Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sVfXReO3QI.exe

Overview

General Information

Sample name:sVfXReO3QI.exe
renamed because original name is a hash value
Original sample name:26e14ee776eacbbd45f8ee346dcecfcc.exe
Analysis ID:1496369
MD5:26e14ee776eacbbd45f8ee346dcecfcc
SHA1:6a61a3987cb37df8d9f143fa384206c45260db1e
SHA256:d79890b31d4d7ae839054794768e2f238a28506673591cafe5b1b82ed157e146
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to register a low level keyboard hook
Tries to delay execution (extensive OutputDebugStringW loop)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • sVfXReO3QI.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\sVfXReO3QI.exe" MD5: 26E14EE776EACBBD45F8EE346DCECFCC)
    • PsiphonPortable.exe (PID: 7408 cmdline: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" MD5: 49BF9DCA0C8EAFF957F62F0F3CEF0BA5)
      • psiphon3.exe (PID: 7536 cmdline: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe" MD5: 03F2D4B132FC5802F9739F4B91C86C25)
        • psiphon-tunnel-core.exe (PID: 8156 cmdline: C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat" MD5: 77F9FB45FA91FBC0B2105900F7AF30DF)
          • conhost.exe (PID: 2584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat", CommandLine: C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat", CommandLine|base64offset|contains: (, Image: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe", ParentImage: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe, ParentProcessId: 7536, ParentProcessName: psiphon3.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat", ProcessId: 8156, ProcessName: psiphon-tunnel-core.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://api.psi.cash:443Avira URL Cloud: Label: malware
Source: sVfXReO3QI.exeReversingLabs: Detection: 44%
Source: sVfXReO3QI.exeVirustotal: Detection: 44%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.6% probability
Source: sVfXReO3QI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: t:\untgz\MoreInfo\SRC\Release\MoreInfo.pdb source: PsiphonPortable.exe, 00000002.00000002.2609208112.0000000002882000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040372C GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040372C
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00403211 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00403211
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00406436 FindFirstFileW,FindClose,2_2_00406436
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00406DFC DeleteFileW,CloseHandle,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00406DFC
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00402E18 FindFirstFileW,2_2_00402E18
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_050D5CE1 FindFirstFileW,FindClose,2_2_050D5CE1
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\AppJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: global trafficUDP traffic: 192.168.2.7:64151 -> 146.70.144.213:554
Source: global trafficTCP traffic: 192.168.2.7:49729 -> 192.155.93.29:53
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Host: eljvuop.netUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Content-Length: 6454Content-Type: image/tiffCookie: ak_cuscartcart=x0es792JsQU9UiGh7qdRQDsg5TsEs1HHQ2gwlakxB8UhHggMKVMQdiNuU8Gh5XnZb+oMIqtQMgSvdauo9ZtoxB6SqgdSq4hwcCbvlBsyWyajNGqqaC+OACxPDbrqt0yXtUqRfWHt1wweFCP9qluLkHrPxC7K6jXt5KpBFbXpzbYcsD4EopkXOWo9VfrZnxTsVNiicS/3YBH04pQoialfFQI84WWIi0eoQdd8jij0s8Zc8Rtev9OUkNVMfJKlymNKdwVyC/GKLgT57lP5yWUe9dgw0u+75BrcgY5VAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Host: eljvuop.netUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Content-Length: 0Content-Type: image/tiffCookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zgAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Host: eljvuop.netUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Content-Length: 1047Content-Type: image/tiffCookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zgAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Host: eljvuop.netUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Content-Length: 0Content-Type: image/tiffCookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zgAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Host: eljvuop.netUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Content-Length: 143Content-Type: image/tiffCookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zgAccept-Encoding: gzip
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 77.68.29.80
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 77.68.29.80
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 77.68.29.80
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 217.160.34.195
Source: unknownTCP traffic detected without corresponding DNS query: 217.138.199.186
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 45.128.38.162
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.119.50
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.119.50
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.119.50
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownTCP traffic detected without corresponding DNS query: 192.155.93.29
Source: unknownHTTP traffic detected: POST / HTTP/1.1Host: australiais.orgUser-Agent: Go-http-client/1.1Content-Length: 963Content-Type: audio/mpegCookie: D=wkKgjSLUI1gWvAYywhTgWpudEpBrwCoEQ3X9G6bxZHDby1xaL+8oLoh9t6Tzo05eXwhOQ2egrkD4eLLYHfMuziuR2UF5WDjej7e4aCjldZD6zAa+Gsv3hKxjVQ5mG45MrhtDzAGTeiACJEVc9qs+44nACu4kwjBkYsaIF0EHxko+O/HaT44tmx/TAg+g+htD0hoHU6a/ieTPWBUl0WTsgGtrqEZPDlBr/6/t+j+tb0HtcZeQtNrebO9f4zocrCdVXMtu7S3T8hfRXU+l2Vlp63KVpSu449YoGW4VAccept-Encoding: gzip
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2613588387.0000000001575000.00000004.00000001.01000000.00000017.sdmpString found in binary or memory: http://.css
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2621129777.000000000A94E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://api.psi.cash:443
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/gsr1.crl0
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r4.crl0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1654304898.000000000A662000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1653392198.000000000A6EE000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1634915231.000000000A49B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://eljvuop.net/
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1634915231.000000000A49B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://eljvuop.net/217.138.199.186:80217.138.199.186:80P
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2619227637.000000000A6CE000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1653730551.000000000A6C8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://eljvuop.net:800
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1669467875.000000000A56D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://eljvuop.net:8010471047
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/gsr1.crt0-
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r4.crt0
Source: psiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473000987.0000000005EF9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1474941291.0000000005F03000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471827251.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jqueryui.com
Source: psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/add-inverted-param/
Source: psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444504743.000000000CD02000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444613286.000000000CD05000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444769779.000000000CD08000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444717984.000000000CD07000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444570063.000000000CD03000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444674747.000000000CD06000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/define-locale/
Source: psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/dst-shifted/
Source: psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/js-date/
Source: psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/min-max/
Source: psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/min-max/isDSTShifted
Source: psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/min-max/styczeD
Source: psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://momentjs.com/guides/#/warnings/zone/
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmp, PsiphonPortable.exe, 00000002.00000000.1342138864.0000000000408000.00000002.00000001.01000000.00000005.sdmp, PsiphonPortable.exe, 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
Source: PsiphonPortable.exe, 00000002.00000002.2609208112.0000000002882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://portableapps.com/jportable
Source: sVfXReO3QI.exe, 00000000.00000002.2605237204.0000000000AD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sourceforge.net/projects/s-zipsfxbuilder/)
Source: psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473663652.0000000005373000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463554890.0000000005FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1669356126.000000000A64C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.memoaiart.com/
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1669356126.000000000A64C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.memoaiart.com/s
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1664416805.000000000A4C6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.memoaiart.coma2938.b.akamai.net:80
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1664416805.000000000A4C6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.memoaiart.coma2938.b.akamai.net:80www.memoaiart.com:80
Source: psiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.satzansatz.de/cssd/onhavinglayout.html
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1666137802.000000000A7B2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://australiais.org/australiais.org:443
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2608457403.0000000000F82000.00000002.00000001.01000000.00000017.sdmpString found in binary or memory: https://github.com/Psiphon-Labs/psiphon-tunnel-core.git
Source: psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473663652.0000000005373000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463554890.0000000005FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lrepacks.net/
Source: psiphon3.exe, 00000004.00000003.1430222323.000000000EE41000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428293155.000000000CEB6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427675274.000000000CB19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://my.psi.cash/?etc
Source: psiphon3.exe, 00000004.00000003.1430222323.000000000EE41000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428293155.000000000CEB6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427675274.000000000CB19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://my.psi.cash/forgot?etc
Source: psiphon3.exe, 00000004.00000003.1472835924.0000000006913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1445555358.0000000006621000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicash
Source: psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicash-account
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicashZ
Source: psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.0000000006681000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444907628.0000000006684000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicashb
Source: psiphon3.exe, 00000004.00000003.1444400608.00000000068C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1445485486.00000000068E6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1472291031.00000000068ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicashs
Source: psiphon3.exe, 00000004.00000003.1443999867.00000000066C6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicashtion-TransactionAmountMismatch-title
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/faq.html#psicashu
Source: psiphon3.exe, 00000004.00000003.1463378975.0000000006717000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441730730.00000000066EC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426661379.000000000CB8E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/fr/license.html
Source: psiphon3.exe, 00000004.00000003.1441948287.0000000006689000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.000000000668B000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426661379.000000000CB8E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/fr/privacy.html
Source: psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/license.html
Source: psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon.ca/privacy.html
Source: psiphon3.exe, 00000004.00000003.1443066247.000000000682E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.co
Source: psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clear
Source: psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clear-windows-data
Source: psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.0000000006681000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444907628.0000000006684000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clear:
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clear?
Source: psiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clearB
Source: psiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clearR
Source: psiphon3.exe, 00000004.00000003.1441784900.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clearTB.n_
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#cleari
Source: psiphon3.exe, 00000004.00000003.1433582896.0000000006646000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clearies-to-lan#help-text
Source: psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faq.html#clearinimize#heading
Source: psiphon3.exe, 00000004.00000003.1445335169.0000000006724000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/faqT
Source: psiphon3.exe, 00000004.00000003.1445786011.000000000671D000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463378975.0000000006721000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441730730.00000000066EC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://psiphon3.com/fr/faq.html#clear-windows-data
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html
Source: psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#direct
Source: psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directQ
Source: psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe
Source: psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe%
Source: psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directeY
Source: psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directeu
Source: psiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directh
Source: psiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directon
Source: psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.html
Source: psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.html
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.htmlblegectede
Source: psiphon3.exe, 00000004.00000003.1471063667.000000000696E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.h
Source: psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collected
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedI
Source: psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedr
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/psiupload/
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.com/web/mjr4-p23r-puwl/osl
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1664416805.000000000A4C6000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1611413530.000000000A45E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.coma248.e.akamai.net
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1611413530.000000000A45E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.coma248.e.akamai.netpsiphon.s3.amazonaws.coma248.e.akamai.netpsiphon.s3.amazona
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1530102055.000000000A462000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1539517853.000000000A460000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1543503944.000000000A45E000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1626362737.000000000A4C6000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1610820002.000000000A4A2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.comhttps://s3.amazonaws.coma248.e.akamai.net
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1530102055.000000000A462000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1539517853.000000000A460000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1543503944.000000000A45E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://s3.amazonaws.comhttps://s3.amazonaws.coma248.e.akamai.netpsiphon.s3.amazonaws.coma248.e.akam
Source: psiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/a/17622706/729729
Source: psiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/24431054/float-right-and-float-left-in-absolute-container-ie7-ex
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1609386724.000000000A520000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1596099817.000000000A734000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.kindletterfaq.com/
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1609386724.000000000A520000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.kindletterfaq.com/www.kindletterfaq.com:443
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1596099817.000000000A734000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.kindletterfaq.com/www.kindletterfaq.com:443104
Source: psiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.raceegguxdas.com/web/mjr4-p23r-puwl
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1526565471.000000000A5D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressed
Source: psiphon-tunnel-core.exe, 0000000C.00000003.1526565471.000000000A5D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressedhttps://www.syst
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00408DA3 SetWindowsHookExW 00000002,Function_00008D75,00000000,000000000_2_00408DA3
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_0040522D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_0040522D
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00404605 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,2_2_00404605
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_10001571 GetWindowLongW,lstrlenW,lstrlenW,lstrlenW,GlobalAlloc,wsprintfW,CreateProcessW,GetLastError,GetDlgItem,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,CreateProcessWithLogonW,GetLastError,GetLastError,FormatMessageW,MessageBoxW,LocalFree,GetLastError,GlobalFree,CloseHandle,EndDialog,SetWindowLongW,GetDlgItem,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,LoadLibraryA,LoadImageW,GetDlgItem,SendMessageW,SendMessageW,DestroyWindow,2_2_10001571
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_004039E3 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,2_2_004039E3
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00405C180_2_00405C18
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040B0D00_2_0040B0D0
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040B0D40_2_0040B0D4
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040A8F00_2_0040A8F0
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004199430_2_00419943
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040A2600_2_0040A260
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040D4700_2_0040D470
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040AC100_2_0040AC10
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00409C100_2_00409C10
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040ED000_2_0040ED00
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00409DC00_2_00409DC0
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004195D10_2_004195D1
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004196AB0_2_004196AB
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00418F100_2_00418F10
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_0040761C2_2_0040761C
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_004070332_2_00407033
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00404ADC2_2_00404ADC
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_050D41202_2_050D4120
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_050D24DB2_2_050D24DB
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A48852212_3_0A488522
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A485FB012_3_0A485FB0
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A488F5C12_3_0A488F5C
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: String function: 004029DB appears 44 times
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: String function: 00406404 appears 58 times
Source: sVfXReO3QI.exe, 00000000.00000000.1333737152.0000000000423000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs sVfXReO3QI.exe
Source: sVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePsiphonPortable.exe4 vs sVfXReO3QI.exe
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: sVfXReO3QI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal68.spyw.evad.winEXE@8/51@0/7
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004095EE wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_004095EE
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_10001A46 GetCurrentProcessId,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,2_2_10001A46
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040122A GetDiskFreeSpaceExW,SendMessageW,0_2_0040122A
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_7026124C CreateToolhelp32Snapshot,GetLastError,2_2_7026124C
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004092A9 GetDlgItem,GetDlgItem,SendMessageW,GetDlgItem,GetWindowLongW,GetDlgItem,SetWindowLongW,GetSystemMenu,EnableMenuItem,GetDlgItem,SetFocus,SetTimer,CoCreateInstance,GetDlgItem,IsWindow,GetDlgItem,EnableWindow,GetDlgItem,ShowWindow,0_2_004092A9
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_004020D2 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_004020D2
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\main[1]Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMutant created: NULL
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ServerListMutex-VPN
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeMutant created: \Sessions\1\BaseNamedObjects\PortableApps.comLauncherPsiphon-PsiphonPortable::Starting
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeMutant created: \Sessions\1\BaseNamedObjects\PortableApps.comLauncherPsiphon-PsiphonPortable
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{B88F6262-9CC8-44EF-887D-FB77DC89BB8C}
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ServerListMutex-CoreTransport
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2584:120:WilError_03
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile created: C:\Users\user~1\AppData\Local\Temp\7ZipSfx.000Jump to behavior
Source: sVfXReO3QI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: sVfXReO3QI.exeReversingLabs: Detection: 44%
Source: sVfXReO3QI.exeVirustotal: Detection: 44%
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile read: C:\Users\user\Desktop\sVfXReO3QI.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\sVfXReO3QI.exe "C:\Users\user\Desktop\sVfXReO3QI.exe"
Source: C:\Users\user\Desktop\sVfXReO3QI.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe"
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess created: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat"
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\sVfXReO3QI.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess created: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat"Jump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: msiso.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: t2embed.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: uianimation.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile written: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\AppInfo\Launcher\PsiphonPortable.iniJump to behavior
Source: sVfXReO3QI.exeStatic file information: File size 6986755 > 1048576
Source: Binary string: t:\untgz\MoreInfo\SRC\Release\MoreInfo.pdb source: PsiphonPortable.exe, 00000002.00000002.2609208112.0000000002882000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00402678 LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_00402678
Source: version.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x9f31
Source: registry.dll.2.drStatic PE information: real checksum: 0x0 should be: 0xa9c5
Source: psiphon3.exe.0.drStatic PE information: real checksum: 0x67e6a2 should be: 0x6833b8
Source: System.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x116c6
Source: sVfXReO3QI.exeStatic PE information: real checksum: 0x22d33 should be: 0x6aab81
Source: UAC.dll.2.drStatic PE information: real checksum: 0x0 should be: 0xe6aa
Source: PsiphonPortable.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x23bb6
Source: version.dll.0.drStatic PE information: section name: .code
Source: psiphon-tunnel-core.exe.4.drStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00419290 push eax; ret 0_2_004192BE
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_050D62A0 push eax; ret 2_2_050D62CE
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481026 push esp; iretd 12_3_0A481167
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeCode function: 12_3_0A481404 push eax; retf 12_3_0A481405
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\version.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile created: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\registry.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile created: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\UAC.dllJump to dropped file
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeJump to dropped file
Source: C:\Users\user\Desktop\sVfXReO3QI.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile created: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\newtextreplace.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeFile created: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile created: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_100012F6 GetWindowLongW,GetModuleFileNameW,SendMessageW,lstrcatW,GetDlgItem,GetPrivateProfileIntW,GetPrivateProfileIntW,EnableWindow,GetPrivateProfileIntW,ShowWindow,2_2_100012F6
Source: C:\Users\user\Desktop\sVfXReO3QI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeSection loaded: OutputDebugStringW count: 401
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 4C50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5C90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5E10000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5E30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 6FB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 70B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 7370000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 74E0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 7540000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 7560000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 7580000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: AFF0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CA50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 4E90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 4ED0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 4F70000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 4F90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5030000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 50D0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 50F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5110000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 5130000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CA70000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CC90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CCC0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CCE0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CD60000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CD80000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CDA0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CDF0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CE50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CF60000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D0C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D0E0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D100000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D120000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D160000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D180000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D1A0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D040000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D060000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D080000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D0A0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D360000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D380000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: D3A0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DAD0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DAF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DB10000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DBD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DBF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DD00000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DB30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DB70000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E030000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E0A0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DF20000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E0C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E1B0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E230000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E160000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E180000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E270000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E290000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E2D0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E2F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E310000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E330000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E350000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DD00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DAF0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E370000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E550000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E800000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DAF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E650000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: DEE0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E4D0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FDD0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E430000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E450000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E470000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E7E0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E930000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E990000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CEF0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CF10000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E650000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: CF30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E2B0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E530000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E750000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E770000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E790000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E820000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E840000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E860000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E880000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E8C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E8E0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E900000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: E950000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: EB50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FDD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FED0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FEF0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FF10000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FF30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FF50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10010000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FF90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FFB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: FFD0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10350000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10370000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 108F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10390000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10910000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10930000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10950000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10970000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10990000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 109B0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 109D0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 109F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10A10000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10A30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10A50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10A90000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10AB0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10AD0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10C30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10C50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: 10EE0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\registry.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\UAC.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\newtextreplace.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_0040372C GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040372C
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00403211 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00403211
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00406436 FindFirstFileW,FindClose,2_2_00406436
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00406DFC DeleteFileW,CloseHandle,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00406DFC
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_00402E18 FindFirstFileW,2_2_00402E18
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_050D5CE1 FindFirstFileW,FindClose,2_2_050D5CE1
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\AppJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeAPI call chain: ExitProcess graph end nodegraph_2-6914
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00402678 LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_00402678
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_1000268A _,CreateEventW,CreateEventW,CreateEventW,CreateFileMappingW,MapViewOfFile,GetLastError,CreateThread,GetLastError,WaitForSingleObject,GetExitCodeThread,GetCurrentProcessId,GetCurrentProcessId,GetCurrentThreadId,GetCurrentThreadId,SendMessageW,GetCurrentProcessId,GetCurrentThreadId,SetWindowLongW,GetCurrentProcessId,GetCurrentThreadId,wsprintfW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentThreadId,wsprintfW,GetLastError,GetCurrentProcessId,SetCurrentDirectoryW,GetCommandLineW,GlobalAlloc,GlobalFree,GlobalAlloc,GetModuleFileNameW,lstrlenW,GlobalAlloc,wsprintfW,SetForegroundWindow,ShellExecuteExW,GetLastError,UnhookWindowsHookEx,GetCurrentProcessId,GetCurrentThreadId,MsgWaitForMultipleObjects,GetExitCodeProcess,GetLastError,CloseHandle,FindCloseChangeNotification,wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,GlobalFree,2_2_1000268A
Source: C:\Users\user\Desktop\sVfXReO3QI.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeProcess created: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat"Jump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00402757 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00402757
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00402490
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\psiphon.config VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exeQueries volume information: C:\Users\user\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdb VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00403A96 lstrlenW,GetSystemTimeAsFileTime,GetFileAttributesW,memcpy,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00403A96
Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exeCode function: 2_2_100011A5 SendMessageW,GetUserNameW,wsprintfW,GetDlgItem,GetDlgItem,SendMessageW,SendMessageW,LoadLibraryA,LoadStringW,GetDlgItem,SendMessageW,2_2_100011A5
Source: C:\Users\user\Desktop\sVfXReO3QI.exeCode function: 0_2_00405C18 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,lstrlenW,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,lstrlenW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405C18
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
111
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Email Collection
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Valid Accounts
21
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin Shares111
Input Capture
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
Access Token Manipulation
1
Software Packing
NTDS25
System Information Discovery
Distributed Component Object Model1
Clipboard Data
12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Process Injection
1
DLL Side-Loading
LSA Secrets11
Virtualization/Sandbox Evasion
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Masquerading
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Valid Accounts
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
Virtualization/Sandbox Evasion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1496369 Sample: sVfXReO3QI.exe Startdate: 21/08/2024 Architecture: WINDOWS Score: 68 52 Antivirus detection for URL or domain 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 AI detected suspicious sample 2->56 9 sVfXReO3QI.exe 41 2->9         started        process3 file4 28 C:\Users\user\AppData\Local\...\psiphon3.exe, PE32 9->28 dropped 30 C:\Users\user\AppData\...\psiphon3.exe.orig, ASCII 9->30 dropped 32 C:\Users\user\AppData\...\PsiphonPortable.exe, PE32 9->32 dropped 34 C:\Users\user\AppData\Local\...\version.dll, PE32 9->34 dropped 60 Contains functionality to register a low level keyboard hook 9->60 13 PsiphonPortable.exe 4 45 9->13         started        signatures5 process6 file7 36 C:\Users\user\AppData\Local\...\registry.dll, PE32 13->36 dropped 38 C:\Users\user\AppData\...\newtextreplace.dll, PE32 13->38 dropped 40 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 13->40 dropped 42 C:\Users\user\AppData\Local\...\System.dll, PE32 13->42 dropped 16 psiphon3.exe 18 53 13->16         started        process8 dnsIp9 44 127.0.0.1 unknown unknown 16->44 26 C:\Users\user\...\psiphon-tunnel-core.exe, PE32 16->26 dropped 58 Tries to delay execution (extensive OutputDebugStringW loop) 16->58 21 psiphon-tunnel-core.exe 5 16->21         started        file10 signatures11 process12 dnsIp13 46 146.70.144.213, 554, 64151 TENET-1ZA United Kingdom 21->46 48 217.160.34.195, 22, 49728 ONEANDONE-ASBrauerstrasse48DE Germany 21->48 50 4 other IPs or domains 21->50 24 conhost.exe 21->24         started        process14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sVfXReO3QI.exe45%ReversingLabsWin32.Trojan.RemoteManip
sVfXReO3QI.exe45%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe4%ReversingLabs
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\version.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\UAC.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\newtextreplace.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\registry.dll0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://jqueryui.com0%URL Reputationsafe
http://momentjs.com/guides/#/warnings/add-inverted-param/0%URL Reputationsafe
http://momentjs.com/guides/#/warnings/js-date/0%URL Reputationsafe
http://momentjs.com/guides/#/warnings/define-locale/0%URL Reputationsafe
https://psiphon3.com/faq.html#clear-windows-data0%Avira URL Cloudsafe
https://psiphon.ca/fr/license.html0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.html0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clear?0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clear:0%Avira URL Cloudsafe
http://momentjs.com/guides/#/warnings/zone/0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://momentjs.com/guides/#/warnings/dst-shifted/0%URL Reputationsafe
http://momentjs.com/guides/#/warnings/min-max/0%URL Reputationsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.htmlblegectede0%Avira URL Cloudsafe
http://api.psi.cash:443100%Avira URL Cloudmalware
https://psiphon3.com/faq.html#clear:0%VirustotalBrowse
https://psiphon.ca/fr/license.html2%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.html0%VirustotalBrowse
https://psiphon3.com/faq.html#clear-windows-data0%VirustotalBrowse
https://psiphon3.com/faq.html#clear?1%VirustotalBrowse
https://psiphon3.com/faq.html#clearB0%VirustotalBrowse
http://api.psi.cash:4430%VirustotalBrowse
https://psiphon3.com/faq.html#clearB0%Avira URL Cloudsafe
https://psiphon3.com/fr/faq.html#clear-windows-data0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#direct0%Avira URL Cloudsafe
https://github.com/Psiphon-Labs/psiphon-tunnel-core.git0%Avira URL Cloudsafe
http://momentjs.com/guides/#/warnings/min-max/isDSTShifted0%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
https://psiphon.ca/privacy.html0%Avira URL Cloudsafe
https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressed0%Avira URL Cloudsafe
https://github.com/Psiphon-Labs/psiphon-tunnel-core.git0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directh0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#direct0%VirustotalBrowse
https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressedhttps://www.syst0%Avira URL Cloudsafe
http://momentjs.com/guides/#/warnings/min-max/isDSTShifted0%VirustotalBrowse
http://portableapps.com/jportable0%Avira URL Cloudsafe
http://eljvuop.net:80104710470%Avira URL Cloudsafe
https://psiphon3.com/fr/faq.html#clear-windows-data0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe0%Avira URL Cloudsafe
https://psiphon.ca/privacy.html3%VirustotalBrowse
https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressed0%VirustotalBrowse
https://stackoverflow.com/questions/24431054/float-right-and-float-left-in-absolute-container-ie7-ex0%Avira URL Cloudsafe
https://australiais.org/0%Avira URL Cloudsafe
https://psiphon.ca/faq.html#psicash-account0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directh0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedI0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe0%VirustotalBrowse
https://psiphon.ca0%Avira URL Cloudsafe
http://portableapps.com/jportable0%VirustotalBrowse
https://psiphon3.co0%Avira URL Cloudsafe
https://stackoverflow.com/questions/24431054/float-right-and-float-left-in-absolute-container-ie7-ex0%VirustotalBrowse
https://my.psi.cash/?etc0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directon0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clear0%Avira URL Cloudsafe
https://psiphon.ca/faq.html#psicash-account2%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe%0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directon0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedI0%VirustotalBrowse
http://c.pki.goog/r/r4.crl00%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clear0%VirustotalBrowse
https://psiphon3.co0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe%0%VirustotalBrowse
http://i.pki.goog/r4.crt00%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.h0%Avira URL Cloudsafe
https://psiphon.ca3%VirustotalBrowse
http://eljvuop.net/217.138.199.186:80217.138.199.186:80P0%Avira URL Cloudsafe
http://i.pki.goog/r4.crt00%VirustotalBrowse
http://c.pki.goog/r/r4.crl00%VirustotalBrowse
http://sourceforge.net/projects/s-zipsfxbuilder/)0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clearinimize#heading0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiupload/0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clearR0%Avira URL Cloudsafe
http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
http://www.memoaiart.com/s0%Avira URL Cloudsafe
http://sourceforge.net/projects/s-zipsfxbuilder/)0%VirustotalBrowse
https://my.psi.cash/?etc1%VirustotalBrowse
https://psiphon3.com/faq.html#clearinimize#heading0%VirustotalBrowse
https://lrepacks.net/0%Avira URL Cloudsafe
https://www.kindletterfaq.com/www.kindletterfaq.com:4431040%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clearR0%VirustotalBrowse
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html0%VirustotalBrowse
http://eljvuop.net:8000%Avira URL Cloudsafe
https://psiphon.ca/faq.html#psicash0%Avira URL Cloudsafe
https://psiphon.ca/fr/privacy.html0%Avira URL Cloudsafe
http://momentjs.com/guides/#/warnings/min-max/styczeD0%Avira URL Cloudsafe
http://c.pki.goog/r/gsr1.crl00%Avira URL Cloudsafe
https://psiphon.ca/license.html0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.html0%Avira URL Cloudsafe
https://www.kindletterfaq.com/0%Avira URL Cloudsafe
https://australiais.org/australiais.org:4430%Avira URL Cloudsafe
https://psiphon3.com/faqT0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#cleari0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clearies-to-lan#help-text0%Avira URL Cloudsafe
https://psiphon.ca/faq.html#psicashs0%Avira URL Cloudsafe
https://psiphon.ca/faq.html#psicashu0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedr0%Avira URL Cloudsafe
https://psiphon3.com/faq.html#clearTB.n_0%Avira URL Cloudsafe
http://www.satzansatz.de/cssd/onhavinglayout.html0%Avira URL Cloudsafe
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directeY0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://australiais.org/false
  • Avira URL Cloud: safe
unknown
http://eljvuop.net/false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://psiphon.ca/fr/license.htmlpsiphon3.exe, 00000004.00000003.1463378975.0000000006717000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441730730.00000000066EC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426661379.000000000CB8E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clear-windows-datapsiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clear:psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.0000000006681000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444907628.0000000006684000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/faq.htmlpsiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clear?psiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.htmlblegectedepsiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://api.psi.cash:443psiphon-tunnel-core.exe, 0000000C.00000002.2621129777.000000000A94E000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
https://psiphon3.com/faq.html#clearBpsiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://jqueryui.compsiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473000987.0000000005EF9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1474941291.0000000005F03000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471827251.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directpsiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/fr/faq.html#clear-windows-datapsiphon3.exe, 00000004.00000003.1445786011.000000000671D000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463378975.0000000006721000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441730730.00000000066EC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/Psiphon-Labs/psiphon-tunnel-core.gitpsiphon-tunnel-core.exe, 0000000C.00000002.2608457403.0000000000F82000.00000002.00000001.01000000.00000017.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/add-inverted-param/psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://momentjs.com/guides/#/warnings/min-max/isDSTShiftedpsiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://.csspsiphon-tunnel-core.exe, 0000000C.00000002.2613588387.0000000001575000.00000004.00000001.01000000.00000017.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/privacy.htmlpsiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressedpsiphon-tunnel-core.exe, 0000000C.00000003.1526565471.000000000A5D0000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directhpsiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.systemsafariuniversitydebt.com/web/mjr4-p23r-puwl/server_list_compressedhttps://www.systpsiphon-tunnel-core.exe, 0000000C.00000003.1526565471.000000000A5D0000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://portableapps.com/jportablePsiphonPortable.exe, 00000002.00000002.2609208112.0000000002882000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://eljvuop.net:8010471047psiphon-tunnel-core.exe, 0000000C.00000003.1669467875.000000000A56D000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directepsiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://stackoverflow.com/questions/24431054/float-right-and-float-left-in-absolute-container-ie7-expsiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicash-accountpsiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedIpsiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon.capsiphon3.exe, 00000004.00000003.1472835924.0000000006913000.00000004.00000020.00020000.00000000.sdmpfalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/js-date/psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://psiphon3.copsiphon3.exe, 00000004.00000003.1443066247.000000000682E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://my.psi.cash/?etcpsiphon3.exe, 00000004.00000003.1430222323.000000000EE41000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428293155.000000000CEB6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427675274.000000000CB19000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directonpsiphon3.exe, 00000004.00000003.1472291031.000000000690D000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clearpsiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directe%psiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://c.pki.goog/r/r4.crl0psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/define-locale/psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444504743.000000000CD02000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444613286.000000000CD05000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444769779.000000000CD08000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444717984.000000000CD07000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444570063.000000000CD03000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444674747.000000000CD06000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://i.pki.goog/r4.crt0psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.htmlpsiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.hpsiphon3.exe, 00000004.00000003.1471063667.000000000696E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://eljvuop.net/217.138.199.186:80217.138.199.186:80Ppsiphon-tunnel-core.exe, 0000000C.00000003.1634915231.000000000A49B000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://sourceforge.net/projects/s-zipsfxbuilder/)sVfXReO3QI.exe, 00000000.00000002.2605237204.0000000000AD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clearinimize#headingpsiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiupload/psiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clearRpsiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473663652.0000000005373000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463554890.0000000005FA3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.memoaiart.com/spsiphon-tunnel-core.exe, 0000000C.00000003.1669356126.000000000A64C000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/zone/psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://lrepacks.net/psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473663652.0000000005373000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1463554890.0000000005FA3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.kindletterfaq.com/www.kindletterfaq.com:443104psiphon-tunnel-core.exe, 0000000C.00000003.1596099817.000000000A734000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://eljvuop.net:800psiphon-tunnel-core.exe, 0000000C.00000002.2619227637.000000000A6CE000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1653730551.000000000A6C8000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicashpsiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1445555358.0000000006621000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443066247.0000000006739000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/fr/privacy.htmlpsiphon3.exe, 00000004.00000003.1441948287.0000000006689000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423852162.000000000E43C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.000000000668B000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427199405.000000001001F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427392429.000000000E931000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1426661379.000000000CB8E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1448518621.000000000E650000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1424314831.000000000E65E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/min-max/styczeDpsiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://c.pki.goog/r/gsr1.crl0psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/license.htmlpsiphon3.exe, 00000004.00000003.1426554413.000000000CB9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/index.htmlpsiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473529864.0000000005987000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.kindletterfaq.com/psiphon-tunnel-core.exe, 0000000C.00000003.1609386724.000000000A520000.00000004.00001000.00020000.00000000.sdmp, psiphon-tunnel-core.exe, 0000000C.00000003.1596099817.000000000A734000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://australiais.org/australiais.org:443psiphon-tunnel-core.exe, 0000000C.00000003.1666137802.000000000A7B2000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faqTpsiphon3.exe, 00000004.00000003.1445335169.0000000006724000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443713968.00000000066EF000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444349174.00000000066FF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorsVfXReO3QI.exe, 00000000.00000003.1339539570.0000000003123000.00000004.00000020.00020000.00000000.sdmp, PsiphonPortable.exe, 00000002.00000000.1342138864.0000000000408000.00000002.00000001.01000000.00000005.sdmp, PsiphonPortable.exe, 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpfalse
  • URL Reputation: safe
unknown
https://psiphon3.com/faq.html#clearipsiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clearies-to-lan#help-textpsiphon3.exe, 00000004.00000003.1433582896.0000000006646000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicashspsiphon3.exe, 00000004.00000003.1444400608.00000000068C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1445485486.00000000068E6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1472291031.00000000068ED000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/dst-shifted/psiphon3.exe, 00000004.00000003.1428442569.00000000064DC000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1422106316.000000000DF04000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500093045.000000000E144000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431710481.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500831334.000000000E14D000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500702174.000000000E145000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499493240.000000000E141000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1499962191.000000000E143000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1421653832.000000000DB37000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1500746423.000000000E146000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://psiphon.ca/faq.html#psicashupsiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedrpsiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.satzansatz.de/cssd/onhavinglayout.htmlpsiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directeYpsiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon3.com/faq.html#clearTB.n_psiphon3.exe, 00000004.00000003.1441784900.0000000006DC3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473554166.0000000006DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicashZpsiphon3.exe, 00000004.00000003.1473554166.0000000006D9C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1441784900.0000000006D9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/privacy.html#information-collectedpsiphon3.exe, 00000004.00000003.1428442569.0000000005F1F000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1473726026.0000000006064000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.raceegguxdas.com/web/mjr4-p23r-puwlpsiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicashbpsiphon3.exe, 00000004.00000003.1432123300.000000000664E000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433349886.0000000006668000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1434437300.000000000667C000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1443999867.0000000006681000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1444907628.0000000006684000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://i.pki.goog/gsr1.crt0-psiphon-tunnel-core.exe, 0000000C.00000003.1698239410.000000000A49E000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/web/mjr4-p23r-puwl/oslpsiphon-tunnel-core.exe, 0000000C.00000002.2620195669.000000000A79A000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.memoaiart.com/psiphon-tunnel-core.exe, 0000000C.00000003.1669356126.000000000A64C000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directQpsiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.kindletterfaq.com/www.kindletterfaq.com:443psiphon-tunnel-core.exe, 0000000C.00000003.1609386724.000000000A520000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://my.psi.cash/forgot?etcpsiphon3.exe, 00000004.00000003.1430222323.000000000EE41000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1428293155.000000000CEB6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1427675274.000000000CB19000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://psiphon.ca/faq.html#psicashtion-TransactionAmountMismatch-titlepsiphon3.exe, 00000004.00000003.1443999867.00000000066C6000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1440610650.00000000066C3000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1433159235.00000000066B9000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1431997707.00000000066AB000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://stackoverflow.com/a/17622706/729729psiphon3.exe, 00000004.00000003.1442580663.0000000001E16000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1415857707.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1471638538.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1475034526.0000000001E42000.00000004.00000020.00020000.00000000.sdmp, psiphon3.exe, 00000004.00000003.1442092248.0000000005F16000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://s3.amazonaws.com/psiphon/web/mjr4-p23r-puwl/download.html#directeupsiphon3.exe, 00000004.00000003.1473133048.000000000618D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://momentjs.com/guides/#/warnings/min-max/psiphon3.exe, 00000004.00000003.1423035564.000000000DD3B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
217.138.199.186
unknownUnited Kingdom
9009M247GBfalse
77.68.29.80
unknownUnited Kingdom
8560ONEANDONE-ASBrauerstrasse48DEfalse
146.70.144.213
unknownUnited Kingdom
2018TENET-1ZAfalse
217.160.34.195
unknownGermany
8560ONEANDONE-ASBrauerstrasse48DEfalse
45.128.38.162
unknownGeorgia
197328INETLTDTRfalse
37.46.119.50
unknownSweden
51430ALTUSNLfalse
IP
127.0.0.1
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1496369
Start date and time:2024-08-21 08:58:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 8m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:sVfXReO3QI.exe
renamed because original name is a hash value
Original Sample Name:26e14ee776eacbbd45f8ee346dcecfcc.exe
Detection:MAL
Classification:mal68.spyw.evad.winEXE@8/51@0/7
EGA Information:
  • Successful, ratio: 50%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 103
  • Number of non-executed functions: 130
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe, UsoClient.exe
  • Excluded IPs from analysis (whitelisted): 23.57.90.70, 23.57.90.79, 2.19.126.154, 2.19.126.163, 93.184.221.240
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, a2938.b.akamai.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, settings-win.data.microsoft.com, ctldl.windowsupdate.com, time.windows.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, a3731.na.akamai.net, wu-b-net.trafficmanager.net
  • Execution Graph export aborted for target psiphon-tunnel-core.exe, PID 8156 because there are no executed function
  • Execution Graph export aborted for target psiphon3.exe, PID 7536 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
02:59:15API Interceptor1935x Sleep call for process: psiphon3.exe modified
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
bg.microsoft.map.fastly.nethttps://umayendustriyel.com/n/?c3Y9bzM2NV8xX3NwJnJhbmQ9U2tKYWJGTT0mdWlkPVVTRVIxNDA4MjAyNFUyMjA4MTQ1NQ==N0123N#victimemail##Get hashmaliciousUnknownBrowse
  • 199.232.210.172
https://dl.dropboxusercontent.com/scl/fi/4owe58ovn1ed21kp09mar/Rechnung-201528807699-vom-30.07.2024.zip?Get hashmaliciousUnknownBrowse
  • 199.232.214.172
https://github.com/Runsim12/Cleodf/raw/main/Tran_ID-Details009192_End_Ids_58788719853478_Pdf.rarGet hashmaliciousUnknownBrowse
  • 199.232.210.172
https://doc.clickup.com/9014542322/d/h/8cmxzzj-434/d3ec30ee79aa63aGet hashmaliciousHTMLPhisherBrowse
  • 199.232.210.172
DonghwanPOGM210820242020032108174KR18190824pu.vbsGet hashmaliciousGuLoader, RemcosBrowse
  • 199.232.210.172
https://benyera.com/workprojects/index.phpGet hashmaliciousHTMLPhisherBrowse
  • 199.232.210.172
https://www.lusha.com/privacy_topic/control-your-profile/Get hashmaliciousUnknownBrowse
  • 199.232.214.172
https://akashguptaji.github.io/netflix/Get hashmaliciousHTMLPhisherBrowse
  • 199.232.214.172
http://krakesnlogos.gitbook.io/usGet hashmaliciousUnknownBrowse
  • 199.232.214.172
https://navigate-loginscreen-att-102042.weeblysite.com/Get hashmaliciousUnknownBrowse
  • 199.232.214.172
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
M247GBfn.msiGet hashmaliciousDanaBotBrowse
  • 89.40.206.111
172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.dat-decoded.exeGet hashmaliciousRemcosBrowse
  • 206.123.138.32
Shipping Documents.jsGet hashmaliciousRemcosBrowse
  • 206.123.138.32
2555 750.exeGet hashmaliciousRemcosBrowse
  • 172.111.244.162
DOC101@%$#@!# (1).exeGet hashmaliciousGuLoader, RemcosBrowse
  • 172.111.244.137
x86.elfGet hashmaliciousUnknownBrowse
  • 92.249.48.62
192.142.102.239-x86-2024-08-14T23_28_18.elfGet hashmaliciousUnknownBrowse
  • 92.249.48.62
SecuriteInfo.com.Linux.Siggen.9999.23751.27873.elfGet hashmaliciousMiraiBrowse
  • 193.160.72.150
botx.mpsl.elfGet hashmaliciousMiraiBrowse
  • 168.80.203.80
https://mytools.graphic.com.gh/UoqgxGet hashmaliciousPhisherBrowse
  • 195.133.83.100
ONEANDONE-ASBrauerstrasse48DEExeFile (233).exeGet hashmaliciousEmotetBrowse
  • 74.208.45.104
ExeFile (249).exeGet hashmaliciousAZORult, PureLog StealerBrowse
  • 82.165.119.177
ExeFile (260).exeGet hashmaliciousEmotetBrowse
  • 217.160.182.191
ExeFile (267).exeGet hashmaliciousEmotetBrowse
  • 74.208.173.91
ExeFile (278).exeGet hashmaliciousEmotetBrowse
  • 87.106.46.107
ExeFile (305).exeGet hashmaliciousEmotetBrowse
  • 87.106.46.107
ExeFile (317).exeGet hashmaliciousEmotetBrowse
  • 74.208.45.104
ExeFile (323).exeGet hashmaliciousEmotetBrowse
  • 87.106.46.107
ExeFile (333).exeGet hashmaliciousEmotetBrowse
  • 74.208.173.91
ExeFile (347).exeGet hashmaliciousEmotetBrowse
  • 87.106.46.107
TENET-1ZAProof of Payment.exeGet hashmaliciousRemcosBrowse
  • 146.70.137.90
sora.arm.elfGet hashmaliciousMiraiBrowse
  • 146.65.242.103
teste.arm7.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
  • 146.230.220.255
45.66.231.213-mipsel-2024-08-09T11_47_09.elfGet hashmaliciousUnknownBrowse
  • 163.200.154.41
mpsl.elfGet hashmaliciousMiraiBrowse
  • 146.236.61.218
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 146.238.134.127
185.196.11.135-x86-2024-08-06T18_49_53.elfGet hashmaliciousMiraiBrowse
  • 146.236.61.249
154.216.17.9-skid.x86-2024-08-04T06_23_12.elfGet hashmaliciousMirai, MoobotBrowse
  • 146.69.37.143
77.90.35.9-skid.sh4-2024-07-30T07_10_53.elfGet hashmaliciousMirai, MoobotBrowse
  • 152.106.28.80
botx.mpsl.elfGet hashmaliciousMiraiBrowse
  • 196.248.26.3
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\version.dllPsiphon_3.179.msiGet hashmaliciousHTMLPhisherBrowse
    C:\Users\user\AppData\Local\Temp\nsc1E86.tmp\System.dllHolyTom980.exeGet hashmaliciousUnknownBrowse
      https://xiuxiu.dl.meitu.com/pc_channel64/xiuxiu64_pc.exeGet hashmaliciousUnknownBrowse
        ReimagePackage.exeGet hashmaliciousXmrigBrowse
          ReimagePackage.exeGet hashmaliciousXmrigBrowse
            SecuriteInfo.com.W32.PossibleThreat.20191.6097.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.PUA.iWin.17190.677.exeGet hashmaliciousUnknownBrowse
                http://xiuxiu.dl.meitu.com/xiuxiu64_beta7.exeGet hashmaliciousUnknownBrowse
                  https://download.zotero.org/client/release/6.0.26/Zotero-6.0.26_setup.exeGet hashmaliciousUnknownBrowse
                    2Ir9YQkiGJ.exeGet hashmaliciousUnknownBrowse
                      theword-setup-en.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):1960
                        Entropy (8bit):5.332766844549583
                        Encrypted:false
                        SSDEEP:24:YxphT/fCI3Rb+a0Lh7JWCxJAYDJAYQtqFsRt7RtNRtbRtZRtLRtFRtQ6RtaiRtQE:YxphjffB+NLTWKPfHvHk
                        MD5:6759B6D9CAA66F4483FF25BBDFCA9E84
                        SHA1:16233624AF89690D7D7EEF952CA3A3B8C68576D2
                        SHA-256:16FD7DF6E68DA138D7A005C27E53049443F7AE05383719AC397E8ECA3CB6EE6C
                        SHA-512:27559550181E393963CA768311AD44044080C3E6DC989885D2E3820433DFF81303084BC501FADC2F31F41807D29BD51DB4DF4DA617EAE4FB36FE80D19CAEAD92
                        Malicious:false
                        Reputation:low
                        Preview:{"instance":{"instanceID":"instanceid_FAw7LhfdG7IOxhJyWBCiJGMxz7PDKe4OKk8Hnio5IibGpaOw","isLoggedOutAccount":false,"locale":"en-Latn-CH"},"user":{"accountUsername":"","authTokens":{"earner":{"Expiry":null,"ID":"token_tracker_earner_9c47b37948e0e55ff63f371d69ecd9aff8f0cc62149222c864cffade1fe2dea1"},"indicator":{"Expiry":null,"ID":"token_tracker_indicator_14c84dbe13ceb3625870048c7e594066803485557277d17111cf94ff9f7e3d61"},"spender":{"Expiry":null,"ID":"token_tracker_spender_c4940f756c336c2330379a7645142e35764ab32f8f7846f37c2edc8676eb9a97"}},"balance":90000000000,"cookies":"AWSALB=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b; AWSALBCORS=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b","isAccount":false,"purchasePrices":[{"class":"speed-boost","distinguisher":"1hr","price":100000000000},{"class":"speed-boost","distinguisher":"2hr","pric
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):1960
                        Entropy (8bit):5.332766844549583
                        Encrypted:false
                        SSDEEP:24:YxphT/fCI3Rb+a0Lh7JWCxJAYDJAYQtqFsRt7RtNRtbRtZRtLRtFRtQ6RtaiRtQE:YxphjffB+NLTWKPfHvHk
                        MD5:6759B6D9CAA66F4483FF25BBDFCA9E84
                        SHA1:16233624AF89690D7D7EEF952CA3A3B8C68576D2
                        SHA-256:16FD7DF6E68DA138D7A005C27E53049443F7AE05383719AC397E8ECA3CB6EE6C
                        SHA-512:27559550181E393963CA768311AD44044080C3E6DC989885D2E3820433DFF81303084BC501FADC2F31F41807D29BD51DB4DF4DA617EAE4FB36FE80D19CAEAD92
                        Malicious:false
                        Reputation:low
                        Preview:{"instance":{"instanceID":"instanceid_FAw7LhfdG7IOxhJyWBCiJGMxz7PDKe4OKk8Hnio5IibGpaOw","isLoggedOutAccount":false,"locale":"en-Latn-CH"},"user":{"accountUsername":"","authTokens":{"earner":{"Expiry":null,"ID":"token_tracker_earner_9c47b37948e0e55ff63f371d69ecd9aff8f0cc62149222c864cffade1fe2dea1"},"indicator":{"Expiry":null,"ID":"token_tracker_indicator_14c84dbe13ceb3625870048c7e594066803485557277d17111cf94ff9f7e3d61"},"spender":{"Expiry":null,"ID":"token_tracker_spender_c4940f756c336c2330379a7645142e35764ab32f8f7846f37c2edc8676eb9a97"}},"balance":90000000000,"cookies":"AWSALB=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b; AWSALBCORS=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b","isAccount":false,"purchasePrices":[{"class":"speed-boost","distinguisher":"1hr","price":100000000000},{"class":"speed-boost","distinguisher":"2hr","pric
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):49120
                        Entropy (8bit):0.0017331682157558962
                        Encrypted:false
                        SSDEEP:3:Ztt:T
                        MD5:0392ADA071EB68355BED625D8F9695F3
                        SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                        SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                        SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 400 x 100, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):16484
                        Entropy (8bit):7.967953919787607
                        Encrypted:false
                        SSDEEP:384:4C9TxGWrQCK4MHC5cYEN3NWQBNDE1GNMur6fa8F89CI:4C9TxXrQC2HPYEN91HwGNXOfZqcI
                        MD5:08B36B5183A2F59EA4B945E69D1DC56F
                        SHA1:69B17763145A4F6A92493CFE57A7132C80AB2D0C
                        SHA-256:F1F61A3FDE6BEAF0F24AC19A729D6E596AB305BDFE2E0F75A69C5157F2495101
                        SHA-512:2E1618B6E9D5EC3FBEEDFD0C9A93E71E7A0DED26D22EFC359E5D887FAB47A77EE5E57DDD88E70A5DA22E9D89D31A0F197B0D843C419887B3685FD83187E7DDA0
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR.......d.......fw....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.paint.net 4.0.5e.2e..?.IDATx^.w..U.._..n2.i. .C.. J.r...(`D.(*......].( .......(...q..kX.D......4]m.S5....<....T..U..7.....@.....A...M,nX.7.A9.....]...........hy9r$......X..g..c%....jb..`..-/.@(............~..f*|.5.k-/...`......,x....!v...MP..Bu9B.w%......iy...8:t....-J.T..n(...|-/.......\..#.....Z^.A=vBm-..J(.^-=.....Z......G.K......<G..&........s.H6<{'.~..g.......R..:.<.?.7....U.jy..u....<.L...^..$.....^.z!.......jy..u.....<.TBa..}Z.0.n.f..K.....t..x...`..Z~*..../..j)...r.H%<..........-.o.;>...#....<;S...l{-/S..V.O%-...V...i.l(.5..4-?[..g.t..Z.92...K.3...T./c:_....$tS..<;O.V.9._.fz&A=.!.A....Y.|....8J;..P......MP..P.....x.....~...-P..$!3..!.P..%s...!.Y8.Tq...,..*..b.<&.P...Z...(......s.H.<.C.Z^6A.dZ.....9.R.....H-O..A.CC".9|..!#..z...Z^E..D"".yl....}U_...(.LX....Nx.....|...-P.w..n.a.*(Du..kT........H;&.P..P..U.% ...<..'V(.!.G...(.qR.h....n
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 388 x 404, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):9910
                        Entropy (8bit):7.936235772936234
                        Encrypted:false
                        SSDEEP:192:hutEWj6HAM/fW7Xl5zsWCLDJgDxJpyaniP9KtYPan0Jf90YOvEF8:hutEghyfMV5j2EpJi1ZuC1Dw
                        MD5:E708E1E407BF824652BA72FC682D113C
                        SHA1:3A069826F16E1F8485410A6B414311DA843A912D
                        SHA-256:620E079BD083BCF3F4A31653BDB37335ED319BCC1C61D0F0CAB5E76140498C09
                        SHA-512:58A3FC0D57493E2C988E7963EC14E213CCBD13B278126EA780696EE928B57E498462DBC6DD8C8E2DA284CD2BA8C1438FB5857A641C848D9E4377D2E667036D19
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR................z....PLTE.............................{.......F..:k*s.1.....=...............z..w....y.c.lKr..0!3.x.<)>8#D.........q......z...b..[.._..]..........V..Z....X..`....d.....U..Y..e..g..T.Hj..............S.....c..0..i..d..j..k.....j.....l.Kn....Fh.......Bf......'...........Z....+.........@d............A'..k.....Yw....|....1...c......s.H..FN....f.&..7....m..!..6a."+......#~...hi..`..x..X..!..m..8.v9....&T.....S..^.{..b2.V..Vk..G....p7..=.......>.........U.........^.\c..g.SZ........h..O.J.Tu.....V.C.<D.5=.:=.....i.......o.....b^.NN........j......*?......t..Y~..i.ti.....b..S.:W.........F......(.}d.........29.ek......Fk.i.....pv.......".VF..M....\.............y..\..G.u{.jf....lG.3......to.........ys...b....2K....K...'tRNS...."O<&^Yg.FTTF.F3.DX...T.p.dS...........#PIDATx...Yj.0...L{ .l.6H.....C..I..3.".B......i......m..^....n.K.>}...2.|..]......A...b.....#.C..xlP......>.)Z./B.....|....qD...$.m:#x........$.
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):7704
                        Entropy (8bit):7.9508788532251655
                        Encrypted:false
                        SSDEEP:192:Z1d9Mzx8Ljf+kQpHbkKYibZp6KUjVNQZcC/7sUzv:Z5Mzx8Ljf+zk2pWVNhwv
                        MD5:286219B85A1E164CA230105DD4A8BEDE
                        SHA1:90764C281427876BD4181D9A131E66E855D24A45
                        SHA-256:3517D9C2EEC3B0255E04C464575D0AD0124C5A14DE087007E5F083978EDC718D
                        SHA-512:BD191F75A45C0559301CD9C9E2CBB586643ECD1855B5A6709AD8E0FB1F5C576029D2412B05E3FF8C884814296184326366DA429B6C72B84F67BABA3E48A2F598
                        Malicious:false
                        Preview:.PNG........IHDR..............>a.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..]I...y...}.......e.#..B#.F9.9.1..`.b....p .h...O......B....... . .F..)v..M.2....}_+.......b.~.k..^.....y....1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..-.....,\$/.....S...I.......j:a. ..J^.$-...7I.f.a..@.:G^X..;.~.D .O.p.P....(~..\!m...:.&..-.....g.u8.. .....-...1..Q.....i.L...=....%.e..{.&..._'/...GK.....Z..5.I.k5...:...A.J..#|.......x...c.v...Y.D..J.=.......!.Y......'..-Yaw.J.......*}J..S>Z...{_.G...../O}...I.]...........`..G1...3.............7..?......F. ..e.....J%......#s[...k..;..to....EG.......Wd._[[../..!..G...y.v...R)..W"_.L.J./.U .D..]C.G...j.;.G../8.<.....t{ee.^..uY.,...{....P+............^I...B.......@.....)b...|.l...../..o...|...wI.<....}...f .\7.;..@*.&.p..=.....Q.lp..MJ..dyyY>...Z.....JDY"..d.x0..)m....;........ .@.@.s#H..........e....5..Z....<...e.E.=..5..._.6F..8..3.8w.\W..`......:.....U.[.........X.....J.x..Vr..%.......,w}..Q...0.7..I.n..xb]G.~..
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 32 x 7904, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):52207
                        Entropy (8bit):7.969320259594288
                        Encrypted:false
                        SSDEEP:1536:jwygiH5MKBCrf6n2QlITH+TvEMCFDM/e5lbV:FZNCiEHQn0bV
                        MD5:722CEB7B1F4A8E338CA9582B10CED8D3
                        SHA1:C3E49967B8ED69AB9EC6A9F927B529CBC479ED73
                        SHA-256:9A97CA877033652187DC9BB105D1A6CB7E041B9779982ADD3576EEB8DFA2701F
                        SHA-512:4B902307444F4DCFFCCB214D6ED07E35343D9D5C014A0B9ED75B8DAF97B91F3DC57774DBD656ABAD6601F48B75AC4D0AF44D880CC3EBAA3A554828205AD2ED6F
                        Malicious:false
                        Preview:.PNG........IHDR... .........b.s.....sRGB.........gAMA......a.....PLTE...................................)..2... $..."........T.X\.....$.*..uz.......mr.OU...l.}.....#(..Y.CH$.[.....d.fi..!.......3..:>.Q...LX...w3..M..t.15Jf..HO...H.r.$~..=.]fY..u........N....,5.j..).....:..-.~..A...x..t..'.......Uj..Vt.NQ...[%%}P.}.......J.IIIp..jk....A^....`..)J.F...t.FH..~#.....i.W.Z.$ ! w..5S.~.......01.s..d..fee)..tv..'<.Ug...k..]_.H...f.......trt.......K...2.@.b{....o....M....\........4F.....@w....WVV......+.......!6A.gs...ma..\...V/n.......og...e;........M.AU5;.2110.X........x...c...W.....b.....:...}..`K{O....q.t%c.>>=....n..D.....Tn....f4S.!.^Z.qpC<...HW......d........Y.....EF.._......a.b.9#....kx.:..~..B.H<q.Z.a3.t@i_.>.=.hu.....!.f......%..$...H.....K^..*?.k-8....#tT97in82E@..~.'..}.c^Y2..z.Hs...U..c.2X.Y.F.....tRNS.D..Y".'.......p.,.j...qIDATx...X.W.?........O....ADPH.+".8F. *"*...n.7@..><*.4..F.../..F7...k)..E..../..."..ou.V....m...h.]w7..$3.|rf&0.9.|o.....
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:Embedded OpenType (EOT), icomoon family
                        Category:dropped
                        Size (bytes):25544
                        Entropy (8bit):6.2856527324339
                        Encrypted:false
                        SSDEEP:768:8AQHnyHsqQ/wFJ+AwV4UPxHMjKiM3C4R+qwogeeZq7g8Y:8AQHnyMqI6GPy63rEogeeZq7g8
                        MD5:79CE7E9887A670AB6A18EAF59CAB7FA7
                        SHA1:0C3C11723E52BC35F8A69C5ACD37AEA959A3E2B7
                        SHA-256:24F0C91CD083494F5475C9DDE62F4477EA9FAE06DF25C398949781FF879FCD83
                        SHA-512:95E2686590CBBD8BA86D006590EFF3E83CC5E29CEAE2342C949673A53B1CBC8B9A1E309742572BB67B49A2E03FBAEEB746A0C8132F379D08C5DB008C28039A27
                        Malicious:false
                        Preview:.c..$c............................LP.........................3$i....................i.c.o.m.o.o.n.....R.e.g.u.l.a.r.....V.e.r.s.i.o.n. .1...0.....i.c.o.m.o.o.n................0OS/2...Q.......`cmap.8.g........gasp............glyf..........\|head..V.._<...6hhea......_t...$hmtx"..].._....,loca...4..`.....maxp.].%..a\... name.J....a|....post......c.... ...........................3...................................@.........@...@............... .....................................\.@....... ...r.... ....7.....................,.4.7.:.E.K.W.Y.\.c.|..................... ...r.........7.....................,.2.6.9.D.J.T.Y.[.b.y.~.......................a.....]...................~.H.E.C.!.........................................`........................................................................................................................79..................79..................79...............".U..."&'..7.>.38.12.......&'...#".....#.#"&=.#...+."&5.4632.
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:HTML document, ASCII text, with very long lines (35110)
                        Category:dropped
                        Size (bytes):3096216
                        Entropy (8bit):5.538652298715578
                        Encrypted:false
                        SSDEEP:49152:DnabrCjlQyjRO6U231I788BIOxF0alPPrRYmSWrp7uniB1RNOoLqWIaN7ldtF4xH:QOxCEtwhcSdyT
                        MD5:AC29386BFB2CD747D4E4F4C6ACB02D1C
                        SHA1:B1A25A6AC9CFADD39C2A4BC8A10C71398B32732C
                        SHA-256:22C54BDBC15BB3F4D84A7FFEAFD310ADF6A0DE9C6DA45952EAD449FCF5B80258
                        SHA-512:92FC1328CB86F98A87B792385776A0B9D2BE81F7ABC846D7C9C0F928B66C08AF3518FBB886D69E2ED5B2FAA73FA024FBA7F29576DCDB78FA3C05CC6173D09F02
                        Malicious:false
                        Preview:<!doctype html><html class="no-js" lang="en"><head><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta charset="utf-8"><meta name="viewport" content="width=device-width,user-scalable=no,initial-scale=1,minimum-scale=1,maximum-scale=1"><title></title><link href="data:text/css;base64,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
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 388 x 404, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):9178
                        Entropy (8bit):7.933402073105207
                        Encrypted:false
                        SSDEEP:192:S+0F3jedyxpqMmr97ll0QBRjxKyzRSqdAwAIWARfnIIOEDxkZeZrw:gjyyDqxr97ll0QBRjxFzDoIWARvII9a7
                        MD5:54A1016B9972EB3212C0C46148C57EB8
                        SHA1:C766CB1A2CDD7390873F4C6AEF6A868B53C8E331
                        SHA-256:BC35AA6BA249B5E9BA38A0345E354589450751CE63AA5455567B8062A37C7597
                        SHA-512:C6289A72361AEEDCA179CA22DA8B6D632356A68AD660E5A1C59472792F6D762E52CE907DAB9A7C9425AEC5679F3AF7AD17E4A3AF45E7ACB131D086F3E4DE7819
                        Malicious:false
                        Preview:.PNG........IHDR................z....PLTE.............................z...u....E..:.].u...Oj.@d.Hx.....x~..p....xPm.b..w..\}...z.............#..$.....!....!..%...... ..Hj."........%................... ...............'..$.......&.... ...."..$..............0.......).....*.....(....(..........+.....m..,..'..-..l..,...~.*..n.....o..Jm.Be....n......+........-....o......./...'....Xy.....p......+.}..........v..!......C.H..Dy...~U...'.9....I..k..e..c.....6..5.0...p.#,........T..E....GO.......=c. ....M.."..^e..<.0.....2...&~"....f.......6>.8..3.......da.6..0\.!Q....H..`..U...~.............o.....*..2..;...`.h..A..[..~....MM.8;.q.....4.....=...........qw...@G.......r..%....."..T[.}u...............-..W.P..d..*A..n.X..Ef.y..<Z...-m....RY..........w..6Q.~.)>.......p..u.9S....tRNS....!O&^<.g.FTF.TTE3.......g.... pIDATx...Ij.@....A..........1I....S....>....^...=..F.z.6...N..:.q..N...1p...m.s`.....I.....\...z..`..p).B...A....{.1.b|.B.n. =.[...(..F!..
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 200 x 200, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):4283
                        Entropy (8bit):7.754381978494951
                        Encrypted:false
                        SSDEEP:96:qc/7kHkCHEHjXan7z/gOOJj66jNBWxfyJBOlfCSh+Yl:qcTokBXan7UOGLjKxfeBUnPl
                        MD5:4E73FC2EE755F35BC816F07CF640B2A2
                        SHA1:B16CF6588D9A31463121829955AE010447DB2F10
                        SHA-256:0E9458EB26515B4AFF8769E3E9D67836110824CD4E016C18E571DAB20A6A53FE
                        SHA-512:C5893B8497BEDDE2919DFDB2799F06E4E8AE6029B39218737F11E47E953E62CE027AB6423C3BFC40A601482553F80BC8CF07B379807297B895A7ACC5642D3291
                        Malicious:false
                        Preview:.PNG........IHDR...............^.....PLTE.:&.<.{#.............>.....kV...I-.cR._H................ZL.......aI.C+y#....^O.L<....o`.|o.zm.......iV....vd........hU.....eS..8..S:.R:.s.gU....[M.YK.7$.?).bQ.6..mW..z.xe.\N.sb....}...ze.nW._P.UC.;..:..<..<..>..8..5..=..<..7..4..7..:..:..1..8..8.....3..2..5../....;..:..9..2..7..:..7..8..5..=..5..1../..4..4..+..2..2..1..).....(..-..-..-..;..nW.6..8..5..*..-..*..*..)....&..bI.J-.4..4..(..%..2..&....0..&...../.......+..*..s.+..,...+..).|$...}%.....'..V;.{e..~%..>..........{$.....s..;..;..s.<..ze...<..=..\M...<.._O.....8....bI......9..2..4..=......ZL...V;.4.......:.........hZ.VD.XE...`P.M8.fY..p.....6..qa.r...F,......m_.@0.....H5.B1.G4.]G.kW........]N.<...........;.....q.]G.........eT.5......9.......tRNS...................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 90 x 90, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):2661
                        Entropy (8bit):7.909873530373701
                        Encrypted:false
                        SSDEEP:48:3ERCUYUEogSlvqERAphLnF4AnbI3eXvtoRqQwObJxlyLixVEpkX12:3fz3omNHnFDIO/tmzDl4ijEpi12
                        MD5:CBA396707A4339C9EAD9AC6DDE96F93D
                        SHA1:9CF1CB627B595C90783E781F2698176001848AD8
                        SHA-256:558CBA644707914E8172333E6D8B8D73EAD464E93C2D1EDE5DD20BD64BD108C8
                        SHA-512:913D703B0A5E8191E6A8659AE7496CCEEBAD2D0EC3629EB1F99F9B67DEDF6ED985012F35F602205DFF27D9F8A0697C580691B2460BC3F28D2B09770FA271CE74
                        Malicious:false
                        Preview:.PNG........IHDR...Z...Z.....8.A....,IDATx..][l....V....."^MpJH)...R.4)AJ..M/B.I..>..R..&&N.]#..R.....C.%.B.p..ZH.!..d..e..0..C:3.;....YK.hl..........g...O&S.'...h.,.......bhK...Ob0....[...P.s.....<dI/S...|...w.]...1.6..|..`.l.l..P.S..uP.;.H.e...t....i....g.^...N...,...P.' K#.%+,..Qy.........T|3.o{...:d.#..+Y3.p'..y.x.o{pf.K..F....^.".M...y"...*.Y&*.MP..P.v.@.#...q..<]..@i..9...t..TL+.nb^.g.qNZ.......r(.}..&&....rZS.@n."..*....`79k......yP..P$u..<F.&Z.P....q)......x...E..HTHu|x(.1..5:.{..=).3.......Eg.n...2.3/.x.Y...6....].m.W....F..w........k..8...|=..`p..../m.q.........`....hL.....1.kg;.TW...l.n...<..+..=......i..+*....."..0p.TXq.....N>....j..Q..&...9i.H...O.K.V..aPz'..g.4.8...%P......xN..x ^.....D...1..6...V.z.:...4?i...<./.SXq.zvX..lV..c..}.0.aM.....x"..PF.[.A.5.M.~P..,..G...R.6..y#...n6..=...D.A..:nEd.(5/`^...e..x..]...g.........&.x...#.D...eU..N.. ..;..f....8.D..Q.}Y&.... ..#F6...d7...q..B;...9...L.....Z.i#....S..X/..#]..T
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):5977
                        Entropy (8bit):7.93144509027021
                        Encrypted:false
                        SSDEEP:96:fk3KslG8wrzhAZGoBb89gTsjues61+zOKF+/oLqC8fiVm2nJIA51xgI5xnTQZtIy:cNlOlAZvBw91KeX1HRC86VXuA51xgWxY
                        MD5:8D890C253C374EA27981CBCA386D69D7
                        SHA1:612FEACFBE10780D685B12AC450346BA8AA85DEC
                        SHA-256:EFE61D586AFF065712F15AB38AC602447B625B0FB21BB8E3FACF14AE453BB431
                        SHA-512:34D05BD9DFEB63B6FE56FF9CD0FFD686806B72C08A22808D4A68C580DD058C8EF52FC43A736EC14456B93A6CEA3DD2317F058581C2630CE8216E3813F69426E9
                        Malicious:false
                        Preview:.PNG........IHDR..............>a.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..]{l\ev?.~.5vl.y..M..D.IYbv..e.X..hH....V.&j..J.B..@.iW.m.m.`i.E1....aix.....).<.$~..y?{.}.w.....H_......~..;.;.c..1c..3f.1c..3f.1c..3f.l&..s.~........?3..P..w`.`[-<......a.#....Ch.e.O.."..b.(o.......t.y..E....&+...........l2...=.GzN.4.a*...x{.t.>F..N..(.v..&.L....\f3.....E..'NxL#.-?...e.F.b..K..7......P......Ob.6MLhw2.]e.@.6..xiW..`.......7.Sj...kJ.......#...O....I.,]..4r..FY'.g.|.......}.t....hF......|9X=x[ 0#.S4.R....J..w..#...\..^^WW.5.N! ... ...3.w%..8..P|.ps........=.....^...w..1.D...V.03.u.........WWW..+.....V..:5..|.^.x0.....b....[...x..z.......v.A..2.A..q3$..W%.;.....s...2{.w6.^/.......].._.|...u...@L..pW..F.B...&.?L.....f.'.P.W..r.(.1Lp$(....c..i.c.<..[..555R.W......?...<[.....NA..g".x..9.Z..z.-..v...:......kb....9.@h...5S#...y..G.....yAg.E..k....j..o..,..iI.@."..yI.7.|S.|).,..%.p8t....1.C.i...!....u...o....E.[ZZ.x.g)...S..\A..{.Lm7.*....Y.Q....'
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 388 x 404, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):8974
                        Entropy (8bit):7.933153833231728
                        Encrypted:false
                        SSDEEP:192:8tZFs49sYdbdIBzQT8Rnd4mA0XJn3U8Gm3hIzRmFgtLu:eN6kIRnd4g3/GNzQFg8
                        MD5:F5459AA2192521674679ECDC0C477666
                        SHA1:F0079A87768102419ADF3651105EC447026F48AC
                        SHA-256:AD47922C22F8FFA5FA7EF32F16E431DB4BB7ACF5646E2FC5191A6C455602C950
                        SHA-512:3D597FF722BCF23CB271CC59D08B5A477D20C3AD1CC38F2ED21879948776057BECFB393E9321E252681C2912952A06B716FF2AE4F74C5A8EA50DC3BAA971890C
                        Malicious:false
                        Preview:.PNG........IHDR................z....PLTE.......................{.....Fm.E..:...#`.*t.......~............u.J..y..wi.Bj.E\.;L.0..u.8..< ...b.?..{...F.-T.7..z{.P{.N.....F.1...F.3F.5E.9H.(z.TG.*{.RI..E.6...E.8G.,G./G./G.-G..Hj.I.!J..E.:H.&H.'..3z.VI."I.#..I.$H.%E.;D.=./.D.@C.DD.>z.WC.BC.F..B.HF.=K..H.&D.AJ..H.$J..B.JC.GJm.Eh.@d............(........3..........i.@......q.HXx.b.7..y._eV.)(0....$...hBJ.Q..c......s^}..=.'..7.....Y./.9p..o.Ml...........d.J..:.FQ.#5`.F..s....... w.Rh?.@.I.SY.`].qw.....Cm,.X6.KE.;...BD...]Y.A............G...D.J>.A&V.z....s"mbK.0Iq.........yg._L.+C.k%v_(.[6.X@.V........E.~B.CQ.5..........?.K...........*.Y0.Q<\.H..{t.Pr....'<...]d.v.j........E..J.U...Hw....H~.G...s.F.....'./.]\..<...V.ck.!..,..C.f6r.f......K.v{.......#.....H.....}.P{.c....~....&tRNS...$O<^YgF.T.TF...4.Y..s....SD.............IDATx...1..0.@..QD.".daa........j;.[.+|9..`R.=.3F.M..Pq.a...B.&."....d......;0U45.s..c1....%.W.v..,.v.c......'.....a. ..J.-.$^#%.K.F..H
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):2374
                        Entropy (8bit):7.8360684332624135
                        Encrypted:false
                        SSDEEP:48:3FjMaBL+KcpcHSqLjxaRzjXLdqKOn6GQaE7/rRmgKmNS1Lx:3FLx+57X0KF/cgej
                        MD5:9A4EC70981F8350743001D2FC21E7167
                        SHA1:B661690CF4E61F16445D29BBAEB16A1D4184C2EB
                        SHA-256:524ADB0EF98AA34A4FFFFE2F4B9476443E78FF8C001752D114B1598C57C401F2
                        SHA-512:75F1927286D586E2756DD59B16B59ACA421A380DC54F068AD0D4BD0F7C11007D7DE147069240CC5A59CFAB1AEDBF2CCA2E6FB5A99BB230F0F1DE8CEE9E2B76D2
                        Malicious:false
                        Preview:.PNG........IHDR...@...@......iq.....gAMA......a.....pHYs..........(J.....IDATx..ZkoT..].>..x..x.....%..Q.Q5.U.VJ.j*%.Q...)...*.K.J)".ThP......P.$-i.Bp....3c{^.uN...G.+..0....a..^{........z.........@....t.Y...b....J........c@.@i..^.1 ..^..........V.7>...p?...|.as....|...k....u.a...Y,A..Ca........3.{.oh.....u.N.*....J2.gOA.&.\..Uk......"...G..o.*..x.s..E8S..C.0.h).$R.0@X....s..f.{....E.O....=..H....Q....\......g..zs.&.o.b.....l.....w..a.K..p.k...v...'.C.>..^.....l.........j..{....2.....ob.".....a.{.F........ @X..?:...........?|F.e....=e......c.".q3.e-....$Fu._..?......."n..;.."r.Z*.D.G5O....,J{^@...../.Q....*..V.1..........i....@..H.Y.....g.......aB./ K.....]*..0.%.my.......#.w......y...^.6.....G9;..~.....?..&.R..g.+v=........s.WQ.|.A...I..@.XBe....'...F..j.......u...../D.6}.V ..6.V....HA.@......?y....:.f...../~c.........v........*..y..}.t....%.'I.B.7.M.o..u.....0S..n...WP;...R{jy*..l.F.....3u.V.6.@..q..J?y..tW..'.X.]..FuN_n>.b.R..y.v..[...WaH..D.^.
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 200 x 200, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):4272
                        Entropy (8bit):7.743484127474195
                        Encrypted:false
                        SSDEEP:96:Jk8phHc8z0TqlWnB6yM/WGeUgdJAl1iC3l0HiXYp2IMYiS4:GKc8z0elWq/WG7gPu1iYl0CopBMYU
                        MD5:87630D356AACE4ED1E3E7EC10BBB5D51
                        SHA1:589818500FE5A27B5FE68F234211998DF129BDFB
                        SHA-256:AE15FFBB69FD4D367D02F6678E475E0A65ADBF5AC9E919F0AC13A59E31D9ECFA
                        SHA-512:01323EFFBF4B92052288F6D8C0FAD98FF196B7A602C7524DAB536840DAE17CFE091205ED20523950C0987394086E2EBC064A689A60207F57AF707BA48237FCEF
                        Malicious:false
                        Preview:.PNG........IHDR...............^.....PLTEopr............vwy...))*.........ppr...z{}......................................uuw....rrt........bbb.........}}..........dde...~...........fgilmojknklnijmijl`acefhmnpghjmnq\]_bcedegcdfabdhik^_aZ[]norSTVaacRRT_`bWWY]^`YY[UVXLLNPPRNNP...XXZ[\^LMOHHJZZ\JJLVWYCCETUWOOQ>>@MMO......KKMIIKGGI889xy{...SSU...QQS..........FFH...335EEGDDF...BBD@@A112==?;;=<<>...noq::<...99;--.778446224.....001//0../...,,-.........**,...&&'............''(.........wx{...nnpjjkjkm...]]_...........\\]......``b.........klocce......yz{...kklnnoggiffh...ccdiij............jjlOOPkkm...VVV...TTVyyzWXZ......VVX..............^^_...............ffg...............]]^lln{|~......abc...........^^`__`__a......aab.....NNOeee...............mmnoop......[[]........................................y....tRNS...................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 90 x 90, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):1528
                        Entropy (8bit):7.691689024830226
                        Encrypted:false
                        SSDEEP:24:ZqwbCHZlyUAu5CKzjaDEO5kzauUis5Lw6Qnbc23ixI/X8/mYsS4KM09Vtwc:nCHeUAu5qIO5kzXA1wXboI/X8/lcstZ
                        MD5:ADCA537524989B256039E986AC1A0809
                        SHA1:F586F5FFBB617DA85BB0E07F87F420848DB9ACC9
                        SHA-256:2D1B7D277C1D6DD780C343D3A4F11FBB1A17B734740C753C97DE42567DAE742B
                        SHA-512:E11FB750715859CA77308CE8549F29C5CB644AD717961721275787D4F502BCE47DA8C0E450B83B1A89E6FBDF11B029109FDFFD09FF373346911B12D8DA27FD06
                        Malicious:false
                        Preview:.PNG........IHDR...Z...Z......v.0....PLTE......................................................................................................................NNN...PPP...WWW...vvv.........aaahhhfff......oooTTTsss......|||lll___........ZZZ..................[[[...........yyy.......5....'tRNS..........{mQD'..............d:93/#....6{.....IDATX..yW.0..CK....}.....V..*.0.:...4s.j_..[..5..w^n.{.}.PKm.z...(...*..T[!.C...^..MF.HY7.....x5...d%_..'..b9E2.HRr......2}..t=..%........Ee..h../...4.)Y<..r<e.V*...y...g.d....q3.Q.T....3...N..p...[....xx.lC\sC......S....._i..gypw2.......u...}.]..,P.^u...L]IbK^X....[.T:.0:.=......=i..;.t.`ba..&..w...H1..;.:s...93..y.......s...}...tC...Q.?J.L...t...H.&.n...=.57%j...|A.oI.$.nzM.>O.9 {.....>.v....v........=....P.!..D.[c ..I....<\.Z:.+..m...Rr....L.e.....7e.L.B.]...+......'z......H...].h.....z..[.@6,;.o.C.......D.+..b ..e.-S...z.:.:<...CMA..z.....hF?.I.+..^..;=...Un!5...X..=...hG....TDEM.].].'hw ....s.5.6Md.N......
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PNG image data, 388 x 404, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):8982
                        Entropy (8bit):7.926043864342521
                        Encrypted:false
                        SSDEEP:192:GEn9rIFZz0XhujinuvsFGugE+lq6OK+D9M+fYHLDooN:GewchuWnSyLgE+lqioMnHLh
                        MD5:9C42A720E237967BE8E37D4D511C7E48
                        SHA1:0CA0B333DB0586226EBCFA9EC1B9542938D5741E
                        SHA-256:2384C8153041EC891D716F43AA7015334360A002F2142C7A81E78838D045ADC9
                        SHA-512:6E636295067F013A1972CDB42833E1C91F5BE15F605540969FBDB58C5218F032333F5EC3B66B6433FDADEAFE2A31F23CD37403D8067F70D3D672292B992C304F
                        Malicious:false
                        Preview:.PNG........IHDR................z....PLTE................................{..E..:....j,$.4,..|........y..w...eblNK.^Z8('.....}y..u9%/.......{.so..z...`L.aL.bL...._L.^L....\L.[L.....ZL._L.]L.ZM...Hj..cL.eL.YL.dL..^M.0..gL.......^MAe.Fh.Kn......(..............A=.cC.F>.K?.kD...YL.^B.oEXw.........^R....R@...[A.O@.gC.XA..x........x...#+.t8e.....!....UAFN..n^I........7....WS.yn.;.....k..!.u.<%q.RV.E......8A.G)n.qf6`....uY.k.dW&T.......- s.cQ.....zi.D^.NX...U..{...ma.cX........\c.f3h.I[.T@...jh.g.SZ....*..zh.]..f..<bid..fz.bk.gV......Rk....o..tz.8;...ss..fi.....@a...Yj.*?..f.^..>f..........f......~v.XV.IJ....:V..,........cd.g^.t]n...1........ek...y..dD..P..U|O.....@>....L.*9......z.............................~...{....m..........%tRNS..$...O<^gYFT..TF.2..s..TFg...D.......)....IDATx...9r.0..AC..B...LT..........;........2...yy.......X^$H....Zz.`\.N........G...Sm.9...W....M.o..M.......(DK.B...A..Q...|O.l?....(.:...
                        Process:C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe
                        File Type:data
                        Category:modified
                        Size (bytes):524288
                        Entropy (8bit):3.2354772061451076
                        Encrypted:false
                        SSDEEP:3072:S/Xqa6fP95a/vmSoa+pm9epL6xAP19JD3+TleAf+Ckmvt5BfxyWr6gj5lCXRONQe:qH69YbEPpxy7GCkhFBQqLwTV4Yvn
                        MD5:7757AC4BCF123A2CCD158D5B35331F60
                        SHA1:DBF54A51C3C0135524B3EDF60EBCBEE2F29F9C93
                        SHA-256:DDF78707886BDF6A1B18AED2D5A96F959FBBCACFC3D02B5F472D4ACD6C53BE08
                        SHA-512:BF8678BD368D0C1282F8D47294CA5D637D7436019AD759B96C500673E2D06EDC7AD34EC734DFF29C9D67D63B95BA3A62F4D69BD675A5D3B6D0AB257243DB455A
                        Malicious:false
                        Preview:........................................................\.......|......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:JSON data
                        Category:modified
                        Size (bytes):1960
                        Entropy (8bit):5.332766844549583
                        Encrypted:false
                        SSDEEP:24:YxphT/fCI3Rb+a0Lh7JWCxJAYDJAYQtqFsRt7RtNRtbRtZRtLRtFRtQ6RtaiRtQE:YxphjffB+NLTWKPfHvHk
                        MD5:6759B6D9CAA66F4483FF25BBDFCA9E84
                        SHA1:16233624AF89690D7D7EEF952CA3A3B8C68576D2
                        SHA-256:16FD7DF6E68DA138D7A005C27E53049443F7AE05383719AC397E8ECA3CB6EE6C
                        SHA-512:27559550181E393963CA768311AD44044080C3E6DC989885D2E3820433DFF81303084BC501FADC2F31F41807D29BD51DB4DF4DA617EAE4FB36FE80D19CAEAD92
                        Malicious:false
                        Preview:{"instance":{"instanceID":"instanceid_FAw7LhfdG7IOxhJyWBCiJGMxz7PDKe4OKk8Hnio5IibGpaOw","isLoggedOutAccount":false,"locale":"en-Latn-CH"},"user":{"accountUsername":"","authTokens":{"earner":{"Expiry":null,"ID":"token_tracker_earner_9c47b37948e0e55ff63f371d69ecd9aff8f0cc62149222c864cffade1fe2dea1"},"indicator":{"Expiry":null,"ID":"token_tracker_indicator_14c84dbe13ceb3625870048c7e594066803485557277d17111cf94ff9f7e3d61"},"spender":{"Expiry":null,"ID":"token_tracker_spender_c4940f756c336c2330379a7645142e35764ab32f8f7846f37c2edc8676eb9a97"}},"balance":90000000000,"cookies":"AWSALB=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b; AWSALBCORS=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b","isAccount":false,"purchasePrices":[{"class":"speed-boost","distinguisher":"1hr","price":100000000000},{"class":"speed-boost","distinguisher":"2hr","pric
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):1960
                        Entropy (8bit):5.332766844549583
                        Encrypted:false
                        SSDEEP:24:YxphT/fCI3Rb+a0Lh7JWCxJAYDJAYQtqFsRt7RtNRtbRtZRtLRtFRtQ6RtaiRtQE:YxphjffB+NLTWKPfHvHk
                        MD5:6759B6D9CAA66F4483FF25BBDFCA9E84
                        SHA1:16233624AF89690D7D7EEF952CA3A3B8C68576D2
                        SHA-256:16FD7DF6E68DA138D7A005C27E53049443F7AE05383719AC397E8ECA3CB6EE6C
                        SHA-512:27559550181E393963CA768311AD44044080C3E6DC989885D2E3820433DFF81303084BC501FADC2F31F41807D29BD51DB4DF4DA617EAE4FB36FE80D19CAEAD92
                        Malicious:false
                        Preview:{"instance":{"instanceID":"instanceid_FAw7LhfdG7IOxhJyWBCiJGMxz7PDKe4OKk8Hnio5IibGpaOw","isLoggedOutAccount":false,"locale":"en-Latn-CH"},"user":{"accountUsername":"","authTokens":{"earner":{"Expiry":null,"ID":"token_tracker_earner_9c47b37948e0e55ff63f371d69ecd9aff8f0cc62149222c864cffade1fe2dea1"},"indicator":{"Expiry":null,"ID":"token_tracker_indicator_14c84dbe13ceb3625870048c7e594066803485557277d17111cf94ff9f7e3d61"},"spender":{"Expiry":null,"ID":"token_tracker_spender_c4940f756c336c2330379a7645142e35764ab32f8f7846f37c2edc8676eb9a97"}},"balance":90000000000,"cookies":"AWSALB=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b; AWSALBCORS=0PHmaQIRJlBjghB6Sf3vn/VBxJBpCi1i/M/h99zJXoyzPDze/I2chYPybipeHakTKmw20VhARSU8FgKWcaNvf1XugAjXFZha8sxV+fRfyZEZjxCqJkgl0PIYes2b","isAccount":false,"purchasePrices":[{"class":"speed-boost","distinguisher":"1hr","price":100000000000},{"class":"speed-boost","distinguisher":"2hr","pric
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):17515
                        Entropy (8bit):6.084162051969243
                        Encrypted:false
                        SSDEEP:384:USAassmiG11fLTEwwxH718TlSnwuybsyPluUeUMucv:UJau11fLT+CRdZ3IUeUMucv
                        MD5:B9D0B5C921D8078F37B20793ED2A32D4
                        SHA1:12B8F4F54C13398D2698BEE2CBDFECD0FE8B0857
                        SHA-256:1AB6FEDEE71957840BCC3B741BBA296BA52B8970DDEBF8AE3AE26C383C7D17D5
                        SHA-512:B6E9BAEA7A7FD7B5BB4F089305F5CA74067BCA7D5255D75B4FD429D06A76A51ACF417672C9EEF9ECC8479F505C35840ED3B9EB6373323FB8D1DAA968B2A2D95D
                        Malicious:false
                        Preview:{"AdditionalParameters":"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
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:ASCII text, with very long lines (5604)
                        Category:dropped
                        Size (bytes):334122
                        Entropy (8bit):3.4749666152199548
                        Encrypted:false
                        SSDEEP:1536:CXTmAlHem/HempllPHqTzL6rx0s6ffAQPlSUGS8PowI1iNncn/jBMkFbHpA2eFxd:k3gf4eumWxCAEX5nI
                        MD5:A9D437CF9D3621F5D5E9C42996837CFA
                        SHA1:79FEDD8F8270394FDEA5B9A7F62A3E2E355FFA1E
                        SHA-256:C98E3DA6781419BF9A0A466389FCAD0350526643228FC631D3BCF3A5F5CABF0B
                        SHA-512:7D201B70A540A9E097551EA6CB74E90292A8052E4828EE3BCE21E3DA78641E518153EDB75818F6353CFDBAB597FADB7F7CC37B3FE346A8CC1B90A6781F9447D0
                        Malicious:false
                        Preview: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
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:MS Windows icon resource - 4 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48, 32 bits/pixel
                        Category:dropped
                        Size (bytes):32093
                        Entropy (8bit):7.008386947240903
                        Encrypted:false
                        SSDEEP:384:Ma+spcaaW1qorW9O4p0xmBdE818j1G2ZBu9cb4pE6KZsMeSnmJBz3JJIgSzwlV:MaICVrWA41UFjrZ49SRnqzvV
                        MD5:69ACA4895E720268EF658026D7EA04BD
                        SHA1:8F1DC29E3B1D5B5826BE277FCAAE2B7C3B71EBE7
                        SHA-256:52A1B391DC8C5489E679704CDE4299DC1F0508C00B96143991E565E1300EC2D0
                        SHA-512:293E07A5874BD11F2AAD03955C199E9756D75D45EB855AF0B01637900194F8DEB7BBD2311BFE8CF500CBC834FE050E8EDA199221E99DCB83A8DE3289EFA61CA3
                        Malicious:false
                        Preview:............ ._B..F...00.... ..%...B.. .... .....Mh........ .h....x...PNG........IHDR.............\r.f....pHYs..........o.d.. .IDATx..y|[W...9.n.Z,..n..6..6....-.B..|......N..-..t:i.3Ca ].E.N..5.......t...M.8..;."/..Kw;.?d;.-.te...G"..<....{..<...l`.........g#j....j...u4..].U.'8.S....N..@y....j.d....SU.J2.......(..6p..*.@.gw.Ru.S.F.p.gP.....#..u....q/o.....]......+5.....BJm.Ev...!&N.I|.V.kmz,.E...X...>..l(I.c....BEf..cE..P... .*.$..0..M..r..f?....N...^....y..?zO..b..0.ya..".1F.}...Fb.....%......a.3.V.k>]Q$......(.(..".aNv.r..4o........r..5...!.6+.6.......#G...K..iI...K.B......Xt..)....`.-...,....k...x../8.]..xY.zv.[...r.%.......}...;V......+.p.r=.^..c5LS.E.g/(....*J..n?+yk..v........G....aBHe.."..."...3r...-..B-..Z...G.-...`..o?.! <.q.}........gK..rK...o....P<....t..)..^n..9yy...WJht...60M.+..p..mrXp....5..u.............X.P...Bw?......F....#...H..P..r..B9..rXtW...5;....i.`....EJmZ%`.....x.9..uax..=...Wk...#..-./.........|/.|.....k...{...z.m+W,..#.1z.
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:Windows setup INFormation
                        Category:dropped
                        Size (bytes):189
                        Entropy (8bit):4.860217916689107
                        Encrypted:false
                        SSDEEP:3:MrEWN9EVsu1L9N9Eo6TEocyMtovAdYrHGQW7yhBztsW7yyv9oeTiHJjv:MrEnG0r1yA2rH13wyv9BTkJT
                        MD5:69796A5E260347ECC2917779F72C632A
                        SHA1:2F255A7E708CC5BCAECA801B0683F22480021CBF
                        SHA-256:7B1943E9E970AC8226A0F7282998966BADF5697C7E9BCF615510FF89F1675A21
                        SHA-512:E37B27BBBE22875662CF969730CC4C72767DCB864262E4515AC3993936F0CEB0E153C040238EDDBD83084097F9DDC4A85BC242A295A597D3FF67DAA85DD899E8
                        Malicious:false
                        Preview:[Details]..Name=Psiphon..AppId=Psiphon..Publisher=LRepacks..Language=Multilingual....[Version]..PackageVersion=3.183..DisplayVersion=3.183....[Control]..Icons=1..Start=PsiphonPortable.exe..
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:Generic INItialization configuration [Activate]
                        Category:dropped
                        Size (bytes):666
                        Entropy (8bit):5.081537570413563
                        Encrypted:false
                        SSDEEP:12:M8tYof061ct9eKR2/epJT7yk2/epababe2/ep2J:JqG0/t9ec2aJHyk2aababe2a0
                        MD5:13A80331AE779ADDF158DA5D51515B3F
                        SHA1:5CCE658366CC5CD8FAC1F5287D3E15B1AE5C5CF8
                        SHA-256:D463E2CE20E25B2ED290DCF6DC1C01DCC60B5DDA71E932CCFA9F5DDF53E81910
                        SHA-512:59849A3E60A4075C1A743C67109916213112A1BC494DC47B4E85E621BCA8CA4554A155A24F07104846227100C06C7C16BF157E7FC97EB5F00F8121C1B341E2C9
                        Malicious:false
                        Preview:[Launch]..ProgramExecutable=Psiphon\psiphon3.exe..RunAsAdmin=force..DirectoryMoveOK=yes....[Activate]..Registry=true....[RegistryKeys]..Psiphon="HKCU\Software\Psiphon3"....[DirectoriesMove]..Psiphon=%LOCALAPPDATA%\Psiphon3....[FileWrite1]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%APPDATA%\\Psiphon3..Replace=%pal:DataDir:doublebackslash%....[FileWrite2]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%PAL:LastPortableAppsBaseDir:DoubleBackslash%\\..Replace=%PAL:PortableAppsBaseDir:DoubleBackslash%\\....[FileWrite3]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%PAL:LastDrive%\\..Replace=%PAL:Drive%\\............
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):21
                        Entropy (8bit):3.4632805178108113
                        Encrypted:false
                        SSDEEP:3:Aa6YHCn:AbeCn
                        MD5:F634A661107AD3303B6C42887318FF85
                        SHA1:51BE496B367DFBEFAB957B0EBA53E498844451FB
                        SHA-256:CAC5507771A6A6A3A71B552098FD37E820D751C1A0FDE1CFF3D312005ED27004
                        SHA-512:20FE17F5FCB2B42687E241F66D9836C0FD45CDAC721DF590202F056E57E0E1794ED0EBA36BDCC99F21B79F5B41C8CCB4C2344E0DB9A25F41536AFBB317D522F0
                        Malicious:false
                        Preview:upgrade.179.part.etag
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.5
                        Encrypted:false
                        SSDEEP:3:Aa6YR:Ab8
                        MD5:AE02494532CAA325B95B23B58D56CC18
                        SHA1:35C3D82AB347B01975B2465DFF8FFDCA462F777E
                        SHA-256:9D56B6ED246603EF44C4DA904BDEB4024ACF83D988644966CDE63FAB9992515E
                        SHA-512:1DA4136FE03965C33CCEF2C67DBD838E9EB0E3E229E6D70E71B079D7C5E7B89460263C42ADA716BBF8E71F9E3955C1022223DA8589A2C2426D68984D97358F6E
                        Malicious:false
                        Preview:upgrade.179.part
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):21
                        Entropy (8bit):3.4632805178108113
                        Encrypted:false
                        SSDEEP:3:Aab+t9Cn:AUE9Cn
                        MD5:7EFC8FB32656E400472EC1AA98959673
                        SHA1:F9E3C3FD377207E602F540BBC2FAD0DDF5C3762A
                        SHA-256:652F69AFF55876DD5D441F06B96AA66426B908D1F3CB764701C8AFEC6F2537CB
                        SHA-512:B49A76F6AD098E03E2EE52A5F9143EEF8C38C46DA67CE519D65DF785AB98520DE880C41B59C373A9D083260B1DA7EBE0BDC13F4CDEBE481020CF92C604EFC78D
                        Malicious:false
                        Preview:upgrade.178.part.etag
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.5
                        Encrypted:false
                        SSDEEP:3:Aab+R:AUu
                        MD5:8AF4C040E9B9024C1CD6998B2354CACB
                        SHA1:A305105C6FFC98C0831A8F53EEAD26FF9A28852C
                        SHA-256:2B1136D17ED408182B73F5CEA14BEB99A9A52667FA3CD48EDB5AF0B952AB8B33
                        SHA-512:C24B9CA42F94CB0F6FE2E4989D4ED7A0DF0ED670B10222156F945A22C27DE9BD1C40446F0D4CB3E1C42724204334C9CF5CCFF18FD9E93D09FFBE6EDBB294BDF6
                        Malicious:false
                        Preview:upgrade.178.part
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:Windows Registry little-endian text (Win2K or above)
                        Category:dropped
                        Size (bytes):452
                        Entropy (8bit):3.5443803979975903
                        Encrypted:false
                        SSDEEP:6:Qyk+SkWCiiCRroZ6IJl5qIlgCVlEEORaJIkAl8aoCinKPQ1/YlFMeQWlQlHOlP+q:Qy5hVZtrRNEELimCaaoYVjlQlHamEV
                        MD5:E2A203CA6E155D6960F4D7E7E741893B
                        SHA1:A8737102C5A5AABD5B59A29907FBBBC05DF3A9BD
                        SHA-256:863DF7402E7283F531331F0F97381B81700F745E6B312A1977EF5AE2170FF8E9
                        SHA-512:D6C37C12F1F463E0602D603423A0A3AC6C8F088305B020F97F938F33265ADBF24CEAD308639F69DA82ED3083A26C51A9601E9604D3B21CADFCE145A38BCE9D03
                        Malicious:false
                        Preview:..W.i.n.d.o.w.s. .R.e.g.i.s.t.r.y. .E.d.i.t.o.r. .V.e.r.s.i.o.n. .5...0.0.........[.H.K.E.Y._.C.U.R.R.E.N.T._.U.S.E.R.\.S.o.f.t.w.a.r.e.\.P.s.i.p.h.o.n.3.].....".S.k.i.p.B.r.o.w.s.e.r.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.1.....".S.k.i.p.P.r.o.x.y.S.e.t.t.i.n.g.s.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.0.....".S.k.i.p.A.u.t.o.C.o.n.n.e.c.t.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.0.....".D.i.s.a.b.l.e.D.i.s.a.l.l.o.w.e.d.T.r.a.f.f.i.c.A.l.e.r.t.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.1.
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                        Category:dropped
                        Size (bytes):6794456
                        Entropy (8bit):7.99770676130868
                        Encrypted:true
                        SSDEEP:98304:x54LpW0sXlQoonh/CxEQ3JFIkWEwaVARl39Bbe5lEf6r6hDkwpaypJG9GH9h:b4dsJondUvrFwaVARBbez6hDkwp1cO
                        MD5:03F2D4B132FC5802F9739F4B91C86C25
                        SHA1:FD853D7313520F72B7173C066ED89FAF22DF92C8
                        SHA-256:9840CC8259705E96D4D95E70D691E56D38DE9DBA393957B6DE6165E19C7D6364
                        SHA-512:717BA1F2B72C72726C8199C5F84142C564B3DDBE94FC06D4CB44A9EAF504DB858B99996047F2F11924567E11D7E0FC2249C218366D52600C27AE9F4F58F091E7
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 4%
                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......:.4 ~.Zs~.Zs~.Zs...sg.Zs...s.Zs...sW.Zs.z.s..ZsE.Yrg.ZsE._r..ZsE.^rX.Zs.z.su.Zs.z.s_.Zs~.[s.Zs..^rh.Zs.._rv.Zs..Sr0.Zs..s..Zs..Xr..ZsRich~.Zs................PE..L...c..f..................d...........w.......w...@..........................pz.......g...@.................................<\z.......w.<.............g..&..._z.0............................w.......w.\...........................................UPX0....................................UPX1......d.......d.................@....rsrc.........w.......d.............@..............................................................................................................................................................................................................................................................................................................................................4.21.UPX!....
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):6
                        Entropy (8bit):2.2516291673878226
                        Encrypted:false
                        SSDEEP:3:w:w
                        MD5:B7128C256A94922983A22977737A726B
                        SHA1:3F67A4AE9B0AAB40AE1C91B0364192EA1524514B
                        SHA-256:61D753E79C2F36DAAF2B6D837B1AF1CE2D36AF8879C7528B701305A9AB5E7F5E
                        SHA-512:540BFCBAF2CF9C9B98E767777F04674FBA75578228DE905E6A1D05171A0DD98B463E6BDB54753AF794DAD588E0D0268B7E5FF37D0B5A958660D9D4F48623077F
                        Malicious:true
                        Preview:STOPIT
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):9216
                        Entropy (8bit):5.216751569597583
                        Encrypted:false
                        SSDEEP:192:Zbw+BKv4xIY6JPnWbBmKmckVPxIiTOPX79t+:Zb7IYUqRmckVPxIiTOT9t
                        MD5:F914B2A70CA7E92ACF60B631011996B1
                        SHA1:CF94DE13FAADE5DA312AEF875ADC44A9B1FB3C3A
                        SHA-256:6A646BBF2DE020EDD636C9140726C9F843174BE8199DE5568CB3AE10FF71CEE3
                        SHA-512:75D83FF6008AB0B645537C8FBA67D38C11AB2ADB282D067B5A32D85E1D532A67016D6A145432B3C5FAA935FE3B0A8AA4955649BEA3CCC9DDF4DB0D233575F41F
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: Psiphon_3.179.msi, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a...........!...2.....................0...............................`.......................................0..+....@..<............................P..p...................................................XA...............................code............................... ..`.text...}.... ...................... ..`.rdata..;....0......................@..@.data........@......................@....reloc..p....P......."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):89
                        Entropy (8bit):5.05137212792698
                        Encrypted:false
                        SSDEEP:3:WB/Wy2KJXMihMIm1erbJSRE2J5xAIjh:WpxXzfIe0i23fjh
