls 24543->24544 24543->24549 24546 42179b 24544->24546 24546->24549 24553 4217a6 24546->24553 24547 4217d2 24554 413a98 __close_nolock 70 API calls 24547->24554 24548 4217eb 24551 42180e 24548->24551 24556 4217f2 24548->24556 24549->24524 24549->24563 24631 41949b 101 API calls 6 library calls 24549->24631 24550 421747 24550->24547 24550->24548 24550->24551 24555 42176a 24550->24555 24550->24563 24630 42ce69 69 API calls 3 library calls 24551->24630 24557 42171b 24552->24557 24558 41fd5c __lseeki64_nolock 69 API calls 24553->24558 24560 4217d9 24554->24560 24555->24524 24629 42ce69 69 API calls 3 library calls 24556->24629 24557->24549 24562 421722 24557->24562 24558->24563 24565 40dfe0 __setmode 67 API calls 24560->24565 24566 41fd5c __lseeki64_nolock 69 API calls 24562->24566 24563->24524 24610 413a98 24563->24610 24564 4217fc 24564->24555 24564->24563 24565->24555 24567 42172c 24566->24567 24567->24535 24567->24563 24568->24486 24570 42d0e1 24569->24570 24571 42d0c4 24569->24571 24570->24490 24572 40dfe0 __setmode 67 API calls 24571->24572 24573 42d0c9 24572->24573 24574 413f6a __setmode 4 API calls 24573->24574 24575 42d0d9 24574->24575 24575->24490 24577 40e8b9 24576->24577 24578 40dfe0 __setmode 67 API calls 24577->24578 24579 40e8df 24577->24579 24580 40e8be 24578->24580 24579->24496 24581 413f6a __setmode 4 API calls 24580->24581 24582 40e8ce 24581->24582 24582->24496 24584 418c2d __getstream 24583->24584 24585 4188d6 __mtinitlocknum 67 API calls 24584->24585 24586 418c3d 24585->24586 24587 418999 __lock 67 API calls 24586->24587 24588 418c42 __getstream 24586->24588 24598 418c51 24587->24598 24588->24509 24589 418d99 24634 418db7 LeaveCriticalSection _doexit 24589->24634 24590 418d2f 24592 41a0e6 __calloc_crt 67 API calls 24590->24592 24595 418d38 24592->24595 24593 418cd2 EnterCriticalSection 24596 418ce2 LeaveCriticalSection 24593->24596 24593->24598 24594 418999 __lock 67 API calls 24594->24598 24595->24589 24597 418b5f ___lock_fhandle 68 API calls 24595->24597 24596->24598 24597->24589 24598->24589 24598->24590 24598->24593 24598->24594 24599 418ca7 24598->24599 24633 418cf4 LeaveCriticalSection _doexit 24598->24633 24599->24598 24632 41a9ba 67 API calls 5 library calls 24599->24632 24602->24495 24603->24499 24604->24502 24605->24515 24606->24540 24607->24522 24608->24527 24609->24534 24611 418aee __commit 67 API calls 24610->24611 24614 413aa4 24611->24614 24612 413af7 24635 418a6d 68 API calls 2 library calls 24612->24635 24613 413ad5 24613->24612 24617 418aee __commit 67 API calls 24613->24617 24614->24612 24614->24613 24616 418aee __commit 67 API calls 24614->24616 24619 413acc 24616->24619 24620 413ae1 FindCloseChangeNotification 24617->24620 24618 413aff 24621 413b21 24618->24621 24636 40e006 67 API calls 3 library calls 24618->24636 24622 418aee __commit 67 API calls 24619->24622 24620->24612 24623 413aed GetLastError 24620->24623 24621->24540 24622->24613 24623->24612 24625->24533 24626->24536 24627->24534 24628->24550 24629->24564 24630->24564 24631->24549 24632->24599 24633->24598 24634->24588 24635->24618 24636->24621 24643 416f77 67 API calls 3 library calls 24637->24643 24639 40d3cf 24640 40d3d5 24639->24640 24644 40d18d 67 API calls 4 library calls 24639->24644 24640->24123 24642 40d3e1 24642->24123 24643->24639 24644->24642 24646 40cbc3 24645->24646 24647 40cba6 24645->24647 24646->24647 24649 40cbca 24646->24649 24648 40dfe0 __setmode 67 API calls 24647->24648 24650 40cbab 24648->24650 24656 414846 103 API calls 13 library calls 24649->24656 24652 413f6a __setmode 4 API calls 24650->24652 24654 40cbbb 24652->24654 24653 40cbf1 24653->24654 24655 41461a __flsbuf 101 API calls 24653->24655 24654->24031 24655->24654 24656->24653 24658 4140a2 EnterCriticalSection 24657->24658 24659 41408b 24657->24659 24658->24137 24659->24658 24660 414092 24659->24660 24661 418999 __lock 67 API calls 24660->24661 24662 4140a0 24661->24662 24662->24137 24664 413bf9 __output_l 67 API calls 24663->24664 24665 41412d 24664->24665 24666 41fcfe __stbuf 67 API calls 24665->24666 24667 414133 _vprintf_helper 24666->24667 24668 40ca4b 24667->24668 24669 414179 24667->24669 24672 4141e7 24668->24672 24681 41a0a6 67 API calls _malloc 24669->24681 24671 41417f 24671->24668 24673 414207 ___crtGetEnvironmentStringsA 24672->24673 24678 40ca5b 24672->24678 24674 41461a __flsbuf 101 API calls 24673->24674 24676 413bf9 __output_l 67 API calls 24673->24676 24673->24678 24682 413c52 24673->24682 24688 41949b 101 API calls 6 library calls 24673->24688 24674->24673 24676->24673 24679 4141b8 101 API calls __flush 24678->24679 24679->24152 24680->24141 24681->24671 24683 413c67 24682->24683 24687 413c88 24682->24687 24684 413bf9 __output_l 67 API calls 24683->24684 24683->24687 24685 413c81 24684->24685 24689 41949b 101 API calls 6 library calls 24685->24689 24687->24673 24688->24673 24689->24687 24691 40c870 24690->24691 24692 40c88d 24690->24692 24693 40dfe0 __setmode 67 API calls 24691->24693 24694 40c885 24692->24694 24696 413c52 __flush 101 API calls 24692->24696 24695 40c875 24693->24695 24706 40c947 LeaveCriticalSection LeaveCriticalSection _fprintf 24694->24706 24697 413f6a __setmode 4 API calls 24695->24697 24698 40c899 24696->24698 24697->24694 24707 413c26 24698->24707 24701 413bf9 __output_l 67 API calls 24702 40c8a7 24701->24702 24711 413b2c 24702->24711 24704 40c8ad 24704->24694 24734 40fdcf 67 API calls 6 library calls 24704->24734 24706->24172 24708 413c32 24707->24708 24710 40c8a1 24707->24710 24708->24710 24735 40fdcf 67 API calls 6 library calls 24708->24735 24710->24701 24712 413b38 __getstream 24711->24712 24713 413b40 24712->24713 24714 413b5b 24712->24714 24736 40dff3 67 API calls __getptd_noexit 24713->24736 24716 413b69 24714->24716 24720 413baa 24714->24720 24737 40dff3 67 API calls __getptd_noexit 24716->24737 24718 413b45 24721 40dfe0 __setmode 67 API calls 24718->24721 24719 413b6e 24722 40dfe0 __setmode 67 API calls 24719->24722 24723 418b5f ___lock_fhandle 68 API calls 24720->24723 24729 413b4d __getstream 24721->24729 24724 413b75 24722->24724 24725 413bb0 24723->24725 24726 413f6a __setmode 4 API calls 24724->24726 24727 413bcb 24725->24727 24728 413bbd 24725->24728 24726->24729 24731 40dfe0 __setmode 67 API calls 24727->24731 24730 413a98 __close_nolock 70 API calls 24728->24730 24729->24704 24732 413bc5 24730->24732 24731->24732 24738 413bef LeaveCriticalSection __unlock_fhandle 24732->24738 24734->24694 24735->24710 24736->24718 24737->24719 24738->24729 24765 40abb0 24739->24765 24742 406140 24743 406154 InitializeCriticalSection 24742->24743 24744 406166 EnterCriticalSection 24742->24744 24743->24744 24745 401220 209 API calls 24744->24745 24746 40618f 24745->24746 25166 401170 24746->25166 24749 4061a8 OpenSCManagerA 24751 4061c0 MessageBoxA 24749->24751 24752 4061dd OpenServiceA 24749->24752 24750 405ae4 24757 405b00 24750->24757 24751->24750 24753 406220 ControlService DeleteService CloseServiceHandle CloseServiceHandle 24752->24753 24754 4061fc CloseServiceHandle MessageBoxA 24752->24754 24755 406257 24753->24755 24756 40625e MessageBoxA 24753->24756 24754->24750 24755->24750 24756->24750 24758 405b88 24757->24758 24761 405b1f 24757->24761 24760 405af0 CoUninitialize 24758->24760 25175 406e30 24758->25175 24760->24047 24761->24758 24763 405b50 24761->24763 24763->24761 24764 405b6f 24763->24764 25179 4051c0 77 API calls 2 library calls 24763->25179 24764->24758 24766 40abce Concurrency::details::stl_critical_section_concrt::stl_critical_section_concrt 24765->24766 24767 40abe8 24766->24767 24768 40ac0a 24766->24768 24878 407c20 68 API calls codecvt 24767->24878 24770 40ac3c 24768->24770 24772 407df0 77 API calls 24768->24772 24774 40ac5f 24770->24774 24777 40ac81 24770->24777 24771 40abff 24773 40d11e __putwch_nolock 5 API calls 24771->24773 24772->24768 24775 405adc 24773->24775 24879 407c20 68 API calls codecvt 24774->24879 24775->24742 24778 40ac9e GetModuleFileNameA 24777->24778 24779 40acf4 24778->24779 24780 40acc6 24778->24780 24782 40ad00 24779->24782 24783 40ad2b 24779->24783 24880 404640 GetLastError 24780->24880 24883 406430 67 API calls 24782->24883 24784 40ad49 lstrlenA 24783->24784 24793 40ad3a 24783->24793 24796 40ad71 24784->24796 24785 40accb 24881 406430 67 API calls 24785->24881 24787 40ad15 24884 407c20 68 API calls codecvt 24787->24884 24790 40ae4a 24799 40ae6b GetModuleHandleA 24790->24799 24800 40ae7c 24790->24800 24791 40ae1f 24888 406430 67 API calls 24791->24888 24792 40acdc 24882 407c20 68 API calls codecvt 24792->24882 24793->24790 24793->24791 24796->24793 24797 40ad9c 24796->24797 24885 4057a0 5 API calls 2 library calls 24796->24885 24807 40ada6 _store_winword 24797->24807 24886 4063c0 68 API calls 24797->24886 24798 40ae34 24889 407c20 68 API calls codecvt 24798->24889 24799->24800 24804 40af27 24799->24804 24890 407b20 68 API calls _memcpy_s 24800->24890 24808 407df0 77 API calls 24804->24808 24806 40ae9d 24810 40aed2 24806->24810 24811 40aea7 24806->24811 24887 406dc0 MultiByteToWideChar 24807->24887 24809 40af3f 24808->24809 24813 40af1f 24809->24813 24893 406720 lstrlenW 24810->24893 24891 406430 67 API calls 24811->24891 24816 40af7b 24813->24816 24817 40af4e 24813->24817 24840 407df0 24816->24840 24894 406430 67 API calls 24817->24894 24818 40aebc 24892 407c20 68 API calls codecvt 24818->24892 24819 40aede 24823 407df0 77 API calls 24819->24823 24823->24813 24824 40af65 24895 407c20 68 API calls codecvt 24824->24895 24827 40afa2 24896 406430 67 API calls 24827->24896 24828 40afcf 24829 40b005 24828->24829 24830 40afdf 24828->24830 24859 40b1e0 24829->24859 24898 40b080 138 API calls 2 library calls 24830->24898 24834 40afb9 24897 407c20 68 API calls codecvt 24834->24897 24835 40affd 24899 406430 67 API calls 24835->24899 24838 40b04c 24900 407c20 68 API calls codecvt 24838->24900 24843 407e1e codecvt 24840->24843 24857 407e24 24840->24857 24841 40d11e __putwch_nolock 5 API calls 24842 407f7b 24841->24842 24842->24827 24842->24828 24844 407e68 lstrlenW 24843->24844 24845 407e5c 24843->24845 24843->24857 24850 407e87 24844->24850 24846 407f1a 24845->24846 24847 407eff 24845->24847 24905 407fb0 75 API calls 24846->24905 24904 406430 67 API calls 24847->24904 24850->24845 24851 407ea9 24850->24851 24901 4057a0 5 API calls 2 library calls 24850->24901 24855 407eb3 _store_winword 24851->24855 24902 4063c0 68 API calls 24851->24902 24852 407f2d codecvt 24906 406430 67 API calls 24852->24906 24903 405890 WideCharToMultiByte 24855->24903 24857->24841 24860 40b20d 24859->24860 24861 40b237 lstrlenW 24860->24861 24864 40b22b 24860->24864 24868 40b256 24861->24868 24862 40b2e9 24907 4083e0 24862->24907 24863 40b2ce 24953 406430 67 API calls 24863->24953 24864->24862 24864->24863 24867 40b278 24876 40b282 _store_winword 24867->24876 24951 4063c0 68 API calls 24867->24951 24868->24864 24868->24867 24950 4057a0 5 API calls 2 library calls 24868->24950 24869 40b2e4 24874 40d11e __putwch_nolock 5 API calls 24869->24874 24875 40b32d 24874->24875 24875->24835 24952 405890 WideCharToMultiByte 24876->24952 24878->24771 24879->24771 24880->24785 24881->24792 24882->24771 24883->24787 24884->24771 24885->24797 24886->24807 24887->24793 24888->24798 24889->24771 24890->24806 24891->24818 24892->24771 24893->24819 24894->24824 24895->24771 24896->24834 24897->24771 24898->24835 24899->24838 24900->24771 24901->24851 24902->24855 24903->24845 24904->24857 24905->24852 24906->24857 24908 40841d 24907->24908 24909 408468 lstrlenW 24908->24909 24912 408459 24908->24912 24919 408487 24909->24919 24910 408520 24983 40b950 67 API calls 24910->24983 24911 408553 LoadLibraryExA 24914 40857a FindResourceA 24911->24914 24915 40856a 24911->24915 24912->24910 24912->24911 24917 4085ab LoadResource 24914->24917 24918 40859b 24914->24918 24985 404640 GetLastError 24915->24985 24925 4085db SizeofResource 24917->24925 24926 4085cb 24917->24926 24986 404640 GetLastError 24918->24986 24919->24912 24920 4084ac 24919->24920 24980 4057a0 5 API calls 2 library calls 24919->24980 24937 4084b6 _store_winword 24920->24937 24981 4063c0 68 API calls 24920->24981 24921 408539 24984 406430 67 API calls 24921->24984 24922 40856f 24934 4086d6 24922->24934 24935 4086cc FreeLibrary 24922->24935 24930 408603 24925->24930 24931 408636 24925->24931 24987 404640 GetLastError 24926->24987 24988 40b950 67 API calls 24930->24988 24955 40b980 24931->24955 24932 408548 24940 40d11e __putwch_nolock 5 API calls 24932->24940 24990 40b950 67 API calls 24934->24990 24935->24934 24982 405890 WideCharToMultiByte 24937->24982 24943 408724 24940->24943 24941 40861c 24989 406430 67 API calls 24941->24989 24942 4086f1 24991 406430 67 API calls 24942->24991 24954 406430 67 API calls 24943->24954 24946 40864c 24946->24922 24960 408180 24946->24960 24948 408693 24965 4089d0 24948->24965 24950->24867 24951->24876 24952->24864 24953->24869 24954->24869 24992 40bea0 24955->24992 25002 4133cf 24960->25002 24962 408198 25011 405910 24962->25011 24966 4089dd __resetstkoflw 24965->24966 25023 408f20 24966->25023 24968 408a0e 24969 408a17 24968->24969 24970 408b7c CoTaskMemFree 24968->24970 24974 408cb0 7 API calls 24968->24974 24975 408a58 24968->24975 24976 409690 115 API calls 24968->24976 24977 408b13 24968->24977 25044 408bc0 24968->25044 25111 408c10 CharNextA 24968->25111 24971 40d11e __putwch_nolock 5 API calls 24969->24971 24970->24969 24972 408b93 24971->24972 24972->24922 24974->24968 24975->24970 24976->24968 25048 409690 24977->25048 24980->24920 24981->24937 24982->24912 24983->24921 24984->24932 24985->24922 24986->24922 24987->24922 24988->24941 24989->24932 24990->24942 24991->24932 24993 40beb7 24992->24993 24994 40b992 24993->24994 25000 404e00 RaiseException __CxxThrowException@8 24993->25000 24996 40bc80 24994->24996 24997 40bc90 24996->24997 24998 40b99e 24996->24998 25001 40bda0 68 API calls 24997->25001 24998->24946 25000->24994 25001->24998 25006 4133dd ___crtGetEnvironmentStringsA 25002->25006 25007 4133e1 _memset 25002->25007 25003 4133e6 25004 40dfe0 __setmode 67 API calls 25003->25004 25005 4133eb 25004->25005 25009 413f6a __setmode 4 API calls 25005->25009 25006->24962 25007->25003 25007->25006 25008 413430 25007->25008 25008->25006 25010 40dfe0 __setmode 67 API calls 25008->25010 25009->25006 25010->25005 25012 405920 25011->25012 25013 40594b 25011->25013 25012->25013 25015 405931 25012->25015 25016 40593b 25012->25016 25017 40593d 25012->25017 25022 404e00 RaiseException __CxxThrowException@8 25013->25022 25020 404e00 RaiseException __CxxThrowException@8 25015->25020 25016->24948 25021 404e00 RaiseException __CxxThrowException@8 25017->25021 25020->25016 25021->25016 25022->25016 25024 408f51 25023->25024 25036 408f57 25023->25036 25025 408f61 lstrlenA 25024->25025 25024->25036 25112 4091c0 CoTaskMemAlloc 25025->25112 25027 40d11e __putwch_nolock 5 API calls 25029 40915e 25027->25029 25028 408f85 25030 408f92 25028->25030 25041 408fb0 25028->25041 