Edit tour

Windows Analysis Report
FortiClientVPNOnlineInstaller.exe

Overview

General Information

Sample name:FortiClientVPNOnlineInstaller.exe
Analysis ID:1360892
MD5:9bfa08538f94a78395b116666e90606b
SHA1:9c62f61abded758772da22c16f825cdf40f00f92
SHA256:d4ba0b587cccc005bc37ad17817fc4dbd123d357eb34ddf6b1dd63fa57343f2f

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • FortiClientVPNOnlineInstaller.exe (PID: 4620 cmdline: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exe MD5: 9BFA08538F94A78395B116666E90606B)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: FortiClientVPNOnlineInstaller.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\FCTInstall.log
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: certificate valid
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.98Cache-Control: no-cacheContent-Length: 464
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.108Cache-Control: no-cacheContent-Length: 464
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.108Cache-Control: no-cacheContent-Length: 472
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.98Cache-Control: no-cacheContent-Length: 472
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.99Cache-Control: no-cacheContent-Length: 472
Source: global trafficHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 208.184.237.75Cache-Control: no-cacheContent-Length: 472
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownTCP traffic detected without corresponding DNS query: 173.243.138.108
Source: unknownDNS traffic detected: queries for: forticlient.fortinet.net
Source: unknownHTTP traffic detected: POST /fdsupdate HTTP/1.1User-Agent: Mozilla/4.0 (compatible; FCT 7.2.2; Windows NT 5.1)Host: 173.243.138.98Cache-Control: no-cacheContent-Length: 464
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE@1/4@2/43
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeMutant created: \Sessions\1\BaseNamedObjects\Global\FC_{22CD96BF-E5B0-41d8-83ED-C73F9BBF9FA8}
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeMutant created: \Sessions\1\BaseNamedObjects\Global\FC_{4E84B682-0B1B-4826-AA4C-9241DE3920F7}
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\FCTInstall.log
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: certificate valid
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: FortiClientVPNOnlineInstaller.exeStatic file information: File size 4150848 > 1048576
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2ec200
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: FortiClientVPNOnlineInstaller.exeStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeFile created: C:\Users\user\AppData\Local\Temp\FCTInstall.log
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeFile opened: PhysicalDrive0
Source: C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exeProcess information queried: ProcessInformation
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin HookLogin HookBinary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://173.243.138.98/fdsupdate0%Avira URL Cloudsafe
http://173.243.138.108/fdsupdate0%Avira URL Cloudsafe
http://173.243.138.99/fdsupdate0%Avira URL Cloudsafe
http://208.184.237.75/fdsupdate0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
forticlient.fortinet.net
173.243.138.98
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://173.243.138.99/fdsupdatefalse
    • Avira URL Cloud: safe
    unknown
    http://173.243.138.98/fdsupdatefalse
    • Avira URL Cloud: safe
    unknown
    http://173.243.138.108/fdsupdatefalse
    • Avira URL Cloud: safe