                        MD5:6BFD2BB0AFBCF2DB0238451598AFD388
                        SHA1:A5838D100B10092CF229F108BFB522807B08BA3D
                        SHA-256:32DE6941791958CE778E83A07C132713C11163F3680644B560B588CEDE84798C
                        SHA-512:E4D852A7056F2322AF0E0A560F35D353E76BA0B9EC03EEEF64ABC860E99663E408E2E948731FA381CD446E75B9470874DA15E89FEABC8024954F9C6FBA0D237E
                        Malicious:false
                        Preview:[PortableApps.comLauncher]..PluginsDir=C:\Users\user~1\AppData\Local\Temp\nsc1E86.tmp..
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):21
                        Entropy (8bit):3.4632805178108113
                        Encrypted:false
                        SSDEEP:3:Aa6YHCn:AbeCn
                        MD5:F634A661107AD3303B6C42887318FF85
                        SHA1:51BE496B367DFBEFAB957B0EBA53E498844451FB
                        SHA-256:CAC5507771A6A6A3A71B552098FD37E820D751C1A0FDE1CFF3D312005ED27004
                        SHA-512:20FE17F5FCB2B42687E241F66D9836C0FD45CDAC721DF590202F056E57E0E1794ED0EBA36BDCC99F21B79F5B41C8CCB4C2344E0DB9A25F41536AFBB317D522F0
                        Malicious:false
                        Preview:upgrade.179.part.etag
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.5
                        Encrypted:false
                        SSDEEP:3:Aa6YR:Ab8
                        MD5:AE02494532CAA325B95B23B58D56CC18
                        SHA1:35C3D82AB347B01975B2465DFF8FFDCA462F777E
                        SHA-256:9D56B6ED246603EF44C4DA904BDEB4024ACF83D988644966CDE63FAB9992515E
                        SHA-512:1DA4136FE03965C33CCEF2C67DBD838E9EB0E3E229E6D70E71B079D7C5E7B89460263C42ADA716BBF8E71F9E3955C1022223DA8589A2C2426D68984D97358F6E
                        Malicious:false
                        Preview:upgrade.179.part
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):21
                        Entropy (8bit):3.4632805178108113
                        Encrypted:false
                        SSDEEP:3:Aab+t9Cn:AUE9Cn
                        MD5:7EFC8FB32656E400472EC1AA98959673
                        SHA1:F9E3C3FD377207E602F540BBC2FAD0DDF5C3762A
                        SHA-256:652F69AFF55876DD5D441F06B96AA66426B908D1F3CB764701C8AFEC6F2537CB
                        SHA-512:B49A76F6AD098E03E2EE52A5F9143EEF8C38C46DA67CE519D65DF785AB98520DE880C41B59C373A9D083260B1DA7EBE0BDC13F4CDEBE481020CF92C604EFC78D
                        Malicious:false
                        Preview:upgrade.178.part.etag
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.5
                        Encrypted:false
                        SSDEEP:3:Aab+R:AUu
                        MD5:8AF4C040E9B9024C1CD6998B2354CACB
                        SHA1:A305105C6FFC98C0831A8F53EEAD26FF9A28852C
                        SHA-256:2B1136D17ED408182B73F5CEA14BEB99A9A52667FA3CD48EDB5AF0B952AB8B33
                        SHA-512:C24B9CA42F94CB0F6FE2E4989D4ED7A0DF0ED670B10222156F945A22C27DE9BD1C40446F0D4CB3E1C42724204334C9CF5CCFF18FD9E93D09FFBE6EDBB294BDF6
                        Malicious:false
                        Preview:upgrade.178.part
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:Windows Registry little-endian text (Win2K or above)
                        Category:dropped
                        Size (bytes):452
                        Entropy (8bit):3.5443803979975903
                        Encrypted:false
                        SSDEEP:6:Qyk+SkWCiiCRroZ6IJl5qIlgCVlEEORaJIkAl8aoCinKPQ1/YlFMeQWlQlHOlP+q:Qy5hVZtrRNEELimCaaoYVjlQlHamEV
                        MD5:E2A203CA6E155D6960F4D7E7E741893B
                        SHA1:A8737102C5A5AABD5B59A29907FBBBC05DF3A9BD
                        SHA-256:863DF7402E7283F531331F0F97381B81700F745E6B312A1977EF5AE2170FF8E9
                        SHA-512:D6C37C12F1F463E0602D603423A0A3AC6C8F088305B020F97F938F33265ADBF24CEAD308639F69DA82ED3083A26C51A9601E9604D3B21CADFCE145A38BCE9D03
                        Malicious:false
                        Preview:..W.i.n.d.o.w.s. .R.e.g.i.s.t.r.y. .E.d.i.t.o.r. .V.e.r.s.i.o.n. .5...0.0.........[.H.K.E.Y._.C.U.R.R.E.N.T._.U.S.E.R.\.S.o.f.t.w.a.r.e.\.P.s.i.p.h.o.n.3.].....".S.k.i.p.B.r.o.w.s.e.r.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.1.....".S.k.i.p.P.r.o.x.y.S.e.t.t.i.n.g.s.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.0.....".S.k.i.p.A.u.t.o.C.o.n.n.e.c.t.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.0.....".D.i.s.a.b.l.e.D.i.s.a.l.l.o.w.e.d.T.r.a.f.f.i.c.A.l.e.r.t.".=.d.w.o.r.d.:.0.0.0.0.0.0.0.1.
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):204
                        Entropy (8bit):4.952668860847125
                        Encrypted:false
                        SSDEEP:6:Cb30o6+ucNwi23fbWpCmapZ1fpbAcNwi2Yn:CG+YZjEclb+ZYn
                        MD5:3C0CB2D2F2126AE97754F04E27D7B575
                        SHA1:6B3F3445F529D5BA77F3D44FD4D8EAF639B43320
                        SHA-256:37B2F8C01030B1CB301A55FA1D662BCEB46D25DE726ECE80975110DE9E5DD8DA
                        SHA-512:24AF85452C40F4F6458FD8B592175AF25BA25469621034066FA667E4E0460CB1FBF539F95968A1D10B78FC4385435D5315434F9680F04EDA2F594927987E87F4
                        Malicious:false
                        Preview:[PsiphonSettings]..LastDrive=C:..LastDirectory=\Users\user\AppData\Local\Temp\7ZipSfx.000..[PortableApps.comLauncherLastRunEnvironment]..PAL:LastPortableAppsBaseDir=C:\Users\user\AppData\Local..
                        Process:C:\Users\user\Desktop\sVfXReO3QI.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):145722
                        Entropy (8bit):7.3156807643139325
                        Encrypted:false
                        SSDEEP:3072:YqeqOYEUXPnDSwPK4u1I0KzpFKFpcVDxCtODy:jEUXP7u1WpF/Dy
                        MD5:49BF9DCA0C8EAFF957F62F0F3CEF0BA5
                        SHA1:C15AD261CF8E2E33FE36C9B69ABFDC29BAC3D19D
                        SHA-256:CC7C4ACA06452689CD8BE37AB8BA2285F6B977FFA7473812713190BF3F2996D4
                        SHA-512:CE352F7C82AEE9A464D4F452ECAFEBEAEB7DB87BFE5F8818A7E2354FE66208DBDF69C2FBDEF197D41FBFEACDB7238B1447C188F24AD6AB03D86F3882CA4B2D64
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................p.......B...9............@.......................................@.................................d............R...........................................................................................................text....o.......p.................. ..`.rdata...*.......,...t..............@..@.data....~..........................@....ndata...P...0...........................rsrc....`.......T..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:Embedded OpenType (EOT), icomoon family
                        Category:dropped
                        Size (bytes):25544
                        Entropy (8bit):6.2856527324339
                        Encrypted:false
                        SSDEEP:768:8AQHnyHsqQ/wFJ+AwV4UPxHMjKiM3C4R+qwogeeZq7g8Y:8AQHnyMqI6GPy63rEogeeZq7g8
                        MD5:79CE7E9887A670AB6A18EAF59CAB7FA7
                        SHA1:0C3C11723E52BC35F8A69C5ACD37AEA959A3E2B7
                        SHA-256:24F0C91CD083494F5475C9DDE62F4477EA9FAE06DF25C398949781FF879FCD83
                        SHA-512:95E2686590CBBD8BA86D006590EFF3E83CC5E29CEAE2342C949673A53B1CBC8B9A1E309742572BB67B49A2E03FBAEEB746A0C8132F379D08C5DB008C28039A27
                        Malicious:false
                        Preview:.c..$c............................LP.........................3$i....................i.c.o.m.o.o.n.....R.e.g.u.l.a.r.....V.e.r.s.i.o.n. .1...0.....i.c.o.m.o.o.n................0OS/2...Q.......`cmap.8.g........gasp............glyf..........\|head..V.._<...6hhea......_t...$hmtx"..].._....,loca...4..`.....maxp.].%..a\... name.J....a|....post......c.... ...........................3...................................@.........@...@............... .....................................\.@....... ...r.... ....7.....................,.4.7.:.E.K.W.Y.\.c.|..................... ...r.........7.....................,.2.6.9.D.J.T.Y.[.b.y.~.......................a.....]...................~.H.E.C.!.........................................`........................................................................................................................79..................79..................79...............".U..."&'..7.>.38.12.......&'...#".....#.#"&=.#...+."&5.4632.
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):18710232
                        Entropy (8bit):6.406575727466805
                        Encrypted:false
                        SSDEEP:98304:8MWhYnBg1t4oUyi2D5jyW/bxkHWvlS0mTK8/WNMtz9f/BILO9qT798Oit/bkR9vH:bWGl814NjONUWeiHit/bcVsuBg07pbAg
                        MD5:77F9FB45FA91FBC0B2105900F7AF30DF
                        SHA1:42695C5D1E42FF3745BEDF32A2E1CDF417E7BE55
                        SHA-256:B04B5C42FE5664B1C176E9258131D29B4D81C8D1C47DF96FB1A7E04548939475
                        SHA-512:F7D1697B817B05E58D4839D0E8772F19498912AE25D6A3477EA4559E7F6705295254D9F3D839A6B791E2DA40FCDBEE0244D94D98843B601466B7BE385C57BBE9
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V...............>..........p........p....@...........................!.....W.....@..........................................................X...&.......R...................................................}...............................text....=.......>.................. ..`.rdata.......P.......B..............@..@.data........p.......\..............@....idata..............................@....reloc...R.......T..................@..B.symtab......p!......V.................B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11264
                        Entropy (8bit):5.729426875863261
                        Encrypted:false
                        SSDEEP:192:0N2gQuUwXzioj4KALV2upWzVd7q1QDXEbBZ8KxHdGzyS/Kx:rJoiO8V2upW7vQjS/
                        MD5:BF712F32249029466FA86756F5546950
                        SHA1:75AC4DC4808AC148DDD78F6B89A51AFBD4091C2E
                        SHA-256:7851CB12FA4131F1FEE5DE390D650EF65CAC561279F1CFE70AD16CC9780210AF
                        SHA-512:13F69959B28416E0B8811C962A49309DCA3F048A165457051A28A3EB51377DCAF99A15E86D7EEE8F867A9E25ECF8C44DA370AC8F530EEAE7B5252EABA64B96F4
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: HolyTom980.exe, Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        • Filename: ReimagePackage.exe, Detection: malicious, Browse
                        • Filename: ReimagePackage.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.W32.PossibleThreat.20191.6097.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.PUA.iWin.17190.677.exe, Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        • Filename: 2Ir9YQkiGJ.exe, Detection: malicious, Browse
                        • Filename: theword-setup-en.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..............]..............XP......Xd......XU......XS.....Rich............PE..L.....GO...........!................('.......0...............................`............@..........................3.......1..P............................P.......................................................0..\............................text...1........................... ..`.rdata.......0......."..............@..@.data...@....@.......&..............@....reloc..L....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):13312
                        Entropy (8bit):5.952191493801213
                        Encrypted:false
                        SSDEEP:192:qP6KdXy+Yo7e1J8qC25a5mDFmCLGUCVGpU6uNck87I0S/TDqwyTq+:q/q3Pgd5mx6VkEck87ILCTN
                        MD5:A88BAAD3461D2E9928A15753B1D93FD7
                        SHA1:BB826E35264968BBC3B981D8430AC55DF1E6D4A6
                        SHA-256:C5AB2926C268257122D0342739E73573D7EEDA34C861BC7A68A02CBC69BD41AF
                        SHA-512:5EDCF46680716930DA7FD1A41B8B0426F057CF4BECEFB3EE84798EC8B449726AFB822FB626C4942036A1AE3BB937184D1F71D0E45075ABB5BF167F5D833DF43A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^.O.0.O.0.O.0.O.1...0..m.D.0.....L.0.6.N.0.4.N.0.RichO.0.................PE..L...m.AK...........!.....&...........-.......@...............................p.......................................5..<.......x....P.......................`..........................................................P............................text....%.......&.................. ..`.data...H....@.......*..............@....rsrc........P......................@..@.reloc..|....`.......0..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:Generic INItialization configuration [Activate]
                        Category:dropped
                        Size (bytes):666
                        Entropy (8bit):5.081537570413563
                        Encrypted:false
                        SSDEEP:12:M8tYof061ct9eKR2/epJT7yk2/epababe2/ep2J:JqG0/t9ec2aJHyk2aababe2a0
                        MD5:13A80331AE779ADDF158DA5D51515B3F
                        SHA1:5CCE658366CC5CD8FAC1F5287D3E15B1AE5C5CF8
                        SHA-256:D463E2CE20E25B2ED290DCF6DC1C01DCC60B5DDA71E932CCFA9F5DDF53E81910
                        SHA-512:59849A3E60A4075C1A743C67109916213112A1BC494DC47B4E85E621BCA8CA4554A155A24F07104846227100C06C7C16BF157E7FC97EB5F00F8121C1B341E2C9
                        Malicious:false
                        Preview:[Launch]..ProgramExecutable=Psiphon\psiphon3.exe..RunAsAdmin=force..DirectoryMoveOK=yes....[Activate]..Registry=true....[RegistryKeys]..Psiphon="HKCU\Software\Psiphon3"....[DirectoriesMove]..Psiphon=%LOCALAPPDATA%\Psiphon3....[FileWrite1]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%APPDATA%\\Psiphon3..Replace=%pal:DataDir:doublebackslash%....[FileWrite2]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%PAL:LastPortableAppsBaseDir:DoubleBackslash%\\..Replace=%PAL:PortableAppsBaseDir:DoubleBackslash%\\....[FileWrite3]..Type=Replace..File=%pal:DataDir%\Settings\Psiphon.reg..Find=%PAL:LastDrive%\\..Replace=%PAL:Drive%\\............
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.663962361333402
                        Encrypted:false
                        SSDEEP:192:GGhRfigbU26niqo9m+9k15AA1NrW0QfaDx3nxNLr6s+:GIwgSnhv/IaDx3n6X
                        MD5:B5358341DF2CB171876A5F201E31A834
                        SHA1:DF34750EA5504274BE5FF8DDD306B49E302D04F9
                        SHA-256:156B9B583399FAF13C4D46B89339FB0F7F38DC847AC2D7872178D8E3998B9734
                        SHA-512:821DC42E24FA2D44A1D4D16B26C3DA2688DAC0FA44A266E38DA2AFF706C91440D83A87ABC74131930E6C38A44A0C5E627DB2D045375FDE147E0EDD3276F4B014
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....+kK...........#...8.....*..."...........0....0d................................!......... ......................................................................................................................................................text...L...........................`.P`.data...$....0......."..............@.0..rdata..h....@.......$..............@.0@.bss..... ...P........................@..edata...............&..............@.0@.idata...............(..............@.0..reloc...............,..............@.0B........................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):29696
                        Entropy (8bit):5.935941891777929
                        Encrypted:false
                        SSDEEP:768:HsKZwhFkGOr0Ga4+8DFFHR4mmw5+64fuKwX13:HLKmGOr0Ga4+8DFFHRrmw5+m
                        MD5:2880BF3BBBC8DCAEB4367DF8A30F01A8
                        SHA1:CB5C65EAE4AE923514A67C95ADA2D33B0C3F2118
                        SHA-256:ACB79C55B3B9C460D032A6F3AAF6C642BF8C1D450E23279D091CC0C6CA510973
                        SHA-512:CA978702CE7AA04F8D9781A819A57974F9627E969138E23E81E0792FF8356037C300BB27A37A9B5C756220A7788A583C8E40CC23125BCBE48849561B159C4FA3
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...J...J...J.*.D...J.A.@...J......J...Y...J...K...J.A._...J.A.N...J.Rich..J.........................PE..L...;4.K...........!.....T..........GK.......p...............................0.......................................s.......p..P............................ ..d....................................................p...............................text....R.......T.................. ..`.rdata.......p.......X..............@..@.data................^..............@....reloc..T.... .......h..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):89
                        Entropy (8bit):5.05137212792698
                        Encrypted:false
                        SSDEEP:3:WB/Wy2KJXMihMIm1erbJSRE2J5xAIjh:WpxXzfIe0i23fjh
                        MD5:6BFD2BB0AFBCF2DB0238451598AFD388
                        SHA1:A5838D100B10092CF229F108BFB522807B08BA3D
                        SHA-256:32DE6941791958CE778E83A07C132713C11163F3680644B560B588CEDE84798C
                        SHA-512:E4D852A7056F2322AF0E0A560F35D353E76BA0B9EC03EEEF64ABC860E99663E408E2E948731FA381CD446E75B9470874DA15E89FEABC8024954F9C6FBA0D237E
                        Malicious:false
                        Preview:[PortableApps.comLauncher]..PluginsDir=C:\Users\user~1\AppData\Local\Temp\nsc1E86.tmp..
                        Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):375152
                        Entropy (8bit):3.9038534404528633
                        Encrypted:false
                        SSDEEP:3072:wNVewYrhdh+Y8QDz5BqBsN5CJKg1hs1DvoXROcHUfOxeI1eXNuNXDYDDGToMyM2v:wNVwTBBq2uM3GToM/Z6Or02FSwAt2U
                        MD5:3B5138064ADB93E9D0340A8D21312703
                        SHA1:A901AB66A1ECDCD83BCB6EA29A8DEB9D4D2C436F
                        SHA-256:F6748266A3016492B1A8DC45102A33DBAC73A1405462523B40A8A219CB05A770
                        SHA-512:476340AC5FC6425AA4B004B62D14E1170DE43214652A0C1A98293089032E9374EFA7EDB8938B2C42082D29E784A7586DBA855D6A12FEEB1DF0D4C7E61518C2E5
                        Malicious:false
                        Preview:LK......,.......,.......LA......(W.......4......LK..............................................................B...............................................................................................................................................................................................................I.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.997861978508547
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:sVfXReO3QI.exe
                        File size:6'986'755 bytes
                        MD5:26e14ee776eacbbd45f8ee346dcecfcc
                        SHA1:6a61a3987cb37df8d9f143fa384206c45260db1e
                        SHA256:d79890b31d4d7ae839054794768e2f238a28506673591cafe5b1b82ed157e146
                        SHA512:870ca2bb42ba2a4c70ddcc91d9d63a6797472c49b9481597e5a6ca6f21e51fc822e75bd4092a5b6d4ed9c7cf7ce2014ec7e8c2f61fad6629498c6ff8704c219b
                        SSDEEP:196608:7gZ/EXLoy4dJrMfiQotB2fXZA93ypZ+3F:7gBEbydJrMfiQotofSJyU
                        TLSH:A56633AA7543C5F5E5DA29B31A3F528090640E401B264EC7877D3C2B8EB7D93E13B729
                        File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L......P............................/.............@.................................3-......................................t........0...O.................
                        Icon Hash:1761d9c969692917
                        Entrypoint:0x41942f
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x50E0DE9B [Mon Dec 31 00:38:51 2012 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f6baa5eaa8231d4fe8e922a2e6d240ea
                        Instruction
                        push ebp
                        mov ebp, esp
                        push FFFFFFFFh
                        push 0041C470h
                        push 004195C0h
                        mov eax, dword ptr fs:[00000000h]
                        push eax
                        mov dword ptr fs:[00000000h], esp
                        sub esp, 68h
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-18h], esp
                        xor ebx, ebx
                        mov dword ptr [ebp-04h], ebx
                        push 00000002h
                        call dword ptr [0041A1E0h]
                        pop ecx
                        or dword ptr [00422DE4h], FFFFFFFFh
                        or dword ptr [00422DE8h], FFFFFFFFh
                        call dword ptr [0041A1E4h]
                        mov ecx, dword ptr [00420DCCh]
                        mov dword ptr [eax], ecx
                        call dword ptr [0041A1E8h]
                        mov ecx, dword ptr [00420DC8h]
                        mov dword ptr [eax], ecx
                        mov eax, dword ptr [0041A1ECh]
                        mov eax, dword ptr [eax]
                        mov dword ptr [00422DE0h], eax
                        call 00007F9CFD699B32h
                        cmp dword ptr [0041E950h], ebx
                        jne 00007F9CFD699A1Eh
                        push 004195B8h
                        call dword ptr [0041A1F0h]
                        pop ecx
                        call 00007F9CFD699B04h
                        push 0041E070h
                        push 0041E06Ch
                        call 00007F9CFD699AEFh
                        mov eax, dword ptr [00420DC4h]
                        mov dword ptr [ebp-6Ch], eax
                        lea eax, dword ptr [ebp-6Ch]
                        push eax
                        push dword ptr [00420DC0h]
                        lea eax, dword ptr [ebp-64h]
                        push eax
                        lea eax, dword ptr [ebp-70h]
                        push eax
                        lea eax, dword ptr [ebp-60h]
                        push eax
                        call dword ptr [0041A1F8h]
                        push 0041E068h
                        push 0041E000h
                        call 00007F9CFD699ABCh
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1c9740xc8.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x4f84.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x1a0000x36c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x18dde0x18e000c04e49d78a3c453186c916e6f29540dFalse0.6056257851758794data6.6740241210126IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x1a0000x3bca0x3c001eff757b36a6b7a599236ac8b1b35b4dFalse0.4557291666666667data5.713391866788319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1e0000x4dec0xa0021d5c7a8ba54658b1e07909bf1045c79False0.50703125data4.450978418041827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x230000x4f840x500082c4c1cf655e3d0184b71be26225f0a6False0.325048828125data5.032889691557307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x232500x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536RussianRussia0.2579268292682927
                        RT_ICON0x238b80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsRussianRussia0.3803763440860215
                        RT_ICON0x23ba00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384RussianRussia0.4344262295081967
                        RT_ICON0x23d880x128Device independent bitmap graphic, 16 x 32 x 4, image size 192RussianRussia0.46621621621621623
                        RT_ICON0x23eb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2679460580912863
                        RT_ICON0x264580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.3834427767354597
                        RT_ICON0x275000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.6560283687943262
                        RT_GROUP_ICON0x279680x30dataRussianRussia0.9375
                        RT_VERSION0x279980x2a4dataEnglishUnited States0.4349112426035503
                        RT_MANIFEST0x27c3c0x346ASCII text, with CRLF line terminatorsEnglishUnited States0.5071599045346062
                        DLLImport
                        COMCTL32.dll
                        SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                        GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                        ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                        USER32.dllGetWindowLongW, GetMenu, SetWindowPos, GetWindowDC, ReleaseDC, GetDlgItem, GetParent, GetWindowRect, GetClassNameA, CreateWindowExW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, SendMessageW, EndDialog, wsprintfW, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, MessageBoxA, ScreenToClient, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, CreateWindowExA, wvsprintfW, CharUpperW, GetKeyState, CopyImage
                        ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                        OLEAUT32.dllVariantClear, SysFreeString, OleLoadPicture, SysAllocString
                        KERNEL32.dllGetFileSize, SetFilePointer, ReadFile, WaitForMultipleObjects, GetModuleHandleA, SetFileTime, SetEndOfFile, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, GetProcAddress, GetModuleHandleW, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetStartupInfoA
                        MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _wtol, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _purecall
                        Language of compilation systemCountry where language is spokenMap
                        RussianRussia
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 21, 2024 08:59:37.426496983 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:37.426512003 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:37.431361914 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:37.431401014 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:37.434534073 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:37.434653044 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:37.435000896 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:37.436356068 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:37.439832926 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:37.439924002 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:37.441458941 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:38.002526045 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:38.039395094 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:38.049770117 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:38.091003895 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:38.135320902 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:38.194389105 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.058331013 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.063534975 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.258241892 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.263490915 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.364341974 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:39.364386082 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:39.364651918 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:39.369283915 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.369297028 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:39.370424986 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:39.373712063 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 08:59:39.373744011 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 08:59:39.387195110 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:39.387353897 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 08:59:39.387609005 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.392502069 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.397650003 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 08:59:39.397670031 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 08:59:39.397804022 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:39.397907019 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:39.402760029 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402820110 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402847052 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402856112 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402865887 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402869940 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.402997017 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:39.467047930 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.515990973 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.562829018 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:39.605149984 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:39.701167107 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.705984116 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.724183083 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:39.724251986 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.728986025 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:39.729079962 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.745915890 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.745958090 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:39.746309042 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.750782013 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.750794888 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.752713919 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.794981003 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.799858093 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.906966925 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.907030106 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:39.907078981 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:39.923273087 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:39.939707041 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:39.966773033 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:39.982355118 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:40.013832092 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.058816910 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.078960896 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.078979969 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.078991890 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.079003096 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.079046965 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.079086065 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.088702917 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.088751078 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.088762045 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.088773012 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.088813066 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.124586105 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.124779940 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:40.124990940 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.127082109 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.127171040 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.129609108 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.129623890 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:40.130268097 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.132114887 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.132126093 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.132581949 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.132615089 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.132704973 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.142996073 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.143012047 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.143017054 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.147846937 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.203916073 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.208842993 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.230833054 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.235635996 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.266314030 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.271691084 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.288510084 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.293313026 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.295001984 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.311604023 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.318810940 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:40.323504925 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:40.324516058 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.324911118 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.328572989 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:40.328896999 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.329674006 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.333823919 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.342971087 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.343344927 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.343628883 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.348077059 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.348469973 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.350487947 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.372108936 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.377110004 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.485368013 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:40.519395113 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:40.523581028 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.531608105 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.574024916 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:40.574038029 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.722647905 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.783860922 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.804008961 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.847192049 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.915213108 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:40.915446997 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:40.915621996 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:40.920213938 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:40.920411110 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:40.920435905 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:40.929347038 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.929358006 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.929924011 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.929929972 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.931309938 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.931375980 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.934954882 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.935038090 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.950907946 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.950928926 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:40.950989962 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:40.971510887 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:40.992535114 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:41.000057936 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:41.016844988 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:41.046844959 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:41.051762104 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:41.110066891 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110100985 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110119104 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110131979 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110160112 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.110208035 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.110934973 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110946894 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110961914 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.110989094 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.111706972 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.111725092 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.111736059 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.111761093 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.111778975 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.112590075 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.112608910 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.112688065 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.112950087 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:41.133559942 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:41.171513081 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:41.176688910 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:41.208277941 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208364010 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208375931 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208409071 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.208420992 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208432913 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208446026 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.208468914 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.208518028 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.209253073 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209265947 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209276915 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209286928 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209300995 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.209326982 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.209887981 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209945917 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209956884 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209968090 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.209990978 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.210016012 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.210686922 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.210697889 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.210709095 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.210719109 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.210735083 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.210761070 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.211543083 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.212166071 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.212265015 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:41.245235920 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:41.245287895 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:41.245392084 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:41.245445967 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:41.245445967 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:41.298715115 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:41.342219114 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125130892 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:42.125719070 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125756025 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125807047 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125823975 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125850916 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125869989 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125889063 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125925064 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.125941992 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.126029015 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.126045942 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.129251957 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:42.129282951 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:42.129528046 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.129553080 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.129573107 CEST49733443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.129580975 CEST4434973337.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.130284071 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.130312920 CEST4434973437.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.130387068 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.135462999 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:42.136332989 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136347055 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136357069 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136529922 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136678934 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136688948 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136698008 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136768103 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136799097 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.136951923 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.137228966 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.137454987 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.143363953 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:42.143914938 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:42.148597956 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.148614883 CEST4434973437.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.154778957 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 08:59:42.158003092 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.158102989 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:42.158102989 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:42.158267021 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:42.164561987 CEST5349729192.155.93.29192.168.2.7
                        Aug 21, 2024 08:59:42.164577961 CEST224972745.128.38.162192.168.2.7
                        Aug 21, 2024 08:59:42.164587021 CEST8049730217.138.199.186192.168.2.7
                        Aug 21, 2024 08:59:42.164621115 CEST4972953192.168.2.7192.155.93.29
                        Aug 21, 2024 08:59:42.164652109 CEST4973080192.168.2.7217.138.199.186
                        Aug 21, 2024 08:59:42.164695978 CEST4972722192.168.2.745.128.38.162
                        Aug 21, 2024 08:59:42.200500011 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 08:59:42.204492092 CEST4434973437.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.425448895 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:42.467593908 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:42.816102982 CEST4434973437.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.816195011 CEST4434973437.46.119.50192.168.2.7
                        Aug 21, 2024 08:59:42.816270113 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:42.816270113 CEST49734443192.168.2.737.46.119.50
                        Aug 21, 2024 08:59:44.185739994 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:44.191072941 CEST2249728217.160.34.195192.168.2.7
                        Aug 21, 2024 08:59:44.201370001 CEST4972822192.168.2.7217.160.34.195
                        Aug 21, 2024 08:59:57.311168909 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 08:59:57.311183929 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 09:00:12.411293030 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 09:00:12.411305904 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 09:00:27.421124935 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 09:00:27.421139002 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 09:00:42.512546062 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 09:00:42.512564898 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 09:00:57.568883896 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 09:00:57.568893909 CEST4434973177.68.29.80192.168.2.7
                        Aug 21, 2024 09:01:12.622401953 CEST49731443192.168.2.777.68.29.80
                        Aug 21, 2024 09:01:12.622412920 CEST4434973177.68.29.80192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 21, 2024 08:59:37.436537027 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:37.653834105 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:37.653882027 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:38.015894890 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.015928984 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.030148983 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.216099024 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.216420889 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.416721106 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:38.416735888 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.016324043 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.016349077 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.058727980 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.365369081 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.374275923 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.374363899 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.374443054 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379718065 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379791975 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379791975 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379791975 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379894018 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379906893 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379906893 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.379906893 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.380049944 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.380109072 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.398871899 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.399209023 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.407294035 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.407324076 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.575963020 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.580938101 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.581068993 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.581738949 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597366095 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597491026 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597506046 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597548008 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597558975 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597568989 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.597579956 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.598870993 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.607302904 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.607363939 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.701004028 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.702136993 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.703649044 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.703696966 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.708312035 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.714801073 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.714843035 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.714864016 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.714910984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.715049982 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.715099096 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.715156078 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.715173006 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.715243101 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.715270042 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.715327024 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.716317892 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.716353893 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.716464996 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.717319012 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.717379093 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.717490911 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.718082905 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.718112946 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.718164921 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.718215942 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.718645096 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.719291925 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:39.724216938 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.725186110 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.743136883 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.743458986 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.747987032 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.748501062 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.751123905 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.754904032 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.756144047 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.756856918 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.757642031 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.757695913 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.757735968 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.757747889 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.757759094 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.758291960 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.758343935 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.760636091 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.764816999 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.776768923 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.795207977 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:39.809442997 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.821898937 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:39.860156059 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:39.872205973 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:39.920874119 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:39.925656080 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:40.130485058 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:40.130574942 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.176182985 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.183083057 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.193512917 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.199588060 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.207117081 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.207190037 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.207199097 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.208436012 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.208775997 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.232969999 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.240803957 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.243525028 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.261836052 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.288430929 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.292414904 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.292634010 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.295489073 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.295566082 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.295811892 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.313442945 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.319780111 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.319791079 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.323616028 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.330928087 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.331404924 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:40.336131096 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.339510918 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:40.339510918 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.347914934 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.350662947 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.371989965 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.373589039 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.376646996 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.377578974 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.379564047 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.380132914 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.401628017 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.402781010 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.402910948 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.403114080 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.415395021 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.419775963 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.420192003 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.426862955 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.427172899 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.427228928 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.427628994 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.427858114 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.428002119 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.436433077 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.436533928 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.437982082 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.439758062 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.443300962 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.443517923 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.445605993 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.447856903 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.450251102 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.450414896 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.451594114 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.452471018 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.457227945 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.457390070 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.457483053 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.459331989 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.460055113 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460105896 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460155010 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460165977 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460222006 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460233927 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460243940 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460257053 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460350990 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460362911 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.460511923 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.460764885 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.460865974 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.460865974 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.460954905 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.460954905 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.461118937 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.461195946 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.461654902 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.461766958 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.461965084 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.462100029 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.463068008 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.465327024 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.465488911 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.467763901 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.467777967 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.467791080 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.467961073 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.469192028 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.469379902 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.472585917 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.472873926 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.473942041 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.474488974 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.476218939 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.477315903 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.477541924 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.478275061 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.478435040 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.478602886 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.480745077 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.481748104 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.481764078 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.481812000 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.482007980 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.482826948 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.484591007 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.484735012 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.484795094 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.500622988 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.500637054 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:40.506078959 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.540925980 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:40.562525034 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.640568972 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.896939039 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.896953106 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.914648056 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.915216923 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:40.930608988 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.931256056 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.931339979 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.940210104 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.941003084 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.941370964 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.941370964 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.941370964 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.941397905 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.949343920 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:40.950274944 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.950397015 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.952573061 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.958137035 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.958800077 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:40.966352940 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.968983889 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.976258039 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:40.980237007 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:41.000236034 CEST5364150146.70.54.146192.168.2.7
                        Aug 21, 2024 08:59:41.116281986 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.128963947 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:42.158435106 CEST64151554192.168.2.7146.70.144.213
                        Aug 21, 2024 08:59:42.338990927 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342653990 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342744112 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342753887 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342765093 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342849016 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342859983 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342890024 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342907906 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.342993021 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.343004942 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.350218058 CEST55464151146.70.144.213192.168.2.7
                        Aug 21, 2024 08:59:42.963460922 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:42.963598967 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:42.963676929 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.003305912 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005165100 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005179882 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005192041 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005203009 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005215883 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005228996 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005240917 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005253077 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.005575895 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.005636930 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.005850077 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.005850077 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.005850077 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.012499094 CEST6415053192.168.2.7146.70.54.146
                        Aug 21, 2024 08:59:43.012550116 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:43.052490950 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.809391975 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:43.809406042 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:44.183049917 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:44.185925007 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:44.186029911 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:44.186089039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:44.186148882 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:44.222899914 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:44.225558043 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:44.250904083 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:44.251054049 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.069720030 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.550488949 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.592861891 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.592881918 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.592894077 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.592905998 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.594438076 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.594590902 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.594736099 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.594789982 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.600903988 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.634172916 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.640860081 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.641069889 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.641421080 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.662996054 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.681142092 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.727629900 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.832617044 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.832631111 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.832640886 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.836196899 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.836266041 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.836807013 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:45.876241922 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:45.937392950 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.003519058 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.006233931 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.029906988 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.075953960 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.075978041 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.075990915 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.085722923 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.085722923 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.085902929 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.091758013 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.131314993 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.131732941 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.161094904 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.172383070 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.212649107 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.337799072 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.337867975 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.337887049 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.337898016 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 08:59:46.340240002 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.340475082 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.340475082 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 08:59:46.379908085 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:01.380140066 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:01.420864105 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.301233053 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.365993977 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.597923994 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.599781036 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.664654016 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.824625015 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.824655056 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.824700117 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:05.832945108 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.833055973 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.833097935 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.833410978 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.844886065 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:05.884732962 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.065458059 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.065609932 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.124131918 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.124255896 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.161247015 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.164269924 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.226176977 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.381143093 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382291079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382369995 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382498980 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382620096 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382627010 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382694960 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382702112 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382713079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382745981 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382751942 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.382757902 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.384726048 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.388789892 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.389781952 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.393054962 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566899061 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566926956 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566945076 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566965103 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566973925 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566984892 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566991091 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.566997051 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.567011118 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.567017078 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.568631887 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.571968079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.670358896 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670506954 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670583963 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670712948 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670917988 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670917988 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.670917988 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.671406984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.671576023 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.671971083 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.672568083 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.672769070 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.672966003 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673182011 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673255920 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673321009 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673377991 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673995018 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.673995018 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.674015999 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.674427986 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:06.710386992 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.712378025 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:06.713804007 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:07.007672071 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:07.047589064 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:07.103950977 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:07.529860973 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:07.597052097 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:07.822062969 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:07.822973013 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:07.887588024 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.056869984 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.056880951 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.056891918 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.058460951 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.059345961 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.059408903 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.059448957 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.059462070 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.059676886 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.059737921 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.059798956 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.059983015 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.060457945 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.060457945 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.060457945 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.062932968 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.062978029 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.063086033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.063093901 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.063278913 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.063393116 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.063500881 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.063694954 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.063694954 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.063711882 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.066576004 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.066586018 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.066596985 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.067080021 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.067209005 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.070228100 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.070235014 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.070246935 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.070527077 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.073745966 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.073755980 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.073769093 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.078437090 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.078447104 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.080543995 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.082221985 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.085287094 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.085374117 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.085504055 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.085727930 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.085747004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.085747004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.085938931 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.088074923 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.090286016 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.092531919 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.095916033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.097033024 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.099402905 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.100123882 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.101902962 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.102296114 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.103091955 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.103826046 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.104130030 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.104295969 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.104712009 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.104768991 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.104892015 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.105447054 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.106729031 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.108620882 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.109947920 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.111757040 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.113964081 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.115216017 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.116331100 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.117285967 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.117291927 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.117404938 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.117569923 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.117569923 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.117748022 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.118397951 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.118932962 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.120070934 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.121862888 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.123114109 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.124711037 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.124819040 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.125201941 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.125956059 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.126986027 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.127861023 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.128231049 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.128798008 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.129638910 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.130701065 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.131967068 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.132193089 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.132240057 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.133440971 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.134584904 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.135740995 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.135777950 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.136173964 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.137020111 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.137339115 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.138467073 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.139420033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.140574932 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.141803980 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.144232988 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.144639969 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.144807100 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.144920111 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.157203913 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.171778917 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.184382915 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.250336885 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.250346899 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.250359058 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.251111984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.251234055 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.251435041 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.252907038 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.252913952 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.256259918 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.256268978 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.256341934 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.256351948 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.257838011 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.257904053 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258034945 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258325100 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258460045 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258749008 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258789062 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.258810997 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.259975910 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.260014057 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.260025978 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.260819912 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.260819912 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.261029005 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.263624907 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.266777039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.266973972 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.267046928 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.267116070 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.267123938 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.268826962 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.268942118 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.269340038 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.269355059 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.269376993 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.270586967 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.270684004 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.270689964 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.274290085 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.274313927 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.274317026 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.274322987 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.276791096 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.276840925 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277215004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277215004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277215004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277364016 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277364016 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277611017 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.277614117 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.277630091 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.277704000 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.277918100 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.279282093 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.279463053 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.279746056 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.279839039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.279839039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.281579971 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.281588078 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.281609058 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.281896114 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.281896114 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.282078981 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.284713984 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.284840107 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.284853935 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.284867048 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.285080910 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.285171032 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.285248995 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.285362959 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.285402060 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.285402060 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.288288116 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.288358927 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.288517952 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.288525105 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.288697004 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.288758039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.288852930 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.289055109 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.289055109 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.289055109 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.291894913 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.291912079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.292058945 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.292068005 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.297609091 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.297748089 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.297843933 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.297981977 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.298111916 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.298111916 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.298173904 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.300632000 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.308736086 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.308793068 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.308832884 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.308839083 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.309144974 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.309293985 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.316696882 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.316968918 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.317919970 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.317979097 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.318017006 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.318025112 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.318207026 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.318207026 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.318296909 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.318409920 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.318454027 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.318454027 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.319228888 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.324651003 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.326766014 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.326802015 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.326976061 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.326992035 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.327024937 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.327111006 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.327246904 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.327269077 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.327689886 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.329351902 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.329359055 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.329366922 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.329605103 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.329653025 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.329754114 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.332153082 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.332176924 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.332263947 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.332334042 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.332364082 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.332413912 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.332504034 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.332693100 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.332693100 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.335648060 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.335740089 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.335828066 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.335834026 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.336338043 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.336596012 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.337070942 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.337232113 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.337233067 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.337368965 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.337882996 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.339241028 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.339276075 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.339317083 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.339330912 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.341206074 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.341339111 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.341619015 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.341619015 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.341655016 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.341655016 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.342886925 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.342930079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.342967033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.343411922 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.343489885 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.343528032 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.343657970 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.346415997 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.346487999 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.346494913 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.346921921 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.346976042 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.347091913 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.349950075 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.349996090 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.350068092 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.350076914 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.350666046 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.351037979 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.351193905 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.351193905 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.351360083 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.357891083 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.367240906 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.372016907 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.376586914 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.381161928 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.383089066 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.390594006 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.416716099 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.443516016 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.443533897 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.443543911 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.443550110 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.446094036 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.446139097 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.446147919 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.447978020 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.448178053 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.448227882 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.448235035 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.451077938 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.451122999 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.451133013 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.451139927 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.453491926 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.453660965 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.453711987 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.453747034 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.453883886 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.454268932 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.454298019 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.454325914 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.454346895 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.454399109 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.454406023 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.455272913 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.455341101 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.455681086 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.455847025 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.455986023 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.456037045 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.456444025 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.456670046 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.456940889 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.456940889 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.457010984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.457010984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.457139969 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.457180977 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.457808971 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.457815886 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.457822084 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.460103035 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.460108995 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.460120916 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.460927963 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.461066008 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.461142063 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.461185932 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.461430073 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.463136911 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.463145018 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.463156939 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.466092110 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.466176033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.466181993 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.468153954 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.468184948 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.468302011 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.468493938 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.468672991 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.469136000 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.469170094 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.469178915 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.472166061 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.472183943 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.472191095 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.473596096 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.473865032 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.473982096 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.474253893 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.475260973 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.475266933 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.475279093 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.475315094 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.475315094 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.478293896 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.478301048 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.478311062 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.481167078 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.481184006 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.481235981 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.481242895 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.481257915 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.481810093 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.481966019 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.482141972 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.482544899 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.482681036 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.484169960 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.484190941 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.484200954 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.484677076 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.484890938 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487065077 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.487159967 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.487245083 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.487307072 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.487376928 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487495899 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487586975 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487865925 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487865925 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.487865925 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.490246058 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.490255117 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.490268946 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.493072033 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.493828058 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.495450974 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.496531010 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.496572971 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.496705055 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.496817112 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.497206926 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:08.500564098 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.507915020 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.513463020 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.521327019 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.522120953 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.527236938 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:08.544790030 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:23.565247059 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:23.695398092 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:23.695431948 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:23.917037964 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:23.917037964 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.348376989 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.348376989 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.368797064 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.369209051 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.369213104 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.369590998 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.369596004 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.370359898 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.370363951 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.402024984 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.402121067 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.402121067 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:24.405389071 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.410260916 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.411648989 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:24.434684038 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:38.493319035 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.586348057 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.586358070 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.771924019 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.772512913 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.805497885 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:38.808537006 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:38.808634043 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:38.870383978 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:38.872395039 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:45.851963997 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:00:45.891602993 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:00:45.927828074 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:00.904675007 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:00.969532013 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:15.944353104 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.037666082 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.037683010 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.224821091 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.224834919 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.597706079 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:16.597721100 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:17.343102932 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:17.343120098 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:18.262377977 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:18.262618065 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:18.262651920 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:18.262671947 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:18.262742043 CEST6414953192.168.2.7196.196.218.27
                        Aug 21, 2024 09:01:18.834125996 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:18.834189892 CEST5364149196.196.218.27192.168.2.7
                        Aug 21, 2024 09:01:18.834614992 CEST6414953192.168.2.7196.196.218.27
                        TimestampSource IPDest IPChecksumCodeType
                        Aug 21, 2024 08:59:42.339062929 CEST192.168.2.7146.70.144.213e3c6(Port unreachable)Destination Unreachable
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Aug 21, 2024 08:59:04.859134912 CEST1.1.1.1192.168.2.70xa067No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                        Aug 21, 2024 08:59:04.859134912 CEST1.1.1.1192.168.2.70xa067No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                        • australiais.org
                        • eljvuop.net
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749730217.138.199.186808156C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe
                        TimestampBytes transferredDirectionData
                        Aug 21, 2024 08:59:39.397804022 CEST551OUTPOST / HTTP/1.1
                        Host: eljvuop.net
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                        Content-Length: 6454
                        Content-Type: image/tiff
                        Cookie: ak_cuscartcart=x0es792JsQU9UiGh7qdRQDsg5TsEs1HHQ2gwlakxB8UhHggMKVMQdiNuU8Gh5XnZb+oMIqtQMgSvdauo9ZtoxB6SqgdSq4hwcCbvlBsyWyajNGqqaC+OACxPDbrqt0yXtUqRfWHt1wweFCP9qluLkHrPxC7K6jXt5KpBFbXpzbYcsD4EopkXOWo9VfrZnxTsVNiicS/3YBH04pQoialfFQI84WWIi0eoQdd8jij0s8Zc8Rtev9OUkNVMfJKlymNKdwVyC/GKLgT57lP5yWUe9dgw0u+75BrcgY5V
                        Accept-Encoding: gzip
                        Aug 21, 2024 08:59:39.397907019 CEST6454OUTData Raw: f7 b6 41 0c 3b 7c a5 64 7f 17 06 a6 69 52 73 6e 06 84 bd e2 ac a8 de 35 71 27 5a e9 10 21 76 8b 12 8f df 9f 10 e7 f4 c6 54 95 80 2e ce 24 41 4c be da 05 08 fb cc ce d2 83 12 c7 bf 32 bc d4 12 0a 53 b4 c7 fa 4a b8 77 30 d5 b1 1e 31 0b d5 e5 9c f9
                        Data Ascii: A;|diRsn5q'Z!vT.$AL2SJw01[:Ojp:<O/+~.'1\jTbsS3nR|H6N}J)CC>rm8y'2AT{B\]M#/N,)
                        Aug 21, 2024 08:59:40.078960896 CEST1236INHTTP/1.1 200 OK
                        Set-Cookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zg
                        Date: Wed, 21 Aug 2024 06:59:39 GMT
                        Content-Type: application/octet-stream
                        Transfer-Encoding: chunked
                        Data Raw: 31 63 35 35 0d 0a 19 02 7a ad 42 8d 8d d1 49 73 35 28 35 98 3b 07 09 f7 18 39 2a 5a aa 00 63 3f 9b 78 78 88 d9 9e 65 89 1d 41 77 03 d8 1b 96 4a a3 b1 73 25 2a 8f a9 c1 0c 01 c9 41 c1 aa 46 86 c5 aa a6 ff 68 30 07 79 de 71 97 0d 4f 9f 55 1f 86 c2 0d 04 aa 79 cf 25 61 60 db bb 71 82 f5 32 34 ae 4e 3a 66 8b ba 10 6b 04 26 01 71 d3 62 1c d9 82 71 9f 5b 78 8a d7 1e 3f 1e 19 46 f9 8c 12 6d 87 39 8f 33 9f 28 3c 2b 7d 98 45 1f 17 dd c6 74 d3 eb 14 0c 6e 1e 40 60 a0 09 15 42 bc 71 54 66 b3 36 fe f7 db 77 0f 8a 7e fe bb 12 69 1e da 0c 68 e3 fc 1f 8c 69 fa e5 a6 b3 fc f6 f5 02 9b 28 c1 95 77 66 bc e4 79 45 92 df f2 c1 4c 0e 10 cf 2f 28 04 f8 c5 c4 41 44 87 8d 98 6c bb 4e 4b 82 4b b1 24 93 70 98 69 68 ea 65 41 51 59 d7 08 19 f8 8b 7e 1e e9 ee a6 1b d9 00 93 cc 11 5e 1d e0 39 81 88 75 c0 0c ba 10 32 88 3f 6f a5 9f a9 69 68 bd a7 6f 9b b5 67 00 ce 84 0e 61 f1 2e 72 11 1c 96 5e e7 16 c8 b4 17 aa c8 3b 50 32 42 13 db 47 29 88 5a 3c f4 30 c9 59 54 7c 60 d0 2c a8 0a 40 d0 83 64 c9 ef 00 c7 3d cb 56 75 9b 13 a3 74 60 [TRUNCATED]
                        Data Ascii: 1c55zBIs5(5;9*Zc?xxeAwJs%*AFh0yqOUy%a`q24N:fk&qbq[x?Fm93(<+}Etn@`BqTf6w~ihi(wfyEL/(ADlNKK$piheAQY~^9u2?oihoga.r^;P2BG)Z<0YT|`,@d=Vut`0@(LyNjYXR@t3Yo0WYqm(1S9[o-'ACmxXtG d/a//Y/S.sM.BY;|mb3bCP6M~$Ye\keil(vi@k/`Py9NL4SI;Q%ca$(wO4bCQ:8tOhzG0Y5hLk.Fn[(YEA^+~Yjd(+9FFF$td8GIS-0Q&pe9k"'OU;O?10:I 9UV]m'XLh+LY/*)gxZ{x!T)V>Ah#aPL7-wS26YJnf7@mq#F7I_]8"L},H5cs21"T7 [TRUNCATED]
                        Aug 21, 2024 08:59:40.078979969 CEST1236INData Raw: a3 8b 5f 87 d4 cf 0b 77 ca 79 98 da 06 01 17 f8 0f b9 be 17 76 f0 da 36 f0 3a f8 ae 96 3e 3a d5 1a c9 d2 60 5c dd ed 66 ac a1 20 b2 10 20 93 b5 b3 b7 98 50 b2 5e a2 0f 92 85 40 c0 2d 58 8b 3f 37 bc db 91 b8 39 ba a9 a1 c2 af cc 69 b6 d6 5e 77 a1
                        Data Ascii: _wyv6:>:`\f P^@-X?79i^w{a92c[r'l~oLk^}(g\v6bOn<X|.y#$4VKfq)M/wMQrp{ro10nIx*rL8(b*@']!`7&>"PPi
                        Aug 21, 2024 08:59:40.078991890 CEST1236INData Raw: 98 7a ef b3 69 96 8e 1f e6 d0 b5 52 ca 91 4d 83 a2 8d ed c3 4e cf 09 ae 42 a0 4e 12 10 72 25 82 89 47 6e 64 a9 8f d9 a8 a0 72 05 a5 57 fa 39 34 82 af 24 5c 32 77 9d 68 1c 0f 54 86 28 6a 80 61 22 db 55 01 34 ab 45 9d 5f c2 80 5f 24 95 e1 bf c6 6b
                        Data Ascii: ziRMNBNr%GndrW94$\2whT(ja"U4E__$kb2CQ;3i+g?5HB2&uYQ'5}ufA14G3n$0\Nr0l~^M`kG*On@i[: WuR65_\jtq!wG1(Vs5e
                        Aug 21, 2024 08:59:40.079003096 CEST388INData Raw: 3d 2b 32 4e 1c 4f 32 e2 48 e2 c1 5e b0 e1 77 b6 e6 fd 68 d3 08 94 6a 71 cc c2 0b 75 e7 24 63 76 19 e0 0e 68 46 41 47 64 0b 24 e3 6c 3b 07 1b 50 e6 9d d2 5c 9a fa 3d 6b 99 bc 03 da cf eb f9 22 2f 9d 00 ae 1d 29 2f c6 e9 83 51 e2 ed 5f 02 bd c7 a9
                        Data Ascii: =+2NO2H^whjqu$cvhFAGd$l;P\=k"/)/Q_)r@<'Rb6nM"c1,in6SWi1x"1nBFoP l8eZ%2U{ej 7qq%\vZ_LKD\kQ>&^zv
                        Aug 21, 2024 08:59:40.088702917 CEST1236INData Raw: 4b 21 e8 bc ad d1 83 b8 87 78 ed 00 d9 e4 65 cb 74 06 ac 9b b2 33 76 fc 95 6e cf db 56 58 a0 28 81 a2 40 0f 5e b8 e4 b8 a6 80 f6 90 cf c9 ee 34 2d 7e 2a ca 0a a2 d8 e8 e3 2f 06 8c 9a 57 3d f7 6a db 01 34 2f f0 d9 41 97 24 5f a6 52 94 92 44 02 87
                        Data Ascii: K!xet3vnVX(@^4-~*/W=j4/A$_RDDZ%z4H-Vp2Eicw]>dqO|rMq\O]&1.HwId"C|\1CeM<7DZpaIIebJ`HT*c
                        Aug 21, 2024 08:59:40.088751078 CEST1236INData Raw: b8 a2 73 e1 6b 9a a2 76 64 fa e2 de 0f 46 9e 50 c7 60 f9 59 96 14 2e 53 31 af da d5 cd b2 2a ac 2c 17 ae b2 1a 94 44 21 67 bc 36 22 6b 18 49 3e f8 2a 35 2b 49 a2 0d 4e a6 d7 c6 b0 82 b0 8b 48 90 81 80 c3 a7 f5 1b c6 db d7 6c 32 d3 72 38 65 60 e1
                        Data Ascii: skvdFP`Y.S1*,D!g6"kI>*5+INHl2r8e`#~i_>"mpjEm$N&$@9/}pLuS"sX\gVmX{H*+azmzkSR==1ZUR
                        Aug 21, 2024 08:59:40.088762045 CEST1236INData Raw: 90 53 db 80 99 4a b7 f3 63 73 35 3f 57 31 ab 0c fa b9 86 30 33 97 20 2c 86 2c c9 cf bf f8 35 66 c0 ae da 30 9e 1f 4d 35 21 7f 4e 3d e7 f7 53 95 14 46 0c e0 bc 07 eb 70 2d c2 8e ab 55 b1 5f a7 4e c0 db 98 e4 5e fa c7 1d 42 4e 85 98 33 eb 66 31 13
                        Data Ascii: SJcs5?W103 ,,5f0M5!N=SFp-U_N^BN3f1R(Q|w7H]2!Y-WAu:)K+8j(EYK cCjjqfCbUS!^hn^I=m=>0!eQ>Dq!-QQvkSX/N
                        Aug 21, 2024 08:59:40.088773012 CEST500INData Raw: 91 72 ed b5 a5 b0 74 fe 2d 43 9e 9f 66 ec e0 55 eb 6c 30 d6 db 75 01 14 94 bb 6c 88 e7 1a 05 81 d9 f9 6b 94 6a 2d 11 5e 44 a0 70 fd 9d fd c4 14 6d c7 14 c3 a2 d9 46 b4 1c dc 4a de 2e c6 a2 06 98 9f eb 37 e1 ac 4e d5 62 60 0b d7 93 98 73 f1 64 14
                        Data Ascii: rt-CfUl0ulkj-^DpmFJ.7Nb`sdnG{C6+)Ty?h@*:=fG0&bf.N^2Y-c5}bSW.Z@rN.a8'!(|'2!rm
                        Aug 21, 2024 08:59:40.124990940 CEST278OUTPOST / HTTP/1.1
                        Host: eljvuop.net
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                        Content-Length: 0
                        Content-Type: image/tiff
                        Cookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zg
                        Accept-Encoding: gzip
                        Aug 21, 2024 08:59:40.342971087 CEST75INHTTP/1.1 200 OK
                        Date: Wed, 21 Aug 2024 06:59:40 GMT
                        Content-Length: 0
                        Aug 21, 2024 08:59:40.343344927 CEST281OUTPOST / HTTP/1.1
                        Host: eljvuop.net
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                        Content-Length: 1047
                        Content-Type: image/tiff
                        Cookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zg
                        Accept-Encoding: gzip
                        Aug 21, 2024 08:59:40.343628883 CEST1047OUTData Raw: 4d 8d b0 b0 38 b9 49 bd 00 8d 58 92 e6 66 a5 86 d3 b2 d2 99 78 25 ff d5 52 0f 67 ce 96 8c 8c af bc 2e b3 ee 04 06 8d c2 4b d6 1f d9 e4 ec 50 08 c6 43 62 c5 f3 40 2b b0 bf 89 af 82 73 fa 16 ab 52 5d 83 7f 67 01 11 4b da c2 35 9d f9 51 af 43 fa 1c
                        Data Ascii: M8IXfx%Rg.KPCb@+sR]gK5QC^I8a`-\4Zw}Q;89MC.z/lPy|cj1I~0|=4,!T`[qeyV`"SKKu:Nm>B1qR(+T?$dj*40
                        Aug 21, 2024 08:59:40.722647905 CEST904INHTTP/1.1 200 OK
                        Date: Wed, 21 Aug 2024 06:59:40 GMT
                        Content-Length: 787
                        Content-Type: application/octet-stream
                        Data Raw: 3b c8 43 23 18 67 51 70 af 25 ea 51 26 08 a6 b5 e7 a4 fd 9e 48 40 aa b2 49 43 27 4a 0b d8 1f 46 c5 fc 8c b8 b5 d5 a2 c3 91 59 55 50 8d 54 09 f0 d4 1d 7e 1c bb a7 e7 7a 05 d5 df 9a fd be 85 f4 57 e8 3a 36 0d 76 ba b7 48 ff 3b 5e 53 38 b9 17 e2 b7 5c c4 d4 94 10 5e 9a 23 2a 0d a5 67 30 01 ea ea be 24 13 b4 64 df af 59 b5 95 6e fb 79 e3 b7 ca 65 3b 6e dd 43 96 c8 a9 e8 d7 23 80 eb a6 63 77 3a a9 0b 05 a7 75 68 3a 96 21 61 8f 35 4d d2 88 db e8 67 6b a9 e7 bc 11 99 fe 91 ce 61 97 93 0c 97 3d d9 2c 93 c4 65 9f a5 c1 62 53 a4 70 9b 12 52 9f 84 43 8d 62 6e 12 99 c1 e8 90 71 42 f5 57 1a 72 93 a2 bb f6 33 e7 f4 2a 03 7a d0 b7 c6 39 38 a6 32 e9 c7 ed 06 64 92 d2 f8 05 82 25 31 da e1 32 3f 50 2d 4d a1 44 8f ac ea c4 2a 59 2d 62 e0 57 a3 30 77 86 d8 d1 b4 10 db 3a b4 29 33 64 12 3e 26 33 0b 41 7c 43 3a 30 8d ac 88 76 a2 f1 04 69 01 de 6b 21 9f 92 0c e2 71 2c 16 a1 cd 42 f0 49 e2 77 46 39 94 3b fd 04 f8 f6 f1 ee 26 e7 72 65 2a 0f 7f 55 d0 97 b4 f9 af 50 ca 80 90 48 7c f3 ea 59 cb 53 d0 a0 b9 12 e6 90 de e2 1c 9c [TRUNCATED]
                        Data Ascii: ;C#gQp%Q&H@IC'JFYUPT~zW:6vH;^S8\^#*g0$dYnye;nC#cw:uh:!a5Mgka=,ebSpRCbnqBWr3*z982d%12?P-MD*Y-bW0w:)3d>&3A|C:0vik!q,BIwF9;&re*UPH|YS?U-.'fBi8A=\;+o4{ueG?)zZYMp@Rf&VFkg.aE!7pFlL*S0:cjsSr`i0/zz*aE"+GpujwSw.h,W^:%P)5MS=rr"hPfh^6pZ[;.xAhbDgiUJHB6=+fWm^~NyKC`lA{,$R<Vnbce*yu/;[2olX>6+_7_@"ZO|u7ZI[JJ(8nuRGG2U7HRs~3N*F2E\mfMRwTY?
                        Aug 21, 2024 08:59:40.915621996 CEST278OUTPOST / HTTP/1.1
                        Host: eljvuop.net
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                        Content-Length: 0
                        Content-Type: image/tiff
                        Cookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zg
                        Accept-Encoding: gzip
                        Aug 21, 2024 08:59:41.133559942 CEST75INHTTP/1.1 200 OK
                        Date: Wed, 21 Aug 2024 06:59:41 GMT
                        Content-Length: 0
                        Aug 21, 2024 08:59:42.129251957 CEST280OUTPOST / HTTP/1.1
                        Host: eljvuop.net
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                        Content-Length: 143
                        Content-Type: image/tiff
                        Cookie: ak_cuscartcart=vWR4wVcczUw/qsqsg1H1zg
                        Accept-Encoding: gzip
                        Aug 21, 2024 08:59:42.129282951 CEST143OUTData Raw: eb c1 01 9a 45 4d c9 18 a8 23 ed 0e 32 6b 0f c4 3b 7a 88 6c ea 41 ed 5a c5 40 19 35 23 fa 42 ff ac 01 a4 c7 37 ab d1 f5 ae 1f 1e 83 97 55 8b cc f0 f2 53 93 eb a1 d8 28 b2 54 be fd 45 fa b3 45 4b 7e 6d 7b 1f 1d 47 2e 9c ee ca 5e de 13 3a ea 24 27
                        Data Ascii: EM#2k;zlAZ@5#B7US(TEEK~m{G.^:$')[jS'/bo>"z/YmZ&~1@