25029->24968 25113 4092a0 CoTaskMemFree 25030->25113 25032 408fe0 CharNextA 25032->25041 25033 4092c0 70 API calls 25033->25041 25036->25027 25037 409108 CharNextA 25037->25041 25040 409010 25125 4092a0 CoTaskMemFree 25040->25125 25041->25032 25041->25033 25041->25037 25041->25040 25043 4090d8 CharNextA 25041->25043 25114 409640 25041->25114 25118 409170 25041->25118 25123 409600 RaiseException lstrcmpiA codecvt 25041->25123 25124 409450 72 API calls 2 library calls 25041->25124 25043->25041 25045 408bcd 25044->25045 25046 408bf5 25045->25046 25047 408bdc lstrcmpiA 25045->25047 25046->24968 25047->25045 25047->25046 25049 4096c9 25048->25049 25129 408cb0 25049->25129 25051 4096f3 25052 4096fc 25051->25052 25102 40971f 25051->25102 25142 404c10 RegCloseKey 25052->25142 25054 40978d _HRESULT_FROM_WIN32 25163 404c10 RegCloseKey 25054->25163 25055 40972e lstrcmpiA lstrcmpiA 25055->25102 25056 409714 25061 40d11e __putwch_nolock 5 API calls 25056->25061 25058 4098bc lstrcmpiA 25060 4098f5 lstrcmpiA 25058->25060 25058->25102 25059 408cb0 7 API calls 25059->25102 25060->25102 25062 409ef7 25061->25062 25062->24975 25063 409b08 25155 404c10 RegCloseKey 25063->25155 25064 409640 CharNextA 25064->25102 25065 404c80 RegCloseKey RegOpenKeyExA 25065->25102 25067 4097bd 25143 404c10 RegCloseKey 25067->25143 25068 409956 25148 404c10 RegCloseKey 25068->25148 25069 40a9f0 lstrcmpiA 25069->25102 25070 409170 78 API calls 25070->25102 25073 4097e2 25144 404c10 RegCloseKey 25073->25144 25077 409fc0 9 API calls 25077->25102 25078 40a0d0 90 API calls 25078->25102 25079 40aa90 12 API calls 25079->25102 25080 409859 25145 404c10 RegCloseKey 25080->25145 25081 409ba4 _HRESULT_FROM_WIN32 25157 404c10 RegCloseKey 25081->25157 25083 409e72 lstrlenA 25083->25102 25084 409aaa _HRESULT_FROM_WIN32 25153 404c10 RegCloseKey 25084->25153 25086 409cb3 lstrlenA 25086->25102 25087 409885 25146 404c10 RegCloseKey 25087->25146 25090 404c10 RegCloseKey 25090->25102 25091 4099df 25149 404c10 RegCloseKey 25091->25149 25094 409a68 25097 409a89 _HRESULT_FROM_WIN32 25094->25097 25107 409e3a _HRESULT_FROM_WIN32 25094->25107 25151 405030 RegDeleteValueA 25094->25151 25154 404c10 RegCloseKey 25094->25154 25160 405a10 RegDeleteKeyA 25094->25160 25162 404c10 RegCloseKey 25094->25162 25095 409690 109 API calls 25095->25102 25096 4099f7 25150 404c10 RegCloseKey 25096->25150 25152 404c10 RegCloseKey 25097->25152 25100 40aa40 RegQueryInfoKeyA 25100->25102 25102->25054 25102->25055 25102->25058 25102->25059 25102->25060 25102->25063 25102->25064 25102->25065 25102->25067 25102->25068 25102->25069 25102->25070 25102->25077 25102->25078 25102->25079 25102->25080 25102->25081 25102->25083 25102->25084 25102->25086 25102->25087 25102->25090 25102->25091 25102->25094 25102->25095 25102->25100 25104 409dbf _HRESULT_FROM_WIN32 25102->25104 25147 404c10 RegCloseKey 25102->25147 25156 409f50 RegCloseKey RegCreateKeyExA 25102->25156 25158 404c40 RegCloseKey 25102->25158 25159 404c10 RegCloseKey 25104->25159 25161 404c10 RegCloseKey 25107->25161 25110 409aa3 25110->25054 25111->24968 25112->25028 25113->25036 25115 409655 25114->25115 25117 409651 25114->25117 25116 409675 CharNextA 25115->25116 25115->25117 25116->25115 25117->25041 25126 4091a0 25118->25126 25121 405910 RaiseException 25122 409191 25121->25122 25122->25041 25123->25041 25124->25041 25125->25036 25127 41344f _wctomb_s 77 API calls 25126->25127 25128 409188 25127->25128 25128->25121 25130 408cc1 25129->25130 25164 408c10 CharNextA 25129->25164 25132 408cf6 CharNextA 25130->25132 25133 408e09 25130->25133 25138 408ccd 25130->25138 25141 408d07 25132->25141 25137 408e31 CharNextA 25133->25137 25133->25138 25134 408dcf 25135 408ded CharNextA 25134->25135 25134->25138 25135->25138 25137->25133 25137->25138 25138->25051 25139 408d34 CharNextA 25140 408d45 CharNextA 25139->25140 25140->25138 25140->25141 25141->25134 25141->25139 25141->25140 25165 408ed0 CharNextA 25141->25165 25142->25056 25143->25073 25144->25056 25145->25054 25146->25054 25147->25058 25148->25056 25149->25096 25150->25056 25151->25094 25152->25110 25153->25054 25154->25102 25155->25056 25156->25102 25157->25056 25158->25102 25159->25056 25160->25094 25161->25110 25162->25102 25163->25056 25164->25130 25165->25141 25167 401184 InitializeCriticalSection 25166->25167 25168 401196 EnterCriticalSection 25166->25168 25167->25168 25169 401220 209 API calls 25168->25169 25170 4011bf OpenSCManagerA 25169->25170 25171 4011e1 OpenServiceA 25170->25171 25172 401218 25170->25172 25173 4011fd CloseServiceHandle 25171->25173 25174 40120e CloseServiceHandle 25171->25174 25172->24749 25172->24750 25173->25174 25174->25172 25176 406e49 25175->25176 25177 406e6a 25176->25177 25180 406e80 25176->25180 25177->24760 25179->24763 25183 406ea0 25180->25183 25185 406eb6 25183->25185 25187 406e98 25183->25187 25184 406f42 25184->25187 25191 406f70 25184->25191 25185->25184 25189 406f0a 25185->25189 25187->25177 25189->25185 25190 406f29 25189->25190 25199 4051c0 77 API calls 2 library calls 25189->25199 25190->25184 25192 406f7e 25191->25192 25200 4067f0 25192->25200 25194 407007 25265 401090 SysFreeString 25194->25265 25195 406fa5 25195->25194 25198 406fd4 UnRegisterTypeLib 25195->25198 25197 407032 25197->25187 25198->25194 25199->25189 25202 406809 25200->25202 25245 40680f 25200->25245 25201 40d11e __putwch_nolock 5 API calls 25203 406db8 25201->25203 25204 40683e GetModuleFileNameA 25202->25204 25202->25245 25203->25195 25205 406863 25204->25205 25206 406886 25204->25206 25270 404640 GetLastError 25205->25270 25207 4068b2 25206->25207 25208 406892 25206->25208 25266 403ce0 25207->25266 25272 406430 67 API calls 25208->25272 25212 406868 25271 406430 67 API calls 25212->25271 25215 4068f6 lstrlenW 25234 40691e 25215->25234 25216 4068e7 25219 4069ec lstrlenA 25216->25219 25220 4069cc 25216->25220 25217 406aa0 lstrlenA 25235 406ac8 25217->25235 25218 406a91 25221 406b96 LoadTypeLib 25218->25221 25222 406b76 25218->25222 25227 406a39 25219->25227 25228 406a1f 25219->25228 25276 406430 67 API calls 25220->25276 25223 406bba 25221->25223 25224 406d5e 25221->25224 25282 406430 67 API calls 25222->25282 25231 406c0a 25223->25231 25232 406bea 25223->25232 25229 406d67 SysAllocString 25224->25229 25230 406d81 25224->25230 25277 406430 67 API calls 25227->25277 25228->25227 25238 406a59 25228->25238 25229->25230 25289 406430 67 API calls 25230->25289 25284 4058e0 68 API calls _strcpy_s 25231->25284 25283 406430 67 API calls 25232->25283 25234->25216 25248 406949 25234->25248 25273 4057a0 5 API calls 2 library calls 25234->25273 25235->25218 25244 406af3 25235->25244 25279 4057a0 5 API calls 2 library calls 25235->25279 25278 4058e0 68 API calls _strcpy_s 25238->25278 25250 406afd _store_winword 25244->25250 25280 4063c0 68 API calls 25244->25280 25245->25201 25247 406c33 25252 406c54 lstrlenA 25247->25252 25257 406c45 25247->25257 25249 406953 _store_winword 25248->25249 25274 4063c0 68 API calls 25248->25274 25275 405890 WideCharToMultiByte 25249->25275 25281 406dc0 MultiByteToWideChar 25250->25281 25251 406a7f 25251->25217 25251->25218 25260 406c7c 25252->25260 25255 406d47 LoadTypeLib 25255->25224 25256 406d2a 25288 406430 67 API calls 25256->25288 25257->25255 25257->25256 25259 406ca7 25263 406cb1 _store_winword 25259->25263 25286 4063c0 68 API calls 25259->25286 25260->25257 25260->25259 25285 4057a0 5 API calls 2 library calls 25260->25285 25287 406dc0 MultiByteToWideChar 25263->25287 25265->25197 25267 403cec 25266->25267 25268 403cf0 25266->25268 25267->25215 25267->25216 25267->25251 25268->25267 25269 403d26 CharNextA 25268->25269 25269->25268 25270->25212 25271->25245 25272->25245 25273->25248 25274->25249 25275->25216 25276->25245 25277->25245 25278->25251 25279->25244 25280->25250 25281->25218 25282->25245 25283->25245 25284->25247 25285->25259 25286->25263 25287->25257 25288->25245 25289->25245 25290->24059 25291->24073 25293 40eae1 __getstream 25292->25293 25294 418999 __lock 67 API calls 25293->25294 25295 40eae8 25294->25295 25296 40eb53 _doexit 25295->25296 25297 40eb0c 25295->25297 25308 40eb8e LeaveCriticalSection _doexit 25296->25308 25310 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 25297->25310 25300 40eb6f 25302 40eb8b __getstream 25300->25302 25309 4188a9 LeaveCriticalSection 25300->25309 25301 40eb17 25311 4195e3 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 25301->25311 25302->23798 25305 40eb82 25306 40e84f _fast_error_exit 3 API calls 25305->25306 25306->25302 25307 40eb24 _doexit 25307->25296 25308->25300 25309->25305 25310->25301 25311->25307 25312 418ed5 25313 418f11 25312->25313 25345 418f0a 25312->25345 25314 418f15 25313->25314 25315 418f3c 25313->25315 25373 40dff3 67 API calls __getptd_noexit 25314->25373 25319 418f80 25315->25319 25324 418fa6 25315->25324 25316 40d11e __putwch_nolock 5 API calls 25318 419493 25316->25318 25374 40dff3 67 API calls __getptd_noexit 25319->25374 25320 418f1a 25321 40dfe0 __setmode 67 API calls 25320->25321 25326 418f21 25321->25326 25323 418fb8 25327 41fcfe __stbuf 67 API calls 25323->25327 25324->25323 25325 41fd5c __lseeki64_nolock 69 API calls 25324->25325 25325->25323 25329 413f6a __setmode 4 API calls 25326->25329 25330 418fc1 25327->25330 25328 418f85 25331 40dfe0 __setmode 67 API calls 25328->25331 25329->25345 25332 4191c0 25330->25332 25340 419821 ___InternalCxxFrameHandler 67 API calls 25330->25340 25333 418f8e 25331->25333 25334 4193f3 WriteFile 25332->25334 25335 4191ce 25332->25335 25336 413f6a __setmode 4 API calls 25333->25336 25338 41941a GetLastError 25334->25338 25339 419313 25334->25339 25337 419271 25335->25337 25346 4191e0 25335->25346 25336->25345 25350 41927b 25337->25350 25353 419318 25337->25353 25342 4191bb 25338->25342 25339->25342 25343 418fdc GetConsoleMode 25340->25343 25341 419454 25341->25345 25348 40dfe0 __setmode 67 API calls 25341->25348 25342->25341 25342->25345 25355 419434 25342->25355 25343->25332 25344 419000 25343->25344 25344->25332 25349 41900e GetConsoleCP 25344->25349 25345->25316 25346->25341 25346->25342 25347 41922b WriteFile 25346->25347 25347->25338 25347->25346 25352 419441 25348->25352 25349->25342 25368 41902e 25349->25368 25350->25341 25351 4192ce WriteFile 25350->25351 25351->25338 25356 4192f3 25351->25356 25377 40dff3 67 API calls __getptd_noexit 25352->25377 25353->25341 25354 41936e WideCharToMultiByte 25353->25354 25354->25338 25359 4193a1 WriteFile 25354->25359 25357 419449 25355->25357 25358 41943c 25355->25358 25356->25339 25356->25342 25356->25350 25376 40e006 67 API calls 3 library calls 25357->25376 25363 40dfe0 __setmode 67 API calls 25358->25363 25360 4193cf GetLastError 25359->25360 25365 4193c6 25359->25365 25360->25365 25363->25352 25365->25339 25365->25342 25365->25353 25365->25359 25366 423ad9 79 API calls __write_nolock 25366->25368 25367 4190a6 WideCharToMultiByte 25367->25342 25370 4190d4 WriteFile 25367->25370 25368->25342 25368->25366 25368->25367 25369 4190f5 25368->25369 25375 4202bf 77 API calls __isleadbyte_l 25368->25375 25369->25338 25369->25342 25369->25368 25371 423823 11 API calls __putwch_nolock 25369->25371 25372 41910d WriteFile 25369->25372 25370->25338 25370->25369 25371->25369 25372->25338 25372->25369 25373->25320 25374->25328 25375->25368 25376->25345 25377->25345 25378 40d40f 25379 40d450 25378->25379 25380 40d432 25378->25380 25397 41783f 25379->25397 25382 40dfe0 __setmode 67 API calls 25380->25382 25384 40d437 25382->25384 25383 40d455 25405 41704b 25383->25405 25385 413f6a __setmode 4 API calls 25384->25385 25396 40d446 __aulldiv __aullrem 25385->25396 25387 40d45e 25388 40d470 GetSystemTimeAsFileTime 25387->25388 25389 40d463 25387->25389 25391 40d49b __aulldiv 25388->25391 25412 413e36 10 API calls 3 library calls 25389->25412 25395 40d4b1 GetTimeZoneInformation 25391->25395 25391->25396 25392 40d11e __putwch_nolock 5 API calls 25394 40d55c 25392->25394 25393 40d46d 25393->25388 25395->25396 25396->25392 25398 41784b __getstream 25397->25398 25399 41787f __getstream 25398->25399 25400 418999 __lock 67 API calls 25398->25400 25399->25383 25401 41785c 25400->25401 25402 41786d 25401->25402 25413 41715d 25401->25413 25478 417885 LeaveCriticalSection _doexit 25402->25478 25406 417073 25405->25406 25407 417056 25405->25407 25406->25387 25408 40dfe0 __setmode 67 API calls 25407->25408 25409 41705b 25408->25409 25410 413f6a __setmode 4 API calls 25409->25410 25411 41706b 25410->25411 25411->25387 25412->25393 25414 417169 __getstream 25413->25414 25415 418999 __lock 67 API calls 25414->25415 25416 417184 _expandtime 25415->25416 25417 41704b __ftime64_s 67 API calls 25416->25417 25418 417199 25417->25418 25419 4171ab 25418->25419 25420 41719e 25418->25420 25479 416fe3 25419->25479 25498 413e36 10 API calls 3 library calls 25420->25498 25423 4171a8 25423->25419 25424 4171b4 25425 4171c6 25424->25425 25426 4171b9 25424->25426 25486 417017 25425->25486 25499 413e36 10 API calls 3 library calls 25426->25499 25429 4171c3 25429->25425 25430 4171cf 25431 4171e1 25430->25431 25432 4171d4 25430->25432 25493 422519 25431->25493 25500 413e36 10 API calls 3 library calls 25432->25500 25435 4171de 25435->25431 25437 40d968 _getenv 120 API calls 25438 417208 25437->25438 25439 41728e 25438->25439 25446 417216 __setlocale_get_all 25438->25446 25440 4172a4 GetTimeZoneInformation 25439->25440 25505 40fdcf 67 API calls 6 library calls 25439->25505 25444 4172b7 WideCharToMultiByte 25440->25444 25452 417361 __tzset_nolock 25440->25452 25442 41729d 25442->25440 25443 41723f _strlen 25502 41a0a6 67 API calls _malloc 25443->25502 25448 41732d WideCharToMultiByte 25444->25448 25446->25443 25449 417239 25446->25449 25446->25452 25448->25452 25501 40fdcf 67 API calls 6 library calls 25449->25501 25506 41740c LeaveCriticalSection _doexit 25452->25506 25453 41724d _strlen 25453->25452 25503 413106 67 API calls __setmode 25453->25503 25456 417271 25456->25452 25504 413e36 10 API calls 3 library calls 25456->25504 25457 4173aa 25470 417487 __tzset_nolock __getstream 25457->25470 25507 422092 67 API calls __setmode 25457->25507 25460 417286 25460->25452 25461 4173c2 25462 4173d6 25461->25462 25463 4173c9 25461->25463 25509 42203c 91 API calls _strtol 25462->25509 25508 413e36 10 API calls 3 library calls 25463->25508 25465 4173d3 25465->25462 25467 4173ec 25468 417441 25467->25468 25510 42203c 91 API calls _strtol 25467->25510 25468->25470 25512 422092 67 API calls __setmode 25468->25512 25470->25402 25472 417471 25472->25470 25473 417478 25472->25473 25513 413e36 10 API calls 3 library calls 25473->25513 25474 417421 25474->25468 25511 42203c 91 API calls _strtol 25474->25511 25477 417482 25477->25470 25478->25399 25480 41700b 25479->25480 25481 416fee 25479->25481 25480->25424 25482 40dfe0 __setmode 67 API calls 25481->25482 25483 416ff3 25482->25483 25484 413f6a __setmode 4 API calls 25483->25484 25485 417003 25484->25485 25485->25424 25487 417022 25486->25487 25488 41703f 25486->25488 25489 40dfe0 __setmode 67 API calls 25487->25489 25488->25430 25490 417027 25489->25490 25491 413f6a __setmode 4 API calls 25490->25491 25492 417037 25491->25492 25492->25430 25494 419821 ___InternalCxxFrameHandler 67 API calls 25493->25494 25496 42251e 25494->25496 25495 4171e6 25495->25437 25496->25495 25514 41b47d 75 API calls 6 library calls 25496->25514 25498->25423 25499->25429 25500->25435 25501->25443 25502->25453 25503->25456 25504->25460 25505->25442 25506->25457 25507->25461 25508->25465 25509->25467 25510->25474 25511->25468 25512->25472 25513->25477 25514->25495