    unknown
    http://208.184.237.75/fdsupdatefalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    173.243.138.98
    forticlient.fortinet.netUnited States
    40934FORTINETUSfalse
    173.243.138.99
    unknownUnited States
    40934FORTINETUSfalse
    173.243.138.108
    unknownUnited States
    40934FORTINETUSfalse
    208.184.237.75
    unknownUnited States
    17025ZAYO-CUSTOMER-17025USfalse
    Joe Sandbox version:38.0.0 Ammolite
    Analysis ID:1360892
    Start date and time:2023-12-12 23:18:23 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsinteractivecookbook.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    Analysis Mode:stream
    Analysis stop reason:Timeout
    Sample name:FortiClientVPNOnlineInstaller.exe
    Detection:CLEAN
    Classification:clean1.winEXE@1/4@2/43
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • VT rate limit hit for: FortiClientVPNOnlineInstaller.exe
    Process:C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):1156
    Entropy (8bit):4.687533735098527
    Encrypted:false
    SSDEEP:
    MD5:6A4509C88DAAB8C0DDBA9FB88FB8C156
    SHA1:3AF8086C84A61827B4EE31F300253D283D8C7F4A
    SHA-256:716E111FA236DDD28BA251759F1D38CBD91E21193FD3364045FBC12982D49693
    SHA-512:8729E28478BCEC12C5BD3491F8EFAFE7B77AF7AB5C47A5B7EAB0C76B83561BBD42F96D14F8AA9C10D1F0731AE04F1757BA07BDC30EF6FDEF8D6353938BAB3941
    Malicious:false
    Reputation:low
    Preview:Wed Dec 13 01:02:42 2023 - Server list:..Wed Dec 13 01:02:42 2023 - .173.243.138.108 TZ1..Wed Dec 13 01:02:42 2023 - .173.243.138.98 TZ6..Wed Dec 13 01:02:42 2023 - .173.243.138.99 TZ9..Wed Dec 13 01:02:42 2023 - .208.184.237.75 TZ9..Wed Dec 13 01:02:42 2023 - begin download...Wed Dec 13 01:02:42 2023 - downloading server list...Wed Dec 13 01:02:42 2023 - downloading image table, server 173.243.138.108..Wed Dec 13 01:02:44 2023 - Highest available image found: 07002000FIMG03028-00002.00002...Wed Dec 13 01:02:44 2023 - This image is version: 7.2.2...Wed Dec 13 01:02:44 2023 - downloading image 07002000FIMG03028-00002.00002..Wed Dec 13 01:02:44 2023 - downloading image from server: 173.243.138.108..Wed Dec 13 01:02:46 2023 - downloading image 07002000FIMG03028-00002.00002..Wed Dec 13 01:02:46 2023 - downloading image from server: 173.243.138.98..Wed Dec 13 01:02:46 2023 - downloading image 07002000FIMG03028-00002.00002..Wed Dec 13 01:02:46 2023 - downloading image from server: 173.243.13
    Process:C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exe
    File Type:data
    Category:modified
    Size (bytes):12615808
    Entropy (8bit):7.992723359901509
    Encrypted:true
    SSDEEP:
    MD5:48C4BE26935FA6A1840135D4D361B638
    SHA1:450AD3E1F4E3D998E245E2F6D622811CB3B109BE
    SHA-256:D5002400B927200004C048EE1F8C51D2BD5C8D267D74965522FA5CE8C51F7D88
    SHA-512:FE45A43676BE77A424470777024CBADF5558B50083B7F4E3A79870DB150DECD98596EE2E1E5C00A058FADDCCE20A5FA1B47BAF751D14C1B661D70A767D3C95FD
    Malicious:false
    Reputation:low
    Preview:FIMGFirmware Image......02002231004172628030............0700200000000.......MR2-GA-P2........................................*D.83T...u...\....I,.l...D.?.*W......7.}6."N.,F......t.O..E.......5.....{.y."......3H.0.\.k......M.+.x..>.N.........ch..'.0.gm.8.:.].:..\....7KU.B.>.V.......o....r......K`.K..h.)^.xp...1.*N...CdI,;D.%..T.ec-....N3N....E...S.f.t..y...0...8.\.;:.........f.....s.ugG.6(.....:...!N..>.<...=..Ye.Y.g|...Bi{....0h......i.>..~.q.......o.H.o...8(..K%L!.=!3*.~8..O..:.\...bO..71......e.<0.)~..l......i..{.0....P.h...........!.rb.~%......A.WZ..y^....t...F../~..|.....xL..8.g....:..t\..g."*.....G.B2...1..IUp.T?'.o.../m,.7_. -..va1.pE..y.?S?..&....s={4G .....k.~...... ..Ne...v...|.`T.....m?..g*f..~...J_.p..&Nv..1.a..{.e"./Ez?..OG.eHk..D..............P.=.$.......G.|7.d,.%|...L.%._.\...#...;..f...g9+.;.q....x..8Q.....N...9w....E.E2.....O;..-....e*..+-v._..Z...'.x...V./..p6.c-T...V..kp.3d.a.....F........1.5....w..i..".:...5