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.74973337.46.119.504438156C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe
                        TimestampBytes transferredDirectionData
                        2024-08-21 06:59:40 UTC448OUTPOST / HTTP/1.1
                        Host: australiais.org
                        User-Agent: Go-http-client/1.1
                        Content-Length: 963
                        Content-Type: audio/mpeg
                        Cookie: D=wkKgjSLUI1gWvAYywhTgWpudEpBrwCoEQ3X9G6bxZHDby1xaL+8oLoh9t6Tzo05eXwhOQ2egrkD4eLLYHfMuziuR2UF5WDjej7e4aCjldZD6zAa+Gsv3hKxjVQ5mG45MrhtDzAGTeiACJEVc9qs+44nACu4kwjBkYsaIF0EHxko+O/HaT44tmx/TAg+g+htD0hoHU6a/ieTPWBUl0WTsgGtrqEZPDlBr/6/t+j+tb0HtcZeQtNrebO9f4zocrCdVXMtu7S3T8hfRXU+l2Vlp63KVpSu449YoGW4V
                        Accept-Encoding: gzip
                        2024-08-21 06:59:40 UTC963OUTData Raw: 79 2b 8a bf cc fa 15 0b 69 f1 ae 07 6f 3d 68 88 d9 c0 e1 07 f8 ca 08 fb 52 fb 7a 68 1a 7b 3c 45 a8 46 cd 15 0f 2f 7d bb d4 54 71 33 37 c1 82 28 33 d7 7f f5 b2 1a dc 0c 41 90 df c7 06 7f 27 68 d4 db 2c 88 74 81 9b 15 af 91 57 c5 23 c2 8f d0 24 f2 c5 63 33 59 40 15 7f db 38 0d fd 64 0b e2 03 9a b1 97 fc 9d 7b 2d 96 3f 65 05 c7 e0 1b 97 67 e4 dc 92 4a b3 d3 09 64 4b db 32 3e ae ec 8f 18 a7 ab d7 eb aa 32 96 96 da b1 2a 78 cc e6 47 dc 05 05 a5 87 c3 95 20 cc 78 ee 14 d4 9c 52 f2 45 89 c2 c8 86 0f b8 64 d0 e4 8b b6 8b 23 f0 a2 33 e0 ea 4d 3c 7e 99 87 8f ce cf d2 d8 2f 07 a5 9f 71 6b b9 17 28 34 36 9c 74 6c d1 20 ba da d4 c6 b5 03 64 5c c5 d4 8b f8 ef 7e fc 8e 25 96 c0 af 0f ea 5b c9 ee 01 25 47 4b a3 bf 1c f0 db 4e a2 3e 39 03 33 26 01 68 c8 b9 94 19 69 51 cb
                        Data Ascii: y+io=hRzh{<EF/}Tq37(3A'h,tW#$c3Y@8d{-?egJdK2>2*xG xREd#3M<~/qk(46tl d\~%[%GKN>93&hiQ
                        2024-08-21 06:59:41 UTC177INHTTP/1.1 200 OK
                        Set-Cookie: D=6PJFPolsTIsiw35Anw
                        Date: Wed, 21 Aug 2024 06:59:41 GMT
                        Content-Type: application/octet-stream
                        Connection: close
                        Transfer-Encoding: chunked
                        2024-08-21 06:59:41 UTC1009INData Raw: 63 30 37 0d 0a 8c 05 4d 6d 15 de 60 ad 7a 82 92 fd 4b eb 35 88 63 19 5e 4f db 8c ce 5a 6e 29 cc 20 95 52 dd 0c bc a5 3e 3a 78 65 75 01 4d 98 d4 0a d0 e5 8a 10 e2 1a 96 9e ef 6c 2c da 8b 99 ca 56 f8 7e 6e ce d8 2d 60 78 76 ea 99 4c ff 34 d8 41 d8 f2 09 35 55 10 56 fc 4d 8d c4 20 44 7f 67 58 ff b5 1a 58 9d a7 4e 44 84 c5 ea d6 67 4d 43 0d d6 53 84 99 9c fa ab 62 9f d3 70 6b cc 93 14 83 dc 6e 58 a1 d6 50 3a d2 f4 d5 72 45 12 2e d4 05 13 fa 3c 79 ae ef f7 28 b0 e2 4d 1d 16 1a f1 5a f5 77 47 6d d4 42 15 55 f8 46 59 67 1e 49 76 b7 94 c2 44 89 ee ec ac 39 0f 49 d0 8b 61 19 16 49 44 1f a9 af 36 90 d6 f5 8f 5e 2a ae 42 29 51 b0 ed 65 44 c0 c5 42 0b 7e 84 3a 0e 38 b8 d1 d8 2e 2f 7b d9 13 06 a8 de c6 8c 49 c6 aa 76 36 87 fb 6a e9 74 25 71 ac b0 4f ff 66 7e 46 43 cf
                        Data Ascii: c07Mm`zK5c^OZn) R>:xeuMl,V~n-`xvL4A5UVM DgXXNDgMCSbpknXP:rE.<y(MZwGmBUFYgIvD9IaID6^*B)QeDB~:8./{Iv6jt%qOf~FC
                        2024-08-21 06:59:41 UTC2372INData Raw: f4 6c d2 c4 70 02 5b 89 4f 35 32 dd 9b 2f 7b 22 06 df 3d 50 75 b4 08 cd 29 e4 80 1c c7 c5 b5 55 b2 d9 26 39 2f 18 41 bc 6d f4 51 df a4 06 39 1a 99 7a c0 40 00 26 59 b3 a2 01 9a a7 78 96 69 0d 05 bd 0f 4f 7d c0 98 fb 1d 4d 7b 18 e3 2e 41 63 fc 28 2f 9e 7b f4 18 9a 87 29 60 26 a9 0c 1f 6e fa 9b 1f 75 98 6b ac 92 e5 93 28 af 33 8d 05 60 d4 df a4 e0 73 12 9a 58 be 7f 4a 24 d7 70 fc 59 77 5e 35 f2 d9 b7 5d 3f 73 1c 14 d4 ff ee 6f 8c ed c7 81 f2 85 0b 88 f7 8c 7d 63 9e 03 8a ed c4 e1 aa ad 5d 25 ad 0f 81 3d 38 95 a7 da 4c 77 7b 2e 88 a0 14 42 f3 62 1f a0 5f 71 97 c3 61 b9 4d 03 b9 69 f9 a6 03 3a 01 01 b6 6f 9f 10 99 d2 d8 95 e4 7e e6 20 5e 0c 05 2b 2d d0 c8 0b 25 d8 e2 fd 06 ed 53 5c 12 85 da 5b 0f 2b 5b 50 05 54 e9 35 37 83 d7 5c 95 04 fb 6b a9 15 38 64 dc 8f
                        Data Ascii: lp[O52/{"=Pu)U&9/AmQ9z@&YxiO}M{.Ac(/{)`&nuk(3`sXJ$pYw^5]?so}c]%=8Lw{.Bb_qaMi:o~ ^+-%S\[+[PT57\k8d
                        2024-08-21 06:59:41 UTC437INData Raw: 6b 08 a6 f0 ed 0e 61 71 d2 d3 ac 65 1a 3b 1a e9 f1 89 16 56 4a 3c 80 a8 0f 79 5f 31 eb a7 20 43 0a 22 ca b8 11 20 65 5e 38 59 e9 0a 5e 86 a9 55 ac c8 e1 04 c2 48 23 98 29 b5 df 15 58 ac 2d 21 95 38 74 fd b5 c5 d2 f9 16 4e 81 0f 6c 1a 4b 4b fb 5a d0 a4 51 27 1c ac f0 38 c9 4b 09 dd c2 92 9a 33 3c a4 9c 00 7e 1e 25 53 69 61 e9 8f 00 7b 41 b8 3c 58 e6 0c 0f 1c 4e e9 db 61 cb 0c 4f 9d 09 82 4d 49 a4 99 bc 33 3b b4 f8 ce db 66 73 09 68 af 93 8c 54 bb 9f bc 80 a5 ec 86 62 f6 fe e5 a9 9c 58 ef c2 da 46 87 6a 17 95 91 a5 3d 5d c3 a8 c7 de b6 98 7e f5 d2 54 7e e8 48 21 be 56 f6 42 7f 9d 0f 66 c3 47 bf 03 86 23 5c 85 db e2 2f 2b bf 1b 6f ff cb 73 0a 3e 88 6f 27 90 29 a0 d2 68 b8 cc 98 18 d6 51 a9 46 d4 0b 15 96 b3 31 e6 38 0a b1 e4 4a c3 94 56 b8 8e 81 bb 18 67 39
                        Data Ascii: kaqe;VJ<y_1 C" e^8Y^UH#)X-!8tNlKKZQ'8K3<~%Sia{A<XNaOMI3;fshTbXFj=]~T~H!VBfG#\/+os>o')hQF18JVg9


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:02:59:08
                        Start date:21/08/2024
                        Path:C:\Users\user\Desktop\sVfXReO3QI.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\sVfXReO3QI.exe"
                        Imagebase:0x400000
                        File size:6'986'755 bytes
                        MD5 hash:26E14EE776EACBBD45F8EE346DCECFCC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:2
                        Start time:02:59:08
                        Start date:21/08/2024
                        Path:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe"
                        Imagebase:0x400000
                        File size:145'722 bytes
                        MD5 hash:49BF9DCA0C8EAFF957F62F0F3CEF0BA5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:false

                        Target ID:4
                        Start time:02:59:13
                        Start date:21/08/2024
                        Path:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"
                        Imagebase:0x400000
                        File size:6'794'456 bytes
                        MD5 hash:03F2D4B132FC5802F9739F4B91C86C25
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 4%, ReversingLabs
                        Reputation:low
                        Has exited:false

                        Target ID:12
                        Start time:02:59:26
                        Start date:21/08/2024
                        Path:C:\Users\user\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user~1\AppData\Local\Temp\PsiphonTemp\psiphon-tunnel-core.exe --config "C:\Users\user\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\user\AppData\Local\Psiphon3\server_list.dat"
                        Imagebase:0x410000
                        File size:18'710'232 bytes
                        MD5 hash:77F9FB45FA91FBC0B2105900F7AF30DF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:false