            Control-flow Graph

            APIs
            • GetCommandLineA.KERNEL32 ref: 00403983
              • Part of subcall function 00405BB0: InitializeCriticalSection.KERNEL32(0043AA5C,00000064,00430420), ref: 00405BC9
              • Part of subcall function 00405BB0: EnterCriticalSection.KERNEL32(0043AA5C,00000064,00430420), ref: 00405BDB
              • Part of subcall function 00405BB0: InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405C12
              • Part of subcall function 00405BB0: EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405C24
              • Part of subcall function 00405BB0: _getenv.LIBCMT ref: 00405C57
              • Part of subcall function 00405BB0: InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405C78
              • Part of subcall function 00405BB0: EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405C8A
              • Part of subcall function 00405BB0: _getenv.LIBCMT ref: 00405D05
              • Part of subcall function 00405BB0: InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405D26
              • Part of subcall function 00405BB0: EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405D38
              • Part of subcall function 00405BB0: _getenv.LIBCMT ref: 00405DB3
              • Part of subcall function 00405BB0: InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405DD4
              • Part of subcall function 00405BB0: EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405DE6
            • InitializeCriticalSection.KERNEL32(0043AA5C,0043AA74,?,00000064,00430420), ref: 004039DA
            • EnterCriticalSection.KERNEL32(0043AA5C,0043AA74,?,00000064,00430420), ref: 004039EC
            • lstrcmpiA.KERNEL32(00000000,UnregServer), ref: 00403A3C
            • lstrcmpiA.KERNEL32(00000000,RegServer), ref: 00403A5E
            • lstrcmpiA.KERNEL32(00000000,Service), ref: 00403A84
              • Part of subcall function 00404E50: InitializeCriticalSection.KERNEL32(0043AA5C,F0AA0F6A,?,00000000,0042EFA0,000000FF,?,00403A9C,00000001,00000001), ref: 00404E88
              • Part of subcall function 00404E50: EnterCriticalSection.KERNEL32(0043AA5C,F0AA0F6A,?,00000000,0042EFA0,000000FF,?,00403A9C,00000001,00000001), ref: 00404E9A
              • Part of subcall function 00404E50: CoInitialize.OLE32(00000000), ref: 00404EC3
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$_getenvlstrcmpi$CommandLine
            • String ID: .\ServiceMinit.cpp$.\ServiceMinit.cpp$.\ServiceMinit.cpp$AppID$CServiceModule::_tWinMain()$LocalService$RegServer$Service$UnregServer$key.Open() error$keyAppID.Open() error${F1D4E2A2-4B35-11D5-89B1-0001028D1A2A}
            • API String ID: 3403806960-919169053
            • Opcode ID: 9be5aaa678ae8641ba3fe3cb82d8e0112a281000c9fef272a80bc68efe4cc875
            • Instruction ID: a64d1a377f4d79a045d4eb934f4541e61a2f64c37e036c9c79492cd34675587d
            • Opcode Fuzzy Hash: 9be5aaa678ae8641ba3fe3cb82d8e0112a281000c9fef272a80bc68efe4cc875
            • Instruction Fuzzy Hash: 0771D471940208DBDB04EFA1EC49BEE7B74AB58304F10617EE581B22E1DBB85A54CF5E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 00406159
            • EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 0040616B
            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 004061B1
            • MessageBoxA.USER32(00000000,00431878,?,00000000), ref: 004061D0
            • OpenServiceA.ADVAPI32(00000000,?,00010020), ref: 004061ED
            • CloseServiceHandle.ADVAPI32(00000000), ref: 00406200
            • MessageBoxA.USER32(00000000,004318DC,?,00000000), ref: 00406216
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalMessageOpenSectionService$CloseEnterHandleInitializeManager
            • String ID: .\ServiceMinit.cpp$CServiceModule::Uninstall()$Z@
            • API String ID: 146462905-1623470890
            • Opcode ID: cfc55417f4f085dc926518a2949a1dd43cb884e2c3ab5db4b134038f3dbd8cd1
            • Instruction ID: 06d43fe44f5f93d897bfa6795492ffaad04e0ec981de45b1b0d2e1dc326417d4
            • Opcode Fuzzy Hash: cfc55417f4f085dc926518a2949a1dd43cb884e2c3ab5db4b134038f3dbd8cd1
            • Instruction Fuzzy Hash: A0319234A40204EFEB04EBB4ED59FAE7775AB4C701F10A27AF502B62D0D6789954CB2D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,00000064,00430420), ref: 00405BC9
            • EnterCriticalSection.KERNEL32(0043AA5C,00000064,00430420), ref: 00405BDB
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405C12
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405C24
            • _getenv.LIBCMT ref: 00405C57
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405C78
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405C8A
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405CC3
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405CD5
            • _getenv.LIBCMT ref: 00405D05
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405D26
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405D38
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405D71
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405D83
            • _getenv.LIBCMT ref: 00405DB3
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405DD4
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405DE6
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405E1F
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00405E31
            • LoadStringA.USER32(?,?,?,00000100), ref: 00405E91
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00405F0F
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$_getenv$LoadString
            • String ID: .\ServiceMinit.cpp$============================================$CServiceModule::HG_TOP_DIR=%s$CServiceModule::HG_TOP_DIR=NULL$CServiceModule::Init()$CServiceModule::PATH=%s$CServiceModule::PATH=NULL$CServiceModule::SERVER_DLLS=%s$CServiceModule::SERVER_DLLS=NULL$HG_TOP_DIR$PATH$SERVER_DLLS
            • API String ID: 2995279931-2717624542
            • Opcode ID: 4922ad66b7635c6b891e68e10db0f64cc5a481e4b4e14c81213d2d5b894ba2ce
            • Instruction ID: acca4f42ff14a162e2a45e04993ce93f744dd9570f822106646db080e30b10af
            • Opcode Fuzzy Hash: 4922ad66b7635c6b891e68e10db0f64cc5a481e4b4e14c81213d2d5b894ba2ce
            • Instruction Fuzzy Hash: 2D81D575580244ABDB00EF90ED4DB4A3B70AB18309F24B17EE8C6663A1D3B94568DF1F
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 00401500: _getenv.LIBCMT ref: 00401509
            • _sprintf.LIBCMT ref: 00401249
            • _memset.LIBCMT ref: 0040125C
              • Part of subcall function 004014E0: __stat64i32.LIBCMT ref: 004014EB
            • _sprintf.LIBCMT ref: 00401299
              • Part of subcall function 0040CF8A: __output_l.LIBCMT ref: 0040CFDD
            • LeaveCriticalSection.KERNEL32(0043AA5C), ref: 00401303
            • GetCurrentThreadId.KERNEL32 ref: 0040139F
            • _sprintf.LIBCMT ref: 004013FD
            • _fputs.LIBCMT ref: 0040146A
            • LeaveCriticalSection.KERNEL32(0043AA5C), ref: 00401486
              • Part of subcall function 0040CE39: DeleteFileA.KERNEL32(?,004012C2,?,?,?,?,?,?,?,?,?,?,?,?,004011BF,CServiceModule::IsInstalled()), ref: 0040CE3D
              • Part of subcall function 0040CE39: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004011BF,CServiceModule::IsInstalled()), ref: 0040CE47
              • Part of subcall function 0040CE39: __dosmaperr.LIBCMT ref: 0040CE56
            Strings
            • %04d/%02d/%02d %02d:%02d:%02d.%03d [%04d:%s:%04d] , xrefs: 004013F1
            • %s\ServiceMinit.log, xrefs: 0040123D
            • %s.old, xrefs: 0040128D
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: _sprintf$CriticalLeaveSection$CurrentDeleteErrorFileLastThread__dosmaperr__output_l__stat64i32_fputs_getenv_memset
            • String ID: %04d/%02d/%02d %02d:%02d:%02d.%03d [%04d:%s:%04d] $%s.old$%s\ServiceMinit.log
            • API String ID: 2556210007-1441101590
            • Opcode ID: 3724870ca4b8be6e85ba818a6ab2f69c936aa1394cc3c6c34fc88845c3f4b475
            • Instruction ID: 0346ccfba624cb3aa74887a46b4c4086b3e99751b9784b494c3a11aa2d327130
            • Opcode Fuzzy Hash: 3724870ca4b8be6e85ba818a6ab2f69c936aa1394cc3c6c34fc88845c3f4b475
            • Instruction Fuzzy Hash: 7861A6B5D001189BCB14DB50DD85EDEB378AB48309F4486EEF90977291EA389BC8CF55
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 186 409690-4096fa call 404bf0 call 408cb0 191 4096fc-40971a call 404c10 186->191 192 40971f-409728 186->192 200 409ee2-409efa call 40d11e 191->200 194 409ec4-409edc call 404c10 192->194 195 40972e-409766 lstrcmpiA * 2 192->195 194->200 198 409775-40978b call 408cb0 195->198 199 409768-40976f 195->199 212 409792-409796 198->212 213 40978d 198->213 199->198 202 4098bc-4098cf lstrcmpiA 199->202 204 4098d1-4098ee call 408cb0 202->204 205 4098f5-409908 lstrcmpiA 202->205 204->205 219 4098f0 204->219 210 409af6-409b06 call 409640 205->210 211 40990e-409927 call 408cb0 205->211 225 409b38-409b3c 210->225 226 409b08-409b33 call 408ba0 call 404c10 210->226 222 409929 211->222 223 40992e-409944 call 408cb0 211->223 212->202 214 40979c-4097bb call 404bf0 call 409640 212->214 213->194 242 4097fc-40980d call 40a9f0 214->242 243 4097bd-4097f7 call 408ba0 call 404c10 * 2 214->243 219->194 222->194 240 409946 223->240 241 40994b-409954 223->241 229 409c20-409c24 225->229 230 409b42-409b5e call 404c80 225->230 226->200 235 409c40 229->235 236 409c26-409c36 call 404c80 229->236 252 409bd0-409be6 call 408cb0 230->252 253 409b60-409b7c call 404c80 230->253 238 409c47-409c4b 235->238 255 409c3b-409c3e 236->255 246 409c54-409c84 call 409170 call 408cb0 238->246 247 409c4d 238->247 240->194 249 409986-40998a 241->249 250 409956-409981 call 408ba0 call 404c10 241->250 272 409838-40983f 242->272 273 40980f-409833 call 409f30 call 409fc0 call 409f00 242->273 243->200 302 409c86 246->302 303 409c8b-409ca1 call 40aa90 246->303 247->246 261 409990-4099dd call 404bf0 call 409f30 call 40a0d0 call 409f00 249->261 262 409a2a-409a2e 249->262 250->200 275 409be8 252->275 276 409bed-409bf6 252->276 253->252 283 409b7e-409ba2 call 409f50 253->283 255->238 351 409a11-409a20 call 404c10 261->351 352 4099df-409a0c call 404c10 * 2 261->352 270 409ad4-409aea call 40aa90 262->270 271 409a34-409a38 262->271 304 409af1 270->304 305 409aec 270->305 271->270 285 409a3e-409a66 call 404bf0 call 404c80 271->285 279 409841-409857 call 408cb0 272->279 280 4098ad-4098b7 call 404c10 272->280 273->272 275->194 288 409bf8-409c14 call 40a0d0 276->288 289 409c1b 276->289 315 409859-409868 call 404c10 279->315 316 40986d-409883 call 40aa90 279->316 280->202 283->252 319 409ba4-409bcb call 404bb0 call 404c10 283->319 330 409a68-409a81 call 405030 285->330 331 409aaa-409ac4 call 404bb0 call 404c10 285->331 288->289 323 409c16 288->323 307 409e61-409e65 289->307 302->194 332 409ca3 303->332 333 409ca8-409cb1 303->333 304->192 305->194 317 409e67-409e70 307->317 318 409ebf 307->318 315->194 344 409885-409894 call 404c10 316->344 345 409899-4098a8 call 404c10 316->345 317->318 326 409e72-409e7f lstrlenA 317->326 318->192 319->200 323->194 326->318 335 409e81-409ea1 call 409690 326->335 364 409a83-409a87 330->364 365 409aa8-409acf call 404c10 330->365 331->194 332->194 340 409cb3-409cc0 lstrlenA 333->340 341 409d0e-409d18 333->341 358 409ea3 335->358 359 409ea5-409ebb call 408cb0 335->359 340->341 356 409cc2-409cd8 call 409690 340->356 354 409d1a 341->354 355 409d1f-409d23 341->355 344->194 345->307 351->307 352->200 354->192 366 409d25-409d29 355->366 367 409d46-409d4a 355->367 372 409cdd-409ce4 356->372 358->194 359->318 393 409ebd 359->393 364->365 376 409a89-409aa3 call 404bb0 call 404c10 364->376 365->270 377 409d32-409d41 call 404bb0 366->377 378 409d2b 366->378 370 409d94-409da3 call 404c30 call 40aa40 367->370 371 409d4c-409d62 call 404c30 call 40aa40 367->371 402 409da8-409dbd call 404c40 370->402 371->370 407 409d64-409d78 call 40a9f0 371->407 382 409cf1-409d07 call 408cb0 372->382 383 409ce6-409cea 372->383 376->194 377->194 378->192 382->341 404 409d09 382->404 383->382 391 409cec 383->391 391->194 393->194 410 409deb-409def 402->410 411 409dbf-409de6 call 404bb0 call 404c10 402->411 404->194 414 409d7a-409d7e 407->414 415 409d8f 407->415 410->307 416 409df1-409df8 410->416 411->200 414->415 418 409d80-409d8a call 409fc0 414->418 415->192 416->307 419 409dfa-409e38 call 404bf0 call 409f30 call 405a10 call 409f00 416->419 418->415 431 409e56-409e5c call 404c10 419->431 432 409e3a-409e54 call 404bb0 call 404c10 419->432 431->307 432->194
            APIs
            • lstrcmpiA.KERNEL32(00000000,00430394), ref: 00409740
            • lstrcmpiA.KERNEL32(00000000,00430374), ref: 0040975E
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: lstrcmpi
            • String ID:
            • API String ID: 1586166983-0
            • Opcode ID: 1742302c096598b4af306b40afe57d209e794b429635fe8f83af9ac050924e33
            • Instruction ID: 1ca1c44655ee9b4dd4f1bdc294fd0864d4db539a443e4aef00778e1943b2eb76
            • Opcode Fuzzy Hash: 1742302c096598b4af306b40afe57d209e794b429635fe8f83af9ac050924e33
            • Instruction Fuzzy Hash: 504226B0904118DBDF14EFA5C899BEEB7B4BB44304F10416EE60A772D2DB385E85CB99