    Process:C:\Users\user\Desktop\FortiClientVPNOnlineInstaller.exe
    File Type:ASCII text
    Category:dropped
    Size (bytes):957244
    Entropy (8bit):4.0246897048554695
    Encrypted:false
    SSDEEP:
    MD5:924DA643ACB63F322605C53E7C3514FA
    SHA1:2E63DD2205939890F716CFA289F48B8DAF6C7F6C
    SHA-256:F1F7E735F17D7A166D0563A85094698FD10595F0C7E5DB19564D7DE4F8582EB2
    SHA-512:6AE1481A1A13C9EFCA3752720BC14791DE8EA375842B9453C541EADA6358F0EBFA61C674AD170C30445D8F1B3A96998B76A034C7658F7174614CB66DA3A0E829
    Malicious:false
    Reputation:low
    Preview:L FAP FAP11C FIMG 5.0.7 05000000FIMG05005-00000.00007 MR0-GA-P07.L FAP FAP11C FIMG 5.0.8 05000000FIMG05005-00000.00008 MR0-GA-P08.L FAP FAP11C FIMG 5.0.9 05000000FIMG05005-00000.00009 MR0-GA-P09.L FAP FAP11C FIMG 5.0.10 05000000FIMG05005-00000.00010 MR0-GA-P10.L FAP FAP11C FIMG 5.2.0 05002000FIMG05005-00002.00000 MR0-GA-P00.L FAP FAP11C FIMG 5.2.2 05002000FIMG05005-00002.00002 MR0-GA-P02.L FAP FAP11C FIMG 5.2.3 05002000FIMG05005-00002.00003 MR0-GA-P03.L FAP FAP11C FIMG 5.2.4 05002000FIMG05005-00002.00004 MR0-GA-P04.L FAP FAP11C FIMG 5.2.6 05002000FIMG05005-00002.00006 MR0-GA-P06.L FAP FAP11C FIMG 5.2.7 05002000FIMG05005-00002.00007 MR0-GA-P07.L FAP FAP11C FIMG 5.4.0 05004000FIMG05005-00004.00000 MR0-GA-P00.L FAP FAP11C FIMG 5.4.1 05004000FIMG05005-00004.00001 MR0-GA-P01.L FAP FAP11C FIMG 5.4.2 05004000FIMG05005-00004.00002 MR0-GA-P02.L FAP FAP11C FIMG 5.4.3 05004000FIMG05005-00004.00003 MR0-GA-P03.L FAP FAP11C FIMG 5.4.4 05004000FIMG05005-00004.00004 MR0-GA-P04.L FAP FAP11C FIMG 5.6.0
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.796242445608833
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:FortiClientVPNOnlineInstaller.exe
    File size:4'150'848 bytes
    MD5:9bfa08538f94a78395b116666e90606b
    SHA1:9c62f61abded758772da22c16f825cdf40f00f92
    SHA256:d4ba0b587cccc005bc37ad17817fc4dbd123d357eb34ddf6b1dd63fa57343f2f
    SHA512:cfb1d911786c0e4b55e5d45bf392ed30a5f4c6843ce4d6ddfa3af3f219ce341e76ea376db2ea0cbf3421364c49920241d85075b062585a127d144942dc5e40c2
    SSDEEP:49152:g9enMTO4Hht2GrgsTeu8T1a0ymq0O493Ej4LA6aKIpmb4RV/TVXUrPhTHlzuw2t3:g9ensr3a4hms4F+7XVXgTHYJOE/
    TLSH:8A169E12FFC28171E9E7417912FAB77E1E3DA830973485D387D059AA89301C17A3EB96
    File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$........e.)C.zzC.zzC.zz...zQ.zz...z..zz...z^.zz.z.zJ.zz.z~{P.zz.zy{X.zz...zF.zzC.zz[.zz.m~{..zzW{s{u.zz.z.{#.zz...zG.zzC.{z..zzW{~{G.z
    Icon Hash:785231641392b747
    Entrypoint:0x4e36b0
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Time Stamp:0x651D8533 [Wed Oct 4 15:30:59 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:7e218f80af54cd99fa3c7a5cdc029310
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 07/06/2021 02:00:00 10/07/2024 01:59:59
    Subject Chain
    • CN=Fortinet Technologies (Canada) ULC, O=Fortinet Technologies (Canada) ULC, L=Burnaby, S=British Columbia, C=CA
    Version:3
    Thumbprint MD5:0FC41099213427CBB151F9BCEB0999A3
    Thumbprint SHA-1:0F38EA0AA959EA336C743AE18DC9E60A4FD58665
    Thumbprint SHA-256:2946B2BB26811170F8E10F1643DDC020888162D9F53073100FE5A408872285EE
    Serial:0862DFFEC6E9332BFA93B2F187863642
    Instruction