                        Target ID:14
                        Start time:02:59:27
                        Start date:21/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:16%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:21.5%
                          Total number of Nodes:1984
                          Total number of Limit Nodes:24
                          execution_graph 10992 410440 10993 410447 10992->10993 10994 41044f 10992->10994 10995 402a87 48 API calls 10994->10995 10996 410479 10994->10996 10995->10996 13413 419c60 13418 4075fb InitializeCriticalSection 13413->13418 13415 419c6a 13416 419278 2 API calls 13415->13416 13417 419c74 13416->13417 13418->13415 10561 40c370 10564 40c000 10561->10564 10563 40c3bc 10565 40c015 10564->10565 10566 40c35a 10564->10566 10565->10566 10589 41336a 10565->10589 10566->10563 10569 40c033 10569->10563 10570 41336a 49 API calls 10571 40c04e 10570->10571 10571->10569 10572 41336a 49 API calls 10571->10572 10573 40c061 10572->10573 10573->10569 10574 41336a 49 API calls 10573->10574 10575 40c077 10574->10575 10576 40c07b 10575->10576 10595 41358f 10575->10595 10576->10563 10578 40c0a1 10578->10563 10579 40c09d 10579->10578 10601 40be80 10579->10601 10581 40c10f 10582 40c326 10581->10582 10583 40c313 10581->10583 10587 4133ae 6 API calls 10581->10587 10588 41367e 118 API calls 10581->10588 10605 40bed0 10581->10605 10612 413662 10582->10612 10583->10563 10585 40c32d 10585->10563 10587->10581 10588->10581 10590 413379 10589->10590 10594 40c02f 10590->10594 10616 413318 10590->10616 10594->10569 10594->10570 10596 41359e 10595->10596 10597 4135b8 10596->10597 10627 41353e 10596->10627 10597->10579 10600 402a64 48 API calls 10600->10597 10602 40be89 10601->10602 10604 40beca 10602->10604 10630 413417 10602->10630 10604->10581 10606 40bf34 10605->10606 10607 40bee8 10605->10607 10608 40bf60 10606->10608 10610 413417 6 API calls 10606->10610 10609 40bf12 10607->10609 10611 413417 6 API calls 10607->10611 10608->10581 10609->10581 10610->10608 10611->10609 10613 413667 10612->10613 10614 41367a 10613->10614 10669 4135d1 10613->10669 10614->10585 10624 402003 10616->10624 10619 402a64 10620 4029fa 47 API calls 10619->10620 10621 402a6d 10620->10621 10622 402a72 10621->10622 10623 402a73 VirtualAlloc 10621->10623 10622->10594 10623->10594 10625 40200a VirtualFree 10624->10625 10626 40201b 10624->10626 10625->10626 10626->10619 10628 402003 VirtualFree 10627->10628 10629 413548 10628->10629 10629->10600 10633 4133ae 10630->10633 10634 4133c0 10633->10634 10635 4133bc 10633->10635 10639 413455 10634->10639 10635->10602 10637 4133e5 _CxxThrowException 10637->10635 10640 41347a 10639->10640 10641 4133e0 10640->10641 10643 413502 10640->10643 10641->10635 10641->10637 10646 4134b7 EnterCriticalSection 10643->10646 10645 413526 10645->10641 10652 412a5a 10646->10652 10648 4134de LeaveCriticalSection 10648->10645 10653 412a6a 10652->10653 10657 412a63 10652->10657 10662 4122f5 SetFilePointer 10653->10662 10657->10648 10658 412a26 10657->10658 10659 412a3e 10658->10659 10660 4129ea GetLastError 10659->10660 10661 412a55 10660->10661 10661->10648 10663 41231e GetLastError 10662->10663 10664 412328 10662->10664 10663->10664 10665 4129ea 10664->10665 10666 4129f1 10665->10666 10667 4129f4 GetLastError 10665->10667 10666->10657 10668 4129fe 10667->10668 10668->10657 10670 4135e5 10669->10670 10671 4135f6 memmove 10670->10671 10672 41360a 10670->10672 10671->10672 10673 413625 10672->10673 10678 415591 10672->10678 10684 41246f SetFileTime 10672->10684 10685 41228a 10672->10685 10688 4012ab 10672->10688 10673->10613 10682 41559d 10678->10682 10679 41564a 10679->10673 10680 415552 112 API calls 10680->10682 10682->10679 10682->10680 10694 418e79 10682->10694 10698 415431 10682->10698 10684->10673 10686 412294 FindCloseChangeNotification 10685->10686 10687 41229f 10685->10687 10686->10687 10687->10673 10689 4012bf 10688->10689 10692 4012b3 10688->10692 10691 4012dc 10689->10691 10973 41248c 10689->10973 10691->10692 10693 4012e9 SetFileAttributesW 10691->10693 10692->10673 10693->10692 10695 418e8a 10694->10695 10696 418e9a 10694->10696 10703 412abe 10695->10703 10696->10682 10699 41544b 10698->10699 10711 412424 10699->10711 10714 401b1e 10699->10714 10700 41547f 10700->10682 10708 41249c 10703->10708 10705 412ad7 10706 4129ea GetLastError 10705->10706 10707 412af6 10706->10707 10707->10696 10709 4124aa 10708->10709 10710 4124ad WriteFile 10708->10710 10709->10710 10710->10705 10777 41235b 10711->10777 10715 401b30 10714->10715 10716 401b3a 10714->10716 10715->10700 10782 415d5c _EH_prolog 10716->10782 10718 401b67 10850 412564 10718->10850 10719 4014eb 2 API calls 10721 401b80 10719->10721 10722 401e5a ??3@YAXPAX 10721->10722 10723 401b95 10721->10723 10727 412564 VariantClear 10722->10727 10808 401403 10723->10808 10726 401ba0 10812 4017d3 10726->10812 10727->10715 10730 40143c 2 API calls 10731 401bbf ??3@YAXPAX 10730->10731 10732 401bd1 10731->10732 10763 401e20 ??3@YAXPAX 10731->10763 10735 401bf2 10732->10735 10738 401c5c 10732->10738 10739 401c1d 10732->10739 10734 412564 VariantClear 10734->10715 10736 412564 VariantClear 10735->10736 10737 401bfa ??3@YAXPAX 10736->10737 10737->10718 10741 401c81 10738->10741 10742 401c9a 10738->10742 10740 412564 VariantClear 10739->10740 10743 401c2f ??3@YAXPAX 10740->10743 10744 412564 VariantClear 10741->10744 10745 401ca2 10742->10745 10746 401cbc GetLocalTime SystemTimeToFileTime 10742->10746 10743->10718 10747 401c89 ??3@YAXPAX 10744->10747 10745->10739 10748 401cf0 10745->10748 10749 401cd9 10745->10749 10746->10745 10747->10718 10841 40372c GetFileAttributesW 10748->10841 10817 403a96 lstrlenW 10749->10817 10753 401e2c GetLastError 10753->10763 10754 401d10 ??2@YAPAXI 10756 401d1c 10754->10756 10755 401e22 10755->10753 10854 412458 10756->10854 10759 401e07 10762 412564 VariantClear 10759->10762 10760 401d57 GetLastError 10857 4013d1 10760->10857 10762->10763 10763->10734 10764 401d69 10765 403a96 88 API calls 10764->10765 10768 401d77 ??3@YAXPAX 10764->10768 10767 401dc4 10765->10767 10767->10768 10770 412458 2 API calls 10767->10770 10769 401d94 10768->10769 10771 412564 VariantClear 10769->10771 10772 401de9 10770->10772 10773 401da2 ??3@YAXPAX 10771->10773 10774 401ded GetLastError 10772->10774 10775 401dfe ??3@YAXPAX 10772->10775 10773->10718 10774->10768 10775->10759 10778 41228a FindCloseChangeNotification 10777->10778 10779 412366 10778->10779 10780 41236a CreateFileW 10779->10780 10781 41238f 10779->10781 10780->10781 10781->10700 10783 415e65 10782->10783 10784 415d97 10782->10784 10785 415db4 10783->10785 10786 415e6a 10783->10786 10784->10785 10787 415e31 10784->10787 10788 415da6 10784->10788 10801 415dda 10785->10801 10886 415add 10785->10886 10789 415e1f 10786->10789 10792 415e74 10786->10792 10800 415dc6 10786->10800 10787->10801 10860 418e5a 10787->10860 10788->10789 10790 415dab 10788->10790 10882 4125ef 10789->10882 10795 415db1 10790->10795 10806 415ddf 10790->10806 10792->10789 10792->10806 10795->10785 10795->10800 10798 415e47 10863 4125a8 10798->10863 10800->10801 10874 412614 10800->10874 10869 412569 10801->10869 10802 412564 VariantClear 10805 401b63 10802->10805 10805->10718 10805->10719 10806->10801 10878 412634 10806->10878 10809 40141a 10808->10809 10810 4011b7 2 API calls 10809->10810 10811 401425 10810->10811 10811->10726 10813 4013d1 2 API calls 10812->10813 10814 4017e1 10813->10814 10901 4014bc 10814->10901 10816 4017ec 10816->10730 10818 402a9c 2 API calls 10817->10818 10819 403ab7 10818->10819 10820 4011b7 2 API calls 10819->10820 10823 403ac7 10819->10823 10820->10823 10822 403b15 GetSystemTimeAsFileTime GetFileAttributesW 10824 403b34 10822->10824 10825 403b2a 10822->10825 10823->10822 10831 403bb9 10823->10831 10904 401e7e CreateDirectoryW 10823->10904 10827 401e7e 4 API calls 10824->10827 10838 403b3a ??3@YAXPAX 10824->10838 10826 40372c 22 API calls 10825->10826 10826->10824 10839 403b47 10827->10839 10828 403be9 10829 4095ee 57 API calls 10828->10829 10834 403bf3 ??3@YAXPAX 10829->10834 10830 403b4c 10910 4095ee 10830->10910 10831->10828 10831->10838 10832 403bad ??3@YAXPAX 10837 403bfe 10832->10837 10833 403b5f memcpy 10833->10839 10834->10837 10837->10739 10838->10837 10839->10830 10839->10832 10839->10833 10840 401e7e 4 API calls 10839->10840 10840->10839 10842 403749 10841->10842 10848 401cfc 10841->10848 10843 40374d SetLastError 10842->10843 10845 40375a 10842->10845 10843->10848 10844 403763 10932 4036ff 10844->10932 10845->10844 10847 403771 FindFirstFileW 10845->10847 10845->10848 10847->10844 10849 403784 FindClose CompareFileTime 10847->10849 10848->10753 10848->10754 10848->10755 10849->10844 10849->10848 10853 412520 10850->10853 10851 412541 VariantClear 10851->10715 10852 412558 10852->10715 10853->10851 10853->10852 10970 412441 10854->10970 10858 4011b7 2 API calls 10857->10858 10859 4013eb 10858->10859 10859->10764 10861 4013d1 2 API calls 10860->10861 10862 418e67 10861->10862 10862->10798 10890 412592 10863->10890 10866 4125e8 ??3@YAXPAX 10866->10801 10867 4125cd 10867->10866 10868 4125d2 _CxxThrowException 10867->10868 10868->10866 10870 412520 VariantClear 10869->10870 10871 412575 10870->10871 10872 412579 memcpy 10871->10872 10873 41258e 10871->10873 10872->10873 10873->10802 10875 412622 10874->10875 10876 41261d 10874->10876 10875->10801 10877 412592 VariantClear 10876->10877 10877->10875 10879 412642 10878->10879 10880 41263d 10878->10880 10879->10801 10881 412592 VariantClear 10880->10881 10881->10879 10883 4125fd 10882->10883 10884 4125f8 10882->10884 10883->10801 10885 412592 VariantClear 10884->10885 10885->10883 10887 415aef 10886->10887 10888 415b0b 10887->10888 10897 41265b 10887->10897 10888->10801 10893 412520 10890->10893 10892 41259a SysAllocString 10892->10866 10892->10867 10896 412528 10893->10896 10894 412541 VariantClear 10894->10892 10895 412558 10895->10892 10896->10894 10896->10895 10898 412664 10897->10898 10899 412669 10897->10899 10900 412592 VariantClear 10898->10900 10899->10888 10900->10899 10902 401472 2 API calls 10901->10902 10903 4014cc 10902->10903 10903->10816 10905 401ebf 10904->10905 10906 401e8f GetLastError 10904->10906 10905->10823 10907 401ea9 GetFileAttributesW 10906->10907 10909 401e9e 10906->10909 10907->10905 10907->10909 10908 401e9f SetLastError 10908->10823 10909->10905 10909->10908 10911 402490 19 API calls 10910->10911 10912 409602 wvsprintfW 10911->10912 10913 4096d1 10912->10913 10914 409623 GetLastError FormatMessageW 10912->10914 10917 40950a 27 API calls 10913->10917 10915 409651 FormatMessageW 10914->10915 10916 409666 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 10914->10916 10915->10913 10915->10916 10921 40950a 10916->10921 10919 4096dd 10917->10919 10919->10838 10922 409519 10921->10922 10923 40957f ??3@YAXPAX LocalFree 10921->10923 10924 4083d2 4 API calls 10922->10924 10923->10919 10925 409528 IsWindow 10924->10925 10926 409551 10925->10926 10927 40953f IsBadReadPtr 10925->10927 10928 408433 22 API calls 10926->10928 10927->10926 10929 409577 10928->10929 10931 4081a6 ??3@YAXPAX 10929->10931 10931->10923 10938 40331e 10932->10938 10934 403708 10935 403729 10934->10935 10936 40370d GetLastError 10934->10936 10935->10848 10937 403718 10936->10937 10937->10848 10939 403327 10938->10939 10940 40332b GetFileAttributesW 10938->10940 10939->10934 10941 403341 10940->10941 10942 40333c 10940->10942 10943 403345 SetFileAttributesW 10941->10943 10944 40335f 10941->10944 10942->10934 10945 403352 DeleteFileW 10943->10945 10946 40335b 10943->10946 10949 403211 10944->10949 10945->10934 10946->10934 10950 402a9c ??2@YAPAXI ??3@YAXPAX 10949->10950 10951 403228 10950->10951 10952 402aed ??2@YAPAXI ??3@YAXPAX 10951->10952 10953 403235 FindFirstFileW 10952->10953 10954 4032ed SetFileAttributesW 10953->10954 10967 403257 10953->10967 10956 403310 ??3@YAXPAX 10954->10956 10957 4032f8 RemoveDirectoryW 10954->10957 10955 401403 ??2@YAPAXI ??3@YAXPAX 10955->10967 10959 403318 10956->10959 10957->10956 10958 403305 ??3@YAXPAX 10957->10958 10958->10959 10959->10934 10960 4017a8 ??2@YAPAXI ??3@YAXPAX 10960->10967 10961 402aed ??2@YAPAXI ??3@YAXPAX 10961->10967 10962 403287 lstrcmpW 10964 4032d0 FindNextFileW 10962->10964 10965 40329d lstrcmpW 10962->10965 10963 4032bc SetFileAttributesW 10963->10956 10966 4032c5 DeleteFileW 10963->10966 10964->10967 10968 4032e6 FindClose 10964->10968 10965->10964 10965->10967 10966->10967 10967->10955 10967->10956 10967->10960 10967->10961 10967->10962 10967->10963 10967->10964 10969 403211 ??2@YAPAXI ??3@YAXPAX 10967->10969 10968->10954 10969->10967 10971 412424 2 API calls 10970->10971 10972 401d4f 10971->10972 10972->10759 10972->10760 10976 41246f SetFileTime 10973->10976 10975 412499 10975->10691 10976->10975 13435 40dc70 13436 40dc83 13435->13436 13439 40da60 13436->13439 13438 40dca2 13440 40da96 13439->13440 13442 40dbf8 13440->13442 13448 40db2d 13440->13448 13453 40d6e0 13440->13453 13443 40d0f0 117 API calls 13442->13443 13444 40dc00 13443->13444 13444->13438 13445 40db6f 13446 413662 117 API calls 13445->13446 13447 40db7b 13446->13447 13447->13442 13450 40db8c 13447->13450 13448->13445 13471 40d000 13448->13471 13476 40d0f0 13450->13476 13454 40d6f1 13453->13454 13455 40d6fa 13453->13455 13454->13440 13456 40d725 13455->13456 13457 41358f 49 API calls 13455->13457 13459 40d744 13455->13459 13461 40d729 13456->13461 13480 40d120 13456->13480 13457->13456 13460 40d77d 13459->13460 13469 40d7e3 13459->13469 13483 41367e 13459->13483 13460->13440 13461->13440 13465 4133ae 6 API calls 13465->13469 13466 41367e 118 API calls 13466->13469 13468 40d080 6 API calls 13468->13469 13469->13460 13469->13465 13469->13466 13469->13468 13488 40d470 13469->13488 13522 40d250 13469->13522 13525 40d2e0 13469->13525 13528 40c820 13469->13528 13472 40d036 13471->13472 13473 40d00a 13471->13473 13472->13448 13474 40d01d 13473->13474 13475 4133ae 6 API calls 13473->13475 13474->13448 13475->13474 13477 40d103 13476->13477 13478 40d0f9 13476->13478 13477->13438 13479 413662 117 API calls 13478->13479 13479->13477 13481 41336a 49 API calls 13480->13481 13482 40d130 13481->13482 13482->13459 13484 413662 117 API calls 13483->13484 13485 413687 13484->13485 13486 41368b _CxxThrowException 13485->13486 13487 41369c 13485->13487 13486->13487 13487->13459 13532 40d080 13488->13532 13491 40d080 6 API calls 13492 40d4a7 13491->13492 13493 40d4bd 13492->13493 13494 40d542 13492->13494 13495 40d4cc 13492->13495 13493->13469 13496 40d571 13494->13496 13497 40d54e 13494->13497 13498 40d080 6 API calls 13495->13498 13500 40d080 6 API calls 13496->13500 13536 40c930 memset memset 13497->13536 13501 40d4ea 13498->13501 13502 40d578 13500->13502 13503 40d508 13501->13503 13506 40d080 6 API calls 13501->13506 13505 40d080 6 API calls 13502->13505 13503->13469 13504 40d557 13546 40ca00 13504->13546 13508 40d59a 13505->13508 13507 40d51a 13506->13507 13507->13469 13510 40d080 6 API calls 13508->13510 13514 40d5bb 13510->13514 13514->13493 13515 40d080 6 API calls 13514->13515 13516 40d628 13514->13516 13515->13514 13537 40ce50 13516->13537 13520 40d65e 13520->13493 13521 40d66f memcpy memcpy 13520->13521 13521->13504 13523 40d080 6 API calls 13522->13523 13524 40d260 13523->13524 13524->13469 13526 40d080 6 API calls 13525->13526 13527 40d2f0 13526->13527 13527->13469 13529 40c836 13528->13529 13530 40c85c 13529->13530 13531 41367e 118 API calls 13529->13531 13530->13469 13530->13530 13531->13529 13533 40d0e3 13532->13533 13535 40d088 13532->13535 13533->13491 13534 4133ae 6 API calls 13534->13535 13535->13533 13535->13534 13536->13504 13538 40cea2 13537->13538 13539 40cf2e memset 13538->13539 13540 40cf52 13538->13540 13539->13538 13540->13493 13541 40d370 13540->13541 13544 40d390 13541->13544 13543 40d450 13543->13520 13544->13543 13545 40d080 6 API calls 13544->13545 13554 40d1c0 13544->13554 13545->13544 13547 40ca60 13546->13547 13548 40cae9 memset 13547->13548 13549 40cb13 13547->13549 13548->13547 13549->13493 13550 40cc60 13549->13550 13551 40ccb2 13550->13551 13552 40cd3e memset 13551->13552 13553 40cd62 13551->13553 13552->13551 13553->13469 13555 40d080 6 API calls 13554->13555 13556 40d1d0 13555->13556 13556->13544 11473 41527d 11476 414f8a 11473->11476 11474 414faf 11477 414c1d 16 API calls 11474->11477 11475 415012 ??2@YAPAXI 11475->11476 11476->11474 11476->11475 11478 41534f ??2@YAPAXI 11476->11478 11480 414c1d 16 API calls 11476->11480 11482 414b12 ctype 16 API calls 11476->11482 11483 415707 112 API calls 11476->11483 11488 414476 167 API calls 11476->11488 11489 41569c 112 API calls 11476->11489 11490 41508f 11476->11490 11479 414fc7 11477->11479 11478->11476 11481 414b12 ctype 16 API calls 11479->11481 11480->11476 11484 414fcf 11481->11484 11482->11476 11483->11476 11485 414c1d 16 API calls 11486 4150b4 11485->11486 11487 414b12 ctype 16 API calls 11486->11487 11487->11484 11488->11476 11489->11476 11490->11485 14397 405915 14399 40592a 14397->14399 14398 405958 14400 412823 memmove 14398->14400 14399->14398 14404 4028f8 ??3@YAXPAX ??3@YAXPAX 14399->14404 14401 405966 14400->14401 14403 405949 ??3@YAXPAX 14403->14399 14404->14403 11491 41942f __set_app_type __p__fmode __p__commode 11492 41949e 11491->11492 11493 4194b2 11492->11493 11494 4194a6 __setusermatherr 11492->11494 11503 4195a6 _controlfp 11493->11503 11494->11493 11496 4194b7 _initterm __getmainargs _initterm 11497 41950b GetStartupInfoA 11496->11497 11499 41953f GetModuleHandleA 11497->11499 11504 4074bd _EH_prolog 11499->11504 11503->11496 11507 405c18 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 11504->11507 11863 40202a GetModuleHandleW CreateWindowExW 11507->11863 11510 405c56 11511 40749c MessageBoxA 11510->11511 11513 405c70 11510->11513 11512 4074b3 exit _XcptFilter 11511->11512 11514 4014eb 2 API calls 11513->11514 11515 405ca7 11514->11515 11516 4014eb 2 API calls 11515->11516 11517 405caf 11516->11517 11866 404932 11517->11866 11522 402aed 2 API calls 11523 405ceb 11522->11523 11875 403101 11523->11875 11525 405cf4 lstrlenW 11889 403685 11525->11889 11530 403685 10 API calls 11531 405d31 11530->11531 11532 403685 10 API calls 11531->11532 11533 405d3e 11532->11533 11912 40455d #17 11533->11912 11536 405d56 wsprintfW 11537 405d73 11536->11537 11539 403685 10 API calls 11537->11539 11538 4011b7 2 API calls 11538->11536 11540 405d87 11539->11540 11935 404880 11540->11935 11543 404880 3 API calls 11545 405de2 11543->11545 11544 405d9f _wtol 11546 405db5 11544->11546 11547 405de8 11545->11547 11548 405e19 11545->11548 11546->11543 12158 4052e7 11547->12158 11550 404880 3 API calls 11548->11550 11551 405e24 11550->11551 11553 405e35 11551->11553 11554 405e2a 11551->11554 11552 405def ??3@YAXPAX 12175 40497f 11552->12175 11555 404880 3 API calls 11553->11555 12180 4056fb 11554->12180 11560 405e44 11555->11560 11558 405e00 ??3@YAXPAX ??3@YAXPAX 11558->11512 11559 405e7a GetModuleFileNameW 11562 405e8c 11559->11562 11563 405e9e 11559->11563 11560->11559 11561 4011b7 2 API calls 11560->11561 11561->11559 11564 4095ee 57 API calls 11562->11564 11565 404880 3 API calls 11563->11565 11756 405ded 11564->11756 11578 405ec0 11565->11578 11566 406068 11567 40143c 2 API calls 11566->11567 11568 406078 11567->11568 11569 40143c 2 API calls 11568->11569 11573 406085 11569->11573 11570 405f8a 11571 405fbd 11570->11571 11575 405fa6 _wtol 11570->11575 11570->11756 11572 404880 3 API calls 11571->11572 11584 40601c 11572->11584 11574 40610a 11573->11574 11577 401403 2 API calls 11573->11577 11576 4026a9 3 API calls 11574->11576 11575->11571 11579 40612c 11576->11579 11580 4060ba 11577->11580 11578->11566 11578->11570 11578->11571 11578->11756 12188 4017a8 11578->12188 11581 401403 2 API calls 11579->11581 11582 401403 2 API calls 11580->11582 11585 406137 ??2@YAPAXI 11581->11585 11589 4060d0 11582->11589 11584->11566 11586 404ea8 2 API calls 11584->11586 11588 406143 11585->11588 11587 40604d 11586->11587 11587->11566 11590 40143c 2 API calls 11587->11590 11940 4123d3 11588->11940 11591 40143c 2 API calls 11589->11591 11590->11566 11592 4060fa 11591->11592 11594 402490 19 API calls 11592->11594 11598 406101 11594->11598 11596 406170 11600 4095ee 57 API calls 11596->11600 11597 406196 11943 402b4e 11597->11943 11599 402aed 2 API calls 11598->11599 11599->11574 11600->11756 11604 4061ab 11605 4061b1 11604->11605 11606 4061d5 11604->11606 11608 4095ee 57 API calls 11605->11608 11607 406267 11606->11607 11609 404880 3 API calls 11606->11609 11610 4127d6 ctype 16 API calls 11607->11610 11611 4061b9 ??3@YAXPAX 11608->11611 11612 4061ec 11609->11612 11613 40626f 11610->11613 11611->11756 11612->11607 11620 4061f2 11612->11620 11614 406294 11613->11614 12217 4037a5 11613->12217 11615 40624b ??3@YAXPAX 11614->11615 11624 40629d 11614->11624 11615->11756 11618 4062e2 11977 404f17 11618->11977 11619 4062a9 wsprintfW 11622 402490 19 API calls 11619->11622 11620->11615 12191 4059b8 11620->12191 11621 406289 ??3@YAXPAX 11621->11756 11622->11624 11624->11618 11624->11619 11627 403685 10 API calls 11624->11627 11627->11624 11628 403685 10 API calls 11686 4062fe 11628->11686 11629 406221 11629->11615 11630 406227 11629->11630 11631 4095ee 57 API calls 11630->11631 11632 40622f ??3@YAXPAX 11631->11632 11632->11756 11633 4065af 11634 40660e 11633->11634 11635 402a9c 2 API calls 11633->11635 11636 403685 10 API calls 11634->11636 11637 4065ce 11635->11637 11638 406643 11636->11638 11639 404d44 3 API calls 11637->11639 11640 402a9c 2 API calls 11638->11640 11641 4065e0 11639->11641 11642 40664f 11640->11642 11643 40143c 2 API calls 11641->11643 12042 404d44 11642->12042 11646 4065ec ??3@YAXPAX ??3@YAXPAX 11643->11646 11647 405992 4 API calls 11646->11647 11650 406606 11647->11650 11649 40143c 2 API calls 11651 40666f ??3@YAXPAX ??3@YAXPAX 11649->11651 11652 40596c 4 API calls 11650->11652 12054 405992 11651->12054 11652->11634 11654 406689 12059 40596c 11654->12059 11656 406691 11657 403685 10 API calls 11656->11657 11658 4066a0 11657->11658 11659 404f17 26 API calls 11658->11659 11660 4066a9 11659->11660 11662 406815 11660->11662 12274 402757 AllocateAndInitializeSid 11660->12274 11661 4046a3 lstrlenW lstrlenW _wcsnicmp 11661->11686 12064 4029db 11662->12064 11665 406889 12067 404af0 11665->12067 11667 402a9c 2 API calls 11680 40682a 11667->11680 11669 4066d0 11671 4014eb 2 API calls 11669->11671 11672 4066d8 11671->11672 11674 4014eb 2 API calls 11672->11674 11673 4064d7 _wtol 11673->11686 11677 4066e0 GetCommandLineW 11674->11677 11675 406909 CoInitialize 11682 4029db lstrcmpW 11675->11682 11683 404ea8 2 API calls 11677->11683 11678 4029db lstrcmpW 11684 4068bd 11678->11684 11679 40688b ??3@YAXPAX 11679->11665 11680->11665 11680->11667 11680->11679 11685 403685 10 API calls 11680->11685 11681 4014eb 2 API calls 11681->11686 11687 40692f 11682->11687 11688 4066f0 11683->11688 11689 4068cd 11684->11689 11694 402490 19 API calls 11684->11694 11690 406865 ??3@YAXPAX 11685->11690 11686->11633 11686->11661 11686->11673 11686->11681 11691 404ea8 2 API calls 11686->11691 11717 406615 ??3@YAXPAX 11686->11717 12246 40519e 11686->12246 12257 404b47 11686->12257 12271 401503 11686->12271 11692 406943 11687->11692 11697 401403 2 API calls 11687->11697 11693 402a9c 2 API calls 11688->11693 12282 404544 11689->12282 11695 4029db lstrcmpW 11690->11695 11691->11686 11699 40464c 16 API calls 11692->11699 11698 4066fb 11693->11698 11694->11689 11695->11680 11697->11692 11702 404df8 2 API calls 11698->11702 11703 406949 11699->11703 11706 40671a 11702->11706 11707 4029db lstrcmpW 11703->11707 11704 408433 22 API calls 11709 4068f0 11704->11709 11710 404e16 2 API calls 11706->11710 11711 406958 11707->11711 12285 4081a6 ??3@YAXPAX 11709->12285 11713 406727 11710->11713 11714 406a42 11711->11714 11721 406971 lstrlenW 11711->11721 11716 404e16 2 API calls 11713->11716 11718 4029db lstrcmpW 11714->11718 11715 4068fb ??3@YAXPAX 11715->11675 11720 406734 11716->11720 11717->11756 11719 406a54 11718->11719 11722 406a68 11719->11722 11723 406a5b _wtol 11719->11723 12277 404e34 11720->12277 11742 406989 11721->11742 11725 406a70 11722->11725 11726 406a9b 11722->11726 11723->11722 12286 4097de 11725->12286 11729 406aa4 11726->11729 11730 406aaf 11726->11730 12303 4096e3 11729->12303 11777 406ae0 11730->11777 12073 4015d8 11730->12073 11731 4017d3 2 API calls 11732 40674e 11731->11732 11735 40143c 2 API calls 11732->11735 11733 406a79 ??3@YAXPAX 11733->11552 11733->11756 11739 40675a 7 API calls 11735->11739 11741 4053bb 9 API calls 11739->11741 11740 406ac6 ??3@YAXPAX 11740->11756 11743 4067a1 11741->11743 11748 401503 2 API calls 11742->11748 11745 4067ab ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11743->11745 11746 4067df ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11743->11746 11744 4014eb 2 API calls 11744->11777 11745->11756 11746->11756 11748->11714 11749 406b19 GetKeyState 11749->11777 11750 406c6c ??3@YAXPAX 11750->11756 11751 406cce 11754 406d04 11751->11754 11755 406cd6 11751->11755 11752 401403 ??2@YAPAXI ??3@YAXPAX 11752->11777 11753 4029db lstrcmpW 11753->11777 11759 4013d1 2 API calls 11754->11759 12087 404a41 11755->12087 11756->11552 11757 4017a8 ??2@YAPAXI ??3@YAXPAX 11757->11777 11762 406d12 11759->11762 11763 40464c 16 API calls 11762->11763 11765 406d1b 11763->11765 11764 40143c 2 API calls 11766 406cf3 ??3@YAXPAX 11764->11766 11767 406d2d ??3@YAXPAX 11765->11767 11772 40143c 2 API calls 11765->11772 11774 406d3c 11766->11774 11767->11774 11768 406c61 ??3@YAXPAX 11768->11777 11769 406cbe ??3@YAXPAX ??3@YAXPAX 11769->11756 11770 406c8b 11771 4095ee 57 API calls 11770->11771 11773 406c97 ??3@YAXPAX ??3@YAXPAX 11771->11773 11772->11767 11773->11756 11775 406d88 11774->11775 11776 406d7b 11774->11776 12357 408c92 11775->12357 12100 4019e5 ??2@YAPAXI 11776->12100 11777->11744 11777->11749 11777->11750 11777->11751 11777->11752 11777->11753 11777->11757 11777->11768 11777->11769 11777->11770 12336 408bb8 11777->12336 12349 408c36 11777->12349 11780 406d84 11781 406dc5 11780->11781 11782 406d9a 11780->11782 11783 404af0 22 API calls 11781->11783 12365 40491c 11782->12365 11785 406dca 11783->11785 11787 40739a 11785->11787 11788 4014eb 2 API calls 11785->11788 11790 407413 11787->11790 11792 4029db lstrcmpW 11787->11792 11789 406de9 11788->11789 11847 406dfc 11789->11847 12369 404e52 11789->12369 11793 407456 ??3@YAXPAX ??3@YAXPAX 11790->11793 11797 4029db lstrcmpW 11790->11797 11794 4073cc 11792->11794 11795 407475 ??3@YAXPAX 11793->11795 11796 40746f 11793->11796 11794->11790 12436 404903 11794->12436 11798 40497f 17 API calls 11795->11798 11796->11795 11799 407432 11797->11799 11801 407486 ??3@YAXPAX ??3@YAXPAX 11798->11801 11799->11793 11803 40743f 11799->11803 11800 4014eb ??2@YAPAXI ??3@YAXPAX 11800->11847 11801->11512 11805 4013d1 2 API calls 11803->11805 11809 40744e 11805->11809 11806 408433 22 API calls 11810 407408 11806->11810 11807 407248 ??3@YAXPAX ??3@YAXPAX 11808 40733a 11807->11808 11812 407391 ??3@YAXPAX 11808->11812 11815 404af0 22 API calls 11808->11815 12440 405758 11809->12440 12439 4081a6 ??3@YAXPAX 11810->12439 11811 404e16 ??2@YAPAXI ??3@YAXPAX 11850 406e3a 11811->11850 11812->11787 11817 407348 11815->11817 12426 4051fc 11817->12426 11819 40143c 2 API calls 11820 406e6c ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 11819->11820 11822 40725f 11820->11822 11820->11850 11821 407361 SetCurrentDirectoryW 11824 4051fc 4 API calls 11821->11824 11825 40491c 16 API calls 11822->11825 11823 4017a8 2 API calls 11826 406f34 ??3@YAXPAX ??3@YAXPAX 11823->11826 11827 407389 11824->11827 11828 407264 11825->11828 11826->11847 11829 40491c 16 API calls 11827->11829 11830 4095ee 57 API calls 11828->11830 11829->11812 11831 40726d ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11830->11831 11831->11756 11833 4072a3 11831->11833 11832 4046dd lstrlenW lstrlenW _wcsnicmp 11832->11847 11833->11756 11834 406fd1 _wtol 11834->11847 11835 40143c 2 API calls 11835->11847 11836 401403 ??2@YAPAXI ??3@YAXPAX 11836->11847 11837 4029db lstrcmpW 11837->11847 11838 402aed ??2@YAPAXI ??3@YAXPAX 11838->11847 11839 404ea8 2 API calls 11839->11847 11840 402a9c 2 API calls 11840->11847 11842 407319 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11842->11808 11843 407216 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11843->11847 11844 404680 20 API calls 11844->11847 11847->11800 11847->11807 11847->11823 11847->11832 11847->11834 11847->11835 11847->11836 11847->11837 11847->11838 11847->11839 11847->11840 11847->11842 11847->11843 11847->11844 11847->11850 11853 4017d3 2 API calls 11847->11853 12121 402726 11847->12121 12130 404df8 11847->12130 12135 404e16 11847->12135 11849 4072b6 SetLastError 11851 4072bd 11849->11851 11850->11811 11850->11819 11850->11847 11850->11849 12378 405492 11850->12378 12423 4026be 11850->12423 11854 4095ee 57 API calls 11851->11854 11855 4071aa ??3@YAXPAX ??3@YAXPAX 11853->11855 11856 4072c7 11854->11856 12140 4053bb 11855->12140 11858 40491c 16 API calls 11856->11858 11860 4072cc 7 API calls 11858->11860 11859 4071ce 11861 4071dc ??3@YAXPAX 11859->11861 11862 4072ae ??3@YAXPAX 11859->11862 11860->11756 11861->11850 11862->11851 11864 402092 GetVersionExW 11863->11864 11865 40205f SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 11863->11865 11864->11510 11864->11511 11865->11864 11867 4011b7 2 API calls 11866->11867 11868 404947 GetCommandLineW 11867->11868 11869 404ea8 11868->11869 11870 404ee2 11869->11870 11871 404eb6 11869->11871 11872 404eda 11870->11872 11874 4017a8 2 API calls 11870->11874 11871->11872 11873 4017a8 2 API calls 11871->11873 11872->11522 11873->11871 11874->11870 11876 4014eb 2 API calls 11875->11876 11884 403111 11876->11884 11877 4031f7 11878 40143c 2 API calls 11877->11878 11879 403204 ??3@YAXPAX 11878->11879 11879->11525 11880 4017a8 ??2@YAPAXI ??3@YAXPAX 11880->11884 11882 4014eb 2 API calls 11882->11884 11884->11877 11884->11880 11884->11882 11885 40143c 2 API calls 11884->11885 12479 402b66 11884->12479 12482 402e03 11884->12482 11886 403171 ??3@YAXPAX 11885->11886 11887 4014bc 2 API calls 11886->11887 11888 403186 ??3@YAXPAX ??3@YAXPAX 11887->11888 11888->11884 11890 4014eb 2 API calls 11889->11890 11891 403693 11890->11891 11892 4014eb 2 API calls 11891->11892 11893 40369b 11892->11893 11894 401403 2 API calls 11893->11894 11895 4036a6 11894->11895 11896 401403 2 API calls 11895->11896 11897 4036b1 11896->11897 12493 403604 ??2@YAPAXI 11897->12493 11900 4036f5 12499 4028f8 ??3@YAXPAX ??3@YAXPAX 11900->12499 11902 402a9c 2 API calls 11904 4036d2 11902->11904 11903 4036fd 11909 4026a9 11903->11909 11905 402aed 2 API calls 11904->11905 11906 4036dd 11905->11906 11907 403685 9 API calls 11906->11907 11908 4036ea ??3@YAXPAX 11907->11908 11908->11900 12505 402678 LoadLibraryA GetProcAddress 11909->12505 11911 4026ae 11911->11530 11913 404574 11912->11913 11914 40243a 3 API calls 11913->11914 11915 404579 11914->11915 11916 402490 19 API calls 11915->11916 11917 404580 11916->11917 11918 402490 19 API calls 11917->11918 11919 40458c 11918->11919 11920 402490 19 API calls 11919->11920 11921 404598 11920->11921 11922 402490 19 API calls 11921->11922 11923 4045a4 11922->11923 11924 402490 19 API calls 11923->11924 11925 4045b0 11924->11925 11926 402490 19 API calls 11925->11926 11927 4045bc 11926->11927 11928 402490 19 API calls 11927->11928 11929 4045c8 11928->11929 11930 4045e0 SHGetSpecialFolderPathW 11929->11930 11933 404647 11929->11933 11934 403685 10 API calls 11929->11934 11930->11929 11931 4045f4 wsprintfW 11930->11931 11932 403685 10 API calls 11931->11932 11932->11929 11933->11536 11933->11538 11934->11929 11937 40488f 11935->11937 11936 4048a9 lstrlenW lstrlenW 12508 401f7d 11936->12508 11937->11936 11939 4048cc 11937->11939 11939->11544 11939->11546 12518 4123b1 11940->12518 11944 40283a 2 API calls 11943->11944 11945 402b62 11944->11945 11946 404038 11945->11946 11947 402678 3 API calls 11946->11947 11948 404046 11947->11948 11949 402b4e 2 API calls 11948->11949 11950 40407f 11949->11950 11951 402b4e 2 API calls 11950->11951 11952 404087 11951->11952 11953 402b4e 2 API calls 11952->11953 11954 40408f 11953->11954 12524 403f47 11954->12524 11960 404125 11961 403f47 7 API calls 11960->11961 11963 40413b 11961->11963 11962 403f47 7 API calls 11968 4040cc 11962->11968 11964 402f19 10 API calls 11963->11964 11966 40414d 11964->11966 11965 402f19 10 API calls 11965->11968 12567 402cb4 11966->12567 11968->11960 11968->11962 11968->11965 11970 402cb4 2 API calls 11968->11970 12570 402c7e 11968->12570 11970->11968 11971 4041c3 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11971->11604 11972 403f47 7 API calls 11974 404163 11972->11974 11973 402f19 10 API calls 11973->11974 11974->11971 11974->11972 11974->11973 11975 402c7e 2 API calls 11974->11975 11976 402cb4 2 API calls 11974->11976 11975->11974 11976->11974 11978 4029db lstrcmpW 11977->11978 11979 404f30 11978->11979 11980 404f80 11979->11980 11982 401403 2 API calls 11979->11982 11981 4029db lstrcmpW 11980->11981 11983 404f9e 11981->11983 11984 404f47 11982->11984 11987 4029db lstrcmpW 11983->11987 11985 402490 19 API calls 11984->11985 11986 404f4e 11985->11986 11989 402aed 2 API calls 11986->11989 11988 404fb6 11987->11988 11991 4029db lstrcmpW 11988->11991 11990 404f57 11989->11990 11992 401403 2 API calls 11990->11992 11993 404fce 11991->11993 11994 404f70 11992->11994 11996 4029db lstrcmpW 11993->11996 11995 402490 19 API calls 11994->11995 11997 404f77 11995->11997 11998 404fe6 11996->11998 11999 402aed 2 API calls 11997->11999 12000 404ffd 11998->12000 12001 404fed lstrcmpiW 11998->12001 11999->11980 12002 4029db lstrcmpW 12000->12002 12001->12000 12003 405013 12002->12003 12004 4029db lstrcmpW 12003->12004 12005 405040 12004->12005 12006 40504d 12005->12006 12600 40482e 12005->12600 12008 4029db lstrcmpW 12006->12008 12012 405061 12008->12012 12009 405081 12010 4029db lstrcmpW 12009->12010 12017 405094 12010->12017 12012->12009 12013 4029db lstrcmpW 12012->12013 12604 4047d5 12012->12604 12013->12012 12014 4050b4 12016 4029db lstrcmpW 12014->12016 12018 4050c0 12016->12018 12017->12014 12019 4029db lstrcmpW 12017->12019 12608 404806 12017->12608 12020 4029db lstrcmpW 12018->12020 12019->12017 12021 4050d1 12020->12021 12022 4029db lstrcmpW 12021->12022 12023 4050e2 12022->12023 12024 4050f8 12023->12024 12025 4050ef _wtol 12023->12025 12026 4029db lstrcmpW 12024->12026 12025->12024 12027 405104 12026->12027 12028 405114 12027->12028 12029 40510b _wtol 12027->12029 12030 4029db lstrcmpW 12028->12030 12029->12028 12031 405120 12030->12031 12032 4029db lstrcmpW 12031->12032 12033 405138 12032->12033 12034 4029db lstrcmpW 12033->12034 12035 405150 12034->12035 12036 4029db lstrcmpW 12035->12036 12037 405168 12036->12037 12038 4029db lstrcmpW 12037->12038 12039 405185 12038->12039 12040 405196 12039->12040 12041 402490 19 API calls 12039->12041 12040->11628 12041->12040 12043 404d5e 12042->12043 12044 404d75 12043->12044 12045 404d6a 12043->12045 12046 4014eb 2 API calls 12044->12046 12047 4013d1 2 API calls 12045->12047 12048 404d7e 12046->12048 12049 404d73 12047->12049 12050 4011b7 2 API calls 12048->12050 12049->11649 12051 404d87 12050->12051 12052 4013d1 2 API calls 12051->12052 12053 404dba ??3@YAXPAX 12052->12053 12053->12049 12616 404dcb 12054->12616 12060 404dcb 2 API calls 12059->12060 12061 40597e 12060->12061 12629 4049b1 12061->12629 12633 40295b 12064->12633 12068 404b01 12067->12068 12069 404b44 12067->12069 12070 4013d1 2 API calls 12068->12070 12071 404680 20 API calls 12068->12071 12069->11675 12069->11678 12070->12068 12072 404b1e SetEnvironmentVariableW ??3@YAXPAX 12071->12072 12072->12068 12072->12069 12074 4015f2 ??2@YAPAXI 12073->12074 12085 4015ea 12073->12085 12075 401601 12074->12075 12086 412a5a 3 API calls 12075->12086 12076 401623 ??2@YAPAXI 12077 40162f 12076->12077 12637 40113f 12077->12637 12079 40165a 12080 412564 VariantClear 12079->12080 12081 4016bd 12079->12081 12079->12085 12080->12079 12641 401556 12081->12641 12084 412564 VariantClear 12084->12085 12085->11740 12085->11777 12086->12076 12088 4014eb 2 API calls 12087->12088 12089 404a52 12088->12089 12090 402ad5 2 API calls 12089->12090 12091 404a5b GetTempPathW 12090->12091 12092 404a74 12091->12092 12097 404a8b 12091->12097 12093 402ad5 2 API calls 12092->12093 12095 404a7f GetTempPathW 12093->12095 12094 402ad5 2 API calls 12096 404aae wsprintfW 12094->12096 12095->12097 12096->12097 12097->12094 12098 404ac5 GetFileAttributesW 12097->12098 12099 404ae9 12097->12099 12098->12097 12098->12099 12099->11764 12101 4019fe 12100->12101 12120 412a5a 3 API calls 12101->12120 12102 401a22 12103 401aa3 12102->12103 12104 401a34 ??2@YAPAXI 12102->12104 12106 4095ee 57 API calls 12103->12106 12105 401a40 12104->12105 12107 40113f 191 API calls 12105->12107 12119 401abc 12106->12119 12108 401a6d 12107->12108 12108->12103 12109 401a74 12108->12109 12110 401a8c ??2@YAPAXI 12109->12110 12111 403a96 88 API calls 12109->12111 12112 401a98 12110->12112 12113 401a9f 12110->12113 12114 401a87 12111->12114 13083 4016e7 12112->13083 12116 4015d8 194 API calls 12113->12116 12114->12110 12114->12119 12117 401ae6 12116->12117 13064 401893 12117->13064 12119->11780 12120->12102 12122 402734 12121->12122 12123 40272f 12121->12123 12124 402678 3 API calls 12122->12124 12123->11847 12125 402739 12124->12125 12126 40274a 12125->12126 12127 402743 12125->12127 12126->11847 13094 4026f2 LoadLibraryA GetProcAddress 12127->13094 12131 404932 2 API calls 12130->12131 12132 404e06 12131->12132 12133 4014bc 2 API calls 12132->12133 12134 404e11 12133->12134 12134->11847 12136 4013d1 2 API calls 12135->12136 12137 404e24 12136->12137 12138 402aed 2 API calls 12137->12138 12139 404e2f 12138->12139 12139->11847 12141 4014eb 2 API calls 12140->12141 12142 4053cc 12141->12142 12143 4014eb 2 API calls 12142->12143 12144 4053d4 memset 12143->12144 12145 405402 12144->12145 12146 404ea8 2 API calls 12145->12146 12147 405425 12146->12147 12148 401403 2 API calls 12147->12148 12149 405430 12148->12149 12150 405435 ??3@YAXPAX 12149->12150 12151 40544e ShellExecuteExW 12149->12151 12152 405440 ??3@YAXPAX 12150->12152 12153 405468 12151->12153 12154 40548e 12151->12154 12152->11859 12155 405471 WaitForSingleObject 12153->12155 12156 40547c CloseHandle 12153->12156 12157 405485 ??3@YAXPAX 12154->12157 12155->12156 12156->12157 12157->12152 12159 4083d2 4 API calls 12158->12159 12160 405303 12159->12160 12161 402490 19 API calls 12160->12161 12162 405311 12161->12162 12163 402a9c 2 API calls 12162->12163 12164 40531b 12163->12164 12165 405351 wsprintfW 12164->12165 12167 402aed ??2@YAPAXI ??3@YAXPAX 12164->12167 12166 402aed 2 API calls 12165->12166 12168 405385 12166->12168 12167->12164 12169 402aed 2 API calls 12168->12169 12170 405392 12169->12170 12171 408433 22 API calls 12170->12171 12172 4053a7 ??3@YAXPAX 12171->12172 13096 4081a6 ??3@YAXPAX 12172->13096 12174 4053b8 12174->11756 12176 4127d6 ctype 16 API calls 12175->12176 12177 40498d 12176->12177 12178 4126f9 ctype 16 API calls 12177->12178 12179 41285e ??3@YAXPAX 12178->12179 12179->11558 12181 405708 12180->12181 12187 405724 12180->12187 12184 40571a _wtol 12181->12184 12181->12187 12182 4053bb 9 API calls 12183 405747 12182->12183 12185 405755 12183->12185 12186 40574f GetLastError 12183->12186 12184->12187 12185->11756 12186->12185 12187->12182 12189 401472 2 API calls 12188->12189 12190 4017b2 12189->12190 12190->11578 12192 412458 2 API calls 12191->12192 12193 4059e4 12192->12193 12194 405a40 12193->12194 12196 402a9c 2 API calls 12193->12196 12195 402b4e 2 API calls 12194->12195 12197 405a48 12195->12197 12202 4059f3 12196->12202 12198 402be4 2 API calls 12197->12198 12199 405a55 12198->12199 12200 402c7e 2 API calls 12199->12200 12204 405a62 12200->12204 12201 405ab1 ??3@YAXPAX 12203 405aad 12201->12203 12202->12201 12205 403a96 88 API calls 12202->12205 12203->11629 12206 402c7e 2 API calls 12204->12206 12207 405a17 12205->12207 12208 405a6f 12206->12208 12207->12201 12210 412458 2 API calls 12207->12210 12209 402c7e 2 API calls 12208->12209 12211 405a7c 12209->12211 12212 405a33 12210->12212 12213 412abe 2 API calls 12211->12213 12212->12201 12214 405a37 ??3@YAXPAX 12212->12214 12215 405a90 12213->12215 12214->12194 12215->12201 12216 405a99 ??3@YAXPAX 12215->12216 12216->12203 12218 402b4e 2 API calls 12217->12218 12223 4037ba 12218->12223 12219 403a59 ??3@YAXPAX 12220 403a90 12219->12220 12220->11614 12220->11621 12221 4014eb ??2@YAPAXI ??3@YAXPAX 12221->12223 12222 402b4e 2 API calls 12222->12223 12223->12219 12223->12221 12223->12222 12224 40143c 2 API calls 12223->12224 12226 403a65 12223->12226 12231 403938 strncmp 12223->12231 12235 402e03 ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 12223->12235 12236 40143c 2 API calls 12223->12236 12237 402c56 2 API calls 12223->12237 12241 402c56 ??2@YAPAXI ??3@YAXPAX 12223->12241 12242 4039ed lstrlenW wcsncmp 12223->12242 12243 40295b lstrcmpW 12223->12243 12244 403604 7 API calls 12223->12244 12245 401403 2 API calls 12223->12245 13097 4029a3 12223->13097 13101 4028f8 ??3@YAXPAX ??3@YAXPAX 12223->13101 12225 40382b ??3@YAXPAX ??3@YAXPAX 12224->12225 12225->12223 12225->12226 13102 40305b 12226->13102 12230 403a86 ??3@YAXPAX 12230->12220 12231->12223 12233 403923 strncmp 12231->12233 12233->12223 12233->12231 12235->12223 12238 4039a5 ??3@YAXPAX 12236->12238 12237->12233 12239 403101 9 API calls 12238->12239 12240 4039b6 lstrcmpW 12239->12240 12240->12223 12241->12223 12242->12223 12243->12223 12244->12223 12245->12223 12247 402a9c 2 API calls 12246->12247 12248 4051b0 12247->12248 12249 402aed 2 API calls 12248->12249 12253 4051bd 12249->12253 12250 4051d9 12252 402aed 2 API calls 12250->12252 12251 4017a8 2 API calls 12251->12253 12254 4051e3 12252->12254 12253->12250 12253->12251 12255 404b47 94 API calls 12254->12255 12256 4051ee ??3@YAXPAX 12255->12256 12256->11686 12258 404b8a 12257->12258 12259 404b5e lstrlenW 12257->12259 12258->11686 12260 401f7d CharUpperW 12259->12260 12261 404b74 12260->12261 12261->12258 12261->12259 12262 404b91 12261->12262 12263 402a9c 2 API calls 12262->12263 12264 404b9a 12263->12264 13121 402e4b 12264->13121 12267 4037a5 87 API calls 12268 404c08 12267->12268 12269 404c12 ??3@YAXPAX ??3@YAXPAX 12268->12269 12270 404c29 ??3@YAXPAX ??3@YAXPAX 12268->12270 12269->12258 12270->12258 12272 401403 2 API calls 12271->12272 12273 401511 ??3@YAXPAX 12272->12273 12273->11686 12275 4027b4 12274->12275 12276 40279a CheckTokenMembership FreeSid 12274->12276 12275->11662 12275->11669 12276->12275 12278 4013d1 2 API calls 12277->12278 12279 404e42 12278->12279 12280 4017a8 2 API calls 12279->12280 12281 404e4d 12280->12281 12281->11731 12283 4083d2 4 API calls 12282->12283 12284 40454c 12283->12284 12284->11704 12285->11715 12287 409a6a 12286->12287 12302 4097fd 12286->12302 12287->11733 12288 408c36 25 API calls 12288->12302 12289 401556 26 API calls 12289->12302 12290 4083d2 4 API calls 12290->12302 12291 408bb8 25 API calls 12291->12302 12292 408c92 25 API calls 12292->12302 12293 4029db lstrcmpW 12293->12302 12295 404544 4 API calls 12295->12302 12296 402490 19 API calls 12296->12302 12297 408433 22 API calls 12297->12302 12298 409581 27 API calls 12298->12302 12299 4095ee 57 API calls 12299->12302 12301 404903 4 API calls 12301->12302 12302->12287 12302->12288 12302->12289 12302->12290 12302->12291 12302->12292 12302->12293 12302->12295 12302->12296 12302->12297 12302->12298 12302->12299 12302->12301 13131 4084ad 12302->13131 13135 4081a6 ??3@YAXPAX 12302->13135 12304 4029db lstrcmpW 12303->12304 12306 4096f7 12304->12306 12305 409705 12308 409718 12305->12308 13137 401ee8 GetStdHandle WriteFile 12305->13137 12306->12305 13136 401ee8 GetStdHandle WriteFile 12306->13136 12310 40972d 12308->12310 13138 401ee8 GetStdHandle WriteFile 12308->13138 12312 40973e 12310->12312 13139 401ee8 GetStdHandle WriteFile 12310->13139 12314 4029db lstrcmpW 12312->12314 12315 40974b 12314->12315 12316 409759 12315->12316 13140 401ee8 GetStdHandle WriteFile 12315->13140 12318 4029db lstrcmpW 12316->12318 12319 409766 12318->12319 12320 409774 12319->12320 13141 401ee8 GetStdHandle WriteFile 12319->13141 12322 4029db lstrcmpW 12320->12322 12323 409781 12322->12323 12324 40978f 12323->12324 13142 401ee8 GetStdHandle WriteFile 12323->13142 12326 4029db lstrcmpW 12324->12326 12327 40979c 12326->12327 12328 4097aa 12327->12328 13143 401ee8 GetStdHandle WriteFile 12327->13143 12330 4029db lstrcmpW 12328->12330 12331 4097b7 12330->12331 12332 4097ca 12331->12332 12333 4029db lstrcmpW 12331->12333 12335 406aad 12332->12335 13144 401ee8 GetStdHandle WriteFile 12332->13144 12333->12332 12335->11733 12337 408bdb 12336->12337 12338 408bf0 12337->12338 12339 408c0e 12337->12339 13145 4085c6 12338->13145 13148 4085df 12339->13148 12344 408433 22 API calls 12346 408c09 12344->12346 12345 408433 22 API calls 12345->12346 13151 4081a6 ??3@YAXPAX 12346->13151 12348 408c31 12348->11777 12350 408c4b 12349->12350 12351 4010bd 4 API calls 12350->12351 12352 408c56 12351->12352 12353 408433 22 API calls 12352->12353 12354 408c67 12353->12354 13152 4081a6 ??3@YAXPAX 12354->13152 12356 408c71 12356->11777 12358 408ca5 12357->12358 13153 4085f8 12358->13153 12361 408433 22 API calls 12362 408cda 12361->12362 13156 4081a6 ??3@YAXPAX 12362->13156 12364 408ce4 12364->11780 12366 404925 12365->12366 12368 404930 ??3@YAXPAX ??3@YAXPAX 12365->12368 12367 40331e 16 API calls 12366->12367 12367->12368 12368->11756 12370 4029db lstrcmpW 12369->12370 12371 404e71 12370->12371 12372 404ea6 12371->12372 12373 401403 2 API calls 12371->12373 12372->11847 12374 404e80 12373->12374 12375 404680 20 API calls 12374->12375 12376 404e86 12375->12376 12376->12372 12377 4017a8 2 API calls 12376->12377 12377->12372 12379 4014eb 2 API calls 12378->12379 12380 4054a7 12379->12380 12381 4014eb 2 API calls 12380->12381 12382 4054af GetCommandLineW 12381->12382 12383 404ea8 2 API calls 12382->12383 12384 4054bf 12383->12384 12385 404df8 2 API calls 12384->12385 12386 4054f2 12385->12386 12387 404e16 2 API calls 12386->12387 12388 4054ff 12387->12388 12389 404e16 2 API calls 12388->12389 12390 40550c 12389->12390 12391 404e34 2 API calls 12390->12391 12392 405519 12391->12392 