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 438 4067f0-406807 439 406809-40680d 438->439 440 40680f-406814 438->440 439->440 441 406819-406861 call 405880 call 4063a0 GetModuleFileNameA 439->441 442 406da8-406dbb call 40d11e 440->442 449 406863-40687f call 404640 call 406430 441->449 450 406886-406890 441->450 449->442 451 4068b2-4068d5 call 403ce0 450->451 452 406892-4068ad call 406430 450->452 460 406a82-406a8f 451->460 461 4068db-4068e5 451->461 452->442 465 406aa0-406acd lstrlenA call 405740 460->465 466 406a91-406a9b 460->466 463 4068f6-406923 lstrlenW call 405740 461->463 464 4068e7-4068f1 461->464 479 406931-40693b 463->479 480 406925-40692f 463->480 467 4069b7-4069ca 464->467 482 406adb-406ae5 465->482 483 406acf-406ad9 465->483 469 406b61-406b74 466->469 472 4069ec-406a1d lstrlenA 467->472 473 4069cc-4069e7 call 406430 467->473 475 406b96-406bb4 LoadTypeLib 469->475 476 406b76-406b91 call 406430 469->476 485 406a39-406a54 call 406430 472->485 486 406a1f-406a2b 472->486 473->442 477 406bba-406be8 475->477 478 406d5e-406d65 475->478 476->442 490 406c0a-406c43 call 4058e0 477->490 491 406bea-406c05 call 406430 477->491 487 406d67-406d7f SysAllocString 478->487 488 406d8b-406da2 call 406430 478->488 494 406972-406984 call 4063c0 479->494 495 40693d-406951 call 4057a0 479->495 493 4069ab-4069b1 480->493 498 406ae7-406afb call 4057a0 482->498 499 406b1c-406b2e call 4063c0 482->499 497 406b55-406b5b 483->497 485->442 486->485 489 406a2d-406a37 486->489 487->488 503 406d81 487->503 488->442 489->485 504 406a59-406a7f call 4058e0 489->504 524 406c54-406c81 lstrlenA call 405740 490->524 525 406c45-406c4f 490->525 491->442 493->467 521 40698a-4069a5 call 405890 494->521 495->494 519 406953-406970 call 412db0 495->519 497->469 498->499 520 406afd-406b1a call 412db0 498->520 522 406b34-406b4f call 406dc0 499->522 503->488 504->460 519->521 520->522 521->493 522->497 539 406c83-406c8d 524->539 540 406c8f-406c99 524->540 530 406d15-406d28 525->530 536 406d47-406d58 LoadTypeLib 530->536 537 406d2a-406d45 call 406430 530->537 536->478 537->442 543 406d09-406d0f 539->543 544 406cd0-406ce2 call 4063c0 540->544 545 406c9b-406caf call 4057a0 540->545 543->530 551 406ce8-406d03 call 406dc0 544->551 545->544 550 406cb1-406cce call 412db0 545->550 550->551 551->543
            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040684E
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: FileModuleName
            • String ID: .tlb$z
            • API String ID: 514040917-4222463387
            • Opcode ID: 9a51ab09195e4603d3529f086a7f388a968a5fe3ba3efdd49027be61dd239d39
            • Instruction ID: b6f51d081ea25407fdd8ab6e138143139b20290db2911b39c91a2298c9703b6e
            • Opcode Fuzzy Hash: 9a51ab09195e4603d3529f086a7f388a968a5fe3ba3efdd49027be61dd239d39
            • Instruction Fuzzy Hash: EEF1E9B1901228DBDB24DF55CD95BDEB7B0AF48304F4041EAE54AB7280DB789EA5CF48
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 556 40abb0-40abe6 call 40ab30 call 407d90 561 40abe8-40ac05 call 407c20 556->561 562 40ac0a-40ac0e 556->562 568 40b05d-40b070 call 40d11e 561->568 564 40ac10-40ac16 562->564 565 40ac3c-40ac5d 562->565 564->565 567 40ac18-40ac3a call 407df0 564->567 573 40ac81-40acc4 call 405880 call 4063a0 call 407b60 GetModuleFileNameA 565->573 574 40ac5f-40ac7c call 407c20 565->574 567->564 584 40acf4-40acfe 573->584 585 40acc6-40aced call 404640 call 406430 call 407c20 573->585 574->568 587 40ad00-40ad26 call 406430 call 407c20 584->587 588 40ad2b-40ad38 584->588 585->568 587->568 589 40ad49-40ad76 lstrlenA call 405740 588->589 590 40ad3a-40ad44 588->590 603 40ad84-40ad8e 589->603 604 40ad78-40ad82 589->604 594 40ae0a-40ae1d 590->594 599 40ae4a-40ae69 call 407b80 594->599 600 40ae1f-40ae45 call 406430 call 407c20 594->600 614 40ae6b-40ae76 GetModuleHandleA 599->614 615 40ae7c-40aea5 call 407b20 599->615 600->568 609 40ad90-40ada4 call 4057a0 603->609 610 40adc5-40add7 call 4063c0 603->610 608 40adfe-40ae04 604->608 608->594 609->610 626 40ada6-40adc3 call 412db0 609->626 625 40addd-40adf8 call 406dc0 610->625 614->615 619 40af27-40af3f call 407df0 614->619 629 40aed2-40af25 call 406720 call 407df0 615->629 630 40aea7-40aecd call 406430 call 407c20 615->630 633 40af45-40af4c 619->633 625->608 626->625 629->633 630->568 638 40af7b-40afa0 call 407df0 633->638 639 40af4e-40af76 call 406430 call 407c20 633->639 651 40afa2-40afca call 406430 call 407c20 638->651 652 40afcf-40afdd 638->652 639->568 651->568 653 40b005-40b01e call 40b1e0 652->653 654 40afdf-40b003 call 40b080 652->654 661 40b023 653->661 663 40b029-40b057 call 406430 call 407c20 654->663 661->663 663->568
            APIs
            • Concurrency::details::stl_critical_section_concrt::stl_critical_section_concrt.LIBCPMTD ref: 0040ABC9
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Concurrency::details::stl_critical_section_concrt::stl_critical_section_concrt
            • String ID: "$Module$Module_Raw$z
            • API String ID: 2239783310-2838227397
            • Opcode ID: 85a2eb360b5ae7507ac48fc8c50baf3eedd1054085b8059f4df42fbcaabd6a34
            • Instruction ID: e4e9d695f85cdb35b2a0b3f5634031d0e22b71fd059e4db1701e9b9a2c2604df
            • Opcode Fuzzy Hash: 85a2eb360b5ae7507ac48fc8c50baf3eedd1054085b8059f4df42fbcaabd6a34
            • Instruction Fuzzy Hash: 82D13A719052288BDB24EF55DC50BEEB3B0AF49304F0041EEE50977292DB386E95CF9A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00401189
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040119B
            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 004011D2
            • OpenServiceA.ADVAPI32(00000000,?,00000001), ref: 004011EE
            • CloseServiceHandle.ADVAPI32(00000000), ref: 00401208
            • CloseServiceHandle.ADVAPI32(00000000), ref: 00401212
            Strings
            • CServiceModule::IsInstalled(), xrefs: 004011B5
            • .\ServiceMinit.cpp, xrefs: 004011A1
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Service$CloseCriticalHandleOpenSection$EnterInitializeManager
            • String ID: .\ServiceMinit.cpp$CServiceModule::IsInstalled()
            • API String ID: 310523789-2732721916
            • Opcode ID: eb1060544750c4826093f5c55a46b1932f4d3a5cca13ffe6d2bd53e4101ec16b
            • Instruction ID: 869cb28eb4d2686f3ea92feec4f3a971acf7fb16f3c24d3da782c3d241997189
            • Opcode Fuzzy Hash: eb1060544750c4826093f5c55a46b1932f4d3a5cca13ffe6d2bd53e4101ec16b
            • Instruction Fuzzy Hash: 2611CE74980308EBDB14EFA0ED4DB6D7B70AB08305F1092A9E941B2391C7B85654DF1E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • lstrlenW.KERNEL32(00000000,?,F0AA0F6A), ref: 0040846C
            • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002,00000400,00000000,00000400,0042F0C3,00000400), ref: 0040855B
            • FindResourceA.KERNEL32(00000000,00000400,00000000), ref: 00408586
            • FreeLibrary.KERNEL32(00000000,00000000,00000000,?,?,?,?), ref: 004086D0
              • Part of subcall function 00404640: GetLastError.KERNEL32(?,00404604,?,?,?,?,?,?,?,00000000,0042EF70,000000FF), ref: 00404646
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Library$ErrorFindFreeLastLoadResourcelstrlen
            • String ID:
            • API String ID: 3607514145-0
            • Opcode ID: 63c39e1f7fb701cd30208eb1accc0598d8757d3a3ef54f093196fda49bad776b
            • Instruction ID: 4444f1c583aa86f41c5867afa53c7a296204d83a082266d3899e2f4ce3aee35d
            • Opcode Fuzzy Hash: 63c39e1f7fb701cd30208eb1accc0598d8757d3a3ef54f093196fda49bad776b
            • Instruction Fuzzy Hash: 2BA12AB0C00218DBCB14DFA4DD45BEEB7B4AF44314F1045AEE64977281EB395A85CFA9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,00403A50), ref: 00405A79
              • Part of subcall function 00406140: InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 00406159
              • Part of subcall function 00406140: EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 0040616B
            • EnterCriticalSection.KERNEL32(0043AA5C,?,00403A50), ref: 00405A8B
            • CoInitialize.OLE32(00000000), ref: 00405AB4
            • CoUninitialize.OLE32(00000001,00000000), ref: 00405AF0
            Strings
            • .\ServiceMinit.cpp, xrefs: 00405A91
            • CServiceModule::UnregisterServer(), xrefs: 00405AA5
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$Uninitialize
            • String ID: .\ServiceMinit.cpp$CServiceModule::UnregisterServer()
            • API String ID: 2280959042-2829193702
            • Opcode ID: aca329e018dae73db719ab051e7e27b3e22e66368adadc2cd5cf2a28bb999bec
            • Instruction ID: e10cd5b553a9bd4b7c60894b8b0b86a28370015214c549edea9ef6f6513ef909
            • Opcode Fuzzy Hash: aca329e018dae73db719ab051e7e27b3e22e66368adadc2cd5cf2a28bb999bec
            • Instruction Fuzzy Hash: E3016D30680204AFDB00EFA1ED4AB5D7BB0AB08705F1061A9E585A62E1DBB86954DF1E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • UnRegisterTypeLib.OLEAUT32(?,?,?,?,?), ref: 00406FF6
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: RegisterType
            • String ID: \o@$\o@
            • API String ID: 2778101878-101146686
            • Opcode ID: d535b6ee436e7968a2f40d9941124e9375c64837b394b2e2f2dce52b3b04ba23
            • Instruction ID: fc45a9b89ba459778e767429b4fdca6503fdc3573753b2b4d32699faf48bd2d8
            • Opcode Fuzzy Hash: d535b6ee436e7968a2f40d9941124e9375c64837b394b2e2f2dce52b3b04ba23
            • Instruction Fuzzy Hash: 4B31CCB5D00109EFCB04EFA5C891DEFB7B9BF48304F2045ADE515A7291DB34AA41CBA5
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 795 4010b0-4010b3 796 4010b4-4010b8 795->796 797 401114 796->797 798 4010ba-4010c2 796->798 799 401116-401119 797->799 798->797 800 4010c4-4010c7 798->800 801 4010ca-4010ce 800->801 802 4010d0-4010d8 801->802 803 401105-401112 CharNextA 801->803 802->803 804 4010da-4010e8 802->804 803->796 805 4010f6-401103 CharNextA 804->805 806 4010ea-4010f4 CharNextA 804->806 805->801 806->799
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CharNext
            • String ID:
            • API String ID: 3213498283-0
            • Opcode ID: 75ec6257532cff03e73f5d8352a44eedde3c7f64488a81d14746b496702df13b
            • Instruction ID: 82a503c13fc14620c08baa6895582078b2b94726323239102ebfcad9fa8eb189
            • Opcode Fuzzy Hash: 75ec6257532cff03e73f5d8352a44eedde3c7f64488a81d14746b496702df13b
            • Instruction Fuzzy Hash: E1015E34505148EFCF08CF60C8949BE7BB5AF49702F24C1AEE9059B661D738DE40DB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 807 41d7a7-41d7c5 HeapCreate 808 41d7c7-41d7c9 807->808 809 41d7ca-41d7d7 call 41d74c 807->809 812 41d7d9-41d7e6 call 41d91e 809->812 813 41d7fd-41d800 809->813 812->813 816 41d7e8-41d7fb HeapDestroy 812->816 816->808
            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000,00413839,00000001), ref: 0041D7B8
            • HeapDestroy.KERNEL32 ref: 0041D7EE
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Heap$CreateDestroy
            • String ID:
            • API String ID: 3296620671-0
            • Opcode ID: 0c65be24ec40ea6f2b3044880ab665ce8047fda8414e6124f43c29ce023be7bc
            • Instruction ID: 1944b28af78936fec655b5920f650459b6bf2640a53089ccc9cc5cd139ce4f4b
            • Opcode Fuzzy Hash: 0c65be24ec40ea6f2b3044880ab665ce8047fda8414e6124f43c29ce023be7bc
            • Instruction Fuzzy Hash: DFE092B0E103029EDB266B32AD097AB36D4E740746F20A47AF520C51F4FF7889809F4E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 817 41783f-417853 call 413950 820 417855-417866 call 418999 817->820 821 41787f-417884 call 413995 817->821 826 417873-41787a call 417885 820->826 827 417868 call 41715d 820->827 826->821 830 41786d 827->830 830->826
            APIs
            • __lock.LIBCMT ref: 00417857
              • Part of subcall function 00418999: __mtinitlocknum.LIBCMT ref: 004189AD
              • Part of subcall function 00418999: __amsg_exit.LIBCMT ref: 004189B9
              • Part of subcall function 00418999: EnterCriticalSection.KERNEL32(?,?,?,0041872F,00000004,004370D0,0000000C,0041A0F9,?,?,00000000,00000000,00000000,004197D3,00000001,00000214), ref: 004189C1
            • __tzset_nolock.LIBCMT ref: 00417868
              • Part of subcall function 0041715D: __lock.LIBCMT ref: 0041717F
              • Part of subcall function 0041715D: __invoke_watson.LIBCMT ref: 004171A3
              • Part of subcall function 0041715D: __invoke_watson.LIBCMT ref: 004171BE
              • Part of subcall function 0041715D: __invoke_watson.LIBCMT ref: 004171D9
              • Part of subcall function 0041715D: ____lc_codepage_func.LIBCMT ref: 004171E1
              • Part of subcall function 0041715D: _strlen.LIBCMT ref: 00417241
              • Part of subcall function 0041715D: __malloc_crt.LIBCMT ref: 00417248
              • Part of subcall function 0041715D: _strlen.LIBCMT ref: 0041725E
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __invoke_watson$__lock_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__malloc_crt__mtinitlocknum__tzset_nolock
            • String ID:
            • API String ID: 4249203040-0
            • Opcode ID: b6d0a5ef3522225c040480bcc56409a52f01f0172ac2c5c1fdc1b7ca5e65f832
            • Instruction ID: 05eea345bec0531ea4ab7c4cfc0450cad970292eb3119632f0aab6acfd8bd964
            • Opcode Fuzzy Hash: b6d0a5ef3522225c040480bcc56409a52f01f0172ac2c5c1fdc1b7ca5e65f832
            • Instruction Fuzzy Hash: D0E0CD71885310D5C7257BF2560739D7230EB95B65F10122FB5C0112C1CB7C05C1C79D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 831 40e84f-40e85d call 40e829 ExitProcess
            APIs
            • ___crtCorExitProcess.LIBCMT ref: 0040E853
              • Part of subcall function 0040E829: GetModuleHandleA.KERNEL32(mscoree.dll,0040E858,?,00410022,000000FF,0000001E,00000001,00000000,00000000,?,0041A0B3,?,00000001,004011BF,00418923,00000018), ref: 0040E82E
              • Part of subcall function 0040E829: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040E83E
            • ExitProcess.KERNEL32 ref: 0040E85D
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ExitProcess$AddressHandleModuleProc___crt
            • String ID:
            • API String ID: 2427264223-0
            • Opcode ID: c99fffb33091608b68eb04bbeffa4fbd75a7cac399926fb7d07d96e1bfca17fa
            • Instruction ID: 84092ec04ffeb73ac9bf4ba95bc02b175235151204747064e0a005d6f4455081
            • Opcode Fuzzy Hash: c99fffb33091608b68eb04bbeffa4fbd75a7cac399926fb7d07d96e1bfca17fa
            • Instruction Fuzzy Hash: 1AB00231014100AFDA053B11ED1B41D7B61EF81715F10D93DF189550759B765C60BA45
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CoTaskMemFree.OLE32(00000000,00000000,00000000,?,004086C0), ref: 00408B80
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: FreeTask
            • String ID:
            • API String ID: 734271698-0
            • Opcode ID: 602ce7ae96e1ee1b33a3c6fed72873477825af2390adebc911da63e068b03c57
            • Instruction ID: 2e58224ea2bbb46c6feb435098ec1c0dc0d0842c0c36e679409760001a039c51
            • Opcode Fuzzy Hash: 602ce7ae96e1ee1b33a3c6fed72873477825af2390adebc911da63e068b03c57
            • Instruction Fuzzy Hash: E251ECB4900258EFDB24DF54DA90BEEB7B5AB48304F1080EEA585B7280CB786EC1DF55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegQueryInfoKeyA.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040AA6C
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: InfoQuery
            • String ID:
            • API String ID: 1673771737-0
            • Opcode ID: 87e9eba54c0793c998f5e2383b24e2f0ffac91dc3e7552c7fd25b7072b457d6d
            • Instruction ID: 2c4f4003a32774d448bc98f7b3a0628eb3dd5901bea88227fc8d94065c539319
            • Opcode Fuzzy Hash: 87e9eba54c0793c998f5e2383b24e2f0ffac91dc3e7552c7fd25b7072b457d6d
            • Instruction Fuzzy Hash: 0AE0487075030CBBD714CE74DE41F6E77799744740F204175E905EA1C0DA749614D7A9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExA.KERNELBASE(?,80000000,00000000,00000000,00000000,80000000,AppID), ref: 00404CA2