    call 00007F49FC9C0B70h
    jmp 00007F49FC9C0267h
    push ebp
    mov ebp, esp
    pop ebp
    jmp 00007F49FC9BF8DEh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    call 00007F49FC9C0467h
    push 00000000h
    call 00007F49FC9BFADAh
    pop ecx
    test al, al
    je 00007F49FC9C0450h
    push 004E3780h
    call 00007F49FC9BFC7Bh
    pop ecx
    xor eax, eax
    ret
    push 00000007h
    call 00007F49FC9C087Dh
    int3
    push esi
    push edi
    push 00000FA0h
    push 007AB224h
    call dword ptr [006EE230h]
    push 006F71C0h
    call dword ptr [006EE044h]
    mov esi, eax
    test esi, esi
    jne 00007F49FC9C0453h
    push 007864F0h
    call dword ptr [006EE044h]
    mov esi, eax
    test esi, esi
    je 00007F49FC9C0488h
    push 006F7204h
    push esi
    call dword ptr [006EE048h]
    push 006F7220h
    push esi
    mov edi, eax
    call dword ptr [006EE048h]
    test edi, edi
    je 00007F49FC9C0454h
    test eax, eax
    je 00007F49FC9C0450h
    mov dword ptr [007AB23Ch], edi
    mov dword ptr [007AB240h], eax
    pop edi
    pop esi
    ret
    xor eax, eax
    push eax
    push eax
    push 00000001h
    push eax
    call dword ptr [006EE0A4h]
    mov dword ptr [007AB220h], eax
    test eax, eax
    jne 00007F49FC9C0429h
    push 00000007h
    call 00007F49FC9C07FBh
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x3a13600x624.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x3a19840x3c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b10000x29ec8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x3f2e000x2840.reloc
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3db0000x22304.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x3932100x54.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x3933000x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f71000x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2ee0000x3f0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x39f9000x240.rdata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x2ec12d0x2ec200unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x2ee0000xb516c0xb5200False0.41724896480331264data5.662026650947333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3a40000xb4540x4c00False0.3961245888157895data5.426205803518961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .didat0x3b00000x4340x600False0.3580729166666667data3.655828090476488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x3b10000x29ec80x2a000False0.6871628534226191data6.92369773764398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x3db0000x223040x22400False0.6246222057481752data6.690192436624053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    REGISTRY0x3b4ff80xc3ASCII text, with CRLF line terminators0.6512820512820513
    RT_ICON0x3b55a80x3d9PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced1.0111675126903554
    RT_ICON0x3b59880x725PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced1.0060142154182614
    RT_ICON0x3b60b00xb07PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.003896563939072
    RT_ICON0x3b6bb80x14e3PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced1.002057228352347
    RT_ICON0x3b80a00x1facPNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced1.0013566847557966
    RT_ICON0x3ba0500x3877PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced1.0007609823590453
    RT_ICON0x3bd8c80x554bPNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced1.0007327684909548
    RT_ICON0x3c2e180xac4dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9978915867510032