12393 404e34 2 API calls 12392->12393 12394 405526 12393->12394 12395 404e34 2 API calls 12394->12395 12396 405533 12395->12396 12397 404e34 2 API calls 12396->12397 12398 405540 12397->12398 12399 404e16 2 API calls 12398->12399 12400 40554d 12399->12400 12401 404e16 2 API calls 12400->12401 12402 40555a 12401->12402 12403 404e16 2 API calls 12402->12403 12404 405567 12403->12404 12405 40143c 2 API calls 12404->12405 12406 405573 12 API calls 12405->12406 12407 405608 GetLastError 12406->12407 12408 40562b CreateJobObjectW 12406->12408 12411 405610 ??3@YAXPAX ??3@YAXPAX 12407->12411 12409 405643 AssignProcessToJobObject 12408->12409 12410 4056a6 ResumeThread WaitForSingleObject 12408->12410 12409->12410 12412 405651 CreateIoCompletionPort 12409->12412 12413 4056b6 CloseHandle GetExitCodeProcess 12410->12413 12411->11850 12412->12410 12414 405663 SetInformationJobObject ResumeThread 12412->12414 12415 4056d3 GetLastError 12413->12415 12416 4056dc CloseHandle 12413->12416 12417 405691 GetQueuedCompletionStatus 12414->12417 12415->12416 12418 4056e5 CloseHandle 12416->12418 12419 4056e8 12416->12419 12417->12410 12420 40568b 12417->12420 12418->12419 12421 4056f3 12419->12421 12422 4056ee CloseHandle 12419->12422 12420->12413 12420->12417 12421->12411 12422->12421 12424 4026e2 12423->12424 12425 4026c7 LoadLibraryA GetProcAddress 12423->12425 12424->11847 12425->12424 12427 4014eb 2 API calls 12426->12427 12434 40520d 12427->12434 12428 401403 2 API calls 12428->12434 12429 40529f 12430 4052d9 ??3@YAXPAX 12429->12430 12432 4051fc 3 API calls 12429->12432 12430->11821 12431 4017a8 2 API calls 12431->12434 12433 4052d6 12432->12433 12433->12430 12434->12428 12434->12429 12434->12431 12435 4029db lstrcmpW 12434->12435 12435->12434 12437 4083d2 4 API calls 12436->12437 12438 40490b 12437->12438 12438->11806 12439->11790 12441 40590a ??3@YAXPAX 12440->12441 12442 40576e 12440->12442 12443 405910 12441->12443 12442->12441 12444 405782 GetDriveTypeW 12442->12444 12443->11793 12444->12441 12445 4057ae 12444->12445 12446 404a41 6 API calls 12445->12446 12447 4057bc CreateFileW 12446->12447 12448 4057e2 12447->12448 12449 4058d4 ??3@YAXPAX ??3@YAXPAX 12447->12449 12450 4014eb 2 API calls 12448->12450 12449->12443 12451 4057eb 12450->12451 12452 401403 2 API calls 12451->12452 12453 4057f8 12452->12453 12454 402aed 2 API calls 12453->12454 12455 405806 12454->12455 12456 4014bc 2 API calls 12455->12456 12457 405812 12456->12457 12458 402aed 2 API calls 12457->12458 12459 405820 12458->12459 12460 402aed 2 API calls 12459->12460 12461 40582d 12460->12461 12462 4014bc 2 API calls 12461->12462 12463 405839 12462->12463 12464 402aed 2 API calls 12463->12464 12465 405846 12464->12465 12466 402aed 2 API calls 12465->12466 12467 40584f 12466->12467 12468 4014bc 2 API calls 12467->12468 12469 40585b 12468->12469 12470 402aed 2 API calls 12469->12470 12471 405864 12470->12471 12472 402e4b 3 API calls 12471->12472 12473 405876 WriteFile ??3@YAXPAX CloseHandle 12472->12473 12474 4058a4 12473->12474 12475 4058e5 12473->12475 12474->12475 12476 4058ac SetFileAttributesW ShellExecuteW ??3@YAXPAX 12474->12476 12477 40331e 16 API calls 12475->12477 12476->12449 12478 4058ed ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 12477->12478 12478->12443 12488 40283a 12479->12488 12483 4014eb 2 API calls 12482->12483 12484 402e0f 12483->12484 12485 402e47 12484->12485 12486 402ad5 2 API calls 12484->12486 12485->11884 12487 402e2c MultiByteToWideChar 12486->12487 12487->12485 12489 402848 ??2@YAPAXI 12488->12489 12490 402874 12488->12490 12489->12490 12491 402859 ??3@YAXPAX 12489->12491 12490->11884 12491->12490 12494 40361e 12493->12494 12495 403613 12493->12495 12497 4027b7 4 API calls 12494->12497 12500 402ce2 12495->12500 12498 40362a 12497->12498 12498->11900 12498->11902 12499->11903 12501 4013d1 2 API calls 12500->12501 12502 402cf0 12501->12502 12503 4013d1 2 API calls 12502->12503 12504 402cfc 12503->12504 12504->12494 12506 4026a5 12505->12506 12507 402699 GetNativeSystemInfo 12505->12507 12506->11911 12507->11911 12510 401f8b 12508->12510 12515 401fcb 12508->12515 12509 4126b0 CharUpperW 12509->12510 12510->12509 12511 401fd8 12510->12511 12510->12515 12516 4126b0 CharUpperW 12511->12516 12513 401fe8 12517 4126b0 CharUpperW 12513->12517 12515->11939 12516->12513 12517->12515 12521 412394 12518->12521 12522 41235b 2 API calls 12521->12522 12523 40616c 12522->12523 12523->11596 12523->11597 12574 402be4 12524->12574 12527 402be4 2 API calls 12528 403f6e 12527->12528 12578 402d38 12528->12578 12531 402c1e 2 API calls 12532 403f8b ??3@YAXPAX 12531->12532 12533 402d38 3 API calls 12532->12533 12534 403fa6 12533->12534 12535 402c1e 2 API calls 12534->12535 12536 403fb1 ??3@YAXPAX 12535->12536 12537 403ff1 12536->12537 12538 403fc7 12536->12538 12539 403ff7 wsprintfA 12537->12539 12540 40401e 12537->12540 12538->12537 12541 403fcc wsprintfA 12538->12541 12542 402c7e 2 API calls 12539->12542 12543 402c7e 2 API calls 12540->12543 12544 402c7e 2 API calls 12541->12544 12546 404013 12542->12546 12547 40402b 12543->12547 12545 403fe6 12544->12545 12548 402c7e 2 API calls 12545->12548 12549 402c7e 2 API calls 12546->12549 12550 402c7e 2 API calls 12547->12550 12548->12537 12549->12540 12551 404033 12550->12551 12552 402f19 12551->12552 12553 402f26 12552->12553 12561 412a5a 3 API calls 12553->12561 12554 402f38 lstrlenA lstrlenA 12556 402f65 12554->12556 12555 403043 12563 402c1e 12555->12563 12556->12555 12557 403010 memmove 12556->12557 12558 402fb0 memcmp 12556->12558 12559 402fed memcmp 12556->12559 12562 412a26 GetLastError 12556->12562 12593 402c56 12556->12593 12557->12555 12557->12556 12558->12555 12558->12556 12559->12556 12561->12554 12562->12556 12564 402c2a 12563->12564 12566 402c3b 12563->12566 12565 40283a 2 API calls 12564->12565 12565->12566 12566->11968 12568 402886 2 API calls 12567->12568 12569 402cc4 12568->12569 12569->11974 12569->12569 12571 402c8d 12570->12571 12572 402886 2 API calls 12571->12572 12573 402c9a 12572->12573 12573->11968 12575 402bfa 12574->12575 12576 40283a 2 API calls 12575->12576 12577 402c07 12576->12577 12577->12527 12579 402d53 12578->12579 12580 402d6a 12579->12580 12581 402d5f 12579->12581 12582 402b4e 2 API calls 12580->12582 12590 402b96 12581->12590 12584 402d73 12582->12584 12585 40283a 2 API calls 12584->12585 12587 402d7c 12585->12587 12586 402d68 12586->12531 12588 402b96 2 API calls 12587->12588 12589 402daa ??3@YAXPAX 12588->12589 12589->12586 12591 40283a 2 API calls 12590->12591 12592 402bb1 12591->12592 12592->12586 12596 402886 12593->12596 12597 4028ca 12596->12597 12598 40289a 12596->12598 12597->12556 12599 40283a 2 API calls 12598->12599 12599->12597 12601 40484c 12600->12601 12612 404772 12601->12612 12605 4047e2 12604->12605 12606 404772 _wtol 12605->12606 12607 404803 12606->12607 12607->12012 12609 404813 12608->12609 12610 404772 _wtol 12609->12610 12611 40482b 12610->12611 12611->12017 12615 40477c 12612->12615 12613 404797 _wtol 12613->12615 12614 4047d0 12614->12006 12615->12613 12615->12614 12617 4014eb 2 API calls 12616->12617 12618 404dd7 12617->12618 12619 4017a8 2 API calls 12618->12619 12620 404de0 12619->12620 12621 4017a8 2 API calls 12620->12621 12622 404de9 12621->12622 12623 4017a8 2 API calls 12622->12623 12624 404df2 12623->12624 12625 4049eb 12624->12625 12626 404a3b ??3@YAXPAX 12625->12626 12627 4049fc 12625->12627 12626->11654 12627->12626 12628 402d03 memmove 12627->12628 12628->12626 12630 4049be 12629->12630 12631 402d03 memmove 12630->12631 12632 4049e5 ??3@YAXPAX 12631->12632 12632->11656 12634 402966 12633->12634 12635 402972 lstrcmpW 12634->12635 12636 40298f 12634->12636 12635->12634 12635->12636 12636->11680 12651 415f0b _EH_prolog 12637->12651 12670 416a25 12637->12670 12638 40115f 12638->12079 13055 401519 12641->13055 12644 408433 22 API calls 12645 401581 12644->12645 12646 40158d ??3@YAXPAX 12645->12646 12647 401503 2 API calls 12645->12647 13060 4081a6 ??3@YAXPAX 12646->13060 12647->12646 12650 4015a2 12650->12084 12652 415f2c 12651->12652 12653 416a25 11 API calls 12652->12653 12654 415f6a 12653->12654 12655 415f70 12654->12655 12656 415f96 12654->12656 12681 415b2b 12655->12681 12658 4014eb 2 API calls 12656->12658 12659 415fa7 12658->12659 12678 41839f _EH_prolog 12659->12678 12671 416a37 12670->12671 12676 412a5a 3 API calls 12671->12676 12672 416a4b 12673 416a82 12672->12673 12677 412a5a 3 API calls 12672->12677 12673->12638 12674 416a5f 12674->12673 13042 4168ca 12674->13042 12676->12672 12677->12674 12689 41810e 12678->12689 13025 4159bb 12681->13025 12711 415812 12689->12711 12837 415783 12711->12837 12838 4127d6 ctype 16 API calls 12837->12838 12839 41578c 12838->12839 12840 4127d6 ctype 16 API calls 12839->12840 12841 415794 12840->12841 12842 4127d6 ctype 16 API calls 12841->12842 12843 41579c 12842->12843 12844 4127d6 ctype 16 API calls 12843->12844 12845 4157a4 12844->12845 12846 4127d6 ctype 16 API calls 12845->12846 12847 4157ac 12846->12847 12848 4127d6 ctype 16 API calls 12847->12848 12849 4157b4 12848->12849 12850 4127d6 ctype 16 API calls 12849->12850 12851 4157be 12850->12851 12852 4127d6 ctype 16 API calls 12851->12852 12853 4157c6 12852->12853 12854 4127d6 ctype 16 API calls 12853->12854 12855 4157d3 12854->12855 12856 4127d6 ctype 16 API calls 12855->12856 12857 4157db 12856->12857 12858 4127d6 ctype 16 API calls 12857->12858 12859 4157e8 12858->12859 12860 4127d6 ctype 16 API calls 12859->12860 12861 4157f0 12860->12861 12862 4127d6 ctype 16 API calls 12861->12862 12863 4157fd 12862->12863 12864 4127d6 ctype 16 API calls 12863->12864 12865 415805 12864->12865 13026 4127d6 ctype 16 API calls 13025->13026 13027 4159c9 13026->13027 13043 413b00 GetLastError 13042->13043 13045 4168e2 13043->13045 13044 4168f6 13044->12673 13045->13044 13046 40b2a0 3 API calls 13045->13046 13047 41691a memcpy 13046->13047 13051 41692f 13047->13051 13048 4169c3 ??3@YAXPAX 13048->13044 13050 4169ac memmove 13050->13051 13051->13048 13051->13050 13052 4169d8 memcpy 13051->13052 13053 4169ce ??3@YAXPAX 13051->13053 13054 412a5a 3 API calls 13052->13054 13053->13044 13054->13053 13061 4010bd 13055->13061 13058 4014eb 2 API calls 13059 40152f 13058->13059 13059->12644 13060->12650 13062 4083d2 4 API calls 13061->13062 13063 4010c5 13062->13063 13063->13058 13065 4018a6 13064->13065 13066 401403 2 API calls 13065->13066 13067 4018b3 13066->13067 13068 4017a8 2 API calls 13067->13068 13069 4018bc CreateThread 13068->13069 13070 4018f0 WaitForSingleObject 13069->13070 13071 4018eb 13069->13071 13088 40133c 13069->13088 13073 40190d 13070->13073 13074 40193f 13070->13074 13072 408c92 25 API calls 13071->13072 13072->13070 13076 40192b 13073->13076 13080 40191c 13073->13080 13075 401947 GetExitCodeThread 13074->13075 13078 40193b 13074->13078 13077 40195e 13075->13077 13079 4095ee 57 API calls 13076->13079 13077->13078 13077->13080 13081 40198d SetLastError 13077->13081 13078->12119 13079->13078 13080->13078 13082 4095ee 57 API calls 13080->13082 13081->13080 13082->13078 13084 4014eb 2 API calls 13083->13084 13085 40170e 13084->13085 13086 4014eb 2 API calls 13085->13086 13087 40171a 13086->13087 13087->12113 13089 401345 13088->13089 13090 401358 13088->13090 13089->13090 13091 401347 Sleep 13089->13091 13092 401391 13090->13092 13093 401383 EndDialog 13090->13093 13091->13089 13093->13092 13095 402714 13094->13095 13095->12123 13096->12174 13098 4029b0 lstrcmpW 13097->13098 13099 4029d8 13097->13099 13100 4029c7 13098->13100 13099->12223 13100->13098 13100->13099 13101->12223 13103 403076 13102->13103 13104 40306a 13102->13104 13105 402b4e 2 API calls 13103->13105 13120 401ee8 GetStdHandle WriteFile 13104->13120 13109 403080 13105->13109 13107 403071 13119 4028f8 ??3@YAXPAX ??3@YAXPAX 13107->13119 13108 4030ab 13110 402e03 3 API calls 13108->13110 13109->13108 13112 402c56 2 API calls 13109->13112 13111 4030bd 13110->13111 13113 4030cb 13111->13113 13114 4030df 13111->13114 13112->13109 13116 4095ee 57 API calls 13113->13116 13115 4095ee 57 API calls 13114->13115 13117 4030da ??3@YAXPAX ??3@YAXPAX 13115->13117 13116->13117 13117->13107 13119->12230 13120->13107 13122 402b4e 2 API calls 13121->13122 13123 402e5a 13122->13123 13124 402e96 13123->13124 13127 402bcc 13123->13127 13124->12267 13128 402bd8 13127->13128 13129 402bde WideCharToMultiByte 13127->13129 13130 40283a 2 API calls 13128->13130 13129->13124 13130->13129 13132 4084b8 13131->13132 13133 4084bd 13131->13133 13132->12302 13133->13132 13134 408433 22 API calls 13133->13134 13134->13132 13135->12302 13136->12305 13137->12308 13138->12310 13139->12312 13140->12316 13141->12320 13142->12324 13143->12328 13144->12335 13146 4083d2 4 API calls 13145->13146 13147 4085ce 13146->13147 13147->12345 13149 4010bd 4 API calls 13148->13149 13150 4085e7 13149->13150 13150->12344 13151->12348 13152->12356 13154 4083d2 4 API calls 13153->13154 13155 408600 13154->13155 13155->12361 13156->12364 10977 40f9d0 10979 40f9ed 10977->10979 10978 40f9fc 10979->10978 10982 40df30 10979->10982 10983 40df3a 10982->10983 10987 40df5a 10983->10987 10988 40201c 10983->10988 10986 402a87 48 API calls 10986->10987 10989 402023 free 10988->10989 10990 402029 10988->10990 10989->10990 10990->10986 10337 40dee0 10340 402a87 10337->10340 10345 4029fa 10340->10345 10343 402a95 10344 402a96 malloc 10346 402a0a 10345->10346 10352 402a06 10345->10352 10347 402a1a GlobalMemoryStatusEx 10346->10347 10346->10352 10348 402a28 10347->10348 10347->10352 10348->10352 10353 402490 10348->10353 10352->10343 10352->10344 10354 4024a7 10353->10354 10355 4024d8 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 10354->10355 10360 4024ce 10354->10360 10356 402510 ??2@YAPAXI GetEnvironmentVariableW 10355->10356 10357 402588 SetLastError 10355->10357 10358 402571 ??3@YAXPAX 10356->10358 10359 40253f GetLastError 10356->10359 10357->10360 10361 40259f 10357->10361 10368 402574 10358->10368 10359->10358 10362 402545 10359->10362 10373 409581 10360->10373 10364 4025be lstrlenA ??2@YAPAXI 10361->10364 10382 40243a 10361->10382 10362->10368 10369 40254f lstrcmpiW 10362->10369 10366 402629 MultiByteToWideChar 10364->10366 10367 4025ef GetLocaleInfoW 10364->10367 10366->10360 10367->10366 10371 402616 _wtol 10367->10371 10368->10357 10369->10358 10372 40255e ??3@YAXPAX 10369->10372 10370 4025b4 10370->10364 10371->10366 10372->10368 10389 4083d2 10373->10389 10376 4095a6 IsBadReadPtr 10377 4095b8 10376->10377 10394 408433 10377->10394 10381 4095e9 10381->10352 10383 402444 GetUserDefaultUILanguage 10382->10383 10384 402488 10382->10384 10385 402461 10383->10385 10386 402465 GetSystemDefaultUILanguage 10383->10386 10384->10370 10385->10370 10386->10384 10387 402471 GetSystemDefaultLCID 10386->10387 10387->10384 10388 402481 10387->10388 10388->10384 10407 4014eb 10389->10407 10392 40842f IsWindow 10392->10376 10392->10377 10393 40840b GetSystemMetrics GetSystemMetrics 10393->10392 10395 408442 10394->10395 10396 4084a6 10394->10396 10395->10396 10415 402a9c 10395->10415 10406 4081a6 ??3@YAXPAX 10396->10406 10398 408453 10399 402a9c 2 API calls 10398->10399 10400 40845e 10399->10400 10419 404680 10400->10419 10403 404680 20 API calls 10404 408470 ??3@YAXPAX ??3@YAXPAX 10403->10404 10404->10396 10406->10381 10410 4011b7 10407->10410 10411 4011c5 ??2@YAPAXI 10410->10411 10412 401203 10410->10412 10411->10412 10413 4011e6 ??3@YAXPAX 10411->10413 10412->10392 10412->10393 10413->10412 10416 402ab3 10415->10416 10417 4011b7 2 API calls 10416->10417 10418 402abe 10417->10418 10418->10398 10426 402e9c 10419->10426 10423 404698 10462 40464c 10423->10462 10427 4014eb 2 API calls 10426->10427 10428 402eaa 10427->10428 10429 402eba ExpandEnvironmentStringsW 10428->10429 10430 4011b7 2 API calls 10428->10430 10431 402ed3 ??3@YAXPAX 10429->10431 10432 402ede 10429->10432 10430->10429 10433 402f15 10431->10433 10473 402ad5 10432->10473 10439 404261 10433->10439 10436 402ef9 10477 40143c 10436->10477 10438 402f0d ??3@YAXPAX 10438->10433 10440 4014eb 2 API calls 10439->10440 10441 40426f 10440->10441 10442 40143c 2 API calls 10441->10442 10443 40427a 10442->10443 10481 402aed 10443->10481 10445 404287 10446 402a9c 2 API calls 10445->10446 10447 404294 10446->10447 10485 4041e6 10447->10485 10450 40143c 2 API calls 10451 4042b8 10450->10451 10452 402aed 2 API calls 10451->10452 10453 4042c5 10452->10453 10454 402a9c 2 API calls 10453->10454 10455 4042d2 10454->10455 10456 4041e6 3 API calls 10455->10456 10457 4042e2 ??3@YAXPAX 10456->10457 10458 402a9c 2 API calls 10457->10458 10459 4042f9 10458->10459 10460 4041e6 3 API calls 10459->10460 10461 404308 ??3@YAXPAX ??3@YAXPAX 10460->10461 10461->10423 10463 402e9c 6 API calls 10462->10463 10464 404657 10463->10464 10510 40431c 10464->10510 10466 404664 10533 4043d7 10466->10533 10468 40466f 10556 404492 10468->10556 10470 404675 10471 402e9c 6 API calls 10470->10471 10472 40467b 10471->10472 10472->10403 10474 402ae1 10473->10474 10475 402ae7 ExpandEnvironmentStringsW 10473->10475 10476 4011b7 2 API calls 10474->10476 10475->10436 10476->10475 10478 401448 10477->10478 10480 40145a 10477->10480 10479 4011b7 2 API calls 10478->10479 10479->10480 10480->10438 10482 402afa 10481->10482 10490 401472 10482->10490 10484 402b05 10484->10445 10486 4041fc 10485->10486 10487 4041f8 ??3@YAXPAX 10485->10487 10486->10487 10494 402d03 10486->10494 10498 40362e 10486->10498 10487->10450 10491 4014b6 10490->10491 10492 401486 10490->10492 10491->10484 10493 4011b7 2 API calls 10492->10493 10493->10491 10495 402d19 10494->10495 10496 402d2d 10495->10496 10502 4028d0 memmove 10495->10502 10496->10486 10499 40363d 10498->10499 10501 403656 10499->10501 10503 402dbb 10499->10503 10501->10486 10502->10496 10504 402dcb 10503->10504 10505 401472 2 API calls 10504->10505 10506 402dd7 10505->10506 10509 4028d0 memmove 10506->10509 10508 402de4 10508->10501 10509->10508 10511 4014eb 2 API calls 10510->10511 10512 40432a 10511->10512 10513 40143c 2 API calls 10512->10513 10514 404335 10513->10514 10515 402aed 2 API calls 10514->10515 10516 404342 10515->10516 10517 402a9c 2 API calls 10516->10517 10518 40434f 10517->10518 10519 4041e6 3 API calls 10518->10519 10520 40435f ??3@YAXPAX 10519->10520 10521 40143c 2 API calls 10520->10521 10522 404373 10521->10522 10523 402aed 2 API calls 10522->10523 10524 404380 10523->10524 10525 402a9c 2 API calls 10524->10525 10526 40438d 10525->10526 10527 4041e6 3 API calls 10526->10527 10528 40439d ??3@YAXPAX 10527->10528 10529 402a9c 2 API calls 10528->10529 10530 4043b4 10529->10530 10531 4041e6 3 API calls 10530->10531 10532 4043c3 ??3@YAXPAX ??3@YAXPAX 10531->10532 10532->10466 10534 4014eb 2 API calls 10533->10534 10535 4043e5 10534->10535 10536 40143c 2 API calls 10535->10536 10537 4043f0 10536->10537 10538 402aed 2 API calls 10537->10538 10539 4043fd 10538->10539 10540 402a9c 2 API calls 10539->10540 10541 40440a 10540->10541 10542 4041e6 3 API calls 10541->10542 10543 40441a ??3@YAXPAX 10542->10543 10544 40143c 2 API calls 10543->10544 10545 40442e 10544->10545 10546 402aed 2 API calls 10545->10546 10547 40443b 10546->10547 10548 402a9c 2 API calls 10547->10548 10549 404448 10548->10549 10550 4041e6 3 API calls 10549->10550 10551 404458 ??3@YAXPAX 10550->10551 10552 402a9c 2 API calls 10551->10552 10553 40446f 10552->10553 10554 4041e6 3 API calls 10553->10554 10555 40447e ??3@YAXPAX ??3@YAXPAX 10554->10555 10555->10468 10557 402a9c 2 API calls 10556->10557 10558 4044a5 10557->10558 10559 4041e6 3 API calls 10558->10559 10560 4044b6 ??3@YAXPAX 10559->10560 10560->10470 10991 4123e1 ReadFile 10997 414db4 _EH_prolog 11009 414de7 10997->11009 10998 414f14 11028 40122a 10998->11028 11000 414f29 11049 414b12 11000->11049 11001 414f3e 11004 414f4b ??2@YAPAXI 11001->11004 11002 414bcd _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 11002->11009 11024 414f65 11004->11024 11005 414d8a 21 API calls 11005->11009 11007 412875 16 API calls ctype 11007->11009 11009->10998 11009->11002 11009->11005 11009->11007 11022 414e09 11009->11022 11042 414ca4 11009->11042 11046 414af0 11009->11046 11010 414faf 11052 414c1d 11010->11052 11011 415012 ??2@YAPAXI 11011->11024 11015 414c1d 16 API calls 11015->11024 11017 414b12 ctype 16 API calls 11017->11024 11019 414c1d 16 API calls 11020 4150b4 11019->11020 11021 414b12 ctype 16 API calls 11020->11021 11021->11022 11024->11010 11024->11011 11024->11015 11024->11017 11026 41508f 11024->11026 11038 415707 11024->11038 11055 41534f ??2@YAPAXI 11024->11055 11057 414476 11024->11057 11094 41569c 11024->11094 11026->11019 11029 401238 GetDiskFreeSpaceExW 11028->11029 11030 40128e SendMessageW 11028->11030 11029->11030 11031 401250 11029->11031 11036 401276 11030->11036 11031->11030 11032 402490 19 API calls 11031->11032 11033 401269 11032->11033 11034 409581 27 API calls 11033->11034 11035 40126f 11034->11035 11035->11036 11037 401287 11035->11037 11036->11000 11036->11001 11037->11030 11039 415730 11038->11039 11098 415552 11039->11098 11044 414cb9 11042->11044 11045 414cb3 11042->11045 11043 414ccf _CxxThrowException 11043->11045 11044->11043 11044->11045 11045->11009 11102 4127de 11046->11102 11114 4127d6 11049->11114 11053 413edf ctype 16 API calls 11052->11053 11054 414c28 11053->11054 11056 415381 11055->11056 11056->11024 11214 41663f 11057->11214 11060 414493 11060->11024 11062 4144e4 ??2@YAPAXI 11071 4144cc 11062->11071 11063 4145ac 11232 414155 11063->11232 11065 414508 ??2@YAPAXI 11065->11071 11071->11062 11071->11063 11071->11065 11273 413f9d ??2@YAPAXI 11071->11273 11095 4156a1 11094->11095 11096 4156c8 11095->11096 11097 415431 112 API calls 11095->11097 11096->11024 11097->11095 11101 415557 11098->11101 11099 41558d 11099->11024 11100 415431 112 API calls 11100->11101 11101->11099 11101->11100 11103 412805 11102->11103 11104 4127e6 11102->11104 11103->11009 11106 41270d 11104->11106 11107 4127a1 11106->11107 11108 412720 11106->11108 11107->11103 11109 41272f _CxxThrowException 11108->11109 11110 412791 ??3@YAXPAX 11108->11110 11111 41275f ??2@YAPAXI 11108->11111 11109->11108 11110->11107 11111->11108 11112 412775 memcpy 11111->11112 11112->11110 11117 4126f9 11114->11117 11123 402003 VirtualFree 11117->11123 11127 40c600 11117->11127 11132 40ae60 ??3@YAXPAX 11117->11132 11135 415a4c ??3@YAXPAX 11117->11135 11138 414386 11117->11138 11145 40fe94 11117->11145 11148 4107c0 11117->11148 11154 40f850 11117->11154 11118 41270a 11123->11118 11128 40c620 11127->11128 11129 40c60e 11127->11129 11128->11118 11158 40c550 11129->11158 11133 40ae85 11132->11133 11134 40ae7c ??3@YAXPAX 11132->11134 11133->11118 11134->11133 11136 415a66 11135->11136 11137 415a5f ??3@YAXPAX 11135->11137 11136->11118 11137->11136 11139 41439b 11138->11139 11140 4143c9 11139->11140 11169 41410e 11139->11169 11182 412823 11140->11182 11146 40201c free 11145->11146 11147 40fe9a 11146->11147 11147->11118 11149 4107e5 11148->11149 11150 40201c free 11149->11150 11151 4107ee 11150->11151 11152 410810 11151->11152 11153 410807 ??3@YAXPAX 11151->11153 11152->11118 11153->11152 11155 40f876 11154->11155 11156 40201c free 11155->11156 11157 40f89c 11156->11157 11157->11118 11159 41353e VirtualFree 11158->11159 11160 40c561 11159->11160 11161 413318 VirtualFree 11160->11161 11162 40c57a 11161->11162 11163 413318 VirtualFree 11162->11163 11164 40c593 11163->11164 11165 413318 VirtualFree 11164->11165 11166 40c5ac 11165->11166 11167 413318 VirtualFree 11166->11167 11168 40c5c5 ??3@YAXPAX 11167->11168 11168->11128 11186 413c15 11169->11186 11173 414127 11174 412875 ctype 16 API calls 11173->11174 11175 414132 11174->11175 11198 413edf 11175->11198 11183 412837 11182->11183 11185 41284b 11183->11185 11213 4127a7 memmove 11183->11213 11185->11118 11187 413c24 11186->11187 11188 413c2a 11186->11188 11201 40759f SetEvent 11187->11201 11193 413c40 11188->11193 11204 407543 WaitForSingleObject 11188->11204 11191 413c3a 11205 407519 11191->11205 11194 412875 11193->11194 11195 412854 11194->11195 11196 4126f9 ctype 15 API calls 11195->11196 11197 41285e ??3@YAXPAX 11196->11197 11197->11173 11199 4127d6 ctype 16 API calls 11198->11199 11200 413eed 11199->11200 11209 407503 11201->11209 11203 4075b1 11203->11188 11204->11191 11206 407524 CloseHandle 11205->11206 11208 407539 11205->11208 11207 40752f GetLastError 11206->11207 11206->11208 11207->11208 11208->11193 11210 40750a 11209->11210 11211 40750d GetLastError 11209->11211 11210->11203 11212 407517 11211->11212 11212->11203 11213->11185 11215 416658 11214->11215 11230 41448f 11214->11230 11215->11230 11308 41641a 11215->11308 11217 416832 11220 412875 ctype 16 API calls 11217->11220 11219 41641a 20 API calls 11221 4166f4 11219->11221 11220->11230 11221->11217 11222 416724 11221->11222 11223 412875 ctype 16 API calls 11222->11223 11224 41672d 11223->11224 11225 4167aa 11224->11225 11226 4027b7 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 11224->11226 11227 412875 ctype 16 API calls 11225->11227 11226->11224 11228 4167e6 11227->11228 11229 412875 ctype 16 API calls 11228->11229 11229->11230 11230->11060 11231 4075fb InitializeCriticalSection 11230->11231 11231->11071 11315 413c44 11232->11315 11274 413fac 11273->11274 11354 4027b7 11274->11354 11309 4127d6 ctype 16 API calls 11308->11309 11310 416426 11309->11310 11311 41270d 4 API calls 11310->11311 11312 416430 11311->11312 11313 416442 11312->11313 11314 414af0 4 API calls 11312->11314 11313->11217 11313->11219 11314->11312 11316 4127d6 ctype 16 API calls 11315->11316 11317 413c4c 11316->11317 11318 4127d6 ctype 16 API calls 11317->11318 11319 413c54 11318->11319 11320 4127d6 ctype 16 API calls 11319->11320 11321 413c5c 11320->11321 11355 4127de 4 API calls 11354->11355 11356 4027bf 11355->11356 11356->11071
                          APIs
                          • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405C2B
                            • Part of subcall function 0040202A: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C37,?,00000000), ref: 00402036
                            • Part of subcall function 0040202A: CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402053
                            • Part of subcall function 0040202A: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402065
                            • Part of subcall function 0040202A: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00402072
                            • Part of subcall function 0040202A: DispatchMessageW.USER32(?), ref: 0040207C
                            • Part of subcall function 0040202A: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C37,?,00000000), ref: 00402085
                            • Part of subcall function 0040202A: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C37,?,00000000), ref: 0040208C
                          • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405C48
                          • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 00405CD4
                            • Part of subcall function 00403101: ??3@YAXPAX@Z.MSVCRT ref: 00403174
                            • Part of subcall function 00403101: ??3@YAXPAX@Z.MSVCRT ref: 0040318F
                            • Part of subcall function 00403101: ??3@YAXPAX@Z.MSVCRT ref: 00403197
                            • Part of subcall function 00403101: ??3@YAXPAX@Z.MSVCRT ref: 00403207
                          • lstrlenW.KERNEL32(?,00000000,00000000), ref: 00405CFF
                            • Part of subcall function 00403685: ??3@YAXPAX@Z.MSVCRT ref: 004036ED
                            • Part of subcall function 0040455D: #17.COMCTL32(00000000,?,?), ref: 00404569
                            • Part of subcall function 0040455D: SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 004045EA
                            • Part of subcall function 0040455D: wsprintfW.USER32 ref: 004045FE
                          • wsprintfW.USER32 ref: 00405D67
                          • _wtol.MSVCRT(-00000002), ref: 00405DA3
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405DF2
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405E03
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405E0B
                            • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                            • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                          • GetModuleFileNameW.KERNEL32(00000000,00000208), ref: 00405E82
                          • _wtol.MSVCRT(-00000002), ref: 00405FAA
                          • ??2@YAPAXI@Z.MSVCRT ref: 00406139
                          • ??3@YAXPAX@Z.MSVCRT ref: 004061BC
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406232
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040624E
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040628C
                          • wsprintfW.USER32 ref: 004062B6
                            • Part of subcall function 004046A3: lstrlenW.KERNEL32(00406EB8,00000000,?,?,004046EA,00000000,00000000,00406EB8,?,waitall,00000000,00000000,?,?,0041E9E8), ref: 004046B0
                            • Part of subcall function 004046A3: lstrlenW.KERNEL32(?,?,?,0041E9E8), ref: 004046B9
                            • Part of subcall function 004046A3: _wcsnicmp.MSVCRT ref: 004046C5
                          • _wtol.MSVCRT(?), ref: 004064D8
                          • ??3@YAXPAX@Z.MSVCRT ref: 004065A5
                          • ??3@YAXPAX@Z.MSVCRT ref: 004065EF
                          • ??3@YAXPAX@Z.MSVCRT ref: 004065F7
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406618
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406672
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040667A
                          • GetCommandLineW.KERNEL32(?,?,00000000,?,?), ref: 004066E4
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040675D
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406765
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040676D
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406775
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040677D
                          • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 00406789
                          • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 00406790
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067AB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067B3
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067BB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067C3
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067DF
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067E7
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067EF
                          • ??3@YAXPAX@Z.MSVCRT ref: 004067F7
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406869
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040688C
                          • ??3@YAXPAX@Z.MSVCRT ref: 004068FE
                          • CoInitialize.OLE32(00000000), ref: 0040691A
                          • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00406973
                          • _wtol.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406A5C
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406A7E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406AC9
                          • GetKeyState.USER32(00000010), ref: 00406B1B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406C61
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406C6F
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406C9A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406CA2
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406CBE
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406CC6
                            • Part of subcall function 00404A41: GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00407453,00000000,?,?,004057BC,?,7ZSfx%03x.cmd), ref: 00404A64
                            • Part of subcall function 00404A41: GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,004057BC,?,7ZSfx%03x.cmd), ref: 00404A81
                            • Part of subcall function 00404A41: wsprintfW.USER32 ref: 00404AB7
                            • Part of subcall function 00404A41: GetFileAttributesW.KERNELBASE(?), ref: 00404AD2
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406CF6
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406D37
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406DA2
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406DAA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406E6F
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406E77
                          • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,?,setup.exe,?,00000000,?,?), ref: 00406E81
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406F3B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00406F43
                          • _wtol.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406FD5
                          • ??3@YAXPAX@Z.MSVCRT ref: 004071B0
                          • ??3@YAXPAX@Z.MSVCRT ref: 004071B8
                          • ??3@YAXPAX@Z.MSVCRT ref: 004071DC
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407225
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040722D
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407235
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040723B
                            • Part of subcall function 00405492: GetCommandLineW.KERNEL32(?,00000000,?), ref: 004054B3
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 00405576
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 0040557E
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 00405586
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 0040558E
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 00405596
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 0040559E
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 004055A6
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 004055AE
                            • Part of subcall function 00405492: ??3@YAXPAX@Z.MSVCRT ref: 004055B6
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040724B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407253
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407270
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407278
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407280
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407288
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407290
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072AE
                          • SetLastError.KERNEL32(00000000,00000000,?,?), ref: 004072B7
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072CF
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072D7
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072DF
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072E5
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072ED
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072F5
                          • ??3@YAXPAX@Z.MSVCRT ref: 004072FD
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040731C
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407324
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040732C
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407332
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 0040736A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407394
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407459
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407461
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407478
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407489
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407491
                            • Part of subcall function 00405758: GetDriveTypeW.KERNEL32(?,?,?), ref: 0040579F
                            • Part of subcall function 00405758: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 004057D0
                            • Part of subcall function 00405758: WriteFile.KERNEL32(0041EA30,?,?,00407453,00000000,del ",:Repeat,00000000), ref: 00405885
                            • Part of subcall function 00405758: ??3@YAXPAX@Z.MSVCRT ref: 00405890
                          • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 004074AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$File_wtol$lstrlenwsprintf$CommandLineMessagePath$??2@AttributesCreateCurrentModuleProcessTempTimer$?_set_new_handler@@CallbackDirectoryDispatchDispatcherDriveErrorFolderHandleInitializeKillLastNameSizeSpecialStateTypeUserVersionWindowWorkingWrite_wcsnicmp
                          • String ID: " -$$A$0A$0A$0A$123456789ABCDEFGHJKMNPQRSTUVWXYZ$7-Zip SFX$7ZipSfx.%03x$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$SfxAuthor$SfxString%d$SfxVarCmdLine0$SfxVarCmdLine1$SfxVarCmdLine2$SfxVarModulePlatform$SfxVarSystemLanguage$SfxVarSystemPlatform$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$pA$setup.exe$sfxconfig$sfxelevation$sfxlang$sfxversion$sfxwaitall$shc$waitall$x64$x86$A$A$A
                          • API String ID: 1285656963-2377148831
                          • Opcode ID: ca29ec69b75dae9377f55f1aad8fca88460a48402f3d6daeb9e5462099815401
                          • Instruction ID: 7d3dfb060556a880520f882e8da7ce04cba8f88452da2e3d957660181bc34423
                          • Opcode Fuzzy Hash: ca29ec69b75dae9377f55f1aad8fca88460a48402f3d6daeb9e5462099815401
                          • Instruction Fuzzy Hash: 0FE2F271900204AADF25BF61DD46AEE3768EF05308F11403BF906B61D2DB7D9A91CB9E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1084 403a96-403abc lstrlenW call 402a9c 1087 403ac7-403ad3 1084->1087 1088 403abe-403ac2 call 4011b7 1084->1088 1090 403ad5-403ad9 1087->1090 1091 403adb-403ae1 1087->1091 1088->1087 1090->1091 1092 403ae4-403ae6 1090->1092 1091->1092 1093 403b0a-403b13 call 401e7e 1092->1093 1096 403b15-403b28 GetSystemTimeAsFileTime GetFileAttributesW 1093->1096 1097 403af9-403afb 1093->1097 1100 403b41-403b4a call 401e7e 1096->1100 1101 403b2a-403b38 call 40372c 1096->1101 1098 403ae8-403af0 1097->1098 1099 403afd-403aff 1097->1099 1098->1099 1106 403af2-403af6 1098->1106 1102 403b05 1099->1102 1103 403bb9-403bbf 1099->1103 1114 403b5b-403b5d 1100->1114 1115 403b4c-403b59 call 4095ee 1100->1115 1101->1100 1113 403b3a-403b3c 1101->1113 1102->1093 1109 403bc1-403bcc 1103->1109 1110 403be9-403bfc call 4095ee ??3@YAXPAX@Z 1103->1110 1106->1099 1111 403af8 1106->1111 1109->1110 1116 403bce-403bd2 1109->1116 1126 403bfe-403c02 1110->1126 1111->1097 1120 403bde-403be7 ??3@YAXPAX@Z 1113->1120 1117 403bad-403bb7 ??3@YAXPAX@Z 1114->1117 1118 403b5f-403b7e memcpy 1114->1118 1115->1113 1116->1110 1122 403bd4-403bd9 1116->1122 1117->1126 1124 403b80 1118->1124 1125 403b93-403b97 1118->1125 1120->1126 1122->1110 1123 403bdb-403bdd 1122->1123 1123->1120 1128 403b92 1124->1128 1129 403b82-403b8a 1125->1129 1130 403b99-403ba6 call 401e7e 1125->1130 1128->1125 1129->1130 1131 403b8c-403b90 1129->1131 1130->1115 1134 403ba8-403bab 1130->1134 1131->1128 1131->1130 1134->1117 1134->1118
                          APIs
                          • lstrlenW.KERNEL32(00401A87,00000000,?,?,?,?,?,?,00401A87,?), ref: 00403AA3
                          • GetSystemTimeAsFileTime.KERNEL32(?,00401A87,?,?,?,?,00401A87,?), ref: 00403B19
                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A87,?), ref: 00403B20
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403BDF
                            • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                            • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                          • memcpy.MSVCRT ref: 00403B71
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403BAE
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403BF4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                          • String ID:
                          • API String ID: 846840743-0
                          • Opcode ID: 70eed00c210e8056117a81afcf139e7f7fadff7b77be66bf58d94e28cbcf4867
                          • Instruction ID: 0f2a00f266c3e91eabf76dad8ed74b5c358096388eeecf68552b374039058eee
                          • Opcode Fuzzy Hash: 70eed00c210e8056117a81afcf139e7f7fadff7b77be66bf58d94e28cbcf4867
                          • Instruction Fuzzy Hash: 8D41EB25900115AADB20AF598C42ABF7B7CEB0570AF40413BE941B61C2E77DAF4286DD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1156 402678-402697 LoadLibraryA GetProcAddress 1157 4026a5-4026a8 1156->1157 1158 402699-4026a4 GetNativeSystemInfo 1156->1158
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,?,004026AE,00405D26,00000001), ref: 00402688
                          • GetProcAddress.KERNEL32(00000000), ref: 0040268F
                          • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,004026AE,00405D26,00000001), ref: 0040269D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AddressInfoLibraryLoadNativeProcSystem
                          • String ID: GetNativeSystemInfo$kernel32
                          • API String ID: 2103483237-3846845290
                          • Opcode ID: 589bfe798714c72d55a02258d5f73302c8b4a0cb66d4c90fb85e1d33c1cb50e7
                          • Instruction ID: 4243547076bf45231392ad9064d8e78bc72b2d3c6908f642ae8a754f6dea8c3c
                          • Opcode Fuzzy Hash: 589bfe798714c72d55a02258d5f73302c8b4a0cb66d4c90fb85e1d33c1cb50e7
                          • Instruction Fuzzy Hash: A2D05E70A0520976CB01ABB15D0E9EB76E86A48609B140461A406F00C4EAADDDA0C77A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1198 40372c-403743 GetFileAttributesW 1199 403745-403747 1198->1199 1200 403749-40374b 1198->1200 1201 4037a2-4037a4 1199->1201 1202 40375a-403761 1200->1202 1203 40374d-403758 SetLastError 1200->1203 1204 403763-40376a call 4036ff 1202->1204 1205 40376c-40376f 1202->1205 1203->1201 1204->1201 1207 403771-403782 FindFirstFileW 1205->1207 1208 40379f-4037a1 1205->1208 1207->1204 1210 403784-40379d FindClose CompareFileTime 1207->1210 1208->1201 1210->1204 1210->1208
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 0040373A
                          • SetLastError.KERNEL32(00000010), ref: 0040374F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AttributesErrorFileLast
                          • String ID:
                          • API String ID: 1799206407-0
                          • Opcode ID: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                          • Instruction ID: fc6d74f889439b8008461c5170a41b41c4634018572b579c801417c90cab6092
                          • Opcode Fuzzy Hash: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                          • Instruction Fuzzy Hash: FF018BF45024146ADB102F799D889EA3B5CAF01326F10CA32F522F21E0E73C9B51865E
                          APIs
                          • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 00401246
                          • SendMessageW.USER32(00008001,00000000,?), ref: 0040129F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: DiskFreeMessageSendSpace
                          • String ID:
                          • API String ID: 696007252-0
                          • Opcode ID: 134f51b7559761425d8516f572d58d6d47936f3fb89939f0ed2c5b40a734bcac
                          • Instruction ID: 5a84cd4ed7cf58cef686fcc2e8b11779581c6348a7b22175bc4f470302977229
                          • Opcode Fuzzy Hash: 134f51b7559761425d8516f572d58d6d47936f3fb89939f0ed2c5b40a734bcac
                          • Instruction Fuzzy Hash: A80181B4611208BBEB94DB92DC45F9A77A9FB01714F10807AFD00FA1F0C7B9A9808B1D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 782 401b1e-401b2e 783 401b30-401b35 782->783 784 401b3a-401b65 call 413c8f call 415d5c 782->784 785 401e78-401e7b 783->785 789 401b67 784->789 790 401b78-401b84 call 4014eb 784->790 791 401b69-401b73 call 412564 789->791 796 401e5a-401e75 ??3@YAXPAX@Z call 412564 790->796 797 401b8a-401b8f 790->797 798 401e77 791->798 796->798 797->796 799 401b95-401bcb call 401403 call 4017d3 call 40143c ??3@YAXPAX@Z 797->799 798->785 809 401e40-401e43 799->809 810 401bd1-401bf0 799->810 811 401e45-401e58 ??3@YAXPAX@Z call 412564 809->811 814 401bf2-401c06 call 412564 ??3@YAXPAX@Z 810->814 815 401c0b-401c0f 810->815 811->798 814->791 818 401c11-401c14 815->818 819 401c16-401c1b 815->819 821 401c43-401c5a 818->821 822 401c3d-401c40 819->822 823 401c1d 819->823 821->814 826 401c5c-401c7f 821->826 822->821 824 401c1f-401c25 823->824 828 401c27-401c38 call 412564 ??3@YAXPAX@Z 824->828 831 401c81-401c95 call 412564 ??3@YAXPAX@Z 826->831 832 401c9a-401ca0 826->832 828->791 831->791 835 401ca2-401ca5 832->835 836 401cbc-401cce GetLocalTime SystemTimeToFileTime 832->836 838 401ca7-401ca9 835->838 839 401cae-401cba 835->839 840 401cd4-401cd7 836->840 838->824 839->840 841 401cf0-401cf7 call 40372c 840->841 842 401cd9-401cdb call 403a96 840->842 846 401cfc-401d01 841->846 845 401ce0-401ce3 842->845 845->828 847 401ce9-401ceb 845->847 848 401d07-401d0a 846->848 849 401e2c-401e3b GetLastError 846->849 847->824 850 401d10-401d1a ??2@YAPAXI@Z 848->850 851 401e22-401e25 848->851 849->809 853 401d2b 850->853 854 401d1c-401d29 850->854 851->849 855 401d2d-401d51 call 41333e call 412458 853->855 854->855 860 401e07-401e20 call 4136a9 call 412564 855->860 861 401d57-401d75 GetLastError call 4013d1 call 4033f2 855->861 860->811 870 401db2-401dc7 call 403a96 861->870 871 401d77-401d7e 861->871 875 401dd3-401deb call 412458 870->875 876 401dc9-401dd1 870->876 873 401d82-401d92 ??3@YAXPAX@Z 871->873 877 401d94-401d96 873->877 878 401d9a-401dad call 412564 ??3@YAXPAX@Z 873->878 884 401ded-401dfc GetLastError 875->884 885 401dfe-401e06 ??3@YAXPAX@Z 875->885 876->873 877->878 878->791 884->873 885->860
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4f3a344645c90060d1dde64b1fc318fbc4d03283f1872130456d7d7b8fca47a7
                          • Instruction ID: c97574b0b9fb83ae219b8bf287d177c65d35204aa7b292a8b4aaedb3b9765f48
                          • Opcode Fuzzy Hash: 4f3a344645c90060d1dde64b1fc318fbc4d03283f1872130456d7d7b8fca47a7
                          • Instruction Fuzzy Hash: BFB18E71900205EFCB15EFA5C8849EEB7B5FF48314F10842BF912A72A1DB78EA45CB59