              • Part of subcall function 00404C40: RegCloseKey.ADVAPI32 ref: 00404C5E
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID:
            • API String ID: 47109696-0
            • Opcode ID: cc62ff038b4ab9adf1b16fe774a57c9fd3040c30f9cb5b155c3041b8a622eafa
            • Instruction ID: a96cb6b796e6b63a3cdde5bdaf28bd46cebd3fa258b7e7cae9d2a889feaaaa48
            • Opcode Fuzzy Hash: cc62ff038b4ab9adf1b16fe774a57c9fd3040c30f9cb5b155c3041b8a622eafa
            • Instruction Fuzzy Hash: 97F0B2B5D0120CEFDB04DF95D895B9EBBB8EB88310F2081A9E904A7380D734AA44CB94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _doexit.LIBCMT ref: 0040EBAB
              • Part of subcall function 0040EAD5: __lock.LIBCMT ref: 0040EAE3
              • Part of subcall function 0040EAD5: __decode_pointer.LIBCMT ref: 0040EB12
              • Part of subcall function 0040EAD5: __decode_pointer.LIBCMT ref: 0040EB1F
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __decode_pointer$__lock_doexit
            • String ID:
            • API String ID: 3276244213-0
            • Opcode ID: 44ea3af290a5c0fced421c48bee69f607f8ea4075bd654cc3defe53151bfea1d
            • Instruction ID: f0418e74825f5ced9a78712c1428e7afa1ec256cf104cae6e1c199ea29fd5574
            • Opcode Fuzzy Hash: 44ea3af290a5c0fced421c48bee69f607f8ea4075bd654cc3defe53151bfea1d
            • Instruction Fuzzy Hash: A2A02430F4430075F51011017C03F0433007740F30FF044347504340D051F55134440F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __fsopen
            • String ID:
            • API String ID: 3646066109-0
            • Opcode ID: 2944bcf569b94e2b44a73485ac56fc0f61e1c0f057e6f4bc3992d41405ae1331
            • Instruction ID: ab66410e7d4158dfcb82cafdda1d776de76ab444ce7f5993a10fbf0b8d40d6b5
            • Opcode Fuzzy Hash: 2944bcf569b94e2b44a73485ac56fc0f61e1c0f057e6f4bc3992d41405ae1331
            • Instruction Fuzzy Hash: 95B01275408200FEDA015741EC02B0D77517B80710F80C529B75C200A0923E8124960B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenW.KERNEL32(00000000,F0AA0F6A,000000FF,?,0040B023,?,00000000,00000000,004319B0,?,Module_Raw), ref: 0040B23B
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: lstrlen
            • String ID:
            • API String ID: 1659193697-0
            • Opcode ID: c6ee9c59dea4a54b3ef14151f5338a8781b7720310070fefa74c0209edf11d08
            • Instruction ID: 735ab0c92dffca81a66d0e52864b0ca46bdcb012d54b4a3e1577fb3c71093649
            • Opcode Fuzzy Hash: c6ee9c59dea4a54b3ef14151f5338a8781b7720310070fefa74c0209edf11d08
            • Instruction Fuzzy Hash: 7641E6B1D00219DBCB04DFE5D885AEEB7B4FB48714F10462EE912B7281DB389905CB98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ___getlocaleinfo
            • String ID:
            • API String ID: 1937885557-0
            • Opcode ID: b5b8e1ea38fe09f00adcc477a1572e083a0576349d2920f087e950a4e063d431
            • Instruction ID: ed8af7016d48c66a03100574b0488e20b87c433f707afc56213dc320bc5b529f
            • Opcode Fuzzy Hash: b5b8e1ea38fe09f00adcc477a1572e083a0576349d2920f087e950a4e063d431
            • Instruction Fuzzy Hash: 0FE1F3B290021DBEEF11EAE2CD41DFF77BDEF04748F04092AB215D2041EA74EA599B64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00406009
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040601B
            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00406064
            • MessageBoxA.USER32(00000000,00431878,?,00000000), ref: 00406086
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004060A1
            • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000010,00000003,00000001,?,00000000,00000000,RPCSS,00000000,00000000), ref: 004060DE
            • CloseServiceHandle.ADVAPI32(00000000), ref: 004060F1
            • MessageBoxA.USER32(00000000,00431850,?,00000000), ref: 0040610A
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalMessageSectionService$CloseCreateEnterFileHandleInitializeManagerModuleNameOpen
            • String ID: .\ServiceMinit.cpp$CServiceModule::Install()$RPCSS
            • API String ID: 3876978789-4041271297
            • Opcode ID: fadeb88cde240594ff5b9b98ebae142850d51c25553bfa01df2920e72db14d72
            • Instruction ID: 80c6b10a79878e3c14f1b8978468697218ebc5510cea4c8bdf3df619a66d38d6
            • Opcode Fuzzy Hash: fadeb88cde240594ff5b9b98ebae142850d51c25553bfa01df2920e72db14d72
            • Instruction Fuzzy Hash: 7831A370A80308BBEB18DFA0EC5AFE97774AB48701F1051A9F206BA2D1C6B85954CF5D
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID:
            • String ID: CLSID\$\Implemented Categories$\Required Categories
            • API String ID: 0-4092563799
            • Opcode ID: 47c0e5efdab88fb166c96fc0da7e60ca50408bf61d984a3405d278b0dd1c4c94
            • Instruction ID: d05613de815c8c9fcef9da57b0fa30ebf9ed883adbc59b3692bfac4d47e7c64b
            • Opcode Fuzzy Hash: 47c0e5efdab88fb166c96fc0da7e60ca50408bf61d984a3405d278b0dd1c4c94
            • Instruction Fuzzy Hash: F9E135B1910218DBDB14EB90DC85BEEB3B4FF48304F5041AAE5097B291DB786A84CF99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,{F1D4E2A2-4B35-11D5-89B1-0001028D1A2A},00020019,80000000,AppID,00020019), ref: 00406299
            • EnterCriticalSection.KERNEL32(0043AA5C,{F1D4E2A2-4B35-11D5-89B1-0001028D1A2A},00020019,80000000,AppID,00020019), ref: 004062AB
            • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040631E
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00406351
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00406363
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize$CtrlDispatcherServiceStart
            • String ID: -> Run()$.\ServiceMinit.cpp$CServiceModule::Start()
            • API String ID: 4248115315-1383743213
            • Opcode ID: 024b455f1f994762bdcd995c1845fffcb6c64a2bc5722940d97e34fc99d7312a
            • Instruction ID: 8baf0524c9543601889b67de502b5be109eea69db8c9e573c7028e2b4df59659
            • Opcode Fuzzy Hash: 024b455f1f994762bdcd995c1845fffcb6c64a2bc5722940d97e34fc99d7312a
            • Instruction Fuzzy Hash: E821C1B05402459BDB00EF50EA1D7AA7BB0AB04309F14613ED4866A390D3BD4568CF5F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32 ref: 00416D52
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00416D67
            • UnhandledExceptionFilter.KERNEL32(004337C8), ref: 00416D72
            • GetCurrentProcess.KERNEL32(C0000409), ref: 00416D8E
            • TerminateProcess.KERNEL32(00000000), ref: 00416D95
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID:
            • API String ID: 2579439406-0
            • Opcode ID: 08a1dfdd4275f9915c8067dfe823d8cfbfdec6fe87cb1177a2a9f27b46c50d56
            • Instruction ID: 17231240e9b6221994866eec9e6af3adda2d0ad79e98070ac29d8f15beedd55a
            • Opcode Fuzzy Hash: 08a1dfdd4275f9915c8067dfe823d8cfbfdec6fe87cb1177a2a9f27b46c50d56
            • Instruction Fuzzy Hash: 7021AEB4900309DFD700DF29FD497843BA4FB68325F10603AEA4997362E7B559849F9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __decode_pointer.LIBCMT ref: 0041EB8D
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000000,00419685,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 004195F0
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000005,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 00419607
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041EB94
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Value$ExceptionFilterUnhandled__decode_pointer
            • String ID:
            • API String ID: 1958600898-0
            • Opcode ID: 4f8aed0f2678d74c2c7f0dcca23eb3cb20104a97da73602769ae9de64918b359
            • Instruction ID: 6e17e5454bd1d775a17410ee8bf225bbcc124bc5ec854c384e0beb1a3e7e08ce
            • Opcode Fuzzy Hash: 4f8aed0f2678d74c2c7f0dcca23eb3cb20104a97da73602769ae9de64918b359
            • Instruction Fuzzy Hash: 7DC08C214182C00BCB23533A581C30E7A00E705300F80F4AFD10080042CF6D49888EA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402A13
              • Part of subcall function 00403040: _getenv.LIBCMT ref: 00403052
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402A25
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402A83
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402A95
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402AE2
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402AF4
            • _fgets.LIBCMT ref: 00402B46
            • _strcat.LIBCMT ref: 00402C5B
            • _strcat.LIBCMT ref: 00402D0A
            • _strcat.LIBCMT ref: 00402D2C
            • _sprintf.LIBCMT ref: 00402D4E
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402DA4
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402DB6
            • __strdup.LIBCMT ref: 00402DF0
            • _sprintf.LIBCMT ref: 00402E76
            • __strdup.LIBCMT ref: 00402E85
            • __strdup.LIBCMT ref: 00402E9A
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402ED3
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402EE5
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402F23
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402F35
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00402F73
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00402F85
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize$__strdup_strcat$_sprintf$_fgets_getenv
            • String ID: args : %s$ mode : %s$%s\%s$-- proc : %s$.exe$Respawn$Sysinit$Wait$bin dir is %s$cannot open config file '%s'$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$program '%s' not found$respawn$size is 0$wait
            • API String ID: 1607728339-398193112
            • Opcode ID: f77105157aadd3c1f2da1770ce5e4b8d5b21a54bdc0af3199c0623db70cb3b1c
            • Instruction ID: ed9f73959f831837aead98d028f9c5c61fcb245bf071a8bc5ec3f3340030049c
            • Opcode Fuzzy Hash: f77105157aadd3c1f2da1770ce5e4b8d5b21a54bdc0af3199c0623db70cb3b1c
            • Instruction Fuzzy Hash: 7FF114B09002189BCB10DF10DD99BAE7770BF09308F1491EEE849663C1E7B99A94CF5E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _strlen.LIBCMT ref: 004251E0
            • _strlen.LIBCMT ref: 004251ED
            • _strlen.LIBCMT ref: 004251FE
            • _strlen.LIBCMT ref: 0042520D
            • _strlen.LIBCMT ref: 0042521C
            • __malloc_crt.LIBCMT ref: 0042522C
              • Part of subcall function 0041A0A6: _malloc.LIBCMT ref: 0041A0AE
              • Part of subcall function 0041A0A6: Sleep.KERNEL32(00000000,00000001,004011BF,00418923,00000018,004370F0,0000000C,004189B2,004011BF,?,?,0041872F,00000004,004370D0,0000000C,0041A0F9), ref: 0041A0C3
            • _strcpy_s.LIBCMT ref: 00425278
            • __invoke_watson.LIBCMT ref: 004253A5
            • _strlen.LIBCMT ref: 004253AE
            • _strcpy_s.LIBCMT ref: 004253CC
            • __invoke_watson.LIBCMT ref: 004253DF
            • _strlen.LIBCMT ref: 004253E8
            • _strcpy_s.LIBCMT ref: 00425406
            • __invoke_watson.LIBCMT ref: 00425419
            • _strlen.LIBCMT ref: 00425422
            • _strcpy_s.LIBCMT ref: 00425440
            • __invoke_watson.LIBCMT ref: 00425453
            • _strlen.LIBCMT ref: 0042545C
            • _strcpy_s.LIBCMT ref: 0042547A
            • __invoke_watson.LIBCMT ref: 0042528B
              • Part of subcall function 00413E36: _memset.LIBCMT ref: 00413EC2
              • Part of subcall function 00413E36: IsDebuggerPresent.KERNEL32(?,?,0041A543), ref: 00413EE0
              • Part of subcall function 00413E36: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,0041A543), ref: 00413EEA
              • Part of subcall function 00413E36: UnhandledExceptionFilter.KERNEL32(?,?,?,0041A543), ref: 00413EF4
              • Part of subcall function 00413E36: GetCurrentProcess.KERNEL32(C000000D,?,?,0041A543), ref: 00413F0F
              • Part of subcall function 00413E36: TerminateProcess.KERNEL32(00000000,?,?,0041A543), ref: 00413F16
            • _strlen.LIBCMT ref: 00425294
            • _strcpy_s.LIBCMT ref: 004252B1
            • __invoke_watson.LIBCMT ref: 004252C4
            • _strlen.LIBCMT ref: 004252CD
            • _strcpy_s.LIBCMT ref: 00425311
            • __invoke_watson.LIBCMT ref: 00425324
            • _strlen.LIBCMT ref: 0042532D
            • _strcpy_s.LIBCMT ref: 0042534A
            • __invoke_watson.LIBCMT ref: 0042535D
            • _strlen.LIBCMT ref: 00425366
            • _strcpy_s.LIBCMT ref: 00425392
            • __invoke_watson.LIBCMT ref: 0042548D
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: _strlen$__invoke_watson_strcpy_s$ExceptionFilterProcessUnhandled$CurrentDebuggerPresentSleepTerminate__malloc_crt_malloc_memset
            • String ID:
            • API String ID: 18894028-0
            • Opcode ID: 5f048efc3419fd48bf6455cf2e1626eb8d92070bdea55dfe8ab72c58e300a6a6
            • Instruction ID: 36b241dfad4cd016cf57d5ee5660d20591c2b25f24d3fcbaa48460f4de13a215
            • Opcode Fuzzy Hash: 5f048efc3419fd48bf6455cf2e1626eb8d92070bdea55dfe8ab72c58e300a6a6
            • Instruction Fuzzy Hash: DF8186B2A10304BFDB11AF79CC45AFFB7B9EF40318F45047AEC04A6242E739E6558A65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,F0AA0F6A), ref: 00403638
            • EnterCriticalSection.KERNEL32(0043AA5C,F0AA0F6A), ref: 0040364A
            • GetCurrentThreadId.KERNEL32 ref: 00403671
            • CoInitialize.OLE32(00000000), ref: 0040367E
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000004,00000003,00000000,00000000,00000000,00000000,00000001), ref: 004036BB
            • InitializeCriticalSection.KERNEL32(0043AA5C,00000014,00000001), ref: 004036E5
            • EnterCriticalSection.KERNEL32(0043AA5C,00000014,00000001), ref: 004036F7
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00403772
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00403784
            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004037B5
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004037CF
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004037E1
            • TerminateThread.KERNEL32(000000FF,00000000), ref: 0040381D
            • DispatchMessageA.USER32(?), ref: 00403827
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00403842
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00403854
            • CoUninitialize.OLE32 ref: 00403885
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$MessageThread$CurrentDispatchSecurityTerminateUninitialize
            • String ID: .\ServiceMinit.cpp$.\ServiceMinit.cpp$.\ServiceMinit.cpp$.\ServiceMinit.cpp$.\ServiceMinit.cpp$CServiceModule::Run()$GetMessage %d$In GetMessage Loop$Out GetMessage Loop$Service Started
            • API String ID: 1874840155-863530001
            • Opcode ID: fee855d3e1ef8f5cf425c9b2efe2c7b5102a55e0bc15b69c71e68baf3b32bdd9
            • Instruction ID: df218e8acf96de7610b80a39e02800dad7a40748879ba20d782f668c111cad61
            • Opcode Fuzzy Hash: fee855d3e1ef8f5cf425c9b2efe2c7b5102a55e0bc15b69c71e68baf3b32bdd9