    RT_ICON0x3cdae00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.2647849462365591
    RT_MENU0x3b26080x22Matlab v4 mat-file (little endian) \326S\210m\337\216\324\232GS\032}, numeric, rows 7143568, columns 6881377, imaginaryChineseTaiwan1.1764705882352942
    RT_MENU0x3b4fa80x4cMatlab v4 mat-file (little endian) A, numeric, rows 7143568, columns 6881377, imaginaryDanishDenmark0.881578947368421
    RT_MENU0x3b33d80x48Matlab v4 mat-file (little endian) S, numeric, rows 7143568, columns 6881377, imaginaryGermanGermany0.8888888888888888
    RT_MENU0x3b20b80x42Matlab v4 mat-file (little endian) C, numeric, rows 7143568, columns 6881377, imaginaryEnglishUnited States0.9090909090909091
    RT_MENU0x3b2f980x5aMatlab v4 mat-file (little endian) A, numeric, rows 7143568, columns 6881377, imaginaryFrenchFrance0.8111111111111111
    RT_MENU0x3b43d80x52Matlab v4 mat-file (little endian) S, numeric, rows 7143568, columns 6881377, imaginaryHungarianHungary0.8902439024390244
    RT_MENU0x3b2ba00x38Matlab v4 mat-file (little endian) \2750\3250\3100\2460\2470\2420\2420\3030\3270\3070\3740\3100\2550\3430\3630\2730\3530, numeric, rows 7143568, columns 6881377, imaginaryJapaneseJapan1.0714285714285714
    RT_MENU0x3b28f00x30Matlab v4 mat-file (little endian) \214\301\004\325\270\322\350\306\264\305 , numeric, rows 7143568, columns 6881377, imaginaryKoreanNorth Korea1.1458333333333333
    RT_MENU0x3b28f00x30Matlab v4 mat-file (little endian) \214\301\004\325\270\322\350\306\264\305 , numeric, rows 7143568, columns 6881377, imaginaryKoreanSouth Korea1.1458333333333333
    RT_MENU0x3b3c280x5aMatlab v4 mat-file (little endian) C, numeric, rows 7143568, columns 6881377, imaginaryPortugueseBrazil0.8222222222222222
    RT_MENU0x3b40480x42dataRussianRussia0.9393939393939394
    RT_MENU0x3b47b00x4eMatlab v4 mat-file (little endian) K, numeric, rows 7143568, columns 6881377, imaginaryEstonianEstonia0.8076923076923077
    RT_MENU0x3b4bb80x66Matlab v4 mat-file (little endian) A, numeric, rows 7143568, columns 6881377, imaginaryLithuanianLithuania0.7941176470588235
    RT_MENU0x3b23700x22Matlab v4 mat-file (little endian) \326S\210mo\217\366NGS\247~, numeric, rows 7143568, columns 6881377, imaginaryChineseChina1.1470588235294117
    RT_MENU0x3b38080x5aMatlab v4 mat-file (little endian) C, numeric, rows 7143568, columns 6881377, imaginary0.8444444444444444
    RT_DIALOG0x3b23980x100dataChineseTaiwan0.7109375
    RT_DIALOG0x3b4c200x128dataDanishDenmark0.6587837837837838
    RT_DIALOG0x3b2ff80x12edataGermanGermany0.6423841059602649
    RT_DIALOG0x3b1d200x110dataEnglishUnited States0.6617647058823529
    RT_DIALOG0x3b2bd80x112dataFrenchFrance0.6788321167883211
    RT_DIALOG0x3b40900x10edataHungarianHungary0.7111111111111111
    RT_DIALOG0x3b29200xf8dataJapaneseJapan0.7620967741935484
    RT_DIALOG0x3b26300xf4dataKoreanNorth Korea0.7622950819672131
    RT_DIALOG0x3b26300xf4dataKoreanSouth Korea0.7622950819672131
    RT_DIALOG0x3b38680x11adataPortugueseBrazil0.6595744680851063
    RT_DIALOG0x3b3c880x114dataRussianRussia0.6884057971014492
    RT_DIALOG0x3b44300x114dataEstonianEstonia0.6666666666666666
    RT_DIALOG0x3b48000x126dataLithuanianLithuania0.6462585034013606
    RT_DIALOG0x3b21000x100dataChineseChina0.71484375
    RT_DIALOG0x3b34200x122data0.6620689655172414
    RT_DIALOG0x3b24980x16cdataChineseTaiwan0.6868131868131868
    RT_DIALOG0x3b4d480x25edataDanishDenmark0.504950495049505
    RT_DIALOG0x3b31280x2b0dataGermanGermany0.48691860465116277
    RT_DIALOG0x3b1e300x282dataEnglishUnited States0.48442367601246106