                          Control-flow Graph

                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C37,?,00000000), ref: 00402036
                          • CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402053
                          • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402065
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00402072
                          • DispatchMessageW.USER32(?), ref: 0040207C
                          • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C37,?,00000000), ref: 00402085
                          • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C37,?,00000000), ref: 0040208C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                          • String ID: Static
                          • API String ID: 2479445380-2272013587
                          • Opcode ID: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                          • Instruction ID: 6d361602a22ecfb743b6e8feae7c3bd3eb8e68c6b2cd8e9e3e04e25feeadf995
                          • Opcode Fuzzy Hash: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                          • Instruction Fuzzy Hash: 68F062325472317BCA312BA69C4DEEF3E2DEF46BB1F004260F619A11D1DAB94111C6BA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 891 414476-414491 call 41663f 894 4144a0-4144de call 4075fb call 4136a9 891->894 895 414493-41449d 891->895 900 4144e4-4144ee ??2@YAPAXI@Z 894->900 901 4145ac-4145d2 call 41421a call 414155 894->901 902 4144f0-4144fb 900->902 903 4144fd 900->903 913 4145f0-414608 call 4127d6 call 413c8f 901->913 914 4145d4-4145ea call 413d2c 901->914 905 4144ff-414538 call 41333e ??2@YAPAXI@Z 902->905 903->905 911 41454a 905->911 912 41453a-414548 905->912 916 41454c-414585 call 41333e call 410310 call 413f9d 911->916 912->916 927 414640-414650 913->927 928 41460a-414617 ??2@YAPAXI@Z 913->928 914->913 923 41476c-414783 914->923 942 414587-414589 916->942 943 41458d-414592 916->943 930 4149f9-414a14 call 413cbe 923->930 931 414789 923->931 944 414680-414686 927->944 945 414652 927->945 932 414622 928->932 933 414619-414620 call 41423f 928->933 948 414a16-414a1c 930->948 949 414a1f-414a22 930->949 937 41478c-4147bf 931->937 939 414624-414634 call 4136a9 932->939 933->939 959 4147c1-4147ca 937->959 960 4147f5-41480d 937->960 961 414636-414639 939->961 962 41463b 939->962 942->943 951 414594-414596 943->951 952 41459a-4145a6 943->952 955 41475a-414769 call 4143fe 944->955 956 41468c-4146b9 call 412948 944->956 950 414654-41467a call 412875 call 413d09 call 413e70 call 413edf 945->950 948->949 949->950 957 414a28-414a4f call 41270d 949->957 950->944 951->952 952->900 952->901 955->923 972 4146bf-4146c6 956->972 973 41492e-414933 956->973 981 414a51-414a65 call 4027b7 957->981 982 414a67-414a83 957->982 968 4147d0-4147e5 959->968 969 414964-414966 959->969 977 414813-414818 960->977 978 4148c7-41490a call 41270d * 2 960->978 970 41463d 961->970 962->970 994 414a96-414a98 968->994 995 4147eb-4147ed 968->995 984 41496a-41496f 969->984 970->927 979 4146f4-4146f7 972->979 980 4146c8-4146cc 972->980 986 414935-414937 973->986 987 41493b-414940 973->987 988 414aa8-414aaa 977->988 989 41481e-41482f 977->989 1030 414974 978->1030 1031 41490c-41490f 978->1031 996 41495d-414962 979->996 997 4146fd-41470b call 4136a9 979->997 980->979 991 4146ce-4146d1 980->991 981->982 1081 414a84 call 40faf0 982->1081 1082 414a84 call 4105c0 982->1082 1083 414a84 call 413baa 982->1083 984->950 986->987 998 414942-414944 987->998 999 414948-41494b 987->999 1014 414aae-414ab3 988->1014 1018 414835-414867 call 402a9c call 40b2a0 989->1018 1019 414ab8-414ac6 SysFreeString 989->1019 1006 414950-414955 991->1006 1007 4146d7-4146e5 call 4136a9 991->1007 1003 414aa0-414aa3 994->1003 1004 414a9a-414a9c 994->1004 995->960 1008 4147ef-4147f1 995->1008 996->969 996->984 1024 414718-414729 call 413f9d 997->1024 1025 41470d-414713 call 418dd1 997->1025 998->999 999->950 1002 414a87-414a91 call 412875 1002->950 1003->950 1004->1003 1006->984 1011 414957-414959 1006->1011 1007->1024 1032 4146e7-4146f2 call 418dac 1007->1032 1008->960 1011->996 1014->950 1053 414869-41486f 1018->1053 1054 41487f-41489d ??3@YAXPAX@Z 1018->1054 1028 414ac8-414aca 1019->1028 1029 414ace-414ad0 1019->1029 1039 414731-414736 1024->1039 1040 41472b-41472d 1024->1040 1025->1024 1028->1029 1029->950 1036 414977-41497c 1030->1036 1037 414912-41492a call 4027b7 1031->1037 1032->1024 1042 4149c4-4149f0 call 412875 * 2 1036->1042 1043 41497e-41498a call 413f0b 1036->1043 1057 41492c 1037->1057 1046 414738-41473a 1039->1046 1047 41473e-414743 1039->1047 1040->1039 1042->937 1077 4149f6 1042->1077 1059 414998-4149a4 call 413f56 1043->1059 1060 41498c-414996 1043->1060 1046->1047 1051 414745-414747 1047->1051 1052 41474b-414754 1047->1052 1051->1052 1052->955 1052->956 1058 414871-41487d 1053->1058 1066 4148a3-4148bf ??3@YAXPAX@Z SysFreeString 1054->1066 1067 414ad5-414adc ??3@YAXPAX@Z 1054->1067 1057->1036 1058->1054 1058->1058 1072 4149aa 1059->1072 1073 414ade-414aee call 412875 * 2 1059->1073 1063 4149ad-4149c2 call 4027b7 1060->1063 1063->1042 1063->1043 1066->978 1071 4148c1-4148c3 1066->1071 1067->1019 1071->978 1072->1063 1073->1014 1077->930 1081->1002 1082->1002 1083->1002
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: 788047ecef0a495616e408a1f8658ec1d260eded41d07f1578465c09e28bf8e1
                          • Instruction ID: 9cfdc296de4d911c8b0d5509db40b0b0cf3220fe84743daa4662bb7cf851d428
                          • Opcode Fuzzy Hash: 788047ecef0a495616e408a1f8658ec1d260eded41d07f1578465c09e28bf8e1
                          • Instruction Fuzzy Hash: 36324371900249DFCB14DFA5C8808EEBBB5FF89308B14456EF91A9B251CB39E985CF58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1135 4053bb-405400 call 4014eb * 2 memset 1140 405402-405405 1135->1140 1141 40540c-405410 1135->1141 1140->1141 1142 405412 1141->1142 1143 405419-405433 call 404ea8 call 401403 1141->1143 1142->1143 1148 405435-40543d ??3@YAXPAX@Z 1143->1148 1149 40544e-405466 ShellExecuteExW 1143->1149 1150 405440-40544d ??3@YAXPAX@Z 1148->1150 1151 405468-40546f 1149->1151 1152 40548e-405490 1149->1152 1153 405471-405476 WaitForSingleObject 1151->1153 1154 40547c-40547f CloseHandle 1151->1154 1155 405485-40548c ??3@YAXPAX@Z 1152->1155 1153->1154 1154->1155 1155->1150
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                          • String ID:
                          • API String ID: 2700081640-0
                          • Opcode ID: 91a943068177400c2716056ef89a331a477f8bae5c5f5a6613d8adce82220148
                          • Instruction ID: bfc6e588bc124ab4bb54016629f9cf6f875c5e33f05a46da5ac90fa54932be6c
                          • Opcode Fuzzy Hash: 91a943068177400c2716056ef89a331a477f8bae5c5f5a6613d8adce82220148
                          • Instruction Fuzzy Hash: FB216B71C00208ABCB11AFD5D885AEFBBB8FF44318F10813BE915B61A1D7785995CF45

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1159 4168ca-4168e7 call 413b00 1162 4168ed-4168f4 call 4163c7 1159->1162 1163 416a1f-416a22 1159->1163 1166 4168f6-4168f8 1162->1166 1167 4168fd-41692c call 40b2a0 memcpy 1162->1167 1166->1163 1170 41692f-416937 1167->1170 1171 416939-416947 1170->1171 1172 41694f-416967 1170->1172 1173 4169c3-4169cc ??3@YAXPAX@Z 1171->1173 1174 416949 1171->1174 1178 416969-41696e 1172->1178 1179 4169ce 1172->1179 1176 416a1d-416a1e 1173->1176 1174->1172 1175 41694b-41694d 1174->1175 1175->1172 1175->1173 1176->1163 1181 416970-416978 1178->1181 1182 4169d3-4169d6 1178->1182 1180 4169d0-4169d1 1179->1180 1183 416a16-416a1b ??3@YAXPAX@Z 1180->1183 1184 41697a 1181->1184 1185 4169ac-4169be memmove 1181->1185 1182->1180 1183->1176 1186 416989-41698d 1184->1186 1185->1170 1187 416981-416983 1186->1187 1188 41698f-416991 1186->1188 1187->1185 1189 416985-416986 1187->1189 1188->1185 1190 416993-41699c call 4163c7 1188->1190 1189->1186 1193 4169d8-416a0e memcpy call 412a5a 1190->1193 1194 41699e-4169aa 1190->1194 1196 416a11-416a14 1193->1196 1194->1185 1195 41697c-41697f 1194->1195 1195->1186 1196->1183
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@memcpymemmove
                          • String ID:
                          • API String ID: 3549172513-0
                          • Opcode ID: d379a83c4509f110c68ff3d8a357345f8dafa83bff8cb8b2909894970113db52
                          • Instruction ID: 23944b093298c9250b12953aee9b2fea977b47268a7197f545c2c6c5c712d5c3
                          • Opcode Fuzzy Hash: d379a83c4509f110c68ff3d8a357345f8dafa83bff8cb8b2909894970113db52
                          • Instruction Fuzzy Hash: 1041F4B1A10204ABDB10DB65C940BFFB7B9EF89744F15446EE841A7201D778EE81CB99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1211 40455d-4045de #17 call 418f10 call 40243a call 402490 * 7 1230 4045e0-4045f2 SHGetSpecialFolderPathW 1211->1230 1231 404641-404645 1230->1231 1232 4045f4-404619 wsprintfW call 403685 1230->1232 1231->1230 1234 404647-40464b 1231->1234 1236 40461b-404621 1232->1236 1237 404623-404631 call 403685 1236->1237 1238 404639-40463f 1236->1238 1240 404636 1237->1240 1238->1231 1238->1236 1240->1238
                          APIs
                          • #17.COMCTL32(00000000,?,?), ref: 00404569
                            • Part of subcall function 0040243A: GetUserDefaultUILanguage.KERNEL32(00404579,?,?), ref: 00402444
                            • Part of subcall function 00402490: GetLastError.KERNEL32(00000000,?,?), ref: 004024DF
                            • Part of subcall function 00402490: wsprintfW.USER32 ref: 004024F0
                            • Part of subcall function 00402490: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402505
                            • Part of subcall function 00402490: GetLastError.KERNEL32 ref: 0040250A
                            • Part of subcall function 00402490: ??2@YAPAXI@Z.MSVCRT ref: 00402525
                            • Part of subcall function 00402490: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402538
                            • Part of subcall function 00402490: GetLastError.KERNEL32 ref: 0040253F
                            • Part of subcall function 00402490: lstrcmpiW.KERNEL32(00ADC6C8,?), ref: 00402554
                            • Part of subcall function 00402490: ??3@YAXPAX@Z.MSVCRT ref: 00402564
                            • Part of subcall function 00402490: SetLastError.KERNEL32(00000003), ref: 0040258B
                            • Part of subcall function 00402490: lstrlenA.KERNEL32(0041B330), ref: 004025BF
                            • Part of subcall function 00402490: ??2@YAPAXI@Z.MSVCRT ref: 004025DA
                            • Part of subcall function 00402490: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 0040260C
                            • Part of subcall function 00402490: ??3@YAXPAX@Z.MSVCRT ref: 00402582
                            • Part of subcall function 00402490: _wtol.MSVCRT(?), ref: 0040261D
                            • Part of subcall function 00402490: MultiByteToWideChar.KERNEL32(00000000,0041B330,00000001,00ADC6C8,00000002), ref: 0040263D
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 004045EA
                          • wsprintfW.USER32 ref: 004045FE
                            • Part of subcall function 00403685: ??3@YAXPAX@Z.MSVCRT ref: 004036ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ErrorLast$??3@$??2@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                          • String ID: SfxFolder%02d
                          • API String ID: 1305296731-528147737
                          • Opcode ID: c0b7c8bedfdb96d278ad746eb2fa6d2f79cda622667cf71b9ff6e01a874d3379
                          • Instruction ID: ad47f965f1414b1aea6f9370fe11b7bd4236df0bf66a58ddcda0defb28dd56f0
                          • Opcode Fuzzy Hash: c0b7c8bedfdb96d278ad746eb2fa6d2f79cda622667cf71b9ff6e01a874d3379
                          • Instruction Fuzzy Hash: 7A2104F6D013146AD750EFB29C4EBCA7668AB80709F00853FFA09A71D0EA7A55408B1D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1241 402f19-402f63 call 419290 call 412a5a lstrlenA * 2 1245 402f68-402f84 call 412a26 1241->1245 1247 403054 1245->1247 1248 402f8a-402f8f 1245->1248 1249 403056-40305a 1247->1249 1248->1247 1250 402f95-402f9f 1248->1250 1251 402fa2-402fa7 1250->1251 1252 402fe6-402feb 1251->1252 1253 402fa9-402fae 1251->1253 1254 403010-403034 memmove 1252->1254 1256 402fed-403000 memcmp 1252->1256 1253->1254 1255 402fb0-402fc3 memcmp 1253->1255 1259 403043-40304e 1254->1259 1260 403036-40303d 1254->1260 1261 403050-403052 1255->1261 1262 402fc9-402fd3 1255->1262 1257 402fe0-402fe4 1256->1257 1258 403002-40300e 1256->1258 1257->1251 1258->1251 1259->1249 1260->1259 1263 402f65 1260->1263 1261->1249 1262->1247 1264 402fd5-402fdb call 402c56 1262->1264 1263->1245 1264->1257
                          APIs
                          • lstrlenA.KERNEL32(?,?,004040B3,0041EA30,?,?,004061AB,00000000,00000000,?,?,?,00000000,?), ref: 00402F4B
                          • lstrlenA.KERNEL32(?,?,004040B3,0041EA30,?,?,004061AB,00000000,00000000,?,?,?,00000000,?), ref: 00402F53
                          • memcmp.MSVCRT ref: 00402FB9
                          • memcmp.MSVCRT ref: 00402FF6
                          • memmove.MSVCRT ref: 00403028
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: lstrlenmemcmp$memmove
                          • String ID:
                          • API String ID: 3251180759-0
                          • Opcode ID: a62ca880d0d825914a7d4edcd11435feecd31b01bd7507547217008d56edb1d4
                          • Instruction ID: 6bddd9879f2f5e7a60876394282d69eca814f89a03797a05572576cc836ebeb8
                          • Opcode Fuzzy Hash: a62ca880d0d825914a7d4edcd11435feecd31b01bd7507547217008d56edb1d4
                          • Instruction Fuzzy Hash: BE418C72D01209AFCF10DFA5C8849EEBFB8EF09384F0440AAE804B3280D3799E95DB55

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1268 4019e5-4019fc ??2@YAPAXI@Z 1269 401a07 1268->1269 1270 4019fe-401a05 call 41618b 1268->1270 1272 401a09-401a32 call 41333e call 412a5a 1269->1272 1270->1272 1278 401aa3 1272->1278 1279 401a34-401a3e ??2@YAPAXI@Z 1272->1279 1280 401aa6-401abd call 4095ee 1278->1280 1281 401a40-401a57 1279->1281 1282 401a59 1279->1282 1287 401abe-401ac3 1280->1287 1284 401a5b-401a72 call 40113f 1281->1284 1282->1284 1284->1280 1291 401a74-401a7e 1284->1291 1289 401ac5-401ac7 1287->1289 1290 401acb-401acd 1287->1290 1289->1290 1292 401ad5-401ada 1290->1292 1293 401acf-401ad1 1290->1293 1294 401a80-401a82 call 403a96 1291->1294 1295 401a8c-401a96 ??2@YAPAXI@Z 1291->1295 1297 401b0f-401b13 1292->1297 1293->1292 1300 401a87-401a8a 1294->1300 1298 401a98-401aa1 call 4016e7 1295->1298 1299 401adc 1295->1299 1301 401ade-401aef call 4015d8 call 401893 1298->1301 1299->1301 1300->1287 1300->1295 1307 401af4-401afb 1301->1307 1308 401b03-401b05 1307->1308 1309 401afd-401aff 1307->1309 1310 401b07-401b09 1308->1310 1311 401b0d 1308->1311 1309->1308 1310->1311 1311->1297
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT ref: 004019F2
                          • ??2@YAPAXI@Z.MSVCRT ref: 00401A36
                          • ??2@YAPAXI@Z.MSVCRT ref: 00401A8E
                            • Part of subcall function 004095EE: wvsprintfW.USER32(?,00000000,?), ref: 00409612
                            • Part of subcall function 004095EE: GetLastError.KERNEL32 ref: 00409623
                            • Part of subcall function 004095EE: FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 0040964B
                            • Part of subcall function 004095EE: FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 00409660
                            • Part of subcall function 004095EE: lstrlenW.KERNEL32(?), ref: 00409673
                            • Part of subcall function 004095EE: lstrlenW.KERNEL32(00000000), ref: 0040967A
                            • Part of subcall function 004095EE: ??2@YAPAXI@Z.MSVCRT ref: 0040968F
                            • Part of subcall function 004095EE: lstrcpyW.KERNEL32(00000000,?), ref: 004096A5
                            • Part of subcall function 004095EE: lstrcpyW.KERNEL32(-00000002,00000000), ref: 004096B6
                            • Part of subcall function 004095EE: ??3@YAXPAX@Z.MSVCRT ref: 004096BF
                            • Part of subcall function 004095EE: LocalFree.KERNEL32(00000000), ref: 004096C9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@$FormatMessagelstrcpylstrlen$??3@ErrorFreeLastLocalwvsprintf
                          • String ID: ExecuteFile
                          • API String ID: 1592922708-323923146
                          • Opcode ID: 7a623bca20e68b42fe6845036804734ebb7db2d519c6c2dea3bed0df4bdd9b31
                          • Instruction ID: 6780326a736f9f88a4b68697584b61ff41e5de17b7023dd5f9fed655a3c13ad6
                          • Opcode Fuzzy Hash: 7a623bca20e68b42fe6845036804734ebb7db2d519c6c2dea3bed0df4bdd9b31
                          • Instruction Fuzzy Hash: 0531B335701104AFCB119BA5CC89DAE77A9EF85315B24446BF405EB2A1DB789D80CB29