            • Instruction Fuzzy Hash: EA61E4B1680304ABDB10EFA0ED5EB9D3B70AB18705F20A27EF581766E0D7B80514DB1E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,00402629,00000000), ref: 004031F6
            • EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,00402629,00000000), ref: 00403208
            • _perror.LIBCMT ref: 004032B2
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004032CA
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004032DC
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize$_perror
            • String ID: )&@$)&@$E2BIG$EINVAL$ENOENT$ENOMEM$RESPAWN$SYSINIT$UNKNOWN$WAIT$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$spawn$spawn fail. errno = [%d:%s]$spawn success. pid is %d$spawn(%s) %s %s
            • API String ID: 1749629038-1513654956
            • Opcode ID: 0a5311026cf8a21273fc59127828c2d19745ec74736c4dbb3715ebffdb865e54
            • Instruction ID: d4d8cce7bdfb38d4e600edb14782059d750ac4b71f0814b96284d46dcb5b8dcd
            • Opcode Fuzzy Hash: 0a5311026cf8a21273fc59127828c2d19745ec74736c4dbb3715ebffdb865e54
            • Instruction Fuzzy Hash: EE61C2B0900205DFDB04EF91D855A6E7BB4BF08309F10E26EE8856B391C7799A45CF9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,0041384B), ref: 004199D5
            • __mtterm.LIBCMT ref: 004199E1
              • Part of subcall function 004196AD: __decode_pointer.LIBCMT ref: 004196BE
              • Part of subcall function 004196AD: TlsFree.KERNEL32(00000003,00419B4E), ref: 004196D8
            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004199F7
            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00419A04
            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00419A11
            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00419A1E
            • TlsAlloc.KERNEL32 ref: 00419A6E
            • TlsSetValue.KERNEL32(00000000), ref: 00419A89
            • __init_pointers.LIBCMT ref: 00419A93
            • __encode_pointer.LIBCMT ref: 00419A9E
            • __encode_pointer.LIBCMT ref: 00419AAE
            • __encode_pointer.LIBCMT ref: 00419ABE
            • __encode_pointer.LIBCMT ref: 00419ACE
            • __decode_pointer.LIBCMT ref: 00419AEF
            • __calloc_crt.LIBCMT ref: 00419B08
            • __decode_pointer.LIBCMT ref: 00419B22
            • __initptd.LIBCMT ref: 00419B31
            • GetCurrentThreadId.KERNEL32 ref: 00419B38
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: AddressProc__encode_pointer$__decode_pointer$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 2657569430-3819984048
            • Opcode ID: f507bffcd4d033f7d3c592514c7fc6faebbfd4e5748146557a680d1d709624ee
            • Instruction ID: ac640c6f97835535c44ac35d2d98889fdd24938cac5fdbc259ea592f4e104e6c
            • Opcode Fuzzy Hash: f507bffcd4d033f7d3c592514c7fc6faebbfd4e5748146557a680d1d709624ee
            • Instruction Fuzzy Hash: E131ADB19042019ACB1A7F75FC25B96BBE9FF04710B14253FE650932A1DB799980CBEC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EnterCriticalSection.KERNEL32(0043AA5C,00000004,?,00404091), ref: 00401779
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,00404091), ref: 0040178F
            • EnterCriticalSection.KERNEL32(0043AA5C,?,00404091), ref: 004017A1
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004017F9
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040180B
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 0040184F
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401861
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004018A5
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004018B7
            Strings
            • -- proc : %s, xrefs: 00401832
            • kill_child_processes, xrefs: 004017BB
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004017A7
            • pid : %d, xrefs: 00401888
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00401811
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004018BD
            • kill %s, xrefs: 0040197C
            • done : %d, xrefs: 004018DE
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 0040195B
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00401867
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Enter$Initialize
            • String ID: done : %d$ pid : %d$ -- proc : %s$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$kill %s$kill_child_processes
            • API String ID: 1229453151-3363547746
            • Opcode ID: 17ed9041b5f4fbdd92ee795e6efad9f07a8f3e164348c06fcf2265d071054515
            • Instruction ID: 7f43119c2876006f4be0bf0cc9f1285dc3da217b0bf70f1a8651917c78e99f26
            • Opcode Fuzzy Hash: 17ed9041b5f4fbdd92ee795e6efad9f07a8f3e164348c06fcf2265d071054515
            • Instruction Fuzzy Hash: 4651E472680204EBDB04EF50EA5DB297B71A764308F24B17EE4C56A2A1D3B84524EF5F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,00401763,?), ref: 00403F79
            • EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,00401763,?), ref: 00403F8B
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,00401763,?), ref: 00403FC2
            • EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,00401763,?), ref: 00403FD4
            • PostThreadMessageA.USER32(?,00000012,00000000,00000000), ref: 004040AB
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize$MessagePostThread
            • String ID: code : [%d:%s]$.\ServiceMinit.cpp$Bad service request$CServiceModule::Handler()$SERVICE_CONTROL_CONTINUE$SERVICE_CONTROL_INTERROGATE$SERVICE_CONTROL_SHUTDOWN$SERVICE_CONTROL_STOP$Unknown
            • API String ID: 2620819968-2515691290
            • Opcode ID: f60a2e291c48767d9d345a270c19a9c0da25ddba17d9d0cb7e173b4b9f5e7edc
            • Instruction ID: d231be8befeefc182e9450ab593ad7065785ee4ace9b41cd0e1b140dd3a102d9
            • Opcode Fuzzy Hash: f60a2e291c48767d9d345a270c19a9c0da25ddba17d9d0cb7e173b4b9f5e7edc
            • Instruction Fuzzy Hash: DB41B2B0D40209EBCF10DF91D9496AE7BB0AB88305F20913BE64677390D3785A54DF9E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Name::operator+$Decorator::getoperator+$DataNameName::Name::operator+=Type$BasicDimensionPrimary
            • String ID:
            • API String ID: 563633363-0
            • Opcode ID: f82391e6b20822cc3f47970b8fb022319fc102f83b43c58903be97b1af3c75f2
            • Instruction ID: 93c0ecda68de269ba6b4cc37ff80a11c66599e91427d7c6e137aaf4660e73ef0
            • Opcode Fuzzy Hash: f82391e6b20822cc3f47970b8fb022319fc102f83b43c58903be97b1af3c75f2
            • Instruction Fuzzy Hash: 834181B2B002296ADB11E6A1EC46FFF77AC9F54314F84452FF501A71C1EF38AA458768
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00403420: InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00403474
              • Part of subcall function 00403420: EnterCriticalSection.KERNEL32(0043AA5C), ref: 00403486
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004020DC
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004020EE
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 0040213A
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040214C
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 0040219A
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004021AC
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004027EC
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004027FE
            Strings
            • wait enter ..., xrefs: 00402108
            • wait exit. pid=%d, status=%d, xrefs: 00402174
            • sigterm_catched !!, xrefs: 004021C6
            • ServiceMinit is finish...., xrefs: 00402818
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00402152
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004020F4
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00402804
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004021B2
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: ServiceMinit is finish....$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$sigterm_catched !!$wait enter ...$wait exit. pid=%d, status=%d
            • API String ID: 2028075725-2181195844
            • Opcode ID: 3b4aa31b0a76a69524425cae1e85fbeeae306587072873001aab546c5a7de216
            • Instruction ID: 68a1dc65692af026e0b4eb350238aa1b48cfb1931d21113e332e70c5887d82cd
            • Opcode Fuzzy Hash: 3b4aa31b0a76a69524425cae1e85fbeeae306587072873001aab546c5a7de216
            • Instruction Fuzzy Hash: 1931CEB61802419ACB11AB61AE1E7193AA06718308F14B17FF4C5A16E1E7BC4168EF1F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,0043AAB8,?,004016AE,?,?), ref: 00403DC7
              • Part of subcall function 004019D0: SetServiceStatus.ADVAPI32(00000000,?,?,?,00403EA7,00000002), ref: 004019F7
              • Part of subcall function 00403600: InitializeCriticalSection.KERNEL32(0043AA5C,F0AA0F6A), ref: 00403638
              • Part of subcall function 00403600: EnterCriticalSection.KERNEL32(0043AA5C,F0AA0F6A), ref: 0040364A
              • Part of subcall function 00403600: GetCurrentThreadId.KERNEL32 ref: 00403671
              • Part of subcall function 00403600: CoInitialize.OLE32(00000000), ref: 0040367E
              • Part of subcall function 00403600: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000004,00000003,00000000,00000000,00000000,00000000,00000001), ref: 004036BB
              • Part of subcall function 00403600: InitializeCriticalSection.KERNEL32(0043AA5C,00000014,00000001), ref: 004036E5
              • Part of subcall function 00403600: EnterCriticalSection.KERNEL32(0043AA5C,00000014,00000001), ref: 004036F7
            • EnterCriticalSection.KERNEL32(0043AA5C,0043AAB8,?,004016AE,?,?), ref: 00403DD9
            • RegisterServiceCtrlHandlerA.ADVAPI32(?,004016C0), ref: 00403E23
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00403E4E
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00403E60
            • InitializeCriticalSection.KERNEL32(0043AA5C,00000001,?,?,?,00000002), ref: 00403F01
            • EnterCriticalSection.KERNEL32(0043AA5C,00000001,?,?,?,00000002), ref: 00403F13
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$Service$CtrlCurrentHandlerRegisterSecurityStatusThread
            • String ID: Handler not installed()$.\ServiceMinit.cpp$CServiceModule::ServiceMain()$Handler not installed$Service Stopped$Service stopped
            • API String ID: 3816499838-4266900008
            • Opcode ID: 16bf35986f9ccad765f86e71c8f826731e256d289e3bab67b48f0dcb01127e95
            • Instruction ID: 73783b8433408c8050249ab72eea3a712e9641fa975675cf6ef83068319a06dd
            • Opcode Fuzzy Hash: 16bf35986f9ccad765f86e71c8f826731e256d289e3bab67b48f0dcb01127e95
            • Instruction Fuzzy Hash: 88411370680204EBCB00EF51ED9AB8D7BB0AB18308F24617EF485263E1D7B94A14DF5E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00404A11
            • GetLastError.KERNEL32 ref: 00404A17
            • _malloc.LIBCMT ref: 00404A2A
            • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00404A4D
            • _HRESULT_FROM_WIN32.LIBCMTD ref: 00404A98
              • Part of subcall function 0040FDCF: __lock.LIBCMT ref: 0040FDED
              • Part of subcall function 0040FDCF: ___sbh_find_block.LIBCMT ref: 0040FDF8
              • Part of subcall function 0040FDCF: ___sbh_free_block.LIBCMT ref: 0040FE07
              • Part of subcall function 0040FDCF: HeapFree.KERNEL32(00000000,004011BF,00436E30,Function_0000FDCF,0041897A,00000000,004370F0,0000000C,004189B2,004011BF,?,?,0041872F,00000004,004370D0,0000000C), ref: 0040FE37
              • Part of subcall function 0040FDCF: GetLastError.KERNEL32(?,0041872F,00000004,004370D0,0000000C,0041A0F9,?,?,00000000,00000000,00000000,004197D3,00000001,00000214), ref: 0040FE48
            • GetTokenInformation.ADVAPI32(00000000,00000005(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00404ACC
            • GetLastError.KERNEL32 ref: 00404AD2
            • _malloc.LIBCMT ref: 00404AE5
            • GetTokenInformation.ADVAPI32(00000000,00000005(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00404B08
              • Part of subcall function 00404640: GetLastError.KERNEL32(?,00404604,?,?,?,?,?,?,?,00000000,0042EF70,000000FF), ref: 00404646
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ErrorInformationLastToken$_malloc$FreeHeap___sbh_find_block___sbh_free_block__lock
            • String ID: z$z
            • API String ID: 1750464754-3877588240
            • Opcode ID: f8cf6caf0596041c85158808649e5a9a83e0b6d36ecbe899a08f8f3d8715a670
            • Instruction ID: 671c4058592234a14e0305f99bab17154abcbf6ab2c62eeb642ea106794aaf92
            • Opcode Fuzzy Hash: f8cf6caf0596041c85158808649e5a9a83e0b6d36ecbe899a08f8f3d8715a670
            • Instruction Fuzzy Hash: 26511DF5D00209EFDB14DFA4D845BAEB7B4AF84304F10857AEA056B2C0D779AA44CF95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection_getenv$EnterInitialize__strdup_sprintf
            • String ID: %s\etc$HG_ETC_DIR$HG_TOP_DIR$e:\scada_win\app\serviceminit\minit.cxx$etc dir is %s
            • API String ID: 176128563-2965304638
            • Opcode ID: 6e354f5eae1ececb364fc2300ad5d31bebfa709c00886d2f7740436b443f06f7
            • Instruction ID: a0ebdeba76d7a7274be06188f584f64d63e9db972d5ecc1f552ffe66a95d3fb4
            • Opcode Fuzzy Hash: 6e354f5eae1ececb364fc2300ad5d31bebfa709c00886d2f7740436b443f06f7
            • Instruction Fuzzy Hash: 242180F0A003049FC714EF61AD8E75A3370E758304F6061BAE85D662D1E7B85998CF5E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,F0AA0F6A,?,00000000,0042EFA0,000000FF,?,00403A9C,00000001,00000001), ref: 00404E88
              • Part of subcall function 00406140: InitializeCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 00406159
              • Part of subcall function 00406140: EnterCriticalSection.KERNEL32(0043AA5C,?,?,?,?,?,?,?,?,?,?,00405AE4), ref: 0040616B
              • Part of subcall function 00404C80: RegOpenKeyExA.KERNELBASE(?,80000000,00000000,00000000,00000000,80000000,AppID), ref: 00404CA2
            • EnterCriticalSection.KERNEL32(0043AA5C,F0AA0F6A,?,00000000,0042EFA0,000000FF,?,00403A9C,00000001,00000001), ref: 00404E9A
            • CoInitialize.OLE32(00000000), ref: 00404EC3
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$Initialize$Enter$Open
            • String ID: -Service$.\ServiceMinit.cpp$AppID$CServiceModule::RegisterServer()$LocalService$ServiceMinit$ServiceParameters${F1D4E2A2-4B35-11D5-89B1-0001028D1A2A}
            • API String ID: 1527650992-399234584
            • Opcode ID: cde3df9ca176edff90e8b2111acaadd64d832174564070c2289376f018b47a64
            • Instruction ID: 2cf2bd8d49d24acf26be2acd995b8cedb1a7a1f0966c4c70bf3400f13da8a339
            • Opcode Fuzzy Hash: cde3df9ca176edff90e8b2111acaadd64d832174564070c2289376f018b47a64
            • Instruction Fuzzy Hash: 77519E70944209DBDB04EFA5DC56BEEB770AB48314F20812EF511772E1DB786A44CFA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004017F9