    RT_DIALOG0x3b2cf00x2a6dataFrenchFrance0.48672566371681414
    RT_DIALOG0x3b41a00x238dataHungarianHungary0.5264084507042254
    RT_DIALOG0x3b2a180x188dataJapaneseJapan0.6760204081632653
    RT_DIALOG0x3b27280x1c2dataKoreanNorth Korea0.6711111111111111
    RT_DIALOG0x3b27280x1c2dataKoreanSouth Korea0.6711111111111111
    RT_DIALOG0x3b39880x29edataPortugueseBrazil0.48059701492537316
    RT_DIALOG0x3b3da00x2a6dataRussianRussia0.4911504424778761
    RT_DIALOG0x3b45480x268dataEstonianEstonia0.5081168831168831
    RT_DIALOG0x3b49280x28edataLithuanianLithuania0.48623853211009177
    RT_DIALOG0x3b22000x170dataChineseChina0.6766304347826086
    RT_DIALOG0x3b35480x2badata0.4584527220630373
    RT_STRING0x3cf5400x10cdataChineseTaiwan0.7873134328358209
    RT_STRING0x3d9d380x2b0dataDanishDenmark0.4055232558139535
    RT_STRING0x3d22780x30edataGermanGermany0.4143222506393862
    RT_STRING0x3cdde00x26adataEnglishUnited States0.42718446601941745
    RT_STRING0x3d10080x2f0dataFrenchFrance0.4162234042553192
    RT_STRING0x3d69a00x2acdataHungarianHungary0.4853801169590643
    RT_STRING0x3d06680x176dataJapaneseJapan0.5855614973262032
    RT_STRING0x3cfc800x172dataKoreanNorth Korea0.7216216216216216
    RT_STRING0x3cfc800x172dataKoreanSouth Korea0.7216216216216216
    RT_STRING0x3d47980x2cedataPortugueseBrazil0.41225626740947074
    RT_STRING0x3d59400x25edataRussianRussia0.5181518151815182
    RT_STRING0x3d7ab00x2a2dataEstonianEstonia0.4406528189910979
    RT_STRING0x3d8bc00x26edataLithuanianLithuania0.4533762057877814
    RT_STRING0x3cee180x108dataChineseChina0.7727272727272727
    RT_STRING0x3d35500x2e4data0.40945945945945944
    RT_STRING0x3cf8400x14adataChineseTaiwan0.696969696969697
    RT_STRING0x3da3280x3acdataDanishDenmark0.3553191489361702
    RT_STRING0x3d28f00x3c6dataGermanGermany0.3944099378881988
    RT_STRING0x3ce3200x354dataEnglishUnited States0.3673708920187793
    RT_STRING0x3d16500x3d6dataFrenchFrance0.36761710794297353
    RT_STRING0x3d6f480x3b2dataHungarianHungary0.4143763213530655
    RT_STRING0x3d09800x1e6dataJapaneseJapan0.5946502057613169
    RT_STRING0x3cfff00x1bcdataKoreanNorth Korea0.6036036036036037
    RT_STRING0x3cfff00x1bcdataKoreanSouth Korea0.6036036036036037
    RT_STRING0x3d4d880x3a8dataPortugueseBrazil0.3888888888888889
    RT_STRING0x3d5e980x362dataRussianRussia0.4214780600461894
    RT_STRING0x3d80280x3c2dataEstonianEstonia0.35550935550935553
    RT_STRING0x3d91280x36adataLithuanianLithuania0.41533180778032036
    RT_STRING0x3cf1100x14cdataChineseChina0.6897590361445783
    RT_STRING0x3d3b480x39adata0.36984815618221256
    RT_STRING0x3cf9900x2eadataChineseTaiwan0.5294906166219839
    RT_STRING0x3da6d80x7f0dataDanishDenmark0.2785433070866142
    RT_STRING0x3d2cb80x896dataGermanGermany0.26524112829845314
    RT_STRING0x3ce6780x79cdataEnglishUnited States0.27618069815195073
    RT_STRING0x3d1a280x84adataFrenchFrance0.2822808671065033
    RT_STRING0x3d73000x7aedataHungarianHungary0.32044760935910477
    RT_STRING0x3d0b680x49adataJapaneseJapan0.44482173174872663
    RT_STRING0x3d01b00x4b4dataKoreanNorth Korea0.48588039867109634
    RT_STRING0x3d01b00x4b4dataKoreanSouth Korea0.48588039867109634
    RT_STRING0x3d51300x810dataPortugueseBrazil0.2916666666666667
    RT_STRING0x3d62000x79cdataRussianRussia0.3203285420944558
    RT_STRING0x3d83f00x7d0dataEstonianEstonia0.2765
    RT_STRING0x3d94980x8a0dataLithuanianLithuania0.291213768115942
    RT_STRING0x3cf2600x2e0dataChineseChina0.529891304347826
    RT_STRING0x3d3ee80x8aadata0.2799819657348963
    RT_STRING0x3cf6500x1f0dataChineseTaiwan0.6290322580645161