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1313 401893-4018e9 call 4136a9 call 401403 call 4017a8 CreateThread 1320 4018f0-40190b WaitForSingleObject 1313->1320 1321 4018eb call 408c92 1313->1321 1323 40190d-401910 1320->1323 1324 40193f-401945 1320->1324 1321->1320 1327 401912-401915 1323->1327 1328 401933 1323->1328 1325 4019a3 1324->1325 1326 401947-40195c GetExitCodeThread 1324->1326 1334 4019a8-4019ab 1325->1334 1329 401966-401971 1326->1329 1330 40195e-401960 1326->1330 1331 401917-40191a 1327->1331 1332 40192f-401931 1327->1332 1333 401935-40193d call 4095ee 1328->1333 1336 401973-401974 1329->1336 1337 401979-401982 1329->1337 1330->1329 1335 401962-401964 1330->1335 1338 40192b-40192d 1331->1338 1339 40191c-40191f 1331->1339 1332->1333 1333->1325 1335->1334 1341 401976-401977 1336->1341 1342 401984-40198b 1337->1342 1343 40198d-401999 SetLastError 1337->1343 1338->1333 1344 401921-401924 1339->1344 1345 401926-401929 1339->1345 1347 40199b-4019a0 call 4095ee 1341->1347 1342->1325 1342->1343 1343->1347 1344->1325 1344->1345 1345->1341 1347->1325
                          APIs
                          • CreateThread.KERNELBASE(00000000,00000000,0040133C,00000000,00000000,?), ref: 004018D7
                          • WaitForSingleObject.KERNEL32(000000FF,?,00401AF4,?,?), ref: 004018F8
                            • Part of subcall function 004095EE: wvsprintfW.USER32(?,00000000,?), ref: 00409612
                            • Part of subcall function 004095EE: GetLastError.KERNEL32 ref: 00409623
                            • Part of subcall function 004095EE: FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 0040964B
                            • Part of subcall function 004095EE: FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 00409660
                            • Part of subcall function 004095EE: lstrlenW.KERNEL32(?), ref: 00409673
                            • Part of subcall function 004095EE: lstrlenW.KERNEL32(00000000), ref: 0040967A
                            • Part of subcall function 004095EE: ??2@YAPAXI@Z.MSVCRT ref: 0040968F
                            • Part of subcall function 004095EE: lstrcpyW.KERNEL32(00000000,?), ref: 004096A5
                            • Part of subcall function 004095EE: lstrcpyW.KERNEL32(-00000002,00000000), ref: 004096B6
                            • Part of subcall function 004095EE: ??3@YAXPAX@Z.MSVCRT ref: 004096BF
                            • Part of subcall function 004095EE: LocalFree.KERNEL32(00000000), ref: 004096C9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                          • String ID:
                          • API String ID: 359084233-0
                          • Opcode ID: 91e141f45f2ee7295b0cea4f89133db8f2c00a0fa615f411bb75a8c1b5eb54d3
                          • Instruction ID: a876f98e79dacea5cc089968dae63f64e03189e2a5d1ac9b71cf33a519aa8765
                          • Opcode Fuzzy Hash: 91e141f45f2ee7295b0cea4f89133db8f2c00a0fa615f411bb75a8c1b5eb54d3
                          • Instruction Fuzzy Hash: 423126F5601200BAEB355B16DC55EBB36A9EB85310F20803BF902F52F1D67C8941D66F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1350 404a41-404a72 call 4014eb call 402ad5 GetTempPathW 1355 404a94-404aa1 1350->1355 1356 404a74-404a91 call 402ad5 GetTempPathW call 401184 1350->1356 1357 404aa4-404adb call 402ad5 wsprintfW call 401184 GetFileAttributesW 1355->1357 1356->1355 1366 404ae9-404aef 1357->1366 1367 404add-404ae7 1357->1367 1367->1357 1367->1366
                          APIs
                          • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00407453,00000000,?,?,004057BC,?,7ZSfx%03x.cmd), ref: 00404A64
                          • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,004057BC,?,7ZSfx%03x.cmd), ref: 00404A81
                          • wsprintfW.USER32 ref: 00404AB7
                          • GetFileAttributesW.KERNELBASE(?), ref: 00404AD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: PathTemp$AttributesFilewsprintf
                          • String ID:
                          • API String ID: 1746483863-0
                          • Opcode ID: 5f39394a9dca1049afb72b93ca682225ea40c3988a10b8dd75f2f6ab43e532ce
                          • Instruction ID: 5d9b743630f11cc8f98a804d25f6a969196336981951373b86204d1d51b3fe07
                          • Opcode Fuzzy Hash: 5f39394a9dca1049afb72b93ca682225ea40c3988a10b8dd75f2f6ab43e532ce
                          • Instruction Fuzzy Hash: 8C11E772600204FFD7119F55C844AADB7B9FF48314F10842EF906972E1DBB999108B98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1368 401e7e-401e8d CreateDirectoryW 1369 401ebf-401ec3 1368->1369 1370 401e8f-401e9c GetLastError 1368->1370 1371 401ea9-401eb6 GetFileAttributesW 1370->1371 1372 401e9e 1370->1372 1371->1369 1374 401eb8-401eba 1371->1374 1373 401e9f-401ea8 SetLastError 1372->1373 1374->1369 1375 401ebc-401ebd 1374->1375 1375->1373
                          APIs
                          • CreateDirectoryW.KERNELBASE(00403B10,00000000,-00000001,00403B10,?,00401A87,?,?,?,?,00401A87,?), ref: 00401E85
                          • GetLastError.KERNEL32(?,?,?,?,00401A87,?), ref: 00401E8F
                          • SetLastError.KERNEL32(000000B7,?,?,?,?,00401A87,?), ref: 00401E9F
                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A87,?), ref: 00401EAD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ErrorLast$AttributesCreateDirectoryFile
                          • String ID:
                          • API String ID: 635176117-0
                          • Opcode ID: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                          • Instruction ID: 386708675ad1f67ee821f8193335b86be887b361fe293b8400b21247fb87b693
                          • Opcode Fuzzy Hash: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                          • Instruction Fuzzy Hash: FAE01A3054A220BFEB511B24FC48B9F3B569F41725F148A36FC59E01F4D7388852968A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1376 414db4-414dfc _EH_prolog call 41333e 1379 414e04-414e07 1376->1379 1380 414dfe-414e01 1376->1380 1381 414e09-414e0e 1379->1381 1382 414e1d-414e42 1379->1382 1380->1379 1383 414e10-414e12 1381->1383 1384 414e16-414e18 1381->1384 1385 414e44-414e4a 1382->1385 1383->1384 1386 4152cf-4152e0 1384->1386 1387 414e50-414e54 1385->1387 1388 414f14-414f27 call 40122a 1385->1388 1389 414e56-414e59 1387->1389 1390 414e5c-414e6b 1387->1390 1396 414f29-414f39 call 414b12 1388->1396 1397 414f3e-414f63 call 414318 ??2@YAPAXI@Z 1388->1397 1389->1390 1392 414e90-414e95 1390->1392 1393 414e6d-414e83 call 414bcd call 414d8a call 412875 1390->1393 1394 414ea3-414edd call 414bcd call 414d8a call 412875 call 414ca4 1392->1394 1395 414e97-414ea1 1392->1395 1410 414e88-414e8e 1393->1410 1399 414ee0-414ef6 1394->1399 1395->1394 1395->1399 1396->1386 1413 414f65-414f6c call 4137a3 1397->1413 1414 414f6e-414f87 call 41333e call 4136d0 1397->1414 1404 414ef9-414f01 1399->1404 1409 414f03-414f12 call 414af0 1404->1409 1404->1410 1409->1404 1410->1385 1413->1414 1429 414f8a-414fad call 41369e 1414->1429 1433 414fe3-414fe6 1429->1433 1434 414faf-414fb4 1429->1434 1437 415012-415036 ??2@YAPAXI@Z 1433->1437 1438 414fe8-414fed 1433->1438 1435 414fb6-414fb8 1434->1435 1436 414fbc-414fd4 call 414c1d call 414b12 1434->1436 1435->1436 1457 414fd6-414fd8 1436->1457 1458 414fdc-414fde 1436->1458 1439 415041 1437->1439 1440 415038-41503f call 41534f 1437->1440 1442 414ff5-41500b call 414c1d call 414b12 1438->1442 1443 414fef-414ff1 1438->1443 1445 415043-41505a call 41333e 1439->1445 1440->1445 1442->1437 1443->1442 1455 415068-415084 call 415707 1445->1455 1456 41505c-415065 1445->1456 1461 415089-41508d 1455->1461 1456->1455 1457->1458 1458->1386 1462 4150d0-4150d3 1461->1462 1463 41508f-415094 1461->1463 1464 4150d9-415117 call 414cf0 call 414b9e 1462->1464 1465 41528a-41528f 1462->1465 1466 415096-415098 1463->1466 1467 41509c-4150a1 1463->1467 1480 415119-415127 1464->1480 1481 41512a-415164 call 414476 1464->1481 1468 415291-415292 1465->1468 1469 415297-4152bb 1465->1469 1466->1467 1471 4150a3-4150a5 1467->1471 1472 4150a9-4150c1 call 414c1d call 414b12 1467->1472 1468->1469 1469->1429 1471->1472 1483 4150c3-4150c5 1472->1483 1484 4150c9-4150cb 1472->1484 1480->1481 1486 4151b1-4151b7 1481->1486 1487 415166 1481->1487 1483->1484 1484->1386 1489 4151b9-4151bb 1486->1489 1490 4151ce-4151d0 1486->1490 1488 415169-41516b 1487->1488 1491 4151be-4151ca call 41569c 1488->1491 1489->1491 1492 4151d2-4151d5 1490->1492 1493 4151d7-4151e3 1490->1493 1496 41516d-41516f 1491->1496 1505 4151cc 1491->1505 1492->1496 1493->1488 1494 4151e5-4151ee 1493->1494 1497 4151f0-4151f2 1494->1497 1498 4151f6-4151f8 1494->1498 1499 415171-415172 1496->1499 1500 415177-415179 1496->1500 1497->1498 1498->1469 1502 4151fe-415204 1498->1502 1499->1500 1503 415181-415183 1500->1503 1504 41517b-41517d 1500->1504 1502->1465 1502->1469 1503->1472 1506 415189-41518f 1503->1506 1504->1503 1508 415198-41519a 1505->1508 1509 41519e-4151a0 1505->1509 1506->1472 1508->1509 1511 4151a2-4151a4 1509->1511 1512 4151a8-4151ac 1509->1512 1511->1512 1512->1469
                          APIs
                          • _EH_prolog.MSVCRT ref: 00414DBD
                          • ??2@YAPAXI@Z.MSVCRT ref: 00414F5B
                          • ??2@YAPAXI@Z.MSVCRT ref: 0041502E
                            • Part of subcall function 0041534F: ??2@YAPAXI@Z.MSVCRT ref: 00415377
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@$H_prolog
                          • String ID:
                          • API String ID: 3431946709-0
                          • Opcode ID: fab8fd1235ac050b1e0d8c5e45ec562f8d1428b153f9e8a335c811c2583ca095
                          • Instruction ID: 686c930a7ef178ea5ab12c5d19a3d7c251e78e8bbbc10600cae06936c8b42039
                          • Opcode Fuzzy Hash: fab8fd1235ac050b1e0d8c5e45ec562f8d1428b153f9e8a335c811c2583ca095
                          • Instruction Fuzzy Hash: 46F12571A00209DFCB14DF69C884AEA7BB4BF88354F14415AF8199B351DB79ED82CF98
                          APIs
                            • Part of subcall function 00402678: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,?,004026AE,00405D26,00000001), ref: 00402688
                            • Part of subcall function 00402678: GetProcAddress.KERNEL32(00000000), ref: 0040268F
                            • Part of subcall function 00402678: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,004026AE,00405D26,00000001), ref: 0040269D
                          • ??3@YAXPAX@Z.MSVCRT ref: 004041C6
                          • ??3@YAXPAX@Z.MSVCRT ref: 004041CE
                          • ??3@YAXPAX@Z.MSVCRT ref: 004041D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                          • String ID:
                          • API String ID: 1642057587-0
                          • Opcode ID: 2d54a5c0d0fe28d660c825eb0872e77c4edd5f4509406376405913d5d74d72da
                          • Instruction ID: 7656f2246ecc7c6cc45d06e63a8b72c114f9a889527ded6a08eb3d076b8c2c94
                          • Opcode Fuzzy Hash: 2d54a5c0d0fe28d660c825eb0872e77c4edd5f4509406376405913d5d74d72da
                          • Instruction Fuzzy Hash: 6851A1B2C00149AACF01EFD1CD859FEBB79AF48308F04403AF610B62D1D7799A4ACB59
                          APIs
                          • _EH_prolog.MSVCRT ref: 00415F10
                            • Part of subcall function 0041839F: _EH_prolog.MSVCRT ref: 004183A4
                          • ??3@YAXPAX@Z.MSVCRT ref: 00415FC0
                          • ??3@YAXPAX@Z.MSVCRT ref: 00415FFF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@H_prolog
                          • String ID:
                          • API String ID: 1329742358-0
                          • Opcode ID: fa7e8afba3ce79e0b7bb9301de01f44f0688fdaf3b18fd0d1ac67015356f1684
                          • Instruction ID: 80cfc670515df322d5a0f1bad9bb987e37fd57aaff311f52ca6ed10ca3b00574
                          • Opcode Fuzzy Hash: fa7e8afba3ce79e0b7bb9301de01f44f0688fdaf3b18fd0d1ac67015356f1684
                          • Instruction Fuzzy Hash: CE414F3160060ADFCB11EFA5C895AEEBB75BF84308F14446EF406A7251DF39AD86CB25
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@??3@memmove
                          • String ID:
                          • API String ID: 3828600508-0
                          • Opcode ID: 2d29a23e04a800e727a7b54e03b6005ba5ac139afd78bf77e0f410f3315a2635
                          • Instruction ID: 005381a641870b901654b433da9efa5678f8f783537c5aa95d48f4956821a829
                          • Opcode Fuzzy Hash: 2d29a23e04a800e727a7b54e03b6005ba5ac139afd78bf77e0f410f3315a2635
                          • Instruction Fuzzy Hash: 76F0B4B66006005BC2209B5ADD9485BB7E9EFC97007048C7FE91ED3741D334F85486AE
                          APIs
                          • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 00402A1E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: GlobalMemoryStatus
                          • String ID: @
                          • API String ID: 1890195054-2766056989
                          • Opcode ID: c05d361f5e9571ae993c344487b46086926bcd548e4e39e355e6093bfb7cf5c9
                          • Instruction ID: d00f740de1a2efe1a026dd095351ee785e14532435a1eeee82b2a6518a9fc22a
                          • Opcode Fuzzy Hash: c05d361f5e9571ae993c344487b46086926bcd548e4e39e355e6093bfb7cf5c9
                          • Instruction Fuzzy Hash: 09F0AFB0B102159ADF70BB719A8DA5B77A5BB01358F10853AE402F61D1DBB8E8428A0D
                          APIs
                            • Part of subcall function 00416245: _CxxThrowException.MSVCRT(?,0041C8E8), ref: 0041625F
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041822C
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418390
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$ExceptionThrow
                          • String ID:
                          • API String ID: 2803161813-0
                          • Opcode ID: e06b2bc66e7cb3a24e1f907cd781ac83590aca39cb2d73517e6e0f7c79883864
                          • Instruction ID: 8745e1a2ddce382febef8af04cd5cf2bd10ae178c23d82ec63c8fedf0f7eafba
                          • Opcode Fuzzy Hash: e06b2bc66e7cb3a24e1f907cd781ac83590aca39cb2d73517e6e0f7c79883864
                          • Instruction Fuzzy Hash: 44816B31A00609AFCF25DFA5C891AEEFBB2FF08314F14452EE515A3351DB39A981CB58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@H_prolog
                          • String ID:
                          • API String ID: 1329742358-0
                          • Opcode ID: 756c0b5c6aefcdd13121025024816d24f19935b4aaa740c09a036b61eb7d408f
                          • Instruction ID: ed65cc10277858091f9e8de967aaf07ed2053d25dc20cdc1fb010143ea0b88c4
                          • Opcode Fuzzy Hash: 756c0b5c6aefcdd13121025024816d24f19935b4aaa740c09a036b61eb7d408f
                          • Instruction Fuzzy Hash: 10411F32C04B04EBCB14DB64CA81AFE7B35EF94304B28402FE002A7661D67D9F81D75A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: 81d66f699be0dc610134f1bf801777b590ed4f03ba3fd1023f6ee985c335a7b8
                          • Instruction ID: 2a9acf97f50dc74bf2477fddec51c21d8134541a78e9df3ea2b8f2b8b6786771
                          • Opcode Fuzzy Hash: 81d66f699be0dc610134f1bf801777b590ed4f03ba3fd1023f6ee985c335a7b8
                          • Instruction Fuzzy Hash: D2F08C32210611ABC324DF6DC59186BB3E4FB88315720883FE2DAD72A1DA35A8918754
                          APIs
                          • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00412310
                          • GetLastError.KERNEL32(?,?,?,?), ref: 0041231E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                          • Instruction ID: f48f6f2b0c7156b6abd5f8c57d42b75e78fb70457e0008364ac47cd7433d5725
                          • Opcode Fuzzy Hash: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                          • Instruction Fuzzy Hash: ADF0B7B4900208EF8B05CFA4D9448EE7BB5EB49350B208559F815D7350D7759A60DB65
                          APIs
                          • SysAllocString.OLEAUT32(?), ref: 004125C0
                          • _CxxThrowException.MSVCRT(?,0041C60C), ref: 004125E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AllocExceptionStringThrow
                          • String ID:
                          • API String ID: 3773818493-0
                          • Opcode ID: fcf478e90851fad2b33c9ed1e6fe70bf29481af54092e07db13bd9d2e017d67e
                          • Instruction ID: 420ce26627c0f1c30ef0389914a86a82d93f5de10a8991056aa7ea3c12b3a24c
                          • Opcode Fuzzy Hash: fcf478e90851fad2b33c9ed1e6fe70bf29481af54092e07db13bd9d2e017d67e
                          • Instruction Fuzzy Hash: 9CE06D71640319AA8B20AF69D8859CABBE8EF04380700C03BFC08C6210E6B9D9A0C799
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: e9afefaed684a0424ac29e33d82847c05231d754d7aac0630840e5df30a11e45
                          • Instruction ID: 9b673ee5c2754c871367cb61c0ae667a688a38adf027cf99462c8c0d985af208
                          • Opcode Fuzzy Hash: e9afefaed684a0424ac29e33d82847c05231d754d7aac0630840e5df30a11e45
                          • Instruction Fuzzy Hash: 6BD0A7F290421016D214D60898017C777C44F1D308F044D7FF94882311E7789DD4C7EB
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 6816f4ef9cc482cf1556c997a0dc35d0b2a76dfe488b9d148fb69f72dc558e51
                          • Instruction ID: 36e50f78537d6c02f4a8dbf07160adfdb2fb87d7878207db056aa045a99574e7
                          • Opcode Fuzzy Hash: 6816f4ef9cc482cf1556c997a0dc35d0b2a76dfe488b9d148fb69f72dc558e51
                          • Instruction Fuzzy Hash: 05C08C3291966066C2366629A901ACBB7C45F5E37CF088DBFF854821818ABC5EC1469E
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: 7ad5aa225f16a4b1d32e578b7b055ba544fcc1ca5f17beba0ecf5d568f2aa9fd
                          • Instruction ID: c2a19d5cac2bfdbf8590582b02f57cd8c2d51b72891be0567ea10507677fb98f
                          • Opcode Fuzzy Hash: 7ad5aa225f16a4b1d32e578b7b055ba544fcc1ca5f17beba0ecf5d568f2aa9fd
                          • Instruction Fuzzy Hash: FC31E671901104AFDB20EFA5CC94CAFB7A8EF04344B59487BF441A72A1D7799E81CB6A
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 004134C2
                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 004134E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                          • Instruction ID: d77cb9c9d90e793e1b60eb555ee1e1bf0e0da7b09971d09e2dc09e9e88fc8504
                          • Opcode Fuzzy Hash: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                          • Instruction Fuzzy Hash: 4BF0B432200204BBCB218F95CC08ECABBB9EF49761F15441AFA05E7220C775E860DBA4
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 933b8c5d27097b182096917e0fe23b4488e15967b84e07a88ada714efe5052ef
                          • Instruction ID: 9c1677235a272b5cc34e2a01b884f4e1fb04de9bdd2a22e3254cedb6a922d716
                          • Opcode Fuzzy Hash: 933b8c5d27097b182096917e0fe23b4488e15967b84e07a88ada714efe5052ef
                          • Instruction Fuzzy Hash: B8F06D32600118BB9B11AF56C8418EEB769EF85364710802BFC18AB301D679EE8197A4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: f2c818ef7ab3a64ea75edc2a05806f8e576519a16bb26db7b3aaf62d7c6dceca
                          • Instruction ID: 3a2c23510bbdd7db8eaf6a44a7597d442e7cc213151da8d85dbaf3b81e373392
                          • Opcode Fuzzy Hash: f2c818ef7ab3a64ea75edc2a05806f8e576519a16bb26db7b3aaf62d7c6dceca
                          • Instruction Fuzzy Hash: E4012830800009AACF15FF92C9529DD7B75AF14308F50857AF511310F2AB7A5F59DA58
                          APIs
                          • SetFileAttributesW.KERNELBASE(?,?), ref: 004012EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 448c230cc87f735e1553f318a5b8c444bef40708b0e198b2b123a740f6d4fd43
                          • Instruction ID: 0d0a537d0a85425ebda4de84878e85ba803ab1d2a3bf622a698cf9a5ced90b33
                          • Opcode Fuzzy Hash: 448c230cc87f735e1553f318a5b8c444bef40708b0e198b2b123a740f6d4fd43
                          • Instruction Fuzzy Hash: 52F05E321006029FC7249F55D800BA773F5BB84310F04482EE146F25A0D738A891DF59
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 1c15ab358f7d83620e0d424f65252b0605aca23ab544cd1b18b3b7dbcbdff36d
                          • Instruction ID: 67237ec06fa6f5526f307c7f7ee3ee8d6cae950530cc7ea3400cefdb61a4f5cb
                          • Opcode Fuzzy Hash: 1c15ab358f7d83620e0d424f65252b0605aca23ab544cd1b18b3b7dbcbdff36d
                          • Instruction Fuzzy Hash: 26F082B11807416BC320EF54CD40A83B3D46F45304B048D3FF44587642D7B9E8C5CB99
                          APIs
                            • Part of subcall function 0041228A: FindCloseChangeNotification.KERNELBASE(?,?,00412366,00000000,?,004123AE,?,80000000,?,?,?,004123D0,?,?,00000003,00000080), ref: 00412295
                          • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,004123AE,?,80000000,?,?,?,004123D0), ref: 0041237D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ChangeCloseCreateFileFindNotification
                          • String ID:
                          • API String ID: 727422849-0
                          • Opcode ID: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                          • Instruction ID: 8da2f02dc034daf8371d1df42df6ca4a0fddfd90bd2d401d718584e6e71ac4a6
                          • Opcode Fuzzy Hash: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                          • Instruction Fuzzy Hash: 20E086360402197BCF115F649D01BDE3F95AF09360F144616FA24961F0C7B2C4B5AB95
                          APIs
                          • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00412AD7,00000001,0041EA30,0041EA30,0041A558,?,00405A90,?,?), ref: 004124BF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                          • Instruction ID: b3ad0e42530da5b4dda889df23b63d717a80709c99c60a777d5212d721e63b56
                          • Opcode Fuzzy Hash: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                          • Instruction Fuzzy Hash: CFE0C275640208FFDB00DF95D801BDE7BB9AB49354F10C069F9199A260D3799A60DF54
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: e23681dee6048d7e2731fb4a609dea36f69893ca3260d8bd4e07bac5b1dea7f9
                          • Instruction ID: 5290c6e4ceeb99f02aec6ae12202f97ed0a1f662b14c32a0839b7666316d4697
                          • Opcode Fuzzy Hash: e23681dee6048d7e2731fb4a609dea36f69893ca3260d8bd4e07bac5b1dea7f9
                          • Instruction Fuzzy Hash: 7DE08C72A00108FBCB159F86DC01BEEBB38FB40364F00842FF81191110C779AA50DA68
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: _beginthreadex
                          • String ID:
                          • API String ID: 3014514943-0
                          • Opcode ID: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                          • Instruction ID: b1b1560d688da48002e302f1989f769420d3cb2b74016668af2939eee5b61ada
                          • Opcode Fuzzy Hash: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                          • Instruction Fuzzy Hash: F0D017F6800208BFCF01DFA0CC05CBA3BADEB08204B008469BD05C2210E632DA108BA1
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 004123F7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                          • Instruction ID: 9ccc3df45c5337931c1f9920f453614b41e8bb9900b5d069a402b44b4c854426
                          • Opcode Fuzzy Hash: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                          • Instruction Fuzzy Hash: 99E0EC75201208FFDB01CF90CC01FDE7BBDFB49754F208058E90496160C7759A24EB55
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?,?,00412366,00000000,?,004123AE,?,80000000,?,?,?,004123D0,?,?,00000003,00000080), ref: 00412295
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                          • Instruction ID: b31490782a570351f923d450f5d4ba6ab7a609589b13ee7b544e96044028fae9
                          • Opcode Fuzzy Hash: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                          • Instruction Fuzzy Hash: 1CD012316041615A8E741E3CB9459D637D85A46370321079BF0B9C3AE1D3B58CD35694
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 5de78ebd4f5f29dc8fbb5bb8a3e0a977ead23378360e583b65f93d91bbe299d9
                          • Instruction ID: 89e791b4cdb467548dc89fe6e418eb841be097dbc90599bb9e0328941d4b988a
                          • Opcode Fuzzy Hash: 5de78ebd4f5f29dc8fbb5bb8a3e0a977ead23378360e583b65f93d91bbe299d9
                          • Instruction Fuzzy Hash: 1FD02231900A2197C120FB2DD84048B73805F51338B008F3EF065632D0D638BE8186DE
                          APIs
                          • SetFileTime.KERNELBASE(?,?,?,?,00412499,00000000,00000000,?,004012DC,?), ref: 0041247D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FileTime
                          • String ID:
                          • API String ID: 1425588814-0
                          • Opcode ID: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                          • Instruction ID: f7402770b179a49de0ab9fe0b192ea54849ac29a58fff8f6d7b1295910a8291e
                          • Opcode Fuzzy Hash: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                          • Instruction Fuzzy Hash: 31C04C36159105FF8F020F70CC04C1ABFA2AB99311F10CA18B155C4074C7328034EB12
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: memmove
                          • String ID:
                          • API String ID: 2162964266-0
                          • Opcode ID: 09e9218cbcf6ec2e1d3ec58b92c603910d18c049cb9797cd433dd5721a44e625
                          • Instruction ID: c5f2408c3cf5f7c02ccda8fc3474b5540caab3f10de51e5c5504a290d30f7bf8
                          • Opcode Fuzzy Hash: 09e9218cbcf6ec2e1d3ec58b92c603910d18c049cb9797cd433dd5721a44e625
                          • Instruction Fuzzy Hash: 5221B771A00B00AFC724CF99C98489BF7F9FF88725764896ED09A93A00D774F945CB54
                          APIs
                          • _CxxThrowException.MSVCRT(?,0041C694), ref: 004133F1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID:
                          • API String ID: 432778473-0
                          • Opcode ID: 077327ad973cbf0bf968648ad16f4ee5207855660b82e04fedf8791f854ae119
                          • Instruction ID: 96fb0cf52aecf5192a38f014b97361b1bca792eaa3b626b98573c6095701f3dd
                          • Opcode Fuzzy Hash: 077327ad973cbf0bf968648ad16f4ee5207855660b82e04fedf8791f854ae119
                          • Instruction Fuzzy Hash: A701B171500705AFCB28CF79C80599BBBF8EF45310700496EA882C3611D774FA85CB50
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00413394,?,?,?,0040C02F,?), ref: 00402A80
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                          • Instruction ID: 5caba0a65663c98afa134883a55f00c862568e26fdb3439aab27b9329ceed79e
                          • Opcode Fuzzy Hash: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                          • Instruction Fuzzy Hash: EEC08C303483007AEE6217619E0BF4A3652AB84B16F40C069F348A80E0CBF48810BA0E
                          APIs
                          • VirtualFree.KERNELBASE(?,00000000,00008000,00413323,00000000,?,0041338B,?,?,0040C02F,?), ref: 00402015
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                          • Instruction ID: 9ed37f882ad336993377ad69d37c294f0e387d69dd66a5117829caba82127f93
                          • Opcode Fuzzy Hash: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                          • Instruction Fuzzy Hash: 96B09230285300BAEF224B00DE0DB4A76A0AB80B05F24C828B288340E187B85818EA0E
                          APIs
                          • GetLastError.KERNEL32(00000000,?,?), ref: 004024DF
                          • wsprintfW.USER32 ref: 004024F0
                          • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402505
                          • GetLastError.KERNEL32 ref: 0040250A
                          • ??2@YAPAXI@Z.MSVCRT ref: 00402525
                          • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402538
                          • GetLastError.KERNEL32 ref: 0040253F
                          • lstrcmpiW.KERNEL32(00ADC6C8,?), ref: 00402554
                          • ??3@YAXPAX@Z.MSVCRT ref: 00402564
                          • ??3@YAXPAX@Z.MSVCRT ref: 00402582
                          • SetLastError.KERNEL32(00000003), ref: 0040258B
                          • lstrlenA.KERNEL32(0041B330), ref: 004025BF
                          • ??2@YAPAXI@Z.MSVCRT ref: 004025DA
                          • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 0040260C
                          • _wtol.MSVCRT(?), ref: 0040261D
                          • MultiByteToWideChar.KERNEL32(00000000,0041B330,00000001,00ADC6C8,00000002), ref: 0040263D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                          • String ID: SfxString%d
                          • API String ID: 2117570002-944934635
                          • Opcode ID: 112b8933a593586a47d24d1e8032f038cdb721ad5abb193907f9b4e79a180b84
                          • Instruction ID: b38029d2e4fd4b9097bbc1654eb9199a4bd5f96dc74ee56e617e2b3e5d7b8fd3
                          • Opcode Fuzzy Hash: 112b8933a593586a47d24d1e8032f038cdb721ad5abb193907f9b4e79a180b84
                          • Instruction Fuzzy Hash: 3651B379900215FFCB10DF65DD89EDABBA9FB08300F10443AE946E62D0D7B8A9518B1E
                          APIs
                            • Part of subcall function 00407925: GetDlgItem.USER32(?,?), ref: 00407932
                            • Part of subcall function 00407925: ShowWindow.USER32(00000000,?), ref: 00407949
                          • GetDlgItem.USER32(?,000004B8), ref: 004092D6
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004092E5
                          • GetDlgItem.USER32(?,000004B5), ref: 0040932C
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00409331
                          • GetDlgItem.USER32(?,000004B5), ref: 00409341
                          • SetWindowLongW.USER32(00000000), ref: 00409344
                          • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 0040936A
                          • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 0040937C
                          • GetDlgItem.USER32(?,000004B4), ref: 00409386
                          • SetFocus.USER32(00000000), ref: 00409389
                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004093B8
                          • CoCreateInstance.OLE32(0041C454,00000000,00000001,0041BD5C,?), ref: 004093DC
                          • GetDlgItem.USER32(?,00000002), ref: 004093F9
                          • IsWindow.USER32(00000000), ref: 004093FC
                          • GetDlgItem.USER32(?,00000002), ref: 0040940C
                          • EnableWindow.USER32(00000000), ref: 0040940F
                          • GetDlgItem.USER32(?,000004B5), ref: 00409423
                          • ShowWindow.USER32(00000000), ref: 00409426
                            • Part of subcall function 00408186: GetDlgItem.USER32(?,000004B6), ref: 00408194
                            • Part of subcall function 00408E5E: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409228), ref: 00408E87
                            • Part of subcall function 00408E5E: LoadIconW.USER32(00000000), ref: 00408E8A
                            • Part of subcall function 00408E5E: GetSystemMetrics.USER32(00000032), ref: 00408E9E
                            • Part of subcall function 00408E5E: GetSystemMetrics.USER32(00000031), ref: 00408EA3
                            • Part of subcall function 00408E5E: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409228), ref: 00408EAC
                            • Part of subcall function 00408E5E: LoadImageW.USER32(00000000), ref: 00408EAF
                            • Part of subcall function 00408E5E: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408ECF
                            • Part of subcall function 00408E5E: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408ED8
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B2), ref: 00408EF4
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B2), ref: 00408EFE
                            • Part of subcall function 00408E5E: GetWindowLongW.USER32(?,000000F0), ref: 00408F0A
                            • Part of subcall function 00408E5E: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F19
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B5), ref: 00408F27
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B5), ref: 00408F35
                            • Part of subcall function 00408E5E: GetWindowLongW.USER32(?,000000F0), ref: 00408F41
                            • Part of subcall function 00408E5E: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                          • String ID:
                          • API String ID: 1057135554-0
                          • Opcode ID: e49754246b07947f9327a3e505a0dc2af3972f83f5c4b04be4888168014b4bf2
                          • Instruction ID: 1f75f4d576376dd6869b7793cc4008a80ff502f108e2297fe30e58830d0475fc
                          • Opcode Fuzzy Hash: e49754246b07947f9327a3e505a0dc2af3972f83f5c4b04be4888168014b4bf2
                          • Instruction Fuzzy Hash: 114186B0605708AFDA206F26DD49F5B7BADEF84B04F00843DF955A62E1CB79A850CB1D
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004020DD
                          • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020FA
                          • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 0040210E
                          • SizeofResource.KERNEL32(00000000,00000000), ref: 0040211F
                          • LoadResource.KERNEL32(00000000,00000000), ref: 00402129
                          • LockResource.KERNEL32(00000000), ref: 00402134
                          • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00402160
                          • GetProcAddress.KERNEL32(00000000), ref: 00402169
                          • wsprintfW.USER32 ref: 00402188
                          • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 0040219D
                          • GetProcAddress.KERNEL32(00000000), ref: 004021A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                          • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                          • API String ID: 2639302590-365843014
                          • Opcode ID: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                          • Instruction ID: 1ae794569512dbc5e404ee13fbffb6c659747c84c2a5761ed66dfa610d18b3e0
                          • Opcode Fuzzy Hash: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                          • Instruction Fuzzy Hash: 2021B0B5941308BBDB119BA58C08FAB3ABCEB44710F148422FA04F72D1D6B8CD10CBA9
                          APIs
                          • wvsprintfW.USER32(?,00000000,?), ref: 00409612
                          • GetLastError.KERNEL32 ref: 00409623
                          • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 0040964B
                          • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,00000000,00000000,0000000F), ref: 00409660
                          • lstrlenW.KERNEL32(?), ref: 00409673
                          • lstrlenW.KERNEL32(00000000), ref: 0040967A
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040968F
                          • lstrcpyW.KERNEL32(00000000,?), ref: 004096A5
                          • lstrcpyW.KERNEL32(-00000002,00000000), ref: 004096B6
                          • ??3@YAXPAX@Z.MSVCRT ref: 004096BF
                          • LocalFree.KERNEL32(00000000), ref: 004096C9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                          • String ID: setup.exe
                          • API String ID: 829399097-3657005579
                          • Opcode ID: 5750c877aa78be372f2aceb619f0782c8b01b09b2bad645ab1ffa00b07643c80
                          • Instruction ID: 12e22466ea7d6f2cf89fb4c3cc46047a539dfe2ce14655017aee965f16fa7126
                          • Opcode Fuzzy Hash: 5750c877aa78be372f2aceb619f0782c8b01b09b2bad645ab1ffa00b07643c80
                          • Instruction Fuzzy Hash: DD21937680020CFFDB159FA1DC85DEB7BACEB08354B10847BF905A6191EA349E848BA4
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,0041A688,?,?,?,00000000), ref: 00403240
                          • lstrcmpW.KERNEL32(?,0041A684,?,0000005C,?,?,?,00000000), ref: 00403293
                          • lstrcmpW.KERNEL32(?,0041A67C,?,?,00000000), ref: 004032A9
                          • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 004032BF
                          • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 004032C6
                          • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 004032D8
                          • FindClose.KERNEL32(00000000,?,?,00000000), ref: 004032E7
                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 004032F2
                          • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 004032FB
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403306
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403311
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                          • String ID:
                          • API String ID: 1862581289-0
                          • Opcode ID: 521c214363005649f0aa4fc9851e41a9a7fff0a70674e1ff8893655f89226a6c
                          • Instruction ID: 205cec036fafae4d6b5c4eb3cdad048787afdd456ba1b9ea9c608b8e0a7b29f3
                          • Opcode Fuzzy Hash: 521c214363005649f0aa4fc9851e41a9a7fff0a70674e1ff8893655f89226a6c
                          • Instruction Fuzzy Hash: B62186306012197ADB10AF61DD89FEF3B7CAF44745F1444BAF401B10D1EB38AB558A6D
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00408DC2
                          • SetWindowsHookExW.USER32(00000007,Function_00008CE9,00000000,00000000), ref: 00408DCD
                          • GetCurrentThreadId.KERNEL32 ref: 00408DDC
                          • SetWindowsHookExW.USER32(00000002,Function_00008D75,00000000,00000000), ref: 00408DE7
                          • EndDialog.USER32(?,00000000), ref: 00408E0D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: CurrentHookThreadWindows$Dialog
                          • String ID:
                          • API String ID: 1967849563-0
                          • Opcode ID: 22cad4405ffc611baa51b5bbdaae86c111a6b8b6ccf94b2873c5b2e9bd901595
                          • Instruction ID: 49f4609565cbbe2eab54e5c52cde7036a9aea870f9903f9aac46f6f4f475420f
                          • Opcode Fuzzy Hash: 22cad4405ffc611baa51b5bbdaae86c111a6b8b6ccf94b2873c5b2e9bd901595
                          • Instruction Fuzzy Hash: 3C012672201218EFD6106B57ED04AB2F7ECFF54352B01803FE605D29A1CBB758008B6E
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,004066C8,?,?,?,?,004066C8), ref: 00402790
                          • CheckTokenMembership.ADVAPI32(00000000,004066C8,?,?,?,?,004066C8,?,00000000,?,?), ref: 004027A2
                          • FreeSid.ADVAPI32(004066C8,?,?,?,004066C8,?,00000000,?,?), ref: 004027AB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                          • Instruction ID: be3f0cd0d0f8866a1a9b6021142c7c8ef3248d09ca8b520e62c9ce18037cc408
                          • Opcode Fuzzy Hash: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                          • Instruction Fuzzy Hash: 1FF04F7294528CFFDB01DFE88D85ADEBF7CAB18200F4480EAE101B3182D2705718CB2A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e7ce5bbf85c27cd3a16bfd62f914cbf9f601b523d066491095a794ae8ca6ce8a
                          • Instruction ID: 7a199f50f8a76bda01e3d9699587820df5a766742c6411fdac8cb10a31be0a81
                          • Opcode Fuzzy Hash: e7ce5bbf85c27cd3a16bfd62f914cbf9f601b523d066491095a794ae8ca6ce8a
                          • Instruction Fuzzy Hash: A061A671A14B019BC728DF79C4916EBB7E0BF40308F44092FE4CA5BA81D739B559CB95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                          • Instruction ID: 8cec78a6a68e099a16e582f3a8e71d5628037794c160d545261e982a803351c6
                          • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                          • Instruction Fuzzy Hash: 02022E72A042118BD71CCE28C59027DBBE2FBC4344F150A3FE89667BD4D6789958CB9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3dfa02b277370bfe2ec98d47c5a79ead9a97245a421863a61a189d28b752ac7c
                          • Instruction ID: 78eba2b73e7315ed747d2463b99e0f0da727e6e3e71e6de6a30a0cc06e3ef934
                          • Opcode Fuzzy Hash: 3dfa02b277370bfe2ec98d47c5a79ead9a97245a421863a61a189d28b752ac7c
                          • Instruction Fuzzy Hash: EAD173368882628FE308CF1ADC44566B7A2BFC9350F4E8A79DD9527652C334B913CB95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 91de5e9ca90c5c66c09e0000d0865218a8ccaff647e0888f7f8b7f535350ac81
                          • Instruction ID: b01226d48ec95055162be86c292afb05ea0fa44dcd13ef36d70e14c0bb6191cc
                          • Opcode Fuzzy Hash: 91de5e9ca90c5c66c09e0000d0865218a8ccaff647e0888f7f8b7f535350ac81
                          • Instruction Fuzzy Hash: F8D1A43A9082A28FE758CF19D850126B7E2AFC9350F8E467DD98427653C334F912DB99
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c7bfdb3e15d592c1de232d933842c4ab9efd31f480a5751ca1ce541d06df7cb1
                          • Instruction ID: 5fd417c7d952572407c6f6c7888f1ca0bc84f4baebbdb2067ae0ca3ec0b4583c
                          • Opcode Fuzzy Hash: c7bfdb3e15d592c1de232d933842c4ab9efd31f480a5751ca1ce541d06df7cb1
                          • Instruction Fuzzy Hash: 7D71026600DBD08FC3228B3D9C91665BFE1AEA3105B4D8ACDC0E64BB93D426E10CDB75
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ae9e4649785a9a7ed9bea9f6086f005d98fb5c2918bdb11e6aa39f0e60002f7f
                          • Instruction ID: 926f2a0b08006a4986c2385453d256f4e4db2d14bf8f3d597d75ad2e2c7ef35c
                          • Opcode Fuzzy Hash: ae9e4649785a9a7ed9bea9f6086f005d98fb5c2918bdb11e6aa39f0e60002f7f
                          • Instruction Fuzzy Hash: 08615C725087118FC318DF49D48494AF3E1FFC8318F1A8A6DE9885B361D771E959CB86
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0ba670fa79e56ea5da9b08d97b7026661e275447204a1dd6cba2d29967c51129
                          • Instruction ID: 6873055d3e848c5c3cb633622bbdea2459b20436e901cb037d067e349efc7e13
                          • Opcode Fuzzy Hash: 0ba670fa79e56ea5da9b08d97b7026661e275447204a1dd6cba2d29967c51129
                          • Instruction Fuzzy Hash: AF41E131B506250AF30C8FA99CD41962FC3D7CA3D2788C63DCA65C6299DABDC057D26C
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 99baf1275c6f2b3443f1753a8f1347bf9585a8147b3ee6e0b1e3a1cf49954d11
                          • Instruction ID: 52a36a15b96d8c3db12f4224e86d09f16eb1e762efc431baf9d28f8b44aef370
                          • Opcode Fuzzy Hash: 99baf1275c6f2b3443f1753a8f1347bf9585a8147b3ee6e0b1e3a1cf49954d11
                          • Instruction Fuzzy Hash: 0F41F131B506250AF31C8FA99CD42962BD3E7C93D2B88C23DCA65C6289DABDC057D258
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                          • Instruction ID: fc6911014a5769c04090d27d7ffa82f8d56c726274b281e5acdfb0369f8c68fc
                          • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                          • Instruction Fuzzy Hash: B6419461C14F9652EB134F7CC842272B320BFAB244F00D75AFDD179963FB326984A655
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d6961a6851b0df35e6703018b4a68322b5050cf4149273f733f52e21d87ed88d
                          • Instruction ID: 8a2b0b24014c5991b986b901f2d8342aca775a45101bb951e5ded948b9e7196c
                          • Opcode Fuzzy Hash: d6961a6851b0df35e6703018b4a68322b5050cf4149273f733f52e21d87ed88d
                          • Instruction Fuzzy Hash: DE312C75F082620BF3118F1F8880165FBD29FD5210B8981BADC98DB787D23ADD5287E4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b24d27d690fea3d6a361d608d489979a53087c277769aa55b9e439747c50c34
                          • Instruction ID: 6fb0da5beb68f4ae9d0fb46ff12b95f1bd5c2126e2b05c5ba8ba89b872001878
                          • Opcode Fuzzy Hash: 0b24d27d690fea3d6a361d608d489979a53087c277769aa55b9e439747c50c34
                          • Instruction Fuzzy Hash: 14212E3B370D4607EB0C8979AD377BE24C2E344306F88953DE247C9785EEAE9895860D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                          • Instruction ID: c49fcab296ca2bf8af27a36cb23aed312f04d0f4f633dbe1329b5bd87955ea3a
                          • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                          • Instruction Fuzzy Hash: BC21C53290462587CB02CE6EE4945A7F392FBD436AF174727ED8467290C639AC54C6A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                          • Instruction ID: f99b16dda6d38cb87e4d8a5a1f23eddda7a055a6a92cbe0f293ea0f4b8d4b774
                          • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                          • Instruction Fuzzy Hash: FB21077252442587C701DF1DE8986B7B3E1FFC4319F678A2BD9928B1C1C628DC85D6A4
                          APIs
                          • GetCommandLineW.KERNEL32(?,00000000,?), ref: 004054B3
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405576
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040557E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405586
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040558E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405596
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040559E
                          • ??3@YAXPAX@Z.MSVCRT ref: 004055A6
                          • ??3@YAXPAX@Z.MSVCRT ref: 004055AE
                          • ??3@YAXPAX@Z.MSVCRT ref: 004055B6
                          • ??3@YAXPAX@Z.MSVCRT ref: 004055BE
                          • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004055D7
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004055FE
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 00405608
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405613
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040561B
                          • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00405630
                          • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 00405647
                          • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00405657
                          • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00405678
                          • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405681
                          • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A0
                          • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A9
                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 004056B0
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056BF
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 004056C8
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 004056D3
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004056DF
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056E6
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                          • String ID: " -$sfxwaitall
                          • API String ID: 2734624574-3991362806
                          • Opcode ID: 7534138555af6d7da0c06f5bf533e0ea3e48f844fa8dd0bc78d8b3727306353b
                          • Instruction ID: 8b36649a7f5b94844dc410b38ac8e125e7099180b2db9c241bbbf3df1b55dd4b
                          • Opcode Fuzzy Hash: 7534138555af6d7da0c06f5bf533e0ea3e48f844fa8dd0bc78d8b3727306353b
                          • Instruction Fuzzy Hash: AB6160B2800108BBDF11EFA1DC45EDF3B6CFF58314F044536FA15A21A1DA3A9A549FA9
                          APIs
                          • _wtol.MSVCRT(\@,00000000,0041E9F4), ref: 00403C27
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,0041EA00,00000000,0041E9F4), ref: 00403CCA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D3B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D43
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D4B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D53
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D5B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D63
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403D6B
                          • _wtol.MSVCRT(?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,?), ref: 00403DC1
                          • CoCreateInstance.OLE32(0041C444,00000000,00000001,0041C404,\@,.lnk,?,0000005C), ref: 00403E62
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403EFA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F02
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F0A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F12
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F1A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F22
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F2A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F30
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403F38
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                          • String ID: \@$.lnk
                          • API String ID: 408529070-2235551897
                          • Opcode ID: d9a6bea30dddc72238565fe839226f4d34a1f6ac7e97ef8c390e739a8a88dd89
                          • Instruction ID: c4e1fde8d964a46e0093ffadff84aaac9e103622305f5a74ab09339710324432
                          • Opcode Fuzzy Hash: d9a6bea30dddc72238565fe839226f4d34a1f6ac7e97ef8c390e739a8a88dd89
                          • Instruction Fuzzy Hash: 8CA14D71C10209ABDF14EFA5CC959EEBB79FF5830AF50442AF401B61A1DB399E42CB18
                          APIs
                          • _wtol.MSVCRT(00000000), ref: 004050F0
                          • _wtol.MSVCRT(00000000), ref: 0040510C
                          • lstrcmpiW.KERNEL32(00000000,0041B81C,?,?,?,?,?,?,?,?,?,?,?,?,?,004062EB), ref: 00404FF3
                            • Part of subcall function 00402490: GetLastError.KERNEL32(00000000,?,?), ref: 004024DF
                            • Part of subcall function 00402490: wsprintfW.USER32 ref: 004024F0
                            • Part of subcall function 00402490: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402505
                            • Part of subcall function 00402490: GetLastError.KERNEL32 ref: 0040250A
                            • Part of subcall function 00402490: ??2@YAPAXI@Z.MSVCRT ref: 00402525
                            • Part of subcall function 00402490: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402538
                            • Part of subcall function 00402490: GetLastError.KERNEL32 ref: 0040253F
                            • Part of subcall function 00402490: lstrcmpiW.KERNEL32(00ADC6C8,?), ref: 00402554
                            • Part of subcall function 00402490: ??3@YAXPAX@Z.MSVCRT ref: 00402564
                            • Part of subcall function 00402490: SetLastError.KERNEL32(00000003), ref: 0040258B
                            • Part of subcall function 00402490: lstrlenA.KERNEL32(0041B330), ref: 004025BF
                            • Part of subcall function 00402490: ??2@YAPAXI@Z.MSVCRT ref: 004025DA
                            • Part of subcall function 00402490: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 0040260C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                          • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$PasswordText$PasswordTitle$Progress$Title$WarningTitle
                          • API String ID: 2725485552-2157245290
                          • Opcode ID: a9c6cff8117c3c550b4708d415d49011fe0d469eb6c0d786097ad36de742edcb
                          • Instruction ID: 52c7338879562ac0f6f4460f1eb4efb93b6b1db4ff06df03ebd91a0864d1fcfd
                          • Opcode Fuzzy Hash: a9c6cff8117c3c550b4708d415d49011fe0d469eb6c0d786097ad36de742edcb
                          • Instruction Fuzzy Hash: BB51C9F5E016007ADA11AB275D4ADEF366CDB85708F24443BF904F62C2E77C4E805AAE
                          APIs
                          • GetDriveTypeW.KERNEL32(?,?,?), ref: 0040579F
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 004057D0
                          • WriteFile.KERNEL32(0041EA30,?,?,00407453,00000000,del ",:Repeat,00000000), ref: 00405885
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405890
                          • CloseHandle.KERNEL32(0041EA30), ref: 00405899
                          • SetFileAttributesW.KERNEL32(00407453,00000000), ref: 004058B0
                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 004058C2
                          • ??3@YAXPAX@Z.MSVCRT ref: 004058CB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004058D7
                          • ??3@YAXPAX@Z.MSVCRT ref: 004058DD
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040590B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                          • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                          • API String ID: 3007203151-3467708659
                          • Opcode ID: 359f3aabc4f9e8e11f607baf3d53a5a18da6526f5fcab5e0f91bfd03befc198a
                          • Instruction ID: 454e938891a81a3ce6e75c33e440a46dac244c8e97479dacccdbce2c62b697e3
                          • Opcode Fuzzy Hash: 359f3aabc4f9e8e11f607baf3d53a5a18da6526f5fcab5e0f91bfd03befc198a
                          • Instruction Fuzzy Hash: F7413772C00108AADF11AB91DD869EF7B78EF08318F10843AF511761E1EB795E86CB99
                          APIs
                          • GetClassNameA.USER32(?,?,00000040), ref: 0040346B
                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 0040347E
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040348B
                            • Part of subcall function 00403415: GetWindowTextLengthW.USER32(?), ref: 00403426
                            • Part of subcall function 00403415: GetWindowTextW.USER32(0040349F,00000000,00000001), ref: 00403443
                          • ??3@YAXPAX@Z.MSVCRT ref: 004034B8
                          • GetParent.USER32(?), ref: 004034C6
                          • LoadLibraryA.KERNEL32(riched20), ref: 004034DA
                          • GetMenu.USER32(?), ref: 004034ED
                          • SetThreadLocale.KERNEL32(00000419), ref: 004034FA
                          • CreateWindowExW.USER32(00000000,RichEdit20W,0041A584,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 0040352A
                          • DestroyWindow.USER32(?), ref: 0040353B
                          • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00403550
                          • GetSysColor.USER32(0000000F), ref: 00403554
                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00403562
                          • SendMessageW.USER32(00000000,00000461,?,?), ref: 0040358D
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403592
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040359A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                          • String ID: RichEdit20W$STATIC$riched20${\rtf
                          • API String ID: 3514532227-2281146334
                          • Opcode ID: 7a3c48a2f791b8e6eb50c97ca310f5915cf6b49072542dbb20b47e5b871b4bb5
                          • Instruction ID: b3a85dc6914aeaa8d740e49fddd05501c59d58f3c974b6d8e2233c6538772d35
                          • Opcode Fuzzy Hash: 7a3c48a2f791b8e6eb50c97ca310f5915cf6b49072542dbb20b47e5b871b4bb5
                          • Instruction Fuzzy Hash: EB31B371901108BFDB02AFA5DC49DEF7BBCAF08705F108076F604F2190D6398E508B6A
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409228), ref: 00408E87
                          • LoadIconW.USER32(00000000), ref: 00408E8A
                          • GetSystemMetrics.USER32(00000032), ref: 00408E9E
                          • GetSystemMetrics.USER32(00000031), ref: 00408EA3
                          • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409228), ref: 00408EAC
                          • LoadImageW.USER32(00000000), ref: 00408EAF
                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 00408ECF
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408ED8
                          • GetDlgItem.USER32(?,000004B2), ref: 00408EF4
                          • GetDlgItem.USER32(?,000004B2), ref: 00408EFE
                          • GetWindowLongW.USER32(?,000000F0), ref: 00408F0A
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F19
                          • GetDlgItem.USER32(?,000004B5), ref: 00408F27
                          • GetDlgItem.USER32(?,000004B5), ref: 00408F35
                          • GetWindowLongW.USER32(?,000000F0), ref: 00408F41
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F50
                          • GetWindow.USER32(?,00000005), ref: 00409036
                          • GetWindow.USER32(?,00000005), ref: 00409052
                          • GetWindow.USER32(?,00000005), ref: 0040906A
                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00409228), ref: 004090CA
                          • LoadIconW.USER32(00000000), ref: 004090D1
                          • GetDlgItem.USER32(?,000004B1), ref: 004090F0
                          • SendMessageW.USER32(00000000), ref: 004090F3
                            • Part of subcall function 00408258: GetDlgItem.USER32(?,?), ref: 00408262
                            • Part of subcall function 00408258: GetWindowTextLengthW.USER32(00000000), ref: 00408269
                            • Part of subcall function 00407925: GetDlgItem.USER32(?,?), ref: 00407932
                            • Part of subcall function 00407925: ShowWindow.USER32(00000000,?), ref: 00407949
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                          • String ID:
                          • API String ID: 3694754696-0
                          • Opcode ID: ac7ec00e336c9794e50417161d8aedd7d6cb4612ce90e1a6ec5d593e8ae60ef1
                          • Instruction ID: d692341db9c411847407f156b048f82b81d978b801c66f1920d912fc514de515
                          • Opcode Fuzzy Hash: ac7ec00e336c9794e50417161d8aedd7d6cb4612ce90e1a6ec5d593e8ae60ef1
                          • Instruction Fuzzy Hash: BD71D5703447057BEA256B21DD4AF2B3699EB84704F10443EF652BA2D3CFBDAC018A5E
                          APIs
                          • GetWindowDC.USER32(00000000), ref: 004021C7
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 004021D3
                          • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021EC
                          • GetObjectW.GDI32(?,00000018,?), ref: 0040221B
                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00402226
                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00402230
                          • CreateCompatibleDC.GDI32(?), ref: 0040223E
                          • CreateCompatibleDC.GDI32(?), ref: 00402245
                          • SelectObject.GDI32(00000000,?), ref: 00402253
                          • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00402261
                          • SelectObject.GDI32(00000000,00000000), ref: 00402269
                          • SetStretchBltMode.GDI32(00000000,00000004), ref: 00402271
                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00402290
                          • GetCurrentObject.GDI32(00000000,00000007), ref: 00402299
                          • SelectObject.GDI32(00000000,?), ref: 004022A6
                          • SelectObject.GDI32(00000000,?), ref: 004022AC
                          • DeleteDC.GDI32(00000000), ref: 004022B5
                          • DeleteDC.GDI32(00000000), ref: 004022B8
                          • ReleaseDC.USER32(00000000,?), ref: 004022BF
                          • ReleaseDC.USER32(00000000,?), ref: 004022CE
                          • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 004022DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                          • String ID:
                          • API String ID: 3462224810-0
                          • Opcode ID: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                          • Instruction ID: 438214f58f5379330b0b6d021732d2c30900d875c45a8f4f2e76e20f04445e0f
                          • Opcode Fuzzy Hash: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                          • Instruction Fuzzy Hash: 4E314876D40208BFDF115FE19D48EEF7F79EB48760F108066FA04B61A0C6794A60EB66
                          APIs
                          • GetClassNameA.USER32(?,?,00000040), ref: 004022F8
                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 0040230F
                          • GetWindowLongW.USER32(?,000000F0), ref: 00402322
                          • GetMenu.USER32(?), ref: 00402337
                            • Part of subcall function 004020D2: GetModuleHandleW.KERNEL32(00000000), ref: 004020DD
                            • Part of subcall function 004020D2: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020FA
                            • Part of subcall function 004020D2: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 0040210E
                            • Part of subcall function 004020D2: SizeofResource.KERNEL32(00000000,00000000), ref: 0040211F
                            • Part of subcall function 004020D2: LoadResource.KERNEL32(00000000,00000000), ref: 00402129
                            • Part of subcall function 004020D2: LockResource.KERNEL32(00000000), ref: 00402134
                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402369
                          • memcpy.MSVCRT ref: 00402376
                          • CoInitialize.OLE32(00000000), ref: 0040237F
                          • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 0040238B
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0041C424,?), ref: 004023B0
                          • GlobalFree.KERNEL32(00000000), ref: 004023C0
                            • Part of subcall function 004021BB: GetWindowDC.USER32(00000000), ref: 004021C7
                            • Part of subcall function 004021BB: GetDeviceCaps.GDI32(00000000,00000058), ref: 004021D3
                            • Part of subcall function 004021BB: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021EC
                            • Part of subcall function 004021BB: GetObjectW.GDI32(?,00000018,?), ref: 0040221B
                            • Part of subcall function 004021BB: MulDiv.KERNEL32(?,00000003,00000002), ref: 00402226
                            • Part of subcall function 004021BB: MulDiv.KERNEL32(?,00000003,00000002), ref: 00402230
                            • Part of subcall function 004021BB: CreateCompatibleDC.GDI32(?), ref: 0040223E
                            • Part of subcall function 004021BB: CreateCompatibleDC.GDI32(?), ref: 00402245
                            • Part of subcall function 004021BB: SelectObject.GDI32(00000000,?), ref: 00402253
                            • Part of subcall function 004021BB: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00402261
                            • Part of subcall function 004021BB: SelectObject.GDI32(00000000,00000000), ref: 00402269
                            • Part of subcall function 004021BB: SetStretchBltMode.GDI32(00000000,00000004), ref: 00402271
                            • Part of subcall function 004021BB: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00402290
                            • Part of subcall function 004021BB: GetCurrentObject.GDI32(00000000,00000007), ref: 00402299
                            • Part of subcall function 004021BB: SelectObject.GDI32(00000000,?), ref: 004022A6
                            • Part of subcall function 004021BB: SelectObject.GDI32(00000000,?), ref: 004022AC
                            • Part of subcall function 004021BB: DeleteDC.GDI32(00000000), ref: 004022B5
                            • Part of subcall function 004021BB: DeleteDC.GDI32(00000000), ref: 004022B8
                            • Part of subcall function 004021BB: ReleaseDC.USER32(00000000,?), ref: 004022BF
                          • GetObjectW.GDI32(00000000,00000018,?), ref: 004023F2
                          • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00402406
                          • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00402418
                          • GlobalFree.KERNEL32(00000000), ref: 0040242D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                          • String ID: IMAGES$STATIC
                          • API String ID: 4202116410-1168396491
                          • Opcode ID: ce6654e4372c3ffa34acb2beffbf551bf042f34cfe31152263ceba8f76af984c
                          • Instruction ID: 39ea2f5a34e6d05919b55838b179f0d08c2ef57fa9a9f3a5cade62fe7f969a15
                          • Opcode Fuzzy Hash: ce6654e4372c3ffa34acb2beffbf551bf042f34cfe31152263ceba8f76af984c
                          • Instruction Fuzzy Hash: BE418A31902218BFCB119FA1DD4CDEF7F79FF09711B0080A6F905A62A0D7798A51DBA9
                          APIs
                          • GetDlgItem.USER32(?,000004B3), ref: 00407A68
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00407A6D
                          • GetDlgItem.USER32(?,000004B4), ref: 00407AA4
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00407AA9
                          • GetSystemMetrics.USER32(00000010), ref: 00407B2B
                          • GetSystemMetrics.USER32(00000011), ref: 00407B31
                          • GetSystemMetrics.USER32(00000008), ref: 00407B38
                          • GetSystemMetrics.USER32(00000007), ref: 00407B3F
                          • GetParent.USER32(?), ref: 00407B63
                          • GetClientRect.USER32(00000000,?), ref: 00407B75
                          • ClientToScreen.USER32(?,?), ref: 00407B88
                          • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 00407BEE
                          • GetClientRect.USER32(?,?), ref: 00407C88
                            • Part of subcall function 00407A11: GetDlgItem.USER32(?,?), ref: 00407A2F
                            • Part of subcall function 00407A11: SetWindowPos.USER32(00000000), ref: 00407A36
                          • ClientToScreen.USER32(?,?), ref: 00407B91
                            • Part of subcall function 00407908: GetDlgItem.USER32(?,?), ref: 00407914
                          • GetSystemMetrics.USER32(00000008), ref: 00407D0D
                          • GetSystemMetrics.USER32(00000007), ref: 00407D14
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                          • String ID:
                          • API String ID: 747815384-0
                          • Opcode ID: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                          • Instruction ID: f3222828a116df411f5926d4397ac139304d214e2855758f1a874d1ee42c1992
                          • Opcode Fuzzy Hash: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                          • Instruction Fuzzy Hash: 46A13B70E04209AFDB14CFBDDD85AEEBBF9EF48304F14452AE605F2291D678E9008B65
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040382E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403836
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403A5C
                            • Part of subcall function 004028F8: ??3@YAXPAX@Z.MSVCRT ref: 004028FE
                            • Part of subcall function 004028F8: ??3@YAXPAX@Z.MSVCRT ref: 00402905
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403A89
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: SetEnvironment${\rtf
                          • API String ID: 613200358-318139784
                          • Opcode ID: 27a63a5a7f92f4e166b91d64b471efe2453304cc3adbeb74008082c4d76a8dac
                          • Instruction ID: 8f9334f6a2dd1388b4a5afbed578350eb53b39a6a317aa89a8308fc341e0281c
                          • Opcode Fuzzy Hash: 27a63a5a7f92f4e166b91d64b471efe2453304cc3adbeb74008082c4d76a8dac
                          • Instruction Fuzzy Hash: CA91AF71A00108ABDF21EF91C981AEEBB79AF14305F24407BE481772E2DB795B06DB59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                          • String ID: pA
                          • API String ID: 801014965-794713698
                          • Opcode ID: 032d58b2ebe3cf27d61047a734a84aa96b7daef7a4c7496762f9096cf2c620cd
                          • Instruction ID: f8c09df19b0da82cf9d0b277ad66ee569d762787ff6f3d7b659fbd516fe6565a
                          • Opcode Fuzzy Hash: 032d58b2ebe3cf27d61047a734a84aa96b7daef7a4c7496762f9096cf2c620cd
                          • Instruction Fuzzy Hash: B6419CB6D41344BFDB228FA4DC55AEA7BB9EB09710F20012FE842A3291D7785D81CB59
                          APIs
                          • GetParent.USER32(?), ref: 00407F7C
                          • GetWindowLongW.USER32(00000000), ref: 00407F83
                          • DefWindowProcW.USER32(?,?,?,?), ref: 00407F99
                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 00407FB6
                          • GetSystemMetrics.USER32(00000031), ref: 00407FC8
                          • GetSystemMetrics.USER32(00000032), ref: 00407FCF
                          • GetWindowDC.USER32(?), ref: 00407FE1
                          • GetWindowRect.USER32(?,?), ref: 00407FEE
                          • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00408022
                          • ReleaseDC.USER32(?,00000000), ref: 0040802A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                          • String ID:
                          • API String ID: 2586545124-0
                          • Opcode ID: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                          • Instruction ID: 75cb0a06a2ac89565616e056336673321ae690d364ffe7e0e0e46a8894e64c23
                          • Opcode Fuzzy Hash: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                          • Instruction Fuzzy Hash: 76212D7650120ABFCB019FB8DD48EEF3BADFB08351F044565F911E22A1CB75E9208B65
                          APIs
                            • Part of subcall function 0040918F: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091D7
                            • Part of subcall function 0040918F: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 004091F7
                            • Part of subcall function 0040918F: GetDlgItem.USER32(?,000004B7), ref: 0040920A
                            • Part of subcall function 0040918F: SetWindowLongW.USER32(00000000,000000FC,Function_00007F6E), ref: 00409218
                            • Part of subcall function 00407925: GetDlgItem.USER32(?,?), ref: 00407932
                            • Part of subcall function 00407925: ShowWindow.USER32(00000000,?), ref: 00407949
                            • Part of subcall function 00407908: GetDlgItem.USER32(?,?), ref: 00407914
                          • GetDlgItem.USER32(?,000004B6), ref: 00409490
                          • DestroyWindow.USER32(00000000), ref: 00409493
                          • CreateWindowExA.USER32(00000200,Edit,0041A844,500100A0,?,?,?,?,?,000004B6,00000000,00000000), ref: 004094C9
                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004094D9
                          • GetDlgItem.USER32(?,000004B6), ref: 004094E6
                          • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 004094F0
                          • GetDlgItem.USER32(?,000004B6), ref: 004094FA
                          • SetFocus.USER32(00000000), ref: 004094FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Item$Window$MessageSend$CreateDestroyDirectoryFileFocusInfoLongShowSystem
                          • String ID: Edit
                          • API String ID: 2563414232-554135844
                          • Opcode ID: 56b916562ecd750780d735d099b627b331725e63fe03f363d69cff45a528d5ec
                          • Instruction ID: 7c9fa7fc0bed8e782d3924518fbb970010649ffe409204d719e10ed99d6b5507
                          • Opcode Fuzzy Hash: 56b916562ecd750780d735d099b627b331725e63fe03f363d69cff45a528d5ec
                          • Instruction Fuzzy Hash: F9116A71A00208BFDB11ABE5CD49FAFBBBCEF44B00F104429F605F61A1C675AD508769
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$wsprintf
                          • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                          • API String ID: 2704270482-695273242
                          • Opcode ID: 2d8e9db283933717d1bf74dcc637fb004bcd9ef8bf7c609457385d08cecbeda9
                          • Instruction ID: 91c5cc515a8c04ea92080f1a80fa1a733173372db4396516089c4ac9de792270
                          • Opcode Fuzzy Hash: 2d8e9db283933717d1bf74dcc637fb004bcd9ef8bf7c609457385d08cecbeda9
                          • Instruction Fuzzy Hash: 78215E71A001086BDF05EAA58D86EEE73ADAF48304F14406BF905F71C2CB7C9A068799
                          APIs
                          • GetDlgItem.USER32(?,000004B3), ref: 00407787
                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 0040779A
                          • GetDlgItem.USER32(?,000004B4), ref: 004077A4
                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004077AC
                          • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004077BC
                          • GetDlgItem.USER32(?,?), ref: 004077C5
                          • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004077CD
                          • GetDlgItem.USER32(?,?), ref: 004077D6
                          • SetFocus.USER32(00000000,?,?,00000000,004086F2,000004B3,00000000,?,000004B3), ref: 004077D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ItemMessageSend$Focus
                          • String ID:
                          • API String ID: 3946207451-0
                          • Opcode ID: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                          • Instruction ID: d34367ada3e0903658dac9af1ca1aef10e4e5856eabac84c2cebdb26553fe681
                          • Opcode Fuzzy Hash: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                          • Instruction Fuzzy Hash: A4F04F712403087BEA216B61DD86F9BBB5EDF80B54F018425F354661F0CBF7AC209A29
                          APIs
                          • memcpy.MSVCRT ref: 00407E08
                          • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00407E27
                          • GetDC.USER32(00000000), ref: 00407E32
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00407E3E
                          • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407E4D
                          • ReleaseDC.USER32(00000000,?), ref: 00407E5B
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00407E83
                          • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000762B), ref: 00407EB8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                          • String ID:
                          • API String ID: 2693764856-0
                          • Opcode ID: cd9703eaab2b01bd1f1ad72a60e51d9745bb6fb91da23de710b65ac31fde8908
                          • Instruction ID: 5ae0e358a048fe13eeaed06a2eede89b6f7514d73d54057b29107d928dd7117d
                          • Opcode Fuzzy Hash: cd9703eaab2b01bd1f1ad72a60e51d9745bb6fb91da23de710b65ac31fde8908
                          • Instruction Fuzzy Hash: EE21A175901258BFD7215BA19D48EEB7B7CFB08301F0040B6FA09A2290D7788E94CB6A
                          APIs
                          • GetDC.USER32(?), ref: 00407967
                          • GetSystemMetrics.USER32(0000000B), ref: 00407983
                          • GetSystemMetrics.USER32(0000003D), ref: 0040798C
                          • GetSystemMetrics.USER32(0000003E), ref: 00407994
                          • SelectObject.GDI32(?,?), ref: 004079B1
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004079CC
                          • SelectObject.GDI32(?,?), ref: 004079F2
                          • ReleaseDC.USER32(?,?), ref: 00407A01
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                          • String ID:
                          • API String ID: 2466489532-0
                          • Opcode ID: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                          • Instruction ID: 99be1965ec9079b19cd9ca7ddb514230b5ddac8da32c359285f501be4f4e114b
                          • Opcode Fuzzy Hash: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                          • Instruction Fuzzy Hash: CE215472901209AFCB018FA5DD84A9EBFF4FF08360F20C46AE459A72A0D335AA50DF41
                          APIs
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00408927
                          • GetDlgItem.USER32(?,000004B8), ref: 00408945
                          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00408957
                          • wsprintfW.USER32 ref: 00408975
                          • ??3@YAXPAX@Z.MSVCRT ref: 00408A0D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                          • String ID: %d%%
                          • API String ID: 3753976982-1518462796
                          • Opcode ID: fef41a88bddaff5eade1bc218cc7fbd92aa9700993b027471fab001e173baeb7
                          • Instruction ID: 76316364547db91db0794513d36d59d3d90bef1704c5e6550bd17e0e5aae4baa
                          • Opcode Fuzzy Hash: fef41a88bddaff5eade1bc218cc7fbd92aa9700993b027471fab001e173baeb7
                          • Instruction Fuzzy Hash: DC31B171900208BFCB11AF91DD45EEA7BB9FF48304F10846EF986662F1CB79A911CB59
                          APIs
                          • EndDialog.USER32(?,00000000), ref: 00408B1E
                          • KillTimer.USER32(?,00000001), ref: 00408B2F
                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408B59
                          • SuspendThread.KERNEL32(00000298), ref: 00408B72
                          • ResumeThread.KERNEL32(00000298), ref: 00408B8F
                          • EndDialog.USER32(?,00000000), ref: 00408BB1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: DialogThreadTimer$KillResumeSuspend
                          • String ID:
                          • API String ID: 4151135813-0
                          • Opcode ID: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                          • Instruction ID: a2b05dd5e41b4995a09a300ee16ca779e4d4a037e63c25cdfddae70b45dc1bb5
                          • Opcode Fuzzy Hash: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                          • Instruction Fuzzy Hash: 9711C4B4201608DFD7101F12EE84E677BBCFB84745704803EF986A16A1CF396D00DA1D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%T/$%%T\
                          • API String ID: 613200358-2679640699
                          • Opcode ID: 261993cb00864d984834ad0e43d7f5cd62a108a5b931f8d3cba770c6b4239f23
                          • Instruction ID: 122386fc9699c449d81ec7ba086a527594e92f4f2f80396e21998a5c7b43ab37
                          • Opcode Fuzzy Hash: 261993cb00864d984834ad0e43d7f5cd62a108a5b931f8d3cba770c6b4239f23
                          • Instruction Fuzzy Hash: A811FC35D0010AAACF05FBA2D856CEEBB79AF14318F50846BF511360E2DF789795CB49
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%S/$%%S\
                          • API String ID: 613200358-358529586
                          • Opcode ID: 57045baa5eca15e6faefc41cb7dde46f37a06a346480166a3eef6bc4e1eba18d
                          • Instruction ID: f1f894bdf3d4d090df8b11905aad1c5c8858fc3c453367453fbe743e76f1909d
                          • Opcode Fuzzy Hash: 57045baa5eca15e6faefc41cb7dde46f37a06a346480166a3eef6bc4e1eba18d
                          • Instruction Fuzzy Hash: 54112C34D0010AAACF05FBA2C856CEE7B39AF14308F50846BF111360E2DF789795CB89
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%M/$%%M\
                          • API String ID: 613200358-4143866494
                          • Opcode ID: c6429fdd1526b1e7fbb253b58aeebe4a8df068622cf41946daa1f84d1205c3c4
                          • Instruction ID: 8dba794e35f21279b7ca126a25086939a7e1f708a81bc48e9d43c6f6c4f8843e
                          • Opcode Fuzzy Hash: c6429fdd1526b1e7fbb253b58aeebe4a8df068622cf41946daa1f84d1205c3c4
                          • Instruction Fuzzy Hash: F111FC35D0010AAACF05FBA2D856CEE7B79AF14308F50846BF511360E2DF785796CB89
                          APIs
                          • memset.MSVCRT ref: 00408501
                          • SHBrowseForFolderW.SHELL32(?), ref: 0040851A
                          • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 00408536
                          • SHGetMalloc.SHELL32(00000000), ref: 00408560
                            • Part of subcall function 004082DB: GetDlgItem.USER32(?,000004B6), ref: 004082E8
                            • Part of subcall function 004082DB: SetFocus.USER32(00000000,?,?,004083CF,000004B6,?), ref: 004082EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                          • String ID: A$A
                          • API String ID: 1557639607-3025247501
                          • Opcode ID: 8b567cbf236bcd6d22996d77d705d87133768c80d45aeef4e96c8cb7c657258c
                          • Instruction ID: 0f17a3c008e4a99ccc33b60476d4f22474d7ac170467a7db498a71fbbcb5b23f
                          • Opcode Fuzzy Hash: 8b567cbf236bcd6d22996d77d705d87133768c80d45aeef4e96c8cb7c657258c
                          • Instruction Fuzzy Hash: F2114F71A00208ABCB10DB95CA59BDE77BCAB84700F1404AAE905E3280DB79DE05CB65
                          APIs
                          • LoadLibraryA.KERNEL32(uxtheme,?,0040911B,000004B1,00000000,?,?,?,?,?,00409228), ref: 00407D9C
                          • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407DAD
                          • GetWindow.USER32(?,00000005), ref: 00407DC6
                          • GetWindow.USER32(00000000,00000002), ref: 00407DDC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Window$AddressLibraryLoadProc
                          • String ID: SetWindowTheme$uxtheme
                          • API String ID: 324724604-1369271589
                          • Opcode ID: 01b0f07356888f23ede045274bc5f10b7f94e2717df3aa36a0264411175b615e
                          • Instruction ID: 7420b1413b3927be0e09d5a5b1199939c933d21b5537d32619d12fb45dfdc6a0
                          • Opcode Fuzzy Hash: 01b0f07356888f23ede045274bc5f10b7f94e2717df3aa36a0264411175b615e
                          • Instruction Fuzzy Hash: 6EF0AE32E4972533C13212666C48FE7765CDF46B51B054136FD04F7240DA68DC4041ED
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@??3@memmove
                          • String ID:
                          • API String ID: 3828600508-0
                          • Opcode ID: 598d0d4fbbd1a75924cb74ca8d90dc94e8938ef199d3bd8e5eb98e6998e67018
                          • Instruction ID: 2725a0cdf67a86a76ae89e550574ec4b5b9664117e44407cff9637d04d7e1d1b
                          • Opcode Fuzzy Hash: 598d0d4fbbd1a75924cb74ca8d90dc94e8938ef199d3bd8e5eb98e6998e67018
                          • Instruction Fuzzy Hash: EF4158B5A003048FCB14DF19D880A67B7E5FF88304F14856EEC499B306D739E919CBAA
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405A3A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405A9C
                          • ??3@YAXPAX@Z.MSVCRT ref: 00405AB4
                            • Part of subcall function 00403A96: lstrlenW.KERNEL32(00401A87,00000000,?,?,?,?,?,?,00401A87,?), ref: 00403AA3
                            • Part of subcall function 00403A96: GetSystemTimeAsFileTime.KERNEL32(?,00401A87,?,?,?,?,00401A87,?), ref: 00403B19
                            • Part of subcall function 00403A96: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A87,?), ref: 00403B20
                            • Part of subcall function 00403A96: ??3@YAXPAX@Z.MSVCRT ref: 00403BDF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$FileTime$AttributesSystemlstrlen
                          • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                          • API String ID: 4038993085-372238525
                          • Opcode ID: 691e7b16ecd0d81a9d1d7dccc5ea94fd90d5bd9377cef4520e6c83a46c29e05e
                          • Instruction ID: 05be9fed3064c9d881d7a199c2662b51d83aa20cb5094888597b34cc33987248
                          • Opcode Fuzzy Hash: 691e7b16ecd0d81a9d1d7dccc5ea94fd90d5bd9377cef4520e6c83a46c29e05e
                          • Instruction Fuzzy Hash: 94314D3590021EAACF01EF92CD818EEBB75FF48318F10042BE811721E1DB785685DF59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: wsprintf$ExitProcesslstrcat
                          • String ID: 0x%p
                          • API String ID: 2530384128-1745605757
                          • Opcode ID: 6005226d534fa59506d0e1bea7fa8c4fd587573c945a303a9b2733448e6b2449
                          • Instruction ID: 1d156b8e2377e49bbb98790bed191cf7e4a94fa6407155113c02fa0261581198
                          • Opcode Fuzzy Hash: 6005226d534fa59506d0e1bea7fa8c4fd587573c945a303a9b2733448e6b2449
                          • Instruction Fuzzy Hash: FC1160B5801208EFCB20EFB5DD8599B73B8BB44304F00487BE645A2191D678AA948B5A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$lstrlen
                          • String ID:
                          • API String ID: 2031685711-0
                          • Opcode ID: 29fb89ff9368adaf32589367a9ab08fd84b34a61651bfd4a4b64f513cf1aa78e
                          • Instruction ID: 58df158502e8e8c8b8225c801007fb375eedb3fbf3db66d62c68b1e71e2fb606
                          • Opcode Fuzzy Hash: 29fb89ff9368adaf32589367a9ab08fd84b34a61651bfd4a4b64f513cf1aa78e
                          • Instruction Fuzzy Hash: 87212C71D00105AACB206FA4CC01BEB77B8DF95364F1444BBEE41B71D1E779ED418699
                          APIs
                            • Part of subcall function 004081B6: GetSystemMetrics.USER32(0000000B), ref: 004081DE
                            • Part of subcall function 004081B6: GetSystemMetrics.USER32(0000000C), ref: 004081E7
                          • GetSystemMetrics.USER32(00000007), ref: 0040880B
                          • GetSystemMetrics.USER32(00000007), ref: 0040881C
                          • ??3@YAXPAX@Z.MSVCRT ref: 004088E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MetricsSystem$??3@
                          • String ID: 100%%
                          • API String ID: 2562992111-568723177
                          • Opcode ID: e87f074f6744b37ad901e42117a76a23dcd1fcc12ba0f39c1edec3fa84c37898
                          • Instruction ID: b61f87e028c14ae519fd5acbe82c99188bf114d8ae22895d6fd2ec5fad7201aa
                          • Opcode Fuzzy Hash: e87f074f6744b37ad901e42117a76a23dcd1fcc12ba0f39c1edec3fa84c37898
                          • Instruction Fuzzy Hash: 7231EE72A007089FCB20EF6ACA419AEB7F4EF50314F00443ED482B22D1DB78E944CB99
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00407202,00000000,?,?), ref: 004026D1
                          • GetProcAddress.KERNEL32(00000000), ref: 004026D8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32
                          • API String ID: 2574300362-3900151262
                          • Opcode ID: e30bfedea9ecef5949d5105317049e471af0f001c276a593039802e8fc0993d0
                          • Instruction ID: c8f53901271ec78943a664f820560f4101b0ffac110acd662a43b690bee66615
                          • Opcode Fuzzy Hash: e30bfedea9ecef5949d5105317049e471af0f001c276a593039802e8fc0993d0
                          • Instruction Fuzzy Hash: 19D05EB4193601ABDB402B62AD0CBE276A47B40741F4480357804D00F0CAFC44A2EA1E
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,00402748,?,00407145,?,00000000,?,?), ref: 00402703
                          • GetProcAddress.KERNEL32(00000000), ref: 0040270A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32
                          • API String ID: 2574300362-736604160
                          • Opcode ID: a2255e73f7ab32db877da58af0a01301e41c68a702f0b45ed193178c432436c1
                          • Instruction ID: 14b996144198c06d2b580c2b2f92427fd35363d448dabe68fff46cd2ac5b7c70
                          • Opcode Fuzzy Hash: a2255e73f7ab32db877da58af0a01301e41c68a702f0b45ed193178c432436c1
                          • Instruction Fuzzy Hash: A5D013F45937047BD7505BA19D0DFE677946B44741F5440296404D11F4D7FC4455CE1F
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403207
                            • Part of subcall function 00402E03: MultiByteToWideChar.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,00000000,00403165,?,?,00000000,00000000,00000000), ref: 00402E35
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403174
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040318F
                          • ??3@YAXPAX@Z.MSVCRT ref: 00403197
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$ByteCharMultiWide
                          • String ID:
                          • API String ID: 1731127917-0
                          • Opcode ID: e53d579ea1420204a9d3356672f854fcb038d20c3e554b33ae685d69b99d718d
                          • Instruction ID: 4567f7d22649ab5cc64065fd9ce685159733205cb6f020b8159752473f4b33f9
                          • Opcode Fuzzy Hash: e53d579ea1420204a9d3356672f854fcb038d20c3e554b33ae685d69b99d718d
                          • Instruction Fuzzy Hash: 8131D572C04105AACB14EF96DD828EF77BDEF08316F40443FF856B60E1EA3C6A458668
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@??3@ExceptionThrowmemcpy
                          • String ID:
                          • API String ID: 3462485524-0
                          • Opcode ID: 614e6b9030e33dbd3a2d811ab6a3033ff5f3a7c55e7c8e4e437b1e77e30c11f9
                          • Instruction ID: 405328bf9c6dea51840dca2eba46a3fbb7e242f9a1a1b227e56750dcaa965544
                          • Opcode Fuzzy Hash: 614e6b9030e33dbd3a2d811ab6a3033ff5f3a7c55e7c8e4e437b1e77e30c11f9
                          • Instruction Fuzzy Hash: D41108762003046BCB289F16D9D0DABF7E9AB84354720883FF56DD7280CBB9E8D54759
                          APIs
                            • Part of subcall function 00407908: GetDlgItem.USER32(?,?), ref: 00407914
                            • Part of subcall function 00407925: GetDlgItem.USER32(?,?), ref: 00407932
                            • Part of subcall function 00407925: ShowWindow.USER32(00000000,?), ref: 00407949
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091D7
                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 004091F7
                          • GetDlgItem.USER32(?,000004B7), ref: 0040920A
                          • SetWindowLongW.USER32(00000000,000000FC,Function_00007F6E), ref: 00409218
                            • Part of subcall function 00408E5E: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409228), ref: 00408E87
                            • Part of subcall function 00408E5E: LoadIconW.USER32(00000000), ref: 00408E8A
                            • Part of subcall function 00408E5E: GetSystemMetrics.USER32(00000032), ref: 00408E9E
                            • Part of subcall function 00408E5E: GetSystemMetrics.USER32(00000031), ref: 00408EA3
                            • Part of subcall function 00408E5E: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409228), ref: 00408EAC
                            • Part of subcall function 00408E5E: LoadImageW.USER32(00000000), ref: 00408EAF
                            • Part of subcall function 00408E5E: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408ECF
                            • Part of subcall function 00408E5E: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408ED8
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B2), ref: 00408EF4
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B2), ref: 00408EFE
                            • Part of subcall function 00408E5E: GetWindowLongW.USER32(?,000000F0), ref: 00408F0A
                            • Part of subcall function 00408E5E: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F19
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B5), ref: 00408F27
                            • Part of subcall function 00408E5E: GetDlgItem.USER32(?,000004B5), ref: 00408F35
                            • Part of subcall function 00408E5E: GetWindowLongW.USER32(?,000000F0), ref: 00408F41
                            • Part of subcall function 00408E5E: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F50
                            • Part of subcall function 004082DB: GetDlgItem.USER32(?,000004B6), ref: 004082E8
                            • Part of subcall function 004082DB: SetFocus.USER32(00000000,?,?,004083CF,000004B6,?), ref: 004082EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                          • String ID:
                          • API String ID: 3043669009-0
                          • Opcode ID: 83d92fe2ae362385f538e20dd195bc9a90b973da163aa05b173518147f80f435
                          • Instruction ID: d55f7cd6c0ae67d2cfea52dc8002a5c696cbb6fa088204d5cba6b4347c9ab962
                          • Opcode Fuzzy Hash: 83d92fe2ae362385f538e20dd195bc9a90b973da163aa05b173518147f80f435
                          • Instruction Fuzzy Hash: 6E118675E403146BDB10EBB99C49FDE77BCEB84B14F10446FB251E32C0DAB899058755
                          APIs
                          • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0040780D
                          • GetSystemMetrics.USER32(00000031), ref: 00407833
                          • CreateFontIndirectW.GDI32(?), ref: 00407842
                          • DeleteObject.GDI32(00000000), ref: 00407871
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                          • String ID:
                          • API String ID: 1900162674-0
                          • Opcode ID: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                          • Instruction ID: bcf797713747d1bbc7a039335063bb95dfc11f2d3f3f6a9aa021fe6aed6dce96
                          • Opcode Fuzzy Hash: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                          • Instruction Fuzzy Hash: D2113376A00205AFDB149F54DD88FEAB7B8EB04304F0480AAED15A7391DB74ED44CB55
                          APIs
                          • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402ECD
                          • ??3@YAXPAX@Z.MSVCRT ref: 00402ED6
                            • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT ref: 004011D7
                            • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT ref: 004011FD
                          • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000001,00000001,?), ref: 00402EEE
                          • ??3@YAXPAX@Z.MSVCRT ref: 00402F0E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@$EnvironmentExpandStrings$??2@
                          • String ID:
                          • API String ID: 612612615-0
                          • Opcode ID: 1c3f63ef1eee124114cccf2536dc2808fbbd791f413996130052b08bb3e73a6e
                          • Instruction ID: 9bd8dc273a68bd9637afbd8831705f8c3fd905c1db486eae3d391806f68f5536
                          • Opcode Fuzzy Hash: 1c3f63ef1eee124114cccf2536dc2808fbbd791f413996130052b08bb3e73a6e
                          • Instruction Fuzzy Hash: F2017572D00108BADB15A795DD85DDEB7BCEF58314F10407BF901B31D1EB785A408A99
                          APIs
                          • ScreenToClient.USER32(?,?), ref: 00408D23
                          • GetClientRect.USER32(?,?), ref: 00408D35
                          • PtInRect.USER32(?,?,?), ref: 00408D44
                            • Part of subcall function 0040872F: KillTimer.USER32(?,00000001,?,00408D59), ref: 0040873D
                          • CallNextHookEx.USER32(?,?,?), ref: 00408D66
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ClientRect$CallHookKillNextScreenTimer
                          • String ID:
                          • API String ID: 3015594791-0
                          • Opcode ID: 15b66d1cb46cfd40a4fba80601086509ebb595d1b5124e48eed938ea5df3e736
                          • Instruction ID: 18d01c9c2ab30fc155503021630ae1f402c7651b4ea92375da3568117c475b81
                          • Opcode Fuzzy Hash: 15b66d1cb46cfd40a4fba80601086509ebb595d1b5124e48eed938ea5df3e736
                          • Instruction Fuzzy Hash: 04017935100105EFDB109F55ED14EAA7BA6FF14344B18853AE855A26A0DF34E810DB19
                          APIs
                            • Part of subcall function 00403415: GetWindowTextLengthW.USER32(?), ref: 00403426
                            • Part of subcall function 00403415: GetWindowTextW.USER32(0040349F,00000000,00000001), ref: 00403443
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040450D
                          • ??3@YAXPAX@Z.MSVCRT ref: 00404515
                          • SetWindowTextW.USER32(?,?), ref: 00404522
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040452D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@TextWindow$Length
                          • String ID:
                          • API String ID: 2308334395-0
                          • Opcode ID: 96bd27e7f3fc57ee4696f094549bd80dee55dfdf6bb1a65402e69d1b3675177c
                          • Instruction ID: ff7ec8d6d0e8271002606b95276d32d5875dc5555b990560dc26556ed382b180
                          • Opcode Fuzzy Hash: 96bd27e7f3fc57ee4696f094549bd80dee55dfdf6bb1a65402e69d1b3675177c
                          • Instruction Fuzzy Hash: B1F0FF76D00109BACF01FBE1DD468CE7B79AF18318F1044BBF50571091EA799B958B95
                          APIs
                          • GetObjectW.GDI32(?,0000005C,?), ref: 0040807C
                          • CreateFontIndirectW.GDI32(?), ref: 00408092
                          • GetDlgItem.USER32(?,000004B5), ref: 004080A6
                          • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 004080B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: CreateFontIndirectItemMessageObjectSend
                          • String ID:
                          • API String ID: 2001801573-0
                          • Opcode ID: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                          • Instruction ID: d40879a5241dbada588f6d3d89cdcd4bb4273d743b4923439a9775596fe479dc
                          • Opcode Fuzzy Hash: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                          • Instruction Fuzzy Hash: 05F0B475501704ABD7215B94DD09FC77FACAB84B01F048039EE41E21D0DBB4D4188A2A
                          APIs
                          • EnterCriticalSection.KERNEL32(00420B90), ref: 0040B979
                          • LeaveCriticalSection.KERNEL32(00420B90), ref: 0040B9BC
                            • Part of subcall function 0040B790: ??2@YAPAXI@Z.MSVCRT ref: 0040B814
                            • Part of subcall function 0040B790: ??3@YAXPAX@Z.MSVCRT ref: 0040B856
                            • Part of subcall function 0040B790: ??2@YAPAXI@Z.MSVCRT ref: 0040B86C
                            • Part of subcall function 0040B790: memmove.MSVCRT ref: 0040B889
                            • Part of subcall function 0040B790: ??3@YAXPAX@Z.MSVCRT ref: 0040B896
                            • Part of subcall function 0040B790: memmove.MSVCRT ref: 0040B8B4
                            • Part of subcall function 0040AED0: memset.MSVCRT ref: 0040AF3D
                            • Part of subcall function 0040B900: ??2@YAPAXI@Z.MSVCRT ref: 0040B927
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??2@$??3@CriticalSectionmemmove$EnterLeavememset
                          • String ID: $A$$A
                          • API String ID: 2633840989-464203494
                          • Opcode ID: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                          • Instruction ID: eb367c7ddaee2a2fb62f52f584b5ee913fc6020de714d6b7f11535a2a145910a
                          • Opcode Fuzzy Hash: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                          • Instruction Fuzzy Hash: 01E0127132152916892437566D15AEE2B9ACEC5758B14003FF701732C3CFAC285656EE
                          APIs
                          • GetParent.USER32(?), ref: 0040209B
                          • GetWindowRect.USER32(?,?), ref: 004020B4
                          • ScreenToClient.USER32(00000000,?), ref: 004020C2
                          • ScreenToClient.USER32(00000000,?), ref: 004020C9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ClientScreen$ParentRectWindow
                          • String ID:
                          • API String ID: 2099118873-0
                          • Opcode ID: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                          • Instruction ID: 360ef478bd25029cb3ddb5db89bdb2cb9d11200f358063210d0ebdbaf2693bd9
                          • Opcode Fuzzy Hash: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                          • Instruction Fuzzy Hash: B7E086722062117FD7119BA5BC88C8B7FADDFD5A26700447AF54592221C7769C20DA72
                          APIs
                            • Part of subcall function 004083D2: GetSystemMetrics.USER32(00000010), ref: 00408414
                            • Part of subcall function 004083D2: GetSystemMetrics.USER32(00000011), ref: 00408422
                          • wsprintfW.USER32 ref: 0040536D
                          • ??3@YAXPAX@Z.MSVCRT ref: 004053AA
                          Strings
                          • %X - %03X - %03X - %03X - %03X, xrefs: 00405367
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MetricsSystem$??3@wsprintf
                          • String ID: %X - %03X - %03X - %03X - %03X
                          • API String ID: 1174869416-1993364030
                          • Opcode ID: 54f3d7688a31d9ede09f57ae658537ffb95a78b7225a2b87c8686a6f2efc5fb4
                          • Instruction ID: 4b7263c7f208e356f40bd8d925c78b4f60c931082ae3ce1b0b234df7c4f1af54
                          • Opcode Fuzzy Hash: 54f3d7688a31d9ede09f57ae658537ffb95a78b7225a2b87c8686a6f2efc5fb4
                          • Instruction Fuzzy Hash: C4116D31A40218AADB65BB91ED06FDE7338FF14708F10417AA5117A1D2DFB86A45CB88
                          APIs
                          • GetSystemMetrics.USER32(00000010), ref: 00408414
                          • GetSystemMetrics.USER32(00000011), ref: 00408422
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: MetricsSystem
                          • String ID: ExecuteFile
                          • API String ID: 4116985748-323923146
                          • Opcode ID: 14d786c73423a61b5c4d888c2600fdeb7daaabf908332af799251ff76a0a5de7
                          • Instruction ID: 6a74ab13091649485f48d3283ac03bce7b6736a34d248b30378b572136a87764
                          • Opcode Fuzzy Hash: 14d786c73423a61b5c4d888c2600fdeb7daaabf908332af799251ff76a0a5de7
                          • Instruction Fuzzy Hash: 2CF0F974A007058FC7B0DF79D940286B7F4BF48350749893FD986D3A90EBB4A4859F85
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: ??3@wsprintf
                          • String ID: (%d%s)
                          • API String ID: 3815514257-2087557067
                          • Opcode ID: 987eb4089fde38301cdce038a3fa0667c85b22f9c23ef7476c7b2653851f1aae
                          • Instruction ID: 37cf70faa09b515f4225f8f05a611f4f85e102aba12cbf3defd6e2e13dcc1dea
                          • Opcode Fuzzy Hash: 987eb4089fde38301cdce038a3fa0667c85b22f9c23ef7476c7b2653851f1aae
                          • Instruction Fuzzy Hash: 14F06271800218BBCF21B755DD06ECA7778AF04308F1045BBA512B14A2EE76AA548A98
                          APIs
                          • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 004048FA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2597936174.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2597516887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598352277.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2598714803.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2599050720.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_sVfXReO3QI.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: 7-Zip SFX$Could not allocate memory
                          • API String ID: 2030045667-3806377612
                          • Opcode ID: 3326d66dcc1a04258ccecf944498af0c4029a673cea994d3bb0345d3c23038b9
                          • Instruction ID: 1f72cfa22fc7bf934b0b745acd93f2f995aad45dd61b0b2d5dae8fa57f35f3c3
                          • Opcode Fuzzy Hash: 3326d66dcc1a04258ccecf944498af0c4029a673cea994d3bb0345d3c23038b9
                          • Instruction Fuzzy Hash: 37B012703C130431D10003300C07FC01041C70CF0AF1088517104A81D3DFD620E0204D