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040180B
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 0040184F
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401861
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004018A5
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004018B7
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00401943
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401955
            • TerminateProcess.KERNEL32(00000000,0000000F), ref: 00401998
            • LeaveCriticalSection.KERNEL32(0043AA5C), ref: 004019B8
            Strings
            • -- proc : %s, xrefs: 00401832
            • pid : %d, xrefs: 00401888
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00401811
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004018BD
            • done : %d, xrefs: 004018DE
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 00401867
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize$LeaveProcessTerminate
            • String ID: done : %d$ pid : %d$ -- proc : %s$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx$e:\scada_win\app\serviceminit\minit.cxx
            • API String ID: 1984918317-4009743649
            • Opcode ID: ea8a8c48e6bff28e711c113b430dd649b364c9a016c4db36b059ce8049a1de83
            • Instruction ID: becae717d698fff35acd52f7cfc5301566d51aa71ece6a56d23c7c002473a228
            • Opcode Fuzzy Hash: ea8a8c48e6bff28e711c113b430dd649b364c9a016c4db36b059ce8049a1de83
            • Instruction Fuzzy Hash: AF21D672280200EBD704EF50EE6DA2D3B71A768308F24B17EE4C5666A1D3B90524EF5F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • Concurrency::details::stl_critical_section_concrt::stl_critical_section_concrt.LIBCPMTD ref: 00407559
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Concurrency::details::stl_critical_section_concrt::stl_critical_section_concrt
            • String ID: "$Module$Module_Raw$z
            • API String ID: 2239783310-2838227397
            • Opcode ID: 7208b57a5fb0d507581d204c6dc63b6cc1895e4589eeba6d0a524a9c13047722
            • Instruction ID: f19a1c6c07654fe3355daefcd57cbf2250b9d8eb44eaba27c7be9adb7dd8b9b3
            • Opcode Fuzzy Hash: 7208b57a5fb0d507581d204c6dc63b6cc1895e4589eeba6d0a524a9c13047722
            • Instruction Fuzzy Hash: F6F1F771D052289BDB24EF55DC45BEEB3B4AF48304F0041EAE50977282DB386E95CF96
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bbd2310aa2900d16a0b922388052ccfa1e63fdb8627d5783e795ecd917c68af2
            • Instruction ID: 3c21e8295e12f8ca6467edcc1831c545d28d3913ab09008484d740b2ac913533
            • Opcode Fuzzy Hash: bbd2310aa2900d16a0b922388052ccfa1e63fdb8627d5783e795ecd917c68af2
            • Instruction Fuzzy Hash: EF023A74D01268CBCB28DF65CC94AEEB7B4AF48304F1041EAE619B7281D7385E95CF99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __calloc_crt.LIBCMT ref: 0041C0C8
              • Part of subcall function 0041A0E6: __calloc_impl.LIBCMT ref: 0041A0F4
              • Part of subcall function 0041A0E6: Sleep.KERNEL32(00000000,?,004011BF,CServiceModule::IsInstalled()), ref: 0041A10B
            • __calloc_crt.LIBCMT ref: 0041C0EB
            • __calloc_crt.LIBCMT ref: 0041C107
            • __copytlocinfo_nolock.LIBCMT ref: 0041C12C
            • __setlocale_nolock.LIBCMT ref: 0041C13B
            • ___removelocaleref.LIBCMT ref: 0041C147
            • ___freetlocinfo.LIBCMT ref: 0041C14E
            • __setmbcp_nolock.LIBCMT ref: 0041C166
            • ___removelocaleref.LIBCMT ref: 0041C17B
            • ___freetlocinfo.LIBCMT ref: 0041C182
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __calloc_crt$___freetlocinfo___removelocaleref$Sleep__calloc_impl__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
            • String ID:
            • API String ID: 2969281212-0
            • Opcode ID: 98c141443e9100d4e122e93454bdba12d8dc67b702d4c75a0fac81fdc3cc4ae3
            • Instruction ID: 3b0b3aaa604d0e947d74211c93b600cc0e969492ce3a1846128c9d8ea9a841cf
            • Opcode Fuzzy Hash: 98c141443e9100d4e122e93454bdba12d8dc67b702d4c75a0fac81fdc3cc4ae3
            • Instruction Fuzzy Hash: B621BA35284201EBD7327F66DC4299B7BD1DF84754F20843FF48192296EB3D8C90969D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00401563
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401575
            • RegisterEventSourceA.ADVAPI32(00000000,?), ref: 004015EA
            • ReportEventA.ADVAPI32(00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,00000000), ref: 00401612
            • DeregisterEventSource.ADVAPI32(00000000), ref: 0040161C
            • _puts.LIBCMT ref: 0040162B
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Event$CriticalSectionSource$DeregisterEnterInitializeRegisterReport_puts
            • String ID: .\ServiceMinit.cpp$CServiceModule::LogEvent()
            • API String ID: 2785557927-1947590341
            • Opcode ID: fd23d8b69f4f364c39052b87b6fff3726e73f8f7e7d59f102071f89ea58096d5
            • Instruction ID: 1cdedd3075cf69a26fb8dd841e19523c7fdd883a225bcf63bdd23dc22dabe111
            • Opcode Fuzzy Hash: fd23d8b69f4f364c39052b87b6fff3726e73f8f7e7d59f102071f89ea58096d5
            • Instruction Fuzzy Hash: CE21C4B0940308EBDB14DF50DC5ABDD77B4AB58304F0055A9F6456B2D0DBB85A88CF5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004016D3
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004016E5
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 0040171C
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 0040172E
            Strings
            • .\ServiceMinit.cpp, xrefs: 00401734
            • CServiceModule::_Handler(), xrefs: 00401748
            • ============================================, xrefs: 004016FF
            • .\ServiceMinit.cpp, xrefs: 004016EB
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: .\ServiceMinit.cpp$.\ServiceMinit.cpp$============================================$CServiceModule::_Handler()
            • API String ID: 2028075725-2526023961
            • Opcode ID: b47dde72aece9cc95905bffb37a5fdf8300d2c2f40e29f215cde4e763aed717c
            • Instruction ID: bb4fb74c83d33171bc7bd2c38cfa0f3f7eee1bb89733e43d571d5f318248cd59
            • Opcode Fuzzy Hash: b47dde72aece9cc95905bffb37a5fdf8300d2c2f40e29f215cde4e763aed717c
            • Instruction Fuzzy Hash: 79018FB21802819ACB05BB91BE5A6193A70571C708F14B03BF4C561AA1D7B90068DB2F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,0000EA60), ref: 0040355E
            • __cwait.LIBCMT ref: 00403599
            • __cwait.LIBCMT ref: 004035D1
              • Part of subcall function 0040F6E4: WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,004035D6,00000000,?,00000000), ref: 0040F6F9
              • Part of subcall function 0040F6E4: GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0040F708
              • Part of subcall function 0040F6E4: CloseHandle.KERNEL32(00000000,?,?,?,004035D6,00000000,?,00000000), ref: 0040F74B
            • _perror.LIBCMT ref: 004035E0
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Wait__cwait$CloseCodeExitHandleMultipleObjectObjectsProcessSingle_perror
            • String ID: 6(@$wait for multiple object
            • API String ID: 1421345423-2511187733
            • Opcode ID: 5a4e3ed5b7f53a2e2a31e10908ce36fa9bac27cd0d0d153ae4605f00636dffc2
            • Instruction ID: c0056e94f39cbfebdf3f9ec2a1bd320a36bb117e7a0af5d454562b44d9c35dc8
            • Opcode Fuzzy Hash: 5a4e3ed5b7f53a2e2a31e10908ce36fa9bac27cd0d0d153ae4605f00636dffc2
            • Instruction Fuzzy Hash: 84419C74E00108EFDB18CF84D984BADBBB9FB54305F2085AAD4166B3D0C779AB45CB49
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___set_flsgetvalue.LIBCMT ref: 0040F8F0
            • __calloc_crt.LIBCMT ref: 0040F8FC
            • __initptd.LIBCMT ref: 0040F912
            • CreateThread.KERNEL32(00000000,?,0040F849,00000000,00000004,00000000), ref: 0040F92F
            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00403742,00401A10,00000000,00000000), ref: 0040F93F
            • GetLastError.KERNEL32(?,?,?,?,?,00403742,00401A10,00000000,00000000), ref: 0040F94A
            • __dosmaperr.LIBCMT ref: 0040F962
              • Part of subcall function 0040DFE0: __getptd_noexit.LIBCMT ref: 0040DFE0
              • Part of subcall function 00413F6A: __decode_pointer.LIBCMT ref: 00413F73
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd_noexit__initptd
            • String ID:
            • API String ID: 2530220690-0
            • Opcode ID: 04d9b10834cc21ff653f5b9c9131b61931d2e2934bc2b665f1b7fafca47865bf
            • Instruction ID: 912f782110616dafb4f0ec0ab6a366e0d19dcce8f28352a1fb84b5b9e940f87d
            • Opcode Fuzzy Hash: 04d9b10834cc21ff653f5b9c9131b61931d2e2934bc2b665f1b7fafca47865bf
            • Instruction Fuzzy Hash: 3A11E2B2901200BEDB207F7A9C46A9EBBA4EF05338B20423FF111B26D1DB7959449669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C,?,00403817), ref: 004038C6
            • EnterCriticalSection.KERNEL32(0043AA5C,?,00403817), ref: 004038D8
            • TerminateProcess.KERNEL32(00000000,0000000F), ref: 0040393A
            • _memset.LIBCMT ref: 00403953
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitializeProcessTerminate_memset
            • String ID: .\ServiceMinit.cpp$kill_all_processes
            • API String ID: 343617928-1570544933
            • Opcode ID: 3a19bba7baca3ec7dd61654cd413ddb857ed5960f587b634b56d702ca8789433
            • Instruction ID: 8becaf280632a0a3ff17b634fb9dbf19b54c3515a9ce666be4329a532c2dbf35
            • Opcode Fuzzy Hash: 3a19bba7baca3ec7dd61654cd413ddb857ed5960f587b634b56d702ca8789433
            • Instruction Fuzzy Hash: ED110A75640204EBD704EF50EE5A71D7BB5A724305F10607AE485BA2D1D3B85724DB0F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: BuildCatchMatchObjectType
            • String ID: MOC$csm$csm
            • API String ID: 2881012654-2232927589
            • Opcode ID: ab760937f1b20fd77a9924a1092fbf6872aab60ecf5ced168a1070578684eec1
            • Instruction ID: c1a56251bc77bbebe907f07d737615ca47c6c74997cc5e21ea6beea210543ee6
            • Opcode Fuzzy Hash: ab760937f1b20fd77a9924a1092fbf6872aab60ecf5ced168a1070578684eec1
            • Instruction Fuzzy Hash: 97317EB5C00200AFDB309E69C8847EA77B9BF19319FA8485BD44587311D738E9C6CB9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileType.KERNEL32(?,?,?,00437158,0000000C), ref: 00418DF3
            • GetLastError.KERNEL32(?,?,00437158,0000000C), ref: 00418DFD
            • __dosmaperr.LIBCMT ref: 00418E04
            • __alloc_osfhnd.LIBCMT ref: 00418E25
            • __set_osfhnd.LIBCMT ref: 00418E4F
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ErrorFileLastType__alloc_osfhnd__dosmaperr__set_osfhnd
            • String ID:
            • API String ID: 43408053-0
            • Opcode ID: 7e24268851eb4119000948362b2353c0f6dc2b79362ee1b0ce904de55f2e14dc
            • Instruction ID: 4f3a6c1fe7ba61fe2d2ef8c73c2369b0029cc77993f59b43a3ebd5f932ec529f
            • Opcode Fuzzy Hash: 7e24268851eb4119000948362b2353c0f6dc2b79362ee1b0ce904de55f2e14dc
            • Instruction Fuzzy Hash: 3221F4316013059ACB119F69C8013DA7B60AF45328F28875FE4648B2D2CF7D85C1DF8C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __lock.LIBCMT ref: 0040FDED
              • Part of subcall function 00418999: __mtinitlocknum.LIBCMT ref: 004189AD
              • Part of subcall function 00418999: __amsg_exit.LIBCMT ref: 004189B9
              • Part of subcall function 00418999: EnterCriticalSection.KERNEL32(?,?,?,0041872F,00000004,004370D0,0000000C,0041A0F9,?,?,00000000,00000000,00000000,004197D3,00000001,00000214), ref: 004189C1
            • ___sbh_find_block.LIBCMT ref: 0040FDF8
            • ___sbh_free_block.LIBCMT ref: 0040FE07
            • HeapFree.KERNEL32(00000000,004011BF,00436E30,Function_0000FDCF,0041897A,00000000,004370F0,0000000C,004189B2,004011BF,?,?,0041872F,00000004,004370D0,0000000C), ref: 0040FE37
            • GetLastError.KERNEL32(?,0041872F,00000004,004370D0,0000000C,0041A0F9,?,?,00000000,00000000,00000000,004197D3,00000001,00000214), ref: 0040FE48
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
            • String ID:
            • API String ID: 2714421763-0
            • Opcode ID: 99583a4b5d0315750c4309ed014c9255a41a5303f428dafd6e1f724967448937
            • Instruction ID: 041529d8c119479831ecfd19b10828b34848f6675595699d38cac91702d059a2
            • Opcode Fuzzy Hash: 99583a4b5d0315750c4309ed014c9255a41a5303f428dafd6e1f724967448937
            • Instruction Fuzzy Hash: 510171B1800306AADB346BA2D80679F37609B00B15F20513FF104765E2DB7C85848ADC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: _getenv_strlen_strncpy
            • String ID: HG_TOP_DIR
            • API String ID: 3888170341-162980908
            • Opcode ID: 2fdf4c3e2f7890a8be98569dda38f4240f0105811f4f09c56aa9c175077dce96
            • Instruction ID: 48ab8f9f46f77439d62e6bd6fd47067b6f6f575b3cb9a11fb51264529897c3a8
            • Opcode Fuzzy Hash: 2fdf4c3e2f7890a8be98569dda38f4240f0105811f4f09c56aa9c175077dce96
            • Instruction Fuzzy Hash: 6C317370E04248AFCB14CF98C89176EBFB1EF45305F2480AAD4117B786D3796B80DB55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __decode_pointer.LIBCMT ref: 00415D65
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000000,00419685,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 004195F0
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000005,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 00419607
            • __decode_pointer.LIBCMT ref: 00415D90
              • Part of subcall function 004195E3: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 0041961C
              • Part of subcall function 004195E3: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0041962C
            • __decode_pointer.LIBCMT ref: 00415DB1
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __decode_pointer$Value$AddressHandleModuleProc
            • String ID: g
            • API String ID: 3610270016-30677878
            • Opcode ID: 6041c4c03c4e93a370b25ee82bf9898ed6733f78a047f851f8b1351f9c42f8d6
            • Instruction ID: 64d54c9cdd5d8fd46253627c80f15ba6a1dfed7a9986ef793257ab8ab88765c1
            • Opcode Fuzzy Hash: 6041c4c03c4e93a370b25ee82bf9898ed6733f78a047f851f8b1351f9c42f8d6
            • Instruction Fuzzy Hash: E811EC72404949EFDF26DFA4ED44AED3BA6FB44310F20811AFC6486172D73ADE949B18
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __decode_pointer.LIBCMT ref: 00415D65
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000000,00419685,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 004195F0
              • Part of subcall function 004195E3: TlsGetValue.KERNEL32(00000005,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 00419607
            • __decode_pointer.LIBCMT ref: 00415D90
              • Part of subcall function 004195E3: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 0041961C