    RT_STRING0x3d9fe80x340dataDanishDenmark0.390625
    RT_STRING0x3d25880x368dataGermanGermany0.4013761467889908
    RT_STRING0x3ce0500x2ccdataEnglishUnited States0.41480446927374304
    RT_STRING0x3d12f80x354dataFrenchFrance0.41431924882629106
    RT_STRING0x3d6c500x2f8dataHungarianHungary0.4644736842105263
    RT_STRING0x3d07e00x19cdataJapaneseJapan0.6310679611650486
    RT_STRING0x3cfdf80x1f4dataKoreanNorth Korea0.702
    RT_STRING0x3cfdf80x1f4dataKoreanSouth Korea0.702
    RT_STRING0x3d4a680x31cdataPortugueseBrazil0.42085427135678394
    RT_STRING0x3d5ba00x2f6dataRussianRussia0.45910290237467016
    RT_STRING0x3d7d580x2d0dataEstonianEstonia0.42777777777777776
    RT_STRING0x3d8e300x2f2dataLithuanianLithuania0.4403183023872679
    RT_STRING0x3cef200x1eadataChineseChina0.6224489795918368
    RT_STRING0x3d38380x30edata0.40281329923273657
    RT_GROUP_ICON0x3cda680x76data0.7372881355932204
    RT_GROUP_ICON0x3cddc80x14data1.25
    RT_MANIFEST0x3b50c00x4e3XML 1.0 document, ASCII text, with CRLF line terminators0.4580335731414868
    DLLImport
    KERNEL32.dllVerSetConditionMask, GetCommandLineW, DecodePointer, CloseHandle, RaiseException, GetLastError, SetLastError, InitializeCriticalSectionEx, DeleteCriticalSection, CreateMutexW, OpenMutexW, GetCurrentProcess, GetCurrentProcessId, OpenProcess, GetSystemDirectoryW, FreeLibrary, GetModuleFileNameW, GetModuleHandleW, GetProcAddress, LoadLibraryExW, LoadResource, SizeofResource, SetDefaultDllDirectories, LocalFree, lstrcmpiW, LoadLibraryW, FindResourceW, SetSearchPathMode, VerifyVersionInfoW, MultiByteToWideChar, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, GetFileAttributesW, SetFileAttributesW, SetEvent, WaitForSingleObject, CreateEventW, TerminateThread, ProcessIdToSessionId, Sleep, CreateThread, GetTickCount, WaitForMultipleObjects, GetTimeZoneInformation, WideCharToMultiByte, GetLocaleInfoW, ExpandEnvironmentStringsW, SetCurrentDirectoryW, GetFullPathNameW, GetTempPathW, CancelIo, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetWaitableTimer, CancelWaitableTimer, GetExitCodeProcess, GetCurrentThreadId, CreateProcessW, CreateWaitableTimerW, GetUserDefaultLCID, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, GetEnvironmentVariableW, SearchPathW, CreateFileW, GetCurrentDirectoryW, GetFileSize, QueryPerformanceCounter, ReadFile, GetFileSizeEx, FileTimeToSystemTime, DeviceIoControl, GetVersionExW, CreateNamedPipeW, WaitForMultipleObjectsEx, ReleaseMutex, DisconnectNamedPipe, OutputDebugStringW, ResetEvent, GetOverlappedResult, ConnectNamedPipe, FlushFileBuffers, GetLongPathNameW, K32EnumProcesses, GetWindowsDirectoryW, WTSGetActiveConsoleSessionId, GetComputerNameW, GetVolumeInformationW, SetThreadLocale, GetUserDefaultUILanguage, GetACP, LocalAlloc, SetNamedPipeHandleState, WriteFile, WaitNamedPipeW, TlsSetValue, GetFullPathNameA, UnmapViewOfFile, GetLogicalDriveStringsW, GetFileAttributesExW, TlsAlloc, TlsGetValue, CreateFileMappingW, MapViewOfFile, GetDriveTypeW, QueryDosDeviceW, GetLogicalDrives, FindFirstVolumeMountPointW, FindFirstVolumeW, HeapFree, FindVolumeMountPointClose, TerminateProcess, K32GetModuleFileNameExW, GetVolumePathNameW, HeapSize, GetVolumeNameForVolumeMountPointW, FindNextVolumeMountPointW, HeapReAlloc, HeapAlloc, HeapDestroy, ReadProcessMemory, FindVolumeClose, GetProcessHeap, FindNextVolumeW, OpenThread, OpenEventW, GetSystemDirectoryA, GetLocalTime, GetCurrentThread, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, EncodePointer, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, VirtualAlloc, VirtualFree, SetConsoleMode, GetSystemTime, SystemTimeToFileTime, FormatMessageA, GetStringTypeW, CreateDirectoryW, FindFirstFileExW, GetDiskFreeSpaceExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, SetFileInformationByHandle, SetFileTime, AreFileApisANSI, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, GetLocaleInfoEx, QueryPerformanceFrequency, LCMapStringEx, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, InitializeSRWLock, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, InitOnceExecuteOnce, InitializeConditionVariable, WakeConditionVariable, WakeAllConditionVariable, SleepConditionVariableCS, SleepConditionVariableSRW, CreateEventExW, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetTickCount64, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, CompareStringEx, GetCPInfo, RtlUnwind, InterlockedFlushSList, TlsFree, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, ExitProcess, GetModuleHandleExW, GetModuleFileNameA, GetStdHandle, SetFilePointerEx, GetConsoleMode, ReadConsoleW, GetConsoleCP, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, IsValidLocale, EnumSystemLocalesW, SetStdHandle, SetEndOfFile, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetEnvironmentVariableW, SetConsoleCtrlHandler, OutputDebugStringA, WriteConsoleW, VirtualLock, SwitchToFiber, DeleteFiber, CreateFiberEx, LoadLibraryA, ConvertFiberToThread, ConvertThreadToFiberEx, GlobalMemoryStatus, ReadConsoleA
    ncrypt.dllBCryptGenRandom
    NameOrdinalAddress
    BeginHttpRequest10x4d87c0
    BeginHttpResponse20x4d8850
    FCP_add_param30x4d5900
    FCP_append_objdata_ff40x4d5950
    FCP_break_obj_header50x4d5ca0
    FCP_breakup_data_item60x4d5da0
    FCP_calculate_obj_head_chksum70x4d7c40
    FCP_chk_partial_obj_files80x4d5e20
    FCP_cleanup90x4d60b0
    FCP_clear_object_storage100x4d60c0
    FCP_clear_package110x4d6140
    FCP_clear_params120x4d61b0
    FCP_clear_request130x4d61f0
    FCP_clear_response140x4d6250
    FCP_combine_params150x4d62c0
    FCP_create_package_hdr160x4d7c70
    FCP_del_param170x4d6410
    FCP_delete_file180x4d6450
    FCP_get_file_size190x4d6480
    FCP_get_obj_resume_info200x4d64d0
    FCP_get_object_desc210x4d6680
    FCP_get_param220x4d66c0
    FCP_init_object_storage230x4d6700
    FCP_init_package240x4d6730
    FCP_init_params250x4d6770
    FCP_init_request260x4d67a0
    FCP_init_request_for_sending270x4d67d0
    FCP_init_response280x4d6860
    FCP_init_response_for_sending290x4d6880
    FCP_initialize300x4d6910
    FCP_load_object310x4d6920
    FCP_load_package320x4d6a10
    FCP_pack_obj330x4d7d40
    FCP_parse_params340x4d6ff0
    FCP_recv_request350x4d7110
    FCP_recv_response360x4d72b0
    FCP_send_n_recv370x4d7450
    FCP_send_object380x4d7490
    FCP_send_request390x4d75c0
    FCP_send_response400x4d75f0
    FCP_set_param410x4d7620
    FCP_unpack_obj420x4d7f70
    FCP_unpack_obj_ff430x4d81f0
    FCP_unpack_obj_fnfn440x4d8480
    FCP_verify_object_hdr450x4d8530
    FCP_verify_package_hdr460x4d8570
    FR_cleanup470x4d8930
    FR_close480x4d8940
    FR_connect490x4d8960
    FR_connected500x4d8970
    FR_get_local_addr510x4d8990
    FR_initialize520x4d89e0
    FR_read530x4d8a40
    FR_write540x4d8a60
    Language of compilation systemCountry where language is spokenMap
    ChineseTaiwan
    DanishDenmark
    GermanGermany
    EnglishUnited States
    FrenchFrance
    HungarianHungary
    JapaneseJapan
    KoreanNorth Korea
    KoreanSouth Korea
    PortugueseBrazil
    RussianRussia
    EstonianEstonia
    LithuanianLithuania
    ChineseChina