              • Part of subcall function 004195E3: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0041962C
            • __decode_pointer.LIBCMT ref: 00415DB1
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __decode_pointer$Value$AddressHandleModuleProc
            • String ID: g
            • API String ID: 3610270016-30677878
            • Opcode ID: e38f14334b3b969e50ca3985b2d36a7bf1667041895529fd966efb8e1093d8b2
            • Instruction ID: 6d170daca5a07f2a57e5ec81311a26cae8bacdc48f5bc57a06a231949b2e27cb
            • Opcode Fuzzy Hash: e38f14334b3b969e50ca3985b2d36a7bf1667041895529fd966efb8e1093d8b2
            • Instruction Fuzzy Hash: A4111C72404548EFEF26DFA4DD44AED3BA6FB44310F20411AFC1486162D73ADE94DB48
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: _getenv_sprintf
            • String ID: %s\tmp$HG_TOP_DIR
            • API String ID: 2399524111-1812927091
            • Opcode ID: 0debb074570f87c8bd31008ebd84152334898afead533a3172abd8f28a42d7a5
            • Instruction ID: 3d56d919e3a971802c41bbafce8d72b1b5a6966fe1f1e369a8f770737cc79ce7
            • Opcode Fuzzy Hash: 0debb074570f87c8bd31008ebd84152334898afead533a3172abd8f28a42d7a5
            • Instruction Fuzzy Hash: 50E08661E40208B7C70096945C0261D7214D759304F607277F9056B2C0E17D9F14575F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00408C10: CharNextA.USER32(?,?,00408A4F,?,00408CC1,00408A4F,?,00000000,00000000,?,004086C0), ref: 00408C31
            • CharNextA.USER32(?,00408A4F,?,00000000,00000000,?,004086C0), ref: 00408CFC
            • CharNextA.USER32(00000000,?,00408A4F,?,00000000,00000000), ref: 00408D3A
            • CharNextA.USER32(00408A4F,?,00408A4F,?,00000000,00000000,?,004086C0), ref: 00408D53
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CharNext
            • String ID:
            • API String ID: 3213498283-0
            • Opcode ID: b60d6d9e2a5f99060c83255c1f033a2b1ad7bb04c622636a24d8f49a85aa97d7
            • Instruction ID: 9557b391400eb6962f2cc6271cb15414c5a8e18cca31089792725f627d0c63ec
            • Opcode Fuzzy Hash: b60d6d9e2a5f99060c83255c1f033a2b1ad7bb04c622636a24d8f49a85aa97d7
            • Instruction Fuzzy Hash: 4671FF74A05219DFCF04DFA4C9909AEBBB2BF89304F20816DD855BB395CB38A941CF94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004239F6
            • __isleadbyte_l.LIBCMT ref: 00423A2A
            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,A045FF98,?,00000000,?,?,?,00419096,?,?,00000002), ref: 00423A5B
            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,00419096,?,?,00000002), ref: 00423AC9
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 2e7d1b157371ff90d0e1bd9d39d5f1dda7986cda160315ac29e96f7c701d5574
            • Instruction ID: f83c0012dd0e5109aefc9328cc6263703439a26e42a585a7cb0794a334e92ccc
            • Opcode Fuzzy Hash: 2e7d1b157371ff90d0e1bd9d39d5f1dda7986cda160315ac29e96f7c701d5574
            • Instruction Fuzzy Hash: 8231C331700266EFDB20CF64E8859AB3BB4AF01312B54857BE4919B291D379DE80CB59
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e14f0954eb2d9cf804cf8b8b49e0d795571581d1a0f76fb1385838aaf2400320
            • Instruction ID: 163ebede55f0f19666e9a4c0fc65819d1782817f96851cfbafff2c0c7882e284
            • Opcode Fuzzy Hash: e14f0954eb2d9cf804cf8b8b49e0d795571581d1a0f76fb1385838aaf2400320
            • Instruction Fuzzy Hash: E62130B8600248EFCB10DF64D884B5E77B5AB85314F20817AF9099F380D73DDA80DB99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00419821: __getptd_noexit.LIBCMT ref: 00419822
              • Part of subcall function 00419821: __amsg_exit.LIBCMT ref: 0041982F
            • __amsg_exit.LIBCMT ref: 0041AD2C
            • __lock.LIBCMT ref: 0041AD3C
            • InterlockedDecrement.KERNEL32(?), ref: 0041AD59
            • InterlockedIncrement.KERNEL32(006013F8), ref: 0041AD84
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock
            • String ID:
            • API String ID: 2880340415-0
            • Opcode ID: 70e6f35d70f2c02dc6a5fd5238be7b649bef5c3837bab0c9be67092c2ede24c1
            • Instruction ID: e665a8067840ecceeed5e6fb91df35e506f400d98cd64ab42c247441dde30e50
            • Opcode Fuzzy Hash: 70e6f35d70f2c02dc6a5fd5238be7b649bef5c3837bab0c9be67092c2ede24c1
            • Instruction Fuzzy Hash: 4C01E172D02A119BC720AB65A4067CA7761AF0072AF14502BE800636D0C7BC5DD1CFDF
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __FF_MSGBANNER.LIBCMT ref: 0040FF7D
              • Part of subcall function 0041A5A1: __NMSG_WRITE.LIBCMT ref: 0041A5C8
              • Part of subcall function 0041A5A1: __NMSG_WRITE.LIBCMT ref: 0041A5D2
            • __NMSG_WRITE.LIBCMT ref: 0040FF84
              • Part of subcall function 0041A3E1: _strcpy_s.LIBCMT ref: 0041A44D
              • Part of subcall function 0041A3E1: __invoke_watson.LIBCMT ref: 0041A45E
              • Part of subcall function 0041A3E1: GetModuleFileNameA.KERNEL32(00000000,0043B8F9,00000104,?,004011BF,CServiceModule::IsInstalled()), ref: 0041A47A
              • Part of subcall function 0041A3E1: _strcpy_s.LIBCMT ref: 0041A48F
              • Part of subcall function 0041A3E1: __invoke_watson.LIBCMT ref: 0041A4A2
              • Part of subcall function 0041A3E1: _strlen.LIBCMT ref: 0041A4AB
              • Part of subcall function 0041A3E1: _strlen.LIBCMT ref: 0041A4B8
              • Part of subcall function 0041A3E1: __invoke_watson.LIBCMT ref: 0041A4E5
              • Part of subcall function 0040E84F: ___crtCorExitProcess.LIBCMT ref: 0040E853
              • Part of subcall function 0040E84F: ExitProcess.KERNEL32 ref: 0040E85D
            • HeapAlloc.KERNEL32(00000000,?), ref: 0040FFB1
            • HeapAlloc.KERNEL32(00000000,?), ref: 0040FFE1
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __invoke_watson$AllocExitHeapProcess_strcpy_s_strlen$FileModuleName___crt
            • String ID:
            • API String ID: 2259262434-0
            • Opcode ID: 761ea5e8b47d6fcd93f54cd72b2c77e59199a80f92e11be54c5c251163232364
            • Instruction ID: 14e8e55b641a901c0fef0c7409b9c747e7e1561dbc6498e044053ab2f0771555
            • Opcode Fuzzy Hash: 761ea5e8b47d6fcd93f54cd72b2c77e59199a80f92e11be54c5c251163232364
            • Instruction Fuzzy Hash: ACF0CD3260A2222ADE316725AC41B9B3648EB12320F24603BF900F62E1DB789C4482CD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00403474
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00403486
            Strings
            • get_num_child. count=%d, xrefs: 004034A4
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 0040348C
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: e:\scada_win\app\serviceminit\minit.cxx$get_num_child. count=%d
            • API String ID: 2028075725-2975629567
            • Opcode ID: a956a4226a8c687a5c7d40438d30584310b704d55eedfa0474a12d76ed91d528
            • Instruction ID: 560f05025681c3f6b1e0e844718a48e12af49ef0668edb0a484ebfb3870c91e9
            • Opcode Fuzzy Hash: a956a4226a8c687a5c7d40438d30584310b704d55eedfa0474a12d76ed91d528
            • Instruction Fuzzy Hash: 8201D271940108EFDB00DF94D99975CBFB0BB04309F20A1AAD4806B780C3780A68DF0F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0040EBB4: _doexit.LIBCMT ref: 0040EBBC
            • ___set_flsgetvalue.LIBCMT ref: 0040F849
              • Part of subcall function 0041966A: TlsGetValue.KERNEL32(004197AD,?,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 00419670
              • Part of subcall function 0041966A: __decode_pointer.LIBCMT ref: 00419680
              • Part of subcall function 0041966A: TlsSetValue.KERNEL32(00000000,?,0040123C,?,004011BF,CServiceModule::IsInstalled()), ref: 0041968D
              • Part of subcall function 0041964F: TlsGetValue.KERNEL32(?,0040F859,00000000,?), ref: 00419659
            • __freefls@4.LIBCMT ref: 0040F894
              • Part of subcall function 00419694: __decode_pointer.LIBCMT ref: 004196A2
            • GetLastError.KERNEL32(00000000,?,00000000,?), ref: 0040F870
            • ExitThread.KERNEL32 ref: 0040F877
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: Value$__decode_pointer$ErrorExitLastThread___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 297350007-0
            • Opcode ID: a7f4e0e417c571a1ff23461d911e23802ba1fdb64609b92f6f302fcc39841b15
            • Instruction ID: c6a5fbc05daaf0c9f58f0f2e86359f62c22be9e0238c3df76128c5f16aa842a3
            • Opcode Fuzzy Hash: a7f4e0e417c571a1ff23461d911e23802ba1fdb64609b92f6f302fcc39841b15
            • Instruction Fuzzy Hash: 2D0162315003009BD714BBB2D95999E77A9AF48708F10C43EF844A26A2D73DCC95CB6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00401A23
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401A35
            Strings
            • CServiceModule::ServiceMinit(), xrefs: 00401A4F
            • .\ServiceMinit.cpp, xrefs: 00401A3B
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: .\ServiceMinit.cpp$CServiceModule::ServiceMinit()
            • API String ID: 2028075725-1234673413
            • Opcode ID: 54856f421fb916c83c3a45df1b973c11cd44b053d8a809807075efa54278d12f
            • Instruction ID: 47460eb022e1316bbeafb88790dc6490f941b409b8538a26d2faa4177699af50
            • Opcode Fuzzy Hash: 54856f421fb916c83c3a45df1b973c11cd44b053d8a809807075efa54278d12f
            • Instruction Fuzzy Hash: D2F082722C02849BC700BB91BE4971537B56318708F10703AF4C551AB1D3BD54A8DF1F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CloseExitHandleThread__freeptd__getptd_noexit
            • String ID:
            • API String ID: 1217956143-0
            • Opcode ID: cdc35e4d0b79643a97ee4cc99639e193bec2bdfeb99ac71bf24bfecc8f3f6dd7
            • Instruction ID: 8db6b2e349af711b4aa40c5178ab46e092a7c9e2b34bee4cb0c150b09ccb4caf
            • Opcode Fuzzy Hash: cdc35e4d0b79643a97ee4cc99639e193bec2bdfeb99ac71bf24bfecc8f3f6dd7
            • Instruction Fuzzy Hash: EFE0DF32005A015FE3322B746C9964E3A669F06731B24173FF414F65D1DB28CC89C3AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 00401663
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 00401675
            Strings
            • .\ServiceMinit.cpp, xrefs: 0040167B
            • CServiceModule::_ServiceMain(), xrefs: 0040168F
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: .\ServiceMinit.cpp$CServiceModule::_ServiceMain()
            • API String ID: 2028075725-2060293115
            • Opcode ID: f78be0c0d9a887e08093604bc5698cc944fc4533b881d15d3764718530ac8833
            • Instruction ID: ed0b46dba125d02943cee9d83eef4b6cf3e7400746c103ed76934b137692e10c
            • Opcode Fuzzy Hash: f78be0c0d9a887e08093604bc5698cc944fc4533b881d15d3764718530ac8833
            • Instruction Fuzzy Hash: 1AE0E57618024497C700BF95AE0AA4A3BA4571C704F04B03AF4C4526A0D77890A8DB2F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InitializeCriticalSection.KERNEL32(0043AA5C), ref: 004033D7
            • EnterCriticalSection.KERNEL32(0043AA5C), ref: 004033E9
            Strings
            • spawn success. pid is %d, xrefs: 00403407
            • e:\scada_win\app\serviceminit\minit.cxx, xrefs: 004033EF
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitialize
            • String ID: e:\scada_win\app\serviceminit\minit.cxx$spawn success. pid is %d
            • API String ID: 2028075725-2531702437
            • Opcode ID: fd069e1a6476a274828a6d8426c90d9b9711a717088cc0da41dcd899bd410830
            • Instruction ID: cbffede9149f936e7e1e5037bcdafc11cde24cb4e43064765f877319e2f3e144
            • Opcode Fuzzy Hash: fd069e1a6476a274828a6d8426c90d9b9711a717088cc0da41dcd899bd410830
            • Instruction Fuzzy Hash: 44E092715802445BD701AF40AD597183B619719309F1471AAFCC461691D7B90524DF1F
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID:
            • String ID: *GC
            • API String ID: 0-2591478732
            • Opcode ID: 899f2fd770ecda5790780b15f756a49389b44eb40c263f7b4bcaf768877d6680
            • Instruction ID: 449fc62e2e3f996e6d88959a5192dfebc085f3dc8bc716bab64d3aebb726cd7a
            • Opcode Fuzzy Hash: 899f2fd770ecda5790780b15f756a49389b44eb40c263f7b4bcaf768877d6680
            • Instruction Fuzzy Hash: 96F0C271A00218FADF009F10FC82BB93B74A708758F508016FA45C80D1E2F5D6E4D798
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: __isspace_l
            • String ID: (EC$,@
            • API String ID: 1989754883-981309927
            • Opcode ID: 70c465e7f1e0e3bff1becb53d6bb05b14e292cae5bb090d8b2b437d6954634e8
            • Instruction ID: a7fc81e703caa7090f2c6d5c096ca2fd5875f3a0f576a76e3b6c180d889ac8e2
            • Opcode Fuzzy Hash: 70c465e7f1e0e3bff1becb53d6bb05b14e292cae5bb090d8b2b437d6954634e8
            • Instruction Fuzzy Hash: 8ED0A931008200AECA259B16EC4172437A0AB80726F24686EF084092F0CF3E98B4EA09
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • std::exception::exception.LIBCMTD ref: 0040AB8A
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: std::exception::exception
            • String ID: ^u@$^u@
            • API String ID: 2807920213-2155642463
            • Opcode ID: 82cee07db4e1ed6a6c516daf18cef7e0c36fb099f36d18b2374f95c4850e8236
            • Instruction ID: b76e22428f4f64538be8f71ae1e36aa5bd2ee2e88b086aee79604f42fd5199d4
            • Opcode Fuzzy Hash: 82cee07db4e1ed6a6c516daf18cef7e0c36fb099f36d18b2374f95c4850e8236
            • Instruction Fuzzy Hash: 73C04C7091910CFBCB04DB89E94285DB7F9DB45314B1001EDB80863341DA316F1096D9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00000000,F0AA0F6A,?,?,?,?,?,?,?,?,?,00000000,0042F128,000000FF,?,00408A0E), ref: 00408F6E
            • CharNextA.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0042F128,000000FF), ref: 00408FE6
              • Part of subcall function 004092C0: CharNextA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0042F128,000000FF), ref: 004092CD
            • CharNextA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0042F128,000000FF), ref: 0040910E
            Memory Dump Source
            • Source File: 00000006.00000002.1852964732.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.1852938784.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853005194.0000000000430000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853031966.0000000000439000.00000004.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000006.00000002.1853055527.000000000043D000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_ServiceMinit.jbxd
            Similarity
            • API ID: CharNext$lstrlen
            • String ID:
            • API String ID: 2675299387-0
            • Opcode ID: 0b18a32e85f074cdad813391665cc51a753f210a69f9d5e7238c3116c3cd8488
            • Instruction ID: 670d16859cf8b28671a42e11e53c5edc38fd4b113d9175807d0520915eef3cab
            • Opcode Fuzzy Hash: 0b18a32e85f074cdad813391665cc51a753f210a69f9d5e7238c3116c3cd8488
            • Instruction Fuzzy Hash: BF71EB74E04109DFDB14DFE4C894AAEB7B1EF49304F20816AE822BB396D7395D46CB58
            Uniqueness

            Uniqueness Score: -1.00%