                          Execution Graph

                          Execution Coverage:15.4%
                          Dynamic/Decrypted Code Coverage:35.8%
                          Signature Coverage:10.5%
                          Total number of Nodes:1588
                          Total number of Limit Nodes:86
                          execution_graph 8141 401c46 8142 40145c 18 API calls 8141->8142 8143 401c4c 8142->8143 8144 406404 11 API calls 8143->8144 8145 401c59 8144->8145 8146 406dfc 81 API calls 8145->8146 8147 401c64 8146->8147 7564 70262728 7565 70262773 7564->7565 7566 70262738 VirtualProtect 7564->7566 7566->7565 7310 402665 7311 40145c 18 API calls 7310->7311 7312 40266b 7311->7312 7313 40145c 18 API calls 7312->7313 7314 402674 7313->7314 7315 40145c 18 API calls 7314->7315 7316 40267d 7315->7316 7317 406404 11 API calls 7316->7317 7318 40268c 7317->7318 7319 406436 2 API calls 7318->7319 7325 402695 7319->7325 7320 4026a6 lstrlenW lstrlenW 7322 4050d2 25 API calls 7320->7322 7321 4050d2 25 API calls 7321->7325 7323 4026e8 SHFileOperationW 7322->7323 7324 4030e3 7323->7324 7323->7325 7325->7320 7325->7321 7325->7324 8283 402065 8284 401446 18 API calls 8283->8284 8285 40206d 8284->8285 8286 401446 18 API calls 8285->8286 8287 402076 GetDlgItem 8286->8287 8288 4030dc 8287->8288 8289 4030e3 8288->8289 8291 4060b2 wsprintfW 8288->8291 8291->8289 7567 70261108 7568 70261138 7567->7568 7582 702615a3 7568->7582 7570 70261203 GlobalFree 7572 702611fe 7572->7570 7573 702615a3 3 API calls 7576 70261146 7573->7576 7574 70261189 GlobalAlloc 7578 702611b2 7574->7578 7575 70261223 GlobalFree 7575->7576 7576->7570 7576->7572 7576->7573 7576->7574 7576->7575 7576->7578 7587 7026164f 7576->7587 7578->7576 7591 70261628 7578->7591 7596 702615e0 7578->7596 7583 702615ac 7582->7583 7584 702615dd 7582->7584 7583->7584 7599 70261581 GlobalAlloc 7583->7599 7584->7576 7586 702615ba lstrcpyW GlobalFree 7586->7576 7588 702611cd GlobalFree 7587->7588 7589 70261658 7587->7589 7588->7576 7589->7588 7590 7026165e lstrcpyW 7589->7590 7590->7588 7592 7026162f 7591->7592 7593 7026164a 7591->7593 7600 70261592 7592->7600 7593->7593 7595 70261648 7595->7578 7597 702611ed GlobalFree 7596->7597 7598 702615e9 GlobalAlloc lstrcpynW 7596->7598 7597->7576 7598->7597 7599->7586 7603 70261581 GlobalAlloc 7600->7603 7602 7026159b lstrcpyW 7602->7595 7603->7602 8374 50d273b 8375 50d6045 2 API calls 8374->8375 8376 50d2788 8375->8376 8377 50d6045 2 API calls 8376->8377 8378 50d2792 8377->8378 8379 50d4b53 24 API calls 8378->8379 8380 50d27a7 8379->8380 8393 50d5d1b RegOpenKeyExW 8380->8393 8382 50d27c0 8383 50d2817 8382->8383 8394 50d5e21 RegQueryValueExW 8382->8394 8386 50d60cf 2 API calls 8383->8386 8385 50d27e4 8395 50d5d9f RegCloseKey 8385->8395 8388 50d2841 8386->8388 8391 50d60cf 2 API calls 8388->8391 8389 50d27f3 8389->8383 8396 50d5110 8389->8396 8392 50d2860 8391->8392 8393->8382 8394->8385 8395->8389 8397 50d5132 8396->8397 8403 50d5156 8396->8403 8398 50d5182 lstrcpynW 8397->8398 8399 50d5199 8397->8399 8397->8403 8398->8403 8400 50d525d 8399->8400 8401 50d5243 wsprintfW 8399->8401 8399->8403 8402 50d5263 wsprintfW 8400->8402 8400->8403 8401->8403 8402->8403 8403->8383 8415 50d304e 8416 50d305b 8415->8416 8417 50d6045 2 API calls 8416->8417 8418 50d30ac 8417->8418 8419 50d6045 2 API calls 8418->8419 8420 50d30b6 8419->8420 8421 50d6045 2 API calls 8420->8421 8422 50d30c0 8421->8422 8423 50d4b53 24 API calls 8422->8423 8424 50d30de 8423->8424 8442 50d5d1b RegOpenKeyExW 8424->8442 8426 50d30f7 8427 50d3336 8426->8427 8443 50d5e21 RegQueryValueExW 8426->8443 8430 50d60cf 2 API calls 8427->8430 8429 50d32da 8446 50d5d9f RegCloseKey 8429->8446 8432 50d3361 8430->8432 8433 50d3122 8433->8429 8434 50d3170 8433->8434 8436 50d31fb 8433->8436 8435 50d31cf RegSetValueExW 8434->8435 8435->8429 8437 50d32e2 8436->8437 8440 50d3205 8436->8440 8437->8429 8438 50d32ee lstrcatW lstrlenW 8437->8438 8445 50d5e4b RegSetValueExW 8438->8445 8444 50d5e4b RegSetValueExW 8440->8444 8442->8426 8443->8433 8444->8429 8445->8429 8446->8427 8567 401e0f 8568 401446 18 API calls 8567->8568 8569 401e17 8568->8569 8570 401446 18 API calls 8569->8570 8571 401e21 8570->8571 8572 4030e3 8571->8572 8574 4060b2 wsprintfW 8571->8574 8574->8572 8576 50d345f 8577 50d6045 2 API calls 8576->8577 8578 50d349e 8577->8578 8579 50d6045 2 API calls 8578->8579 8580 50d34a8 8579->8580 8581 50d4b53 24 API calls 8580->8581 8582 50d34bd 8581->8582 8591 50d5d1b RegOpenKeyExW 8582->8591 8584 50d34d6 8586 50d34fa 8584->8586 8592 50d5e05 RegDeleteValueW 8584->8592 8589 50d60cf 2 API calls 8586->8589 8587 50d34eb 8593 50d5d9f RegCloseKey 8587->8593 8590 50d351c 8589->8590 8591->8584 8592->8587 8593->8586 7989 402713 8004 40616a lstrcpynW 7989->8004 7991 40272c 8005 40616a lstrcpynW 7991->8005 7993 402738 7994 40145c 18 API calls 7993->7994 7996 402743 7993->7996 7994->7996 7995 402752 7998 402761 7995->7998 7999 40145c 18 API calls 7995->7999 7996->7995 7997 40145c 18 API calls 7996->7997 7997->7995 8000 40145c 18 API calls 7998->8000 7999->7998 8001 40276b 8000->8001 8002 406404 11 API calls 8001->8002 8003 40277f WritePrivateProfileStringW 8002->8003 8004->7991 8005->7993 8065 401a1f 8066 40145c 18 API calls 8065->8066 8067 401a26 8066->8067 8068 406404 11 API calls 8067->8068 8069 401a49 8068->8069 8070 401a64 8069->8070 8071 401a5c 8069->8071 8120 40616a lstrcpynW 8070->8120 8119 40616a lstrcpynW 8071->8119 8074 401a62 8078 406199 5 API calls 8074->8078 8075 401a6f 8076 406883 3 API calls 8075->8076 8077 401a75 lstrcatW 8076->8077 8077->8074 8108 401a81 8078->8108 8079 406436 2 API calls 8079->8108 8080 401ac2 8081 405f90 2 API calls 8080->8081 8081->8108 8083 401a98 CompareFileTime 8083->8108 8084 401ba9 8085 4050d2 25 API calls 8084->8085 8088 401bb3 8085->8088 8086 401b5d 8087 4050d2 25 API calls 8086->8087 8089 401b70 8087->8089 8090 403550 48 API calls 8088->8090 8094 406404 11 API calls 8089->8094 8091 401bc6 8090->8091 8093 406404 11 API calls 8091->8093 8092 40616a lstrcpynW 8092->8108 8095 401bda 8093->8095 8100 401b8b 8094->8100 8096 401be9 SetFileTime 8095->8096 8097 401bf8 FindCloseChangeNotification 8095->8097 8096->8097 8099 401c09 8097->8099 8097->8100 8098 406966 18 API calls 8098->8108 8101 401c21 8099->8101 8102 401c0e 8099->8102 8104 406966 18 API calls 8101->8104 8103 406966 18 API calls 8102->8103 8106 401c16 lstrcatW 8103->8106 8107 401c29 8104->8107 8105 405e00 MessageBoxIndirectW 8105->8108 8106->8107 8109 406404 11 API calls 8107->8109 8108->8079 8108->8080 8108->8083 8108->8084 8108->8086 8108->8092 8108->8098 8108->8105 8110 401b50 8108->8110 8112 406404 11 API calls 8108->8112 8118 405fb0 GetFileAttributesW CreateFileW 8108->8118 8111 401c34 8109->8111 8113 401b93 8110->8113 8114 401b53 8110->8114 8115 405e00 MessageBoxIndirectW 8111->8115 8112->8108 8116 406404 11 API calls 8113->8116 8117 406404 11 API calls 8114->8117 8115->8100 8116->8100 8117->8086 8118->8108 8119->8074 8120->8075 8691 50d2864 8692 50d6045 2 API calls 8691->8692 8693 50d28ab 8692->8693 8694 50d6045 2 API calls 8693->8694 8695 50d28b5 8694->8695 8696 50d6045 2 API calls 8695->8696 8697 50d28bf 8696->8697 8698 50d6045 2 API calls 8697->8698 8699 50d28c9 8698->8699 8700 50d4b53 24 API calls 8699->8700 8701 50d28e7 8700->8701 8702 50d4f12 12 API calls 8701->8702 8703 50d28f4 8702->8703 8704 50d2afd 8703->8704 8722 50d5d6d RegCreateKeyExW 8703->8722 8706 50d60cf 2 API calls 8704->8706 8708 50d2b1f 8706->8708 8707 50d295c 8723 50d5e4b RegSetValueExW 8707->8723 8709 50d2927 8709->8704 8709->8707 8712 50d299a 8709->8712 8711 50d298f 8727 50d5d9f RegCloseKey 8711->8727 8714 50d2a47 8712->8714 8721 50d29aa 8712->8721 8715 50d2a4d 8714->8715 8716 50d2ab9 8714->8716 8725 50d5e4b RegSetValueExW 8715->8725 8716->8711 8717 50d2ac5 lstrlenW 8716->8717 8726 50d5e4b RegSetValueExW 8717->8726 8724 50d5e4b RegSetValueExW 8721->8724 8722->8709 8723->8711 8724->8711 8725->8711 8726->8711 8727->8704 8728 404a2c 8729 404a51 8728->8729 8730 404a3a 8728->8730 8732 404a5f IsWindowVisible 8729->8732 8738 404a76 8729->8738 8731 404a40 8730->8731 8746 404aba 8730->8746 8733 403f0f SendMessageW 8731->8733 8735 404a6c 8732->8735 8732->8746 8736 404a4a 8733->8736 8734 404ac0 CallWindowProcW 8734->8736 8747 4049ae SendMessageW 8735->8747 8738->8734 8752 40616a lstrcpynW 8738->8752 8740 404aa5 8753 4060b2 wsprintfW 8740->8753 8742 404aac 8743 40141d 80 API calls 8742->8743 8744 404ab3 8743->8744 8754 40616a lstrcpynW 8744->8754 8746->8734 8748 4049d1 GetMessagePos ScreenToClient SendMessageW 8747->8748 8749 404a0b SendMessageW 8747->8749 8750 404a03 8748->8750 8751 404a08 8748->8751 8749->8750 8750->8738 8751->8749 8752->8740 8753->8742 8754->8746 8013 402238 8014 40145c 18 API calls 8013->8014 8015 40223e 8014->8015 8016 406404 11 API calls 8015->8016 8017 40224b 8016->8017 8018 4050d2 25 API calls 8017->8018 8019 402255 8018->8019 8020 405d9f 2 API calls 8019->8020 8021 40225b 8020->8021 8022 4022ac CloseHandle 8021->8022 8023 406404 11 API calls 8021->8023 8027 4030e3 8022->8027 8025 40226d 8023->8025 8025->8022 8026 402283 WaitForSingleObject 8025->8026 8029 406493 2 API calls 8025->8029 8026->8025 8028 402291 GetExitCodeProcess 8026->8028 8030 4022a3 8028->8030 8031 4022ae 8028->8031 8029->8026 8033 4060b2 wsprintfW 8030->8033 8031->8022 8033->8022 6687 407dc0 6688 4074a5 6687->6688 6689 407dce 6688->6689 6690 407523 GlobalFree 6688->6690 6691 40752c GlobalAlloc 6688->6691 6692 4075a4 GlobalAlloc 6688->6692 6693 40759b GlobalFree 6688->6693 6690->6691 6691->6688 6691->6689 6692->6688 6692->6689 6693->6692 8947 401cc3 8948 40145c 18 API calls 8947->8948 8949 401cca lstrlenW 8948->8949 8950 4030dc 8949->8950 8951 4030e3 8950->8951 8953 4060b2 wsprintfW 8950->8953 8953->8951 8954 50d388e 8955 50d6045 2 API calls 8954->8955 8956 50d38c6 8955->8956 8957 50d6045 2 API calls 8956->8957 8958 50d38d0 8957->8958 8959 50d4b53 24 API calls 8958->8959 8960 50d38e5 8959->8960 8961 50d4b53 24 API calls 8960->8961 8962 50d38fd 8961->8962 8969 50d5545 8962->8969 8964 50d3917 8965 50d393a 8964->8965 8966 50d5487 5 API calls 8964->8966 8967 50d60cf 2 API calls 8965->8967 8966->8965 8968 50d395f 8967->8968 8984 50d5d1b RegOpenKeyExW 8969->8984 8971 50d5563 8983 50d559d 8971->8983 8985 50d5d6d RegCreateKeyExW 8971->8985 8973 50d5591 8975 50d5605 8973->8975 8973->8983 8986 50d5dd3 RegEnumValueW 8973->8986 8987 50d5e4b RegSetValueExW 8973->8987 8978 50d5674 8975->8978 8980 50d5545 6 API calls 8975->8980 8975->8983 8988 50d5d41 RegEnumKeyExW 8975->8988 8989 50d5d9f RegCloseKey 8978->8989 8980->8975 8981 50d567d 8990 50d5d9f RegCloseKey 8981->8990 8983->8964 8984->8971 8985->8973 8986->8973 8987->8973 8988->8975 8989->8981 8990->8983 7335 1000268a 7336 100026bd 7335->7336 7337 100027ef GetCurrentProcessId GetCurrentThreadId 7335->7337 7454 1000194c GetVersionExW 7336->7454 7338 10002814 7337->7338 7339 10002d7e GlobalFree 7337->7339 7340 10002820 7338->7340 7341 10002a66 7338->7341 7342 10002d92 7339->7342 7343 10002827 7340->7343 7344 1000294e 7340->7344 7471 10001be2 GetVersionExW 7341->7471 7347 10002905 GetCurrentProcessId GetCurrentThreadId 7343->7347 7348 1000282e 7343->7348 7464 10001995 7344->7464 7352 10001be2 19 API calls 7347->7352 7353 10002835 7348->7353 7354 100028c6 GetCurrentProcessId GetCurrentThreadId 7348->7354 7356 1000290e 7352->7356 7358 10002871 GetCurrentProcessId GetCurrentThreadId 7353->7358 7359 10002838 7353->7359 7360 10001be2 19 API calls 7354->7360 7355 1000194c GetVersionExW 7361 10002a7b 7355->7361 7374 10001be2 19 API calls 7356->7374 7362 10001be2 19 API calls 7358->7362 7359->7339 7370 1000284c 7359->7370 7364 100028cf wsprintfW GetCurrentProcessId 7360->7364 7366 1000194c GetVersionExW 7361->7366 7367 1000287a SetWindowLongW 7362->7367 7389 10002949 7364->7389 7365 10002996 7369 100029a7 7365->7369 7365->7389 7372 10002a8e 7366->7372 7383 100028a3 7367->7383 7376 10002488 14 API calls 7369->7376 7493 10002488 7370->7493 7379 10002abe 7372->7379 7380 10002a9e 7372->7380 7386 10002925 wsprintfW GetLastError GetCurrentProcessId 7374->7386 7375 10002713 7375->7337 7394 1000272c CreateEventW 7375->7394 7387 100029ac 7376->7387 7384 10002af4 GetCommandLineW 7379->7384 7385 10002ac7 7379->7385 7381 10002ab0 7380->7381 7396 10002ced 7380->7396 7391 10002488 14 API calls 7381->7391 7382 10001995 3 API calls 7382->7365 7383->7339 7393 100028b8 7383->7393 7514 10001d79 7384->7514 7392 10002488 14 API calls 7385->7392 7390 10001be2 19 API calls 7386->7390 7387->7339 7400 100029e5 7387->7400 7505 10002146 7387->7505 7389->7339 7389->7342 7390->7389 7428 10002ab5 7391->7428 7392->7428 7395 10002488 14 API calls 7393->7395 7398 10002790 GetLastError 7394->7398 7399 10002741 CreateEventW 7394->7399 7404 100028bd 7395->7404 7397 10002d0b FindCloseChangeNotification 7396->7397 7402 10002d1e wsprintfW wsprintfW wsprintfW wsprintfW 7396->7402 7397->7402 7409 1000278c 7398->7409 7399->7398 7405 10002750 CreateFileMappingW 7399->7405 7407 10002146 8 API calls 7400->7407 7402->7389 7404->7339 7405->7398 7410 10002774 MapViewOfFile 7405->7410 7411 100029f9 7407->7411 7409->7337 7413 1000279e CreateThread 7409->7413 7410->7398 7410->7409 7509 100020b6 SetEvent 7411->7509 7415 100027c4 WaitForSingleObject 7413->7415 7416 100027bc GetLastError 7413->7416 7417 100026ec 7415->7417 7418 100027d6 GetExitCodeThread 7415->7418 7416->7417 7417->7337 7418->7417 7420 10002b5a 7422 10002b60 GlobalFree GlobalAlloc 7420->7422 7420->7428 7421 10002a25 7425 10002146 8 API calls 7421->7425 7422->7420 7424 10002b80 GetModuleFileNameW 7422->7424 7423 10002146 8 API calls 7423->7421 7424->7420 7426 10002ba0 lstrlenW GlobalAlloc 7424->7426 7427 10002a33 7425->7427 7426->7428 7430 10002bc8 wsprintfW 7426->7430 7427->7339 7429 10002a3e SetCurrentDirectoryW 7427->7429 7428->7396 7429->7339 7431 10002bf3 7430->7431 7432 10002be9 7430->7432 7431->7428 7434 10002c16 7431->7434 7435 10002c0c SetForegroundWindow 7431->7435 7523 10001add OpenSCManagerW 7432->7523 7436 10002c3c 7434->7436 7531 10001ba4 SHGetValueA 7434->7531 7435->7434 7539 10001ea1 7436->7539 7441 10002c26 7533 100018f6 7441->7533 7442 10002c50 7445 10002c60 UnhookWindowsHookEx 7442->7445 7443 10002c56 GetLastError 7443->7445 7446 10002c36 7445->7446 7446->7396 7447 10002c72 GetCurrentProcessId GetCurrentThreadId 7446->7447 7448 10002c80 MsgWaitForMultipleObjects 7447->7448 7449 10002ca8 GetExitCodeProcess 7448->7449 7450 10002c99 7448->7450 7451 10002cd6 CloseHandle 7449->7451 7450->7448 7452 10002ccc GetLastError 7450->7452 7546 10002042 7450->7546 7451->7396 7451->7428 7452->7451 7455 1000197f 7454->7455 7455->7417 7456 10001f54 GetCommandLineW 7455->7456 7457 10001d79 3 API calls 7456->7457 7458 10001f60 7457->7458 7459 10001f6a CharNextW 7458->7459 7460 10001f75 7458->7460 7462 10001fba 7458->7462 7459->7458 7459->7460 7461 10001995 3 API calls 7460->7461 7460->7462 7461->7462 7463 10001edc 9 API calls 7462->7463 7463->7375 7465 100019b6 7464->7465 7467 100019ce CharNextW 7465->7467 7469 100019e3 7465->7469 7466 10001a30 7466->7339 7466->7365 7466->7382 7468 100019dc CharNextW 7467->7468 7467->7469 7468->7469 7469->7466 7470 10001a16 CharNextW 7469->7470 7470->7469 7472 10001c21 SetLastError 7471->7472 7473 10001c1a 7471->7473 7472->7473 7474 10001c38 OpenThreadToken 7472->7474 7473->7355 7475 10001c61 AllocateAndInitializeSid 7474->7475 7476 10001c4b OpenProcessToken 7474->7476 7478 10001c9c 7475->7478 7479 10001d3d CloseHandle 7475->7479 7476->7475 7477 10001d46 7476->7477 7477->7473 7484 1000194c GetVersionExW 7477->7484 7480 10001ca6 7478->7480 7481 10001cb9 GetTokenInformation 7478->7481 7479->7477 7483 10001d33 FreeSid 7480->7483 7488 10001cb4 7480->7488 7482 10001cd0 GetLastError 7481->7482 7481->7483 7482->7483 7485 10001cdb GlobalAlloc 7482->7485 7483->7479 7486 10001d52 7484->7486 7485->7483 7487 10001cec GetTokenInformation 7485->7487 7486->7473 7553 10001b4d OpenProcessToken 7486->7553 7490 10001d2c GlobalFree 7487->7490 7492 10001cff 7487->7492 7488->7483 7490->7483 7491 10001d09 EqualSid 7491->7492 7492->7490 7492->7491 7494 1000249f GetWindowThreadProcessId 7493->7494 7504 10002520 SendMessageW 7493->7504 7557 10001a46 OpenProcessToken 7494->7557 7497 100024d3 GetLastError 7497->7504 7498 100024de DuplicateHandle 7499 10001a46 5 API calls 7498->7499 7500 100024fc SendMessageW 7499->7500 7501 1000252f SendMessageW 7500->7501 7500->7504 7502 10002542 SendMessageW MapViewOfFile 7501->7502 7503 10002527 Sleep 7501->7503 7502->7504 7503->7501 7504->7339 7507 1000215f 7505->7507 7506 100020b6 8 API calls 7506->7507 7507->7506 7508 100021a5 7507->7508 7508->7400 7510 10002101 7509->7510 7511 100020d8 MsgWaitForMultipleObjects 7509->7511 7510->7421 7510->7423 7511->7510 7512 100020f3 7511->7512 7512->7511 7513 10002042 6 API calls 7512->7513 7513->7512 7515 10001d87 7514->7515 7517 10001db7 7514->7517 7516 10001d91 7515->7516 7515->7517 7518 10001da8 7516->7518 7519 10001d9d CharNextW 7516->7519 7520 10001dc5 CharNextW 7517->7520 7521 10001db3 7517->7521 7518->7521 7522 10001dae CharNextW 7518->7522 7519->7516 7519->7518 7520->7517 7521->7396 7521->7420 7522->7521 7524 10001b38 GetLastError 7523->7524 7525 10001afd OpenServiceW 7523->7525 7528 10001b45 7524->7528 7526 10001b31 CloseServiceHandle 7525->7526 7527 10001b17 QueryServiceStatus 7525->7527 7526->7528 7529 10001b26 7527->7529 7530 10001b2e CloseServiceHandle 7527->7530 7528->7431 7529->7530 7530->7526 7532 10001bd6 7531->7532 7532->7436 7532->7441 7534 10001902 7533->7534 7534->7534 7535 10001909 DialogBoxParamW 7534->7535 7536 10001939 7535->7536 7537 1000192b 7535->7537 7536->7446 7537->7536 7538 10001931 GetLastError 7537->7538 7538->7536 7540 1000194c GetVersionExW 7539->7540 7541 10001eaf 7540->7541 7542 10001edb ShellExecuteExW 7541->7542 7543 1000194c GetVersionExW 7541->7543 7542->7442 7542->7443 7544 10001ebb 7543->7544 7544->7542 7545 10001ec0 GetCurrentThreadId SetWindowsHookExW 7544->7545 7545->7542 7547 10002084 PeekMessageW 7546->7547 7548 10002093 7547->7548 7549 10002054 7547->7549 7548->7450 7550 10002099 GetCurrentProcessId GetCurrentThreadId 7549->7550 7551 10002070 TranslateMessage DispatchMessageW 7549->7551 7552 1000205f IsDialogMessageW 7549->7552 7550->7548 7551->7547 7552->7547 7552->7551 7554 10001b8c GetLastError CloseHandle 7553->7554 7555 10001b6e GetTokenInformation 7553->7555 7554->7473 7555->7554 7556 10001b84 SetLastError 7555->7556 7556->7554 7558 10001a64 LookupPrivilegeValueW 7557->7558 7559 10001ad6 OpenProcess 7557->7559 7560 10001acd CloseHandle 7558->7560 7561 10001a7d AdjustTokenPrivileges 7558->7561 7559->7497 7559->7498 7560->7559 7562 10001abc 7561->7562 7563 10001aaf GetLastError 7561->7563 7562->7560 7563->7562 9013 4022cc 9014 40145c 18 API calls 9013->9014 9015 4022d3 9014->9015 9016 406436 2 API calls 9015->9016 9017 4022d9 9016->9017 9019 4022e8 9017->9019 9022 4060b2 wsprintfW 9017->9022 9020 4030e3 9019->9020 9023 4060b2 wsprintfW 9019->9023 9022->9019 9023->9020 9024 4030cf 9025 40145c 18 API calls 9024->9025 9026 4030d6 9025->9026 9028 4030dc 9026->9028 9031 40650d GlobalAlloc lstrlenW 9026->9031 9029 4030e3 9028->9029 9058 4060b2 wsprintfW 9028->9058 9037 406543 9031->9037 9039 406595 9031->9039 9032 406570 GetVersionExW 9033 40659f 9032->9033 9032->9039 9035 4065c5 LoadLibraryA 9033->9035 9036 4065ae 9033->9036 9035->9039 9040 4065e3 GetProcAddress GetProcAddress GetProcAddress 9035->9040 9038 4066e6 GlobalFree 9036->9038 9036->9039 9037->9032 9059 40618c CharUpperW 9037->9059 9041 4066fc LoadLibraryA 9038->9041 9042 40683e FreeLibrary 9038->9042 9039->9028 9045 40660b 9040->9045 9047 406756 9040->9047 9041->9039 9044 406716 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 9041->9044 9042->9039 9043 4067b2 FreeLibrary 9052 40678b 9043->9052 9044->9047 9046 40662f FreeLibrary GlobalFree 9045->9046 9045->9047 9053 40664b 9045->9053 9046->9039 9047->9043 9047->9052 9048 40665d lstrcpyW OpenProcess 9050 4066b0 CloseHandle CharUpperW lstrcmpW 9048->9050 9048->9053 9049 40684b 9051 406850 CloseHandle FreeLibrary 9049->9051 9050->9047 9050->9053 9054 406865 CloseHandle 9051->9054 9052->9049 9055 4067e6 lstrcmpW 9052->9055 9056 406817 CloseHandle 9052->9056 9057 406835 CloseHandle 9052->9057 9053->9038 9053->9048 9053->9050 9054->9051 9055->9052 9055->9054 9056->9052 9057->9042 9058->9029 9059->9037 9071 401cd5 9072 401446 18 API calls 9071->9072 9073 401cdd 9072->9073 9074 401446 18 API calls 9073->9074 9075 401ce8 9074->9075 9076 40145c 18 API calls 9075->9076 9077 401cf1 9076->9077 9078 401d07 lstrlenW 9077->9078 9079 401d43 9077->9079 9080 401d11 9078->9080 9080->9079 9084 40616a lstrcpynW 9080->9084 9082 401d2c 9082->9079 9083 401d39 lstrlenW 9082->9083 9083->9079 9084->9082 6694 4039e3 #17 SetErrorMode OleInitialize 6767 40645d GetModuleHandleA 6694->6767 6698 403a51 GetCommandLineW 6772 40616a lstrcpynW 6698->6772 6700 403a63 GetModuleHandleW 6701 403a7b 6700->6701 6773 405e66 6701->6773 6704 403b36 6705 403b55 GetTempPathW 6704->6705 6777 403914 6705->6777 6707 403b6b 6708 403b93 DeleteFileW 6707->6708 6709 403b6f GetWindowsDirectoryW lstrcatW 6707->6709 6785 403679 GetTickCount GetModuleFileNameW 6708->6785 6711 403914 11 API calls 6709->6711 6710 405e66 CharNextW 6716 403a9c 6710->6716 6713 403b8b 6711->6713 6713->6708 6762 403c2c 6713->6762 6714 403ba7 6718 405e66 CharNextW 6714->6718 6754 403c11 6714->6754 6714->6762 6716->6704 6716->6710 6723 403b38 6716->6723 6729 403bbe 6718->6729 6721 403c41 6912 405e00 6721->6912 6722 403d2e 6725 403db1 6722->6725 6727 40645d 3 API calls 6722->6727 6873 40616a lstrcpynW 6723->6873 6731 403d3d 6727->6731 6732 403c57 lstrcatW lstrcmpiW 6729->6732 6733 403be9 6729->6733 6734 40645d 3 API calls 6731->6734 6736 403c73 CreateDirectoryW SetCurrentDirectoryW 6732->6736 6732->6762 6874 4068df 6733->6874 6737 403d46 6734->6737 6739 403c96 6736->6739 6740 403c8b 6736->6740 6741 40645d 3 API calls 6737->6741 6917 40616a lstrcpynW 6739->6917 6916 40616a lstrcpynW 6740->6916 6744 403d4f 6741->6744 6747 403d9d ExitWindowsEx 6744->6747 6753 403d5d GetCurrentProcess 6744->6753 6746 403ca4 6918 40616a lstrcpynW 6746->6918 6747->6725 6750 403daa 6747->6750 6748 403c06 6889 40616a lstrcpynW 6748->6889 6945 40141d 6750->6945 6757 403d6d 6753->6757 6815 405a8c 6754->6815 6757->6747 6758 403cd9 CopyFileW 6763 403cb3 6758->6763 6759 403d22 6761 406dc9 42 API calls 6759->6761 6761->6762 6903 4039a1 6762->6903 6763->6759 6764 406966 18 API calls 6763->6764 6766 403d0d CloseHandle 6763->6766 6919 406966 6763->6919 6937 406dc9 6763->6937 6942 405d9f CreateProcessW 6763->6942 6764->6763 6766->6763 6768 406480 GetProcAddress 6767->6768 6769 406475 LoadLibraryA 6767->6769 6770 403a26 SHGetFileInfoW 6768->6770 6769->6768 6769->6770 6771 40616a lstrcpynW 6770->6771 6771->6698 6772->6700 6774 405e6c 6773->6774 6775 403a8a CharNextW 6774->6775 6776 405e73 CharNextW 6774->6776 6775->6716 6776->6774 6948 406199 6777->6948 6779 40392a 6779->6707 6780 403920 6780->6779 6957 406883 lstrlenW CharPrevW 6780->6957 6964 405fb0 GetFileAttributesW CreateFileW 6785->6964 6787 4036bc 6814 4036c9 6787->6814 6965 40616a lstrcpynW 6787->6965 6789 4036df 6966 4068b2 lstrlenW 6789->6966 6793 4036f0 GetFileSize 6798 403707 6793->6798 6808 4037a5 6793->6808 6797 403829 GlobalAlloc 6799 403840 6797->6799 6801 403881 6798->6801 6807 4032e7 33 API calls 6798->6807 6798->6808 6798->6814 6971 403389 ReadFile 6798->6971 6804 405fe0 2 API calls 6799->6804 6802 4032e7 33 API calls 6801->6802 6802->6814 6803 403812 6805 403389 ReadFile 6803->6805 6806 403851 CreateFileW 6804->6806 6810 40381d 6805->6810 6809 403890 6806->6809 6806->6814 6807->6798 6973 4032e7 6808->6973 6988 4033bb SetFilePointer 6809->6988 6810->6797 6810->6814 6812 40389e 6989 403550 6812->6989 6814->6714 6814->6814 6816 40645d 3 API calls 6815->6816 6817 405aa0 6816->6817 6818 405aa6 6817->6818 6819 405ab8 6817->6819 7053 4060b2 wsprintfW 6818->7053 7054 406034 RegOpenKeyExW 6819->7054 6823 405b08 lstrcatW 6824 405ab6 6823->6824 7044 403ff5 6824->7044 6825 406034 3 API calls 6825->6823 6828 4068df 18 API calls 6829 405b3a 6828->6829 6830 405bd0 6829->6830 6832 406034 3 API calls 6829->6832 6831 4068df 18 API calls 6830->6831 6833 405bd6 6831->6833 6834 405b6c 6832->6834 6835 405be6 6833->6835 6836 406966 18 API calls 6833->6836 6834->6830 6838 405b8f lstrlenW 6834->6838 6842 405e66 CharNextW 6834->6842 6837 405c06 LoadImageW 6835->6837 7060 403fd4 6835->7060 6836->6835 6839 405c31 RegisterClassW 6837->6839 6840 405cc6 6837->6840 6843 405bc3 6838->6843 6844 405b9d lstrcmpiW 6838->6844 6846 405c79 SystemParametersInfoW CreateWindowExW 6839->6846 6871 403c21 6839->6871 6841 40141d 80 API calls 6840->6841 6848 405ccc 6841->6848 6849 405b8a 6842->6849 6847 406883 3 API calls 6843->6847 6844->6843 6850 405bad GetFileAttributesW 6844->6850 6846->6840 6852 405bc9 6847->6852 6855 403ff5 19 API calls 6848->6855 6848->6871 6849->6838 6853 405bb9 6850->6853 6851 405bfc 6851->6837 7059 40616a lstrcpynW 6852->7059 6853->6843 6856 4068b2 2 API calls 6853->6856 6857 405cdd 6855->6857 6856->6843 6858 405ce9 ShowWindow LoadLibraryW 6857->6858 6859 405d6c 6857->6859 6861 405d08 LoadLibraryW 6858->6861 6862 405d0f GetClassInfoW 6858->6862 7065 4051a7 OleInitialize 6859->7065 6861->6862 6864 405d23 GetClassInfoW RegisterClassW 6862->6864 6865 405d39 DialogBoxParamW 6862->6865 6863 405d72 6866 405d76 6863->6866 6867 405d8e 6863->6867 6864->6865 6868 40141d 80 API calls 6865->6868 6870 40141d 80 API calls 6866->6870 6866->6871 6869 40141d 80 API calls 6867->6869 6872 405d61 6868->6872 6869->6871 6870->6871 6890 406248 6871->6890 6872->6871 6873->6705 7212 40616a lstrcpynW 6874->7212 6876 4068f0 6877 405eb9 4 API calls 6876->6877 6878 4068f6 6877->6878 6879 406199 5 API calls 6878->6879 6886 403bf7 6878->6886 6885 406906 6879->6885 6880 40693e lstrlenW 6881 406945 6880->6881 6880->6885 6883 406883 3 API calls 6881->6883 6882 406436 2 API calls 6882->6885 6884 40694b GetFileAttributesW 6883->6884 6884->6886 6885->6880 6885->6882 6885->6886 6887 4068b2 2 API calls 6885->6887 6886->6762 6888 40616a lstrcpynW 6886->6888 6887->6880 6888->6748 6889->6754 6891 406271 6890->6891 6892 406254 6890->6892 6893 406265 6891->6893 6895 4062e8 6891->6895 6896 40628e 6891->6896 6892->6893 6894 40625e CloseHandle 6892->6894 6893->6762 6894->6893 6895->6893 6897 4062f1 lstrcatW lstrlenW WriteFile 6895->6897 6896->6897 6898 406297 GetFileAttributesW 6896->6898 6897->6893 7213 405fb0 GetFileAttributesW CreateFileW 6898->7213 6900 4062b3 6900->6893 6901 4062c3 WriteFile 6900->6901 6902 4062dd SetFilePointer 6900->6902 6901->6902 6902->6895 6904 4039b2 CloseHandle 6903->6904 6905 4039bc 6903->6905 6904->6905 6906 4039d0 6905->6906 6907 4039c6 CloseHandle 6905->6907 7214 403de3 6906->7214 6907->6906 6913 405e15 6912->6913 6914 403c4f ExitProcess 6913->6914 6915 405e2b MessageBoxIndirectW 6913->6915 6915->6914 6916->6739 6917->6746 6918->6763 6932 406973 6919->6932 6920 406be0 6921 403ccc DeleteFileW 6920->6921 7276 40616a lstrcpynW 6920->7276 6921->6758 6921->6763 6923 406a34 GetVersion 6923->6932 6924 406ba7 lstrlenW 6924->6932 6926 406966 10 API calls 6926->6924 6928 406034 3 API calls 6928->6932 6929 406ab3 GetSystemDirectoryW 6929->6932 6930 406199 5 API calls 6930->6932 6931 406ac6 GetWindowsDirectoryW 6931->6932 6932->6920 6932->6923 6932->6924 6932->6926 6932->6928 6932->6929 6932->6930 6932->6931 6933 406966 10 API calls 6932->6933 6934 406b40 lstrcatW 6932->6934 6935 406afa SHGetSpecialFolderLocation 6932->6935 7274 4060b2 wsprintfW 6932->7274 7275 40616a lstrcpynW 6932->7275 6933->6932 6934->6932 6935->6932 6936 406b12 SHGetPathFromIDListW CoTaskMemFree 6935->6936 6936->6932 6938 40645d 3 API calls 6937->6938 6939 406dd0 6938->6939 6941 406df1 6939->6941 7277 406bfa lstrcpyW 6939->7277 6941->6763 6943 405dda 6942->6943 6944 405dce CloseHandle 6942->6944 6943->6763 6944->6943 6946 40139d 80 API calls 6945->6946 6947 401432 6946->6947 6947->6725 6951 4061a6 6948->6951 6949 40621c 6950 406222 CharPrevW 6949->6950 6953 406242 6949->6953 6950->6949 6951->6949 6952 40620f CharNextW 6951->6952 6954 405e66 CharNextW 6951->6954 6955 4061fb CharNextW 6951->6955 6956 40620a CharNextW 6951->6956 6952->6949 6952->6951 6953->6780 6954->6951 6955->6951 6956->6952 6958 4068a0 lstrcatW 6957->6958 6959 403932 CreateDirectoryW 6957->6959 6958->6959 6960 405fe0 6959->6960 6961 405fed GetTickCount GetTempFileNameW 6960->6961 6962 406023 6961->6962 6963 403946 6961->6963 6962->6961 6962->6963 6963->6707 6964->6787 6965->6789 6967 4068c1 6966->6967 6968 4036e5 6967->6968 6969 4068c7 CharPrevW 6967->6969 6970 40616a lstrcpynW 6968->6970 6969->6967 6969->6968 6970->6793 6972 4033aa 6971->6972 6972->6798 6974 403310 6973->6974 6975 4032f8 6973->6975 6977 403320 GetTickCount 6974->6977 6978 403318 6974->6978 6976 403301 DestroyWindow 6975->6976 6979 403308 6975->6979 6976->6979 6977->6979 6981 40332e 6977->6981 7005 406493 6978->7005 6979->6797 6979->6814 7004 4033bb SetFilePointer 6979->7004 6982 403363 CreateDialogParamW ShowWindow 6981->6982 6983 403336 6981->6983 6982->6979 6983->6979 7009 40324c 6983->7009 6985 403344 wsprintfW 7012 4050d2 6985->7012 6988->6812 6990 403560 SetFilePointer 6989->6990 6991 40357a 6989->6991 6990->6991 7023 4033d2 GetTickCount 6991->7023 6994 403638 6994->6814 6995 40358b ReadFile 6995->6994 6996 4035ac 6995->6996 6996->6994 6997 4033d2 43 API calls 6996->6997 6998 4035c3 6997->6998 6998->6994 6999 40363e ReadFile 6998->6999 7001 4035d3 6998->7001 6999->6994 7001->6994 7002 4035ee ReadFile 7001->7002 7003 403607 WriteFile 7001->7003 7002->6994 7002->7001 7003->6994 7003->7001 7004->6803 7006 4064b0 PeekMessageW 7005->7006 7007 4064c0 7006->7007 7008 4064a6 DispatchMessageW 7006->7008 7007->6979 7008->7006 7010 40325b 7009->7010 7011 40325d MulDiv 7009->7011 7010->7011 7011->6985 7013 4050eb 7012->7013 7022 403361 7012->7022 7014 405109 lstrlenW 7013->7014 7015 406966 18 API calls 7013->7015 7016 405132 7014->7016 7017 405117 lstrlenW 7014->7017 7015->7014 7019 405145 7016->7019 7020 405138 SetWindowTextW 7016->7020 7018 405129 lstrcatW 7017->7018 7017->7022 7018->7016 7021 40514b SendMessageW SendMessageW SendMessageW 7019->7021 7019->7022 7020->7019 7021->7022 7022->6979 7024 403530 7023->7024 7025 403401 7023->7025 7026 4032e7 33 API calls 7024->7026 7036 4033bb SetFilePointer 7025->7036 7032 403537 7026->7032 7028 40340c SetFilePointer 7034 403431 7028->7034 7029 403389 ReadFile 7029->7034 7031 4032e7 33 API calls 7031->7034 7032->6994 7032->6995 7033 4034ca WriteFile 7033->7032 7033->7034 7034->7029 7034->7031 7034->7032 7034->7033 7035 403521 SetFilePointer 7034->7035 7037 407473 7034->7037 7035->7024 7036->7028 7038 407493 7037->7038 7039 40749b 7037->7039 7038->7034 7039->7038 7040 407523 GlobalFree 7039->7040 7041 40752c GlobalAlloc 7039->7041 7042 4075a4 GlobalAlloc 7039->7042 7043 40759b GlobalFree 7039->7043 7040->7041 7041->7038 7041->7039 7042->7038 7042->7039 7043->7042 7045 404009 7044->7045 7073 4060b2 wsprintfW 7045->7073 7047 40407d 7048 406966 18 API calls 7047->7048 7049 404089 SetWindowTextW 7048->7049 7050 4040a4 7049->7050 7051 4040bf 7050->7051 7052 406966 18 API calls 7050->7052 7051->6828 7052->7050 7053->6824 7055 406068 RegQueryValueExW 7054->7055 7056 405ae9 7054->7056 7057 40608a RegCloseKey 7055->7057 7056->6823 7056->6825 7057->7056 7059->6830 7074 40616a lstrcpynW 7060->7074 7062 403fe8 7063 406883 3 API calls 7062->7063 7064 403fee lstrcatW 7063->7064 7064->6851 7075 403f0f 7065->7075 7067 4051ca 7070 406404 11 API calls 7067->7070 7072 4051f5 7067->7072 7078 40139d 7067->7078 7068 403f0f SendMessageW 7069 405205 OleUninitialize 7068->7069 7069->6863 7070->7067 7072->7068 7073->7047 7074->7062 7076 403f27 7075->7076 7077 403f18 SendMessageW 7075->7077 7076->7067 7077->7076 7081 4013a4 7078->7081 7079 401410 7079->7067 7081->7079 7082 4013dd MulDiv SendMessageW 7081->7082 7083 4015a0 7081->7083 7082->7081 7084 4015fa 7083->7084 7163 40160c 7083->7163 7085 401601 7084->7085 7086 401742 7084->7086 7087 401962 7084->7087 7088 4019ca 7084->7088 7089 40176e 7084->7089 7090 4017b1 7084->7090 7091 401672 7084->7091 7092 401693 7084->7092 7093 401616 7084->7093 7094 4016d6 7084->7094 7095 401897 7084->7095 7096 4018db 7084->7096 7097 40163c 7084->7097 7098 4016bd 7084->7098 7125 401736 7084->7125 7126 401650 7084->7126 7084->7163 7105 406404 11 API calls 7085->7105 7111 401751 ShowWindow 7086->7111 7112 401758 7086->7112 7102 40145c 18 API calls 7087->7102 7109 40145c 18 API calls 7088->7109 7099 40145c 18 API calls 7089->7099 7192 40145c 7090->7192 7100 40145c 18 API calls 7091->7100 7203 401446 7092->7203 7108 40145c 18 API calls 7093->7108 7124 401446 18 API calls 7094->7124 7094->7163 7101 40145c 18 API calls 7095->7101 7106 40145c 18 API calls 7096->7106 7110 401647 PostQuitMessage 7097->7110 7097->7163 7107 406404 11 API calls 7098->7107 7114 401775 7099->7114 7115 401678 7100->7115 7116 40189d 7101->7116 7117 401968 GetFullPathNameW 7102->7117 7105->7163 7120 4018e2 7106->7120 7121 4016c7 SetForegroundWindow 7107->7121 7122 40161c 7108->7122 7123 4019d1 SearchPathW 7109->7123 7110->7163 7111->7112 7113 401765 ShowWindow 7112->7113 7112->7163 7113->7163 7128 406404 11 API calls 7114->7128 7129 406404 11 API calls 7115->7129 7207 406436 FindFirstFileW 7116->7207 7131 4019a1 7117->7131 7132 40197f 7117->7132 7119 40169a 7134 406404 11 API calls 7119->7134 7135 40145c 18 API calls 7120->7135 7121->7163 7136 406404 11 API calls 7122->7136 7123->7163 7124->7163 7125->7163 7211 4060b2 wsprintfW 7125->7211 7189 406404 lstrlenW wvsprintfW 7126->7189 7139 401785 SetFileAttributesW 7128->7139 7140 401683 7129->7140 7153 4019b8 GetShortPathNameW 7131->7153 7131->7163 7132->7131 7159 406436 2 API calls 7132->7159 7133 406404 11 API calls 7142 4017c9 7133->7142 7143 4016a7 7134->7143 7144 4018eb 7135->7144 7145 401627 7136->7145 7147 40179a 7139->7147 7139->7163 7157 4050d2 25 API calls 7140->7157 7141 4018a5 7148 4018c2 7141->7148 7149 4018a9 7141->7149 7197 405eb9 CharNextW CharNextW 7142->7197 7151 4016b1 Sleep 7143->7151 7152 4016ae 7143->7152 7154 40145c 18 API calls 7144->7154 7155 4050d2 25 API calls 7145->7155 7146 40139d 65 API calls 7146->7163 7156 406404 11 API calls 7147->7156 7160 406404 11 API calls 7148->7160 7158 406404 11 API calls 7149->7158 7151->7163 7152->7151 7153->7163 7161 4018f5 7154->7161 7155->7163 7156->7163 7157->7163 7158->7163 7162 401991 7159->7162 7160->7163 7165 406404 11 API calls 7161->7165 7162->7131 7210 40616a lstrcpynW 7162->7210 7163->7081 7164 401864 7164->7140 7166 40186e 7164->7166 7168 401902 MoveFileW 7165->7168 7169 4050d2 25 API calls 7166->7169 7167 405e66 CharNextW 7171 4017e6 CreateDirectoryW 7167->7171 7168->7140 7172 40191e 7168->7172 7173 401875 7169->7173 7174 4017fe GetLastError 7171->7174 7185 4017d4 7171->7185 7175 401942 7172->7175 7180 406436 2 API calls 7172->7180 7206 40616a lstrcpynW 7173->7206 7177 401827 GetFileAttributesW 7174->7177 7178 40180b GetLastError 7174->7178 7182 406404 11 API calls 7175->7182 7177->7185 7183 406404 11 API calls 7178->7183 7179 406404 11 API calls 7179->7185 7184 401929 7180->7184 7181 401882 SetCurrentDirectoryW 7181->7163 7182->7163 7183->7185 7184->7175 7186 406dc9 42 API calls 7184->7186 7185->7164 7185->7167 7185->7179 7187 401936 7186->7187 7188 4050d2 25 API calls 7187->7188 7188->7175 7190 406248 9 API calls 7189->7190 7191 401664 7190->7191 7191->7146 7193 406966 18 API calls 7192->7193 7194 401488 7193->7194 7195 401497 7194->7195 7196 406199 5 API calls 7194->7196 7195->7133 7196->7195 7198 405ed6 7197->7198 7199 405ee8 7197->7199 7198->7199 7200 405ee3 CharNextW 7198->7200 7201 405e66 CharNextW 7199->7201 7202 405f0c 7199->7202 7200->7202 7201->7199 7202->7185 7204 406966 18 API calls 7203->7204 7205 401455 7204->7205 7205->7119 7206->7181 7208 406457 7207->7208 7209 40644c FindClose 7207->7209 7208->7141 7209->7208 7210->7131 7211->7163 7212->6876 7213->6900 7215 403df1 7214->7215 7216 4039d5 7215->7216 7217 403df6 FreeLibrary GlobalFree 7215->7217 7218 406dfc 7216->7218 7217->7216 7217->7217 7219 4068df 18 API calls 7218->7219 7220 406e0f 7219->7220 7221 406e18 DeleteFileW 7220->7221 7222 406e2f 7220->7222 7223 4039e1 OleUninitialize 7221->7223 7225 406fac 7222->7225 7269 40616a lstrcpynW 7222->7269 7223->6721 7223->6722 7225->7223 7229 406fb9 7225->7229 7232 406436 2 API calls 7225->7232 7226 406e5a 7227 406e64 lstrcatW 7226->7227 7228 406e6e 7226->7228 7230 406e74 7227->7230 7231 4068b2 2 API calls 7228->7231 7236 406404 11 API calls 7229->7236 7234 406e84 lstrcatW 7230->7234 7235 406e7a 7230->7235 7231->7230 7233 406fc5 7232->7233 7233->7223 7237 406fc9 7233->7237 7238 406e8c lstrlenW FindFirstFileW 7234->7238 7235->7234 7235->7238 7236->7223 7239 406883 3 API calls 7237->7239 7240 406f9c 7238->7240 7246 406eb3 7238->7246 7241 406fcf 7239->7241 7240->7225 7243 406404 11 API calls 7241->7243 7242 405e66 CharNextW 7242->7246 7244 406fda 7243->7244 7245 405f90 2 API calls 7244->7245 7249 406fe2 RemoveDirectoryW 7245->7249 7246->7242 7247 406f79 FindNextFileW 7246->7247 7256 406404 11 API calls 7246->7256 7259 406dfc 72 API calls 7246->7259 7266 4050d2 25 API calls 7246->7266 7267 4050d2 25 API calls 7246->7267 7268 406dc9 42 API calls 7246->7268 7270 40616a lstrcpynW 7246->7270 7271 405f90 GetFileAttributesW 7246->7271 7247->7246 7250 406f91 FindClose 7247->7250 7251 407025 7249->7251 7252 406fee 7249->7252 7250->7240 7253 4050d2 25 API calls 7251->7253 7254 407011 7252->7254 7255 406ff4 7252->7255 7253->7223 7254->7229 7257 406404 11 API calls 7255->7257 7256->7246 7258 406ffe 7257->7258 7260 4050d2 25 API calls 7258->7260 7259->7246 7262 407008 7260->7262 7264 406dc9 42 API calls 7262->7264 7265 40700f 7264->7265 7265->7223 7266->7247 7267->7246 7268->7246 7269->7226 7270->7246 7272 405fad DeleteFileW 7271->7272 7273 405f9f SetFileAttributesW 7271->7273 7272->7246 7273->7272 7274->6932 7275->6932 7276->6921 7278 406c48 GetShortPathNameW 7277->7278 7279 406c1f 7277->7279 7281 406c61 7278->7281 7282 406dc3 7278->7282 7303 405fb0 GetFileAttributesW CreateFileW 7279->7303 7281->7282 7284 406c69 WideCharToMultiByte 7281->7284 7282->6941 7283 406c28 CloseHandle GetShortPathNameW 7283->7282 7285 406c40 7283->7285 7284->7282 7286 406c86 WideCharToMultiByte 7284->7286 7285->7278 7285->7282 7286->7282 7287 406c9e wsprintfA 7286->7287 7288 406966 18 API calls 7287->7288 7289 406cca 7288->7289 7304 405fb0 GetFileAttributesW CreateFileW 7289->7304 7291 406cd7 7291->7282 7292 406ce4 GetFileSize GlobalAlloc 7291->7292 7293 406d05 ReadFile 7292->7293 7294 406db9 CloseHandle 7292->7294 7293->7294 7295 406d1f 7293->7295 7294->7282 7295->7294 7305 405f16 lstrlenA 7295->7305 7298 406d38 lstrcpyA 7301 406d5a 7298->7301 7299 406d4c 7300 405f16 4 API calls 7299->7300 7300->7301 7302 406d91 SetFilePointer WriteFile GlobalFree 7301->7302 7302->7294 7303->7283 7304->7291 7306 405f57 lstrlenA 7305->7306 7307 405f30 lstrcmpiA 7306->7307 7308 405f5f 7306->7308 7307->7308 7309 405f4e CharNextA 7307->7309 7308->7298 7308->7299 7309->7306 9381 50d33aa 9382 50d6045 2 API calls 9381->9382 9383 50d33e2 9382->9383 9384 50d4b53 24 API calls 9383->9384 9385 50d33f7 9384->9385 9395 50d5d6d RegCreateKeyExW 9385->9395 9387 50d341d 9388 50d3424 9387->9388 9389 50d3451 9387->9389 9396 50d5d9f RegCloseKey 9388->9396 9391 50d60cf 2 API calls 9389->9391 9392 50d344f 9391->9392 9393 50d342d 9394 50d60cf 2 API calls 9393->9394 9394->9392 9395->9387 9396->9393 9397 50d35a7 9398 50d6045 2 API calls 9397->9398 9399 50d35f4 9398->9399 9400 50d4b53 24 API calls 9399->9400 9401 50d3609 9400->9401 9414 50d5d1b RegOpenKeyExW 9401->9414 9403 50d3625 9404 50d369b 9403->9404 9415 50d5d41 RegEnumKeyExW 9403->9415 9407 50d60cf 2 API calls 9404->9407 9406 50d3648 9408 50d366d 9406->9408 9416 50d5dd3 RegEnumValueW 9406->9416 9410 50d36c0 9407->9410 9417 50d5d9f RegCloseKey 9408->9417 9412 50d3684 9412->9404 9413 50d5487 5 API calls 9412->9413 9413->9404 9414->9403 9415->9406 9416->9408 9417->9412 7604 4023f0 7605 402403 7604->7605 7606 4024da 7604->7606 7607 40145c 18 API calls 7605->7607 7608 4050d2 25 API calls 7606->7608 7609 40240a 7607->7609 7614 4024f1 7608->7614 7610 40145c 18 API calls 7609->7610 7611 402413 7610->7611 7612 402429 LoadLibraryExW 7611->7612 7613 40241b GetModuleHandleW 7611->7613 7615 40243e 7612->7615 7616 4024ce 7612->7616 7613->7612 7613->7615 7634 4064c6 GlobalAlloc WideCharToMultiByte 7615->7634 7617 4050d2 25 API calls 7616->7617 7617->7606 7619 402449 7620 40248c 7619->7620 7621 40244f 7619->7621 7622 4050d2 25 API calls 7620->7622 7623 402457 7621->7623 7624 40246e 7621->7624 7625 402496 7622->7625 7772 401435 7623->7772 7637 50d4120 7624->7637 7679 50d4822 7624->7679 7718 70262a4f 7624->7718 7760 50d2432 7624->7760 7627 406404 11 API calls 7625->7627 7628 40245f 7627->7628 7628->7614 7629 4024c0 FreeLibrary 7628->7629 7629->7614 7635 4064f1 GetProcAddress 7634->7635 7636 4064fe GlobalFree 7634->7636 7635->7636 7636->7619 7775 50d6045 7637->7775 7641 50d49e3 7804 50d6268 wsprintfW 7641->7804 7642 50d49d1 7801 50d6023 7642->7801 7645 50d5e75 lstrcpynW lstrlenW lstrcpynW lstrlenW 7669 50d4190 7645->7669 7647 50d42a1 lstrcpynW lstrlenW 7647->7669 7648 50d4221 lstrcpynW lstrlenW 7648->7669 7649 50d4b53 24 API calls 7649->7669 7653 50d4384 lstrlenW 7653->7669 7654 50d441b lstrcpynW lstrlenW 7654->7669 7655 50d44cd 7655->7669 7798 50d5e05 RegDeleteValueW 7655->7798 7657 50d44f4 lstrcpynW lstrlenW 7657->7669 7658 50d4556 lstrlenW 7799 50d5e4b RegSetValueExW 7658->7799 7659 50d45ab lstrcpynW lstrcmpW 7661 50d45de lstrlenW 7659->7661 7662 50d4662 lstrcmpW 7659->7662 7661->7669 7663 50d4682 lstrcmpW 7662->7663 7662->7669 7665 50d46a2 lstrcmpW 7663->7665 7663->7669 7664 50d47fa lstrlenW 7664->7669 7666 50d46c2 lstrcmpW 7665->7666 7665->7669 7668 50d46e2 lstrcmpW 7666->7668 7666->7669 7667 50d461f lstrcpynW 7667->7669 7668->7669 7670 50d4702 lstrcmpW 7668->7670 7669->7641 7669->7642 7669->7645 7669->7647 7669->7648 7669->7649 7669->7653 7669->7654 7669->7655 7669->7657 7669->7658 7669->7659 7669->7664 7669->7667 7672 50d5e4b RegSetValueExW 7669->7672 7787 50d5d6d RegCreateKeyExW 7669->7787 7788 50d5487 lstrlenW 7669->7788 7800 50d5d9f RegCloseKey 7669->7800 7670->7669 7671 50d4722 lstrcmpW 7670->7671 7671->7669 7673 50d4742 lstrcmpW 7671->7673 7672->7669 7673->7669 7674 50d4762 lstrcmpW 7673->7674 7674->7669 7675 50d477f lstrcmpW 7674->7675 7675->7669 7676 50d479c lstrcmpW 7675->7676 7676->7669 7677 50d47b9 lstrcmpW 7676->7677 7677->7669 7678 50d47d6 lstrcmpW 7677->7678 7678->7669 7703 50d41ba 7679->7703 7680 50d5e4b RegSetValueExW 7680->7703 7681 50d5e75 lstrcpynW lstrlenW lstrcpynW lstrlenW 7681->7703 7683 50d49d1 7684 50d6023 GlobalFree 7683->7684 7686 50d49e3 7684->7686 7685 50d4384 lstrlenW 7685->7703 7687 50d6268 3 API calls 7686->7687 7688 50d49f8 7687->7688 7688->7628 7689 50d42a1 lstrcpynW lstrlenW 7689->7703 7690 50d4221 lstrcpynW lstrlenW 7690->7703 7691 50d4b53 24 API calls 7691->7703 7692 50d441b lstrcpynW lstrlenW 7692->7703 7693 50d44cd 7693->7703 7829 50d5e05 RegDeleteValueW 7693->7829 7694 50d5487 5 API calls 7694->7703 7697 50d44f4 lstrcpynW lstrlenW 7697->7703 7698 50d4556 lstrlenW 7830 50d5e4b RegSetValueExW 7698->7830 7699 50d45ab lstrcpynW lstrcmpW 7701 50d45de lstrlenW 7699->7701 7702 50d4662 lstrcmpW 7699->7702 7701->7703 7702->7703 7704 50d4682 lstrcmpW 7702->7704 7703->7680 7703->7681 7703->7683 7703->7685 7703->7689 7703->7690 7703->7691 7703->7692 7703->7693 7703->7694 7703->7697 7703->7698 7703->7699 7705 50d47fa lstrlenW 7703->7705 7708 50d461f lstrcpynW 7703->7708 7827 50d5d6d RegCreateKeyExW 7703->7827 7828 50d5d9f RegCloseKey 7703->7828 7704->7703 7706 50d46a2 lstrcmpW 7704->7706 7705->7703 7706->7703 7707 50d46c2 lstrcmpW 7706->7707 7707->7703 7709 50d46e2 lstrcmpW 7707->7709 7708->7703 7709->7703 7710 50d4702 lstrcmpW 7709->7710 7710->7703 7711 50d4722 lstrcmpW 7710->7711 7711->7703 7712 50d4742 lstrcmpW 7711->7712 7712->7703 7713 50d4762 lstrcmpW 7712->7713 7713->7703 7714 50d477f lstrcmpW 7713->7714 7714->7703 7715 50d479c lstrcmpW 7714->7715 7715->7703 7716 50d47b9 lstrcmpW 7715->7716 7716->7703 7717 50d47d6 lstrcmpW 7716->7717 7717->7703 7719 70262a7f 7718->7719 7831 70261c1b 7719->7831 7721 70262a86 7722 70262b9c 7721->7722 7723 70262a97 7721->7723 7724 70262a9e 7721->7724 7722->7628 7891 702623c1 7723->7891 7872 702628a3 7724->7872 7729 70262ae4 7904 70262445 7729->7904 7730 70262b02 7734 70262b44 7730->7734 7735 70262b08 7730->7735 7731 70262ab4 7740 70262ac5 7731->7740 7741 70262aba 7731->7741 7732 70262acd 7744 70262ac3 7732->7744 7901 70261507 7732->7901 7738 70262445 11 API calls 7734->7738 7736 70261904 3 API calls 7735->7736 7743 70262b1e 7736->7743 7745 70262b36 7738->7745 7895 702625b2 7740->7895 7741->7744 7885 7026124c 7741->7885 7749 70262445 11 API calls 7743->7749 7744->7729 7744->7730 7751 70262b8b 7745->7751 7926 7026240b 7745->7926 7748 70262acb 7748->7744 7749->7745 7751->7722 7753 70262b95 GlobalFree 7751->7753 7752 702615e0 2 API calls 7755 70262af6 GlobalFree 7752->7755 7753->7722 7755->7745 7757 70262b77 7757->7751 7930 70261880 wsprintfW 7757->7930 7759 70262b70 FreeLibrary 7759->7757 7761 50d6045 2 API calls 7760->7761 7762 50d2471 7761->7762 7946 50d4b53 lstrlenW 7762->7946 7766 50d24a2 7767 50d24b8 7766->7767 7981 50d5d9f RegCloseKey 7766->7981 7768 50d24b2 7767->7768 7768->7767 7770 50d60cf 2 API calls 7768->7770 7771 50d24d7 7770->7771 7771->7628 7773 4050d2 25 API calls 7772->7773 7774 401443 7773->7774 7774->7628 7776 50d604e 7775->7776 7777 50d4182 7775->7777 7776->7777 7778 50d6053 lstrcpyW GlobalFree 7776->7778 7779 50d5f42 CreateFileW 7777->7779 7778->7777 7780 50d6004 7779->7780 7781 50d5f92 SetFilePointer GetFileSize 7779->7781 7782 50d600a GlobalFree 7780->7782 7783 50d6014 7780->7783 7781->7780 7784 50d5fb7 GlobalAlloc 7781->7784 7782->7783 7783->7669 7784->7780 7785 50d5fcf ReadFile 7784->7785 7785->7780 7786 50d5feb CloseHandle 7785->7786 7786->7783 7787->7669 7789 50d54a8 7788->7789 7790 50d54d0 7789->7790 7807 50d5d1b RegOpenKeyExW 7789->7807 7790->7669 7792 50d54fb 7792->7790 7808 50d5db7 RegDeleteKeyW 7792->7808 7794 50d550f 7797 50d5528 7794->7797 7809 50d53cd 7794->7809 7819 50d5d9f RegCloseKey 7797->7819 7798->7655 7799->7669 7800->7669 7802 50d602e GlobalFree 7801->7802 7803 50d6043 7801->7803 7802->7803 7803->7641 7824 50d60cf 7804->7824 7807->7792 7808->7794 7820 50d5d1b RegOpenKeyExW 7809->7820 7811 50d53fc 7813 50d5461 7811->7813 7814 50d53cd 4 API calls 7811->7814 7818 50d547a 7811->7818 7821 50d5d41 RegEnumKeyExW 7811->7821 7822 50d5d9f RegCloseKey 7813->7822 7814->7811 7816 50d546a 7823 50d5db7 RegDeleteKeyW 7816->7823 7818->7797 7819->7790 7820->7811 7821->7811 7822->7816 7823->7818 7825 50d60d8 GlobalAlloc lstrcpynW 7824->7825 7826 50d49f8 7824->7826 7825->7826 7826->7628 7827->7703 7828->7703 7829->7693 7830->7703 7933 70261581 GlobalAlloc 7831->7933 7833 70261c3f 7934 70261581 GlobalAlloc 7833->7934 7835 70261c4a 7836 702615a3 3 API calls 7835->7836 7863 70261c52 7836->7863 7837 70261e60 GlobalFree GlobalFree GlobalFree 7838 70261e7d 7837->7838 7854 70261ec7 7837->7854 7841 702621ad 7838->7841 7850 70261e99 7838->7850 7838->7854 7839 70261d04 GlobalAlloc 7839->7863 7840 702621ed GetModuleHandleW 7844 702621fe LoadLibraryW 7840->7844 7845 7026220f lstrcmpiW 7840->7845 7841->7840 7841->7854 7842 70261d55 lstrcpyW 7846 70261d5f lstrcpyW 7842->7846 7843 70261d7a GlobalFree 7843->7863 7844->7845 7844->7854 7847 70262221 lstrcmpiW 7845->7847 7848 7026222d 7845->7848 7846->7863 7847->7848 7849 70262296 7847->7849 7848->7849 7855 70262257 lstrlenW 7848->7855 7939 7026194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 7849->7939 7852 70261592 2 API calls 7850->7852 7850->7854 7852->7854 7853 702622a8 7853->7854 7857 702622b8 lstrcpyW lstrcatW 7853->7857 7854->7721 7861 70262264 7855->7861 7862 70262282 7855->7862 7940 7026194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 7857->7940 7858 7026216c lstrcpyW 7858->7863 7859 70261dbc 7859->7863 7935 702618df GlobalSize GlobalAlloc 7859->7935 7860 70262019 GlobalFree 7860->7863 7861->7862 7870 70262276 lstrcatW 7861->7870 7938 7026194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 7862->7938 7863->7837 7863->7839 7863->7842 7863->7843 7863->7846 7863->7858 7863->7859 7863->7860 7866 70261592 2 API calls 7863->7866 7937 70261581 GlobalAlloc 7863->7937 7866->7863 7868 702622f2 7868->7854 7869 70262302 lstrcatW 7868->7869 7869->7854 7870->7862 7871 7026228e 7871->7854 7876 702628bb 7872->7876 7873 70261592 2 API calls 7873->7876 7874 702615a3 3 API calls 7874->7876 7875 70261628 2 API calls 7875->7876 7876->7873 7876->7874 7876->7875 7877 70262a18 GlobalFree 7876->7877 7879 702629d0 GlobalAlloc WideCharToMultiByte 7876->7879 7880 7026297b GlobalAlloc lstrcpynW 7876->7880 7882 70262957 lstrlenW 7876->7882 7877->7876 7878 70262a49 7877->7878 7878->7731 7878->7732 7878->7744 7879->7876 7880->7876 7881 702629b0 GlobalAlloc CLSIDFromString GlobalFree 7880->7881 7881->7877 7882->7877 7884 70262966 7882->7884 7884->7877 7941 70262554 7884->7941 7887 7026125e 7885->7887 7886 70261303 CreateToolhelp32Snapshot 7888 70261321 7886->7888 7887->7886 7889 70261412 GetLastError 7888->7889 7890 7026141d 7888->7890 7889->7890 7890->7744 7892 702623d1 7891->7892 7894 70262407 7891->7894 7893 702623e3 GlobalAlloc 7892->7893 7892->7894 7893->7892 7894->7724 7898 702625cd 7895->7898 7896 7026261f 7899 70262625 GlobalSize 7896->7899 7900 7026262f 7896->7900 7897 7026260c GlobalAlloc 7897->7900 7898->7896 7898->7897 7899->7900 7900->7748 7903 70261512 7901->7903 7902 70261552 GlobalFree 7903->7902 7909 7026245e 7904->7909 7906 702624f3 lstrcpyW 7906->7909 7907 702624e2 wsprintfW 7907->7909 7908 7026253e GlobalFree 7908->7909 7913 7026254f 7908->7913 7909->7906 7909->7907 7909->7908 7910 70262515 GlobalFree 7909->7910 7911 702624bf MultiByteToWideChar 7909->7911 7912 70262528 7909->7912 7914 702624a1 lstrcpynW 7909->7914 7916 70262490 StringFromGUID2 7909->7916 7917 7026164f lstrcpyW 7909->7917 7944 70261581 GlobalAlloc 7909->7944 7910->7909 7911->7909 7912->7909 7915 702615e0 2 API calls 7912->7915 7918 70261904 7913->7918 7914->7909 7915->7912 7916->7909 7917->7909 7945 70261581 GlobalAlloc 7918->7945 7920 7026190a 7921 70261917 lstrcpyW 7920->7921 7923 70261931 7920->7923 7924 7026194b 7921->7924 7923->7924 7925 70261936 wsprintfW 7923->7925 7924->7752 7925->7924 7927 7026241a 7926->7927 7929 70262442 7926->7929 7928 70262432 GlobalFree 7927->7928 7927->7929 7928->7927 7929->7757 7929->7759 7931 702615e0 2 API calls 7930->7931 7932 702618aa 7931->7932 7932->7751 7933->7833 7934->7835 7936 702618fd 7935->7936 7936->7859 7937->7863 7938->7871 7939->7853 7940->7868 7942 70262562 VirtualAlloc 7941->7942 7943 702625aa 7941->7943 7942->7943 7943->7884 7944->7909 7945->7920 7947 50d4b83 lstrcpynW 7946->7947 7949 50d4c5e 7947->7949 7950 50d4cd9 lstrcmpiW 7949->7950 7951 50d4cc4 lstrcpynW 7949->7951 7952 50d4cef lstrcmpiW 7950->7952 7953 50d4d05 7950->7953 7951->7950 7952->7953 7954 50d4d28 lstrcmpiW 7952->7954 7955 50d4d14 lstrcpyW 7953->7955 7978 50d2486 7953->7978 7956 50d4d3e lstrcmpiW 7954->7956 7957 50d4d54 7954->7957 7955->7978 7956->7957 7959 50d4d77 lstrcmpiW 7956->7959 7958 50d4d63 lstrcpyW 7957->7958 7957->7978 7958->7978 7960 50d4d8d lstrcmpiW 7959->7960 7961 50d4da3 7959->7961 7960->7961 7962 50d4dc6 lstrcmpiW 7960->7962 7963 50d4db2 lstrcpyW 7961->7963 7961->7978 7964 50d4ddc lstrcmpiW 7962->7964 7965 50d4df2 7962->7965 7963->7978 7964->7965 7966 50d4e15 lstrcmpiW 7964->7966 7967 50d4e01 lstrcpyW 7965->7967 7965->7978 7968 50d4e2b lstrcmpiW 7966->7968 7969 50d4e41 7966->7969 7967->7978 7968->7969 7970 50d4e64 lstrcmpiW 7968->7970 7971 50d4e50 lstrcpyW 7969->7971 7969->7978 7972 50d4e7a lstrcmpiW 7970->7972 7973 50d4e90 7970->7973 7971->7978 7972->7973 7974 50d4eb0 lstrcmpiW 7972->7974 7975 50d4e9f lstrcpyW 7973->7975 7973->7978 7976 50d4edc 7974->7976 7977 50d4ec6 lstrcmpiW 7974->7977 7975->7978 7976->7978 7979 50d4eeb lstrcpyW 7976->7979 7977->7976 7977->7978 7980 50d5d1b RegOpenKeyExW 7978->7980 7979->7978 7980->7766 7981->7768 9446 4020f9 GetDC GetDeviceCaps 9447 401446 18 API calls 9446->9447 9448 402116 MulDiv 9447->9448 9449 401446 18 API calls 9448->9449 9450 40212c 9449->9450 9451 406966 18 API calls 9450->9451 9452 402165 CreateFontIndirectW 9451->9452 9453 4030dc 9452->9453 9454 4030e3 9453->9454 9456 4060b2 wsprintfW 9453->9456 9456->9454 8060 4019fd 8061 40145c 18 API calls 8060->8061 8062 401a04 8061->8062 8063 405fe0 2 API calls 8062->8063 8064 401a0b 8063->8064 9507 402afd 9508 40145c 18 API calls 9507->9508 9509 402b04 9508->9509 9514 405fb0 GetFileAttributesW CreateFileW 9509->9514 9511 402b10 9512 4030e3 9511->9512 9515 4060b2 wsprintfW 9511->9515 9514->9511 9515->9512 9516 4029ff 9517 401553 19 API calls 9516->9517 9518 402a09 9517->9518 9519 40145c 18 API calls 9518->9519 9520 402a12 9519->9520 9521 402a1f RegQueryValueExW 9520->9521 9524 401a13 9520->9524 9522 4029e4 RegCloseKey 9521->9522 9523 402a3f 9521->9523 9522->9524 9523->9522 9527 4060b2 wsprintfW 9523->9527 9527->9522 9667 50d36c4 9668 50d6045 2 API calls 9667->9668 9669 50d3711 9668->9669 9670 50d6045 2 API calls 9669->9670 9671 50d371b 9670->9671 9672 50d6045 2 API calls 9671->9672 9673 50d3725 9672->9673 9674 50d6045 2 API calls 9673->9674 9675 50d372f 9674->9675 9676 50d4b53 24 API calls 9675->9676 9677 50d3744 9676->9677 9678 50d4b53 24 API calls 9677->9678 9679 50d375c 9678->9679 9696 50d5d1b RegOpenKeyExW 9679->9696 9681 50d3775 9682 50d3837 9681->9682 9697 50d5e21 RegQueryValueExW 9681->9697 9685 50d60cf 2 API calls 9682->9685 9684 50d379d 9686 50d3828 9684->9686 9698 50d5d6d RegCreateKeyExW 9684->9698 9688 50d3859 9685->9688 9702 50d5d9f RegCloseKey 9686->9702 9690 50d37d0 9690->9686 9699 50d5e4b RegSetValueExW 9690->9699 9692 50d37f9 9700 50d5d9f RegCloseKey 9692->9700 9694 50d3808 9694->9686 9701 50d5e05 RegDeleteValueW 9694->9701 9696->9681 9697->9684 9698->9690 9699->9692 9700->9694 9701->9686 9702->9682 8006 402797 8007 40145c 18 API calls 8006->8007 8008 4027ae 8007->8008 8009 40145c 18 API calls 8008->8009 8010 4027b7 8009->8010 8011 40145c 18 API calls 8010->8011 8012 4027c0 GetPrivateProfileStringW lstrcmpW 8011->8012 9749 50d2dd3 9750 50d6045 2 API calls 9749->9750 9751 50d2e28 9750->9751 9752 50d6045 2 API calls 9751->9752 9753 50d2e32 9752->9753 9754 50d6238 2 API calls 9753->9754 9755 50d2e37 9754->9755 9756 50d4b53 24 API calls 9755->9756 9757 50d2e4f 9756->9757 9775 50d5d1b RegOpenKeyExW 9757->9775 9759 50d2e68 9761 50d2f12 9759->9761 9776 50d5e21 RegQueryValueExW 9759->9776 9764 50d60cf 2 API calls 9761->9764 9762 50d2e90 9777 50d5d9f RegCloseKey 9762->9777 9766 50d2f85 9764->9766 9765 50d2e9f 9765->9761 9767 50d5110 3 API calls 9765->9767 9769 50d60cf 2 API calls 9766->9769 9768 50d2ec7 9767->9768 9771 50d2f2a 9768->9771 9772 50d2f02 lstrlenW 9768->9772 9770 50d2fa3 9769->9770 9771->9761 9773 50d2f30 lstrlenW 9771->9773 9772->9761 9773->9761 9774 50d2f44 lstrlenW 9773->9774 9774->9761 9775->9759 9776->9762 9777->9765 8121 402b9f 8122 401446 18 API calls 8121->8122 8126 402ba7 8122->8126 8123 402c4a 8124 401446 18 API calls 8129 402c3d 8124->8129 8125 402bdf ReadFile 8125->8126 8125->8129 8126->8123 8126->8125 8127 402c06 MultiByteToWideChar 8126->8127 8128 402c3f 8126->8128 8126->8129 8130 402c4f 8126->8130 8127->8126 8127->8130 8136 4060b2 wsprintfW 8128->8136 8129->8123 8129->8124 8134 402d15 8129->8134 8130->8129 8132 402c6b SetFilePointer 8130->8132 8132->8129 8133 402d17 ReadFile 8133->8129 8133->8134 8134->8129 8134->8133 8135 402d99 8134->8135 8135->8123 8136->8123 7326 402da5 7327 402dac 7326->7327 7328 4030e3 7326->7328 7329 401446 18 API calls 7327->7329 7330 402db8 7329->7330 7331 402dbf SetFilePointer 7330->7331 7331->7328 7332 402dcf 7331->7332 7332->7328 7334 4060b2 wsprintfW 7332->7334 7334->7328 7982 401cb2 7983 40145c 18 API calls 7982->7983 7984 401c54 7983->7984 7985 406404 11 API calls 7984->7985 7988 401c64 7984->7988 7986 401c59 7985->7986 7987 406dfc 81 API calls 7986->7987 7987->7988 8034 401eb9 8035 401f24 8034->8035 8036 401ec6 8034->8036 8038 401f53 GlobalAlloc 8035->8038 8039 401f28 8035->8039 8037 401ed5 8036->8037 8043 401ef7 8036->8043 8040 406404 11 API calls 8037->8040 8041 406966 18 API calls 8038->8041 8042 406404 11 API calls 8039->8042 8046 401f36 8039->8046 8052 401ee2 8040->8052 8045 401f46 8041->8045 8042->8046 8056 40616a lstrcpynW 8043->8056 8048 402708 8045->8048 8049 402387 GlobalFree 8045->8049 8058 40616a lstrcpynW 8046->8058 8049->8048 8050 406966 18 API calls 8050->8052 8051 401f06 8057 40616a lstrcpynW 8051->8057 8052->8048 8052->8050 8054 401f15 8059 40616a lstrcpynW 8054->8059 8056->8051 8057->8054 8058->8045 8059->8048

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 1000268a-100026b7 1 100026bd-100026ea call 1000194c 0->1 2 100027ef-1000280e GetCurrentProcessId GetCurrentThreadId 0->2 21 100026f8-10002719 call 10001f54 call 10001edc 1->21 22 100026ec-100026f3 1->22 3 10002814-1000281a 2->3 4 10002d7e-10002d8c GlobalFree 2->4 5 10002820-10002821 3->5 6 10002a66-10002a9c call 10001be2 call 1000194c * 2 3->6 8 10002d92-10002d9b 4->8 11 10002827-10002828 5->11 12 1000294e-10002960 call 10001995 5->12 62 10002abe-10002ac5 6->62 63 10002a9e-10002aaa 6->63 9 10002daa-10002dad 8->9 10 10002d9d-10002da3 8->10 10->9 15 10002905-10002913 GetCurrentProcessId GetCurrentThreadId call 10001be2 11->15 16 1000282e-1000282f 11->16 12->4 32 10002966-10002974 12->32 35 10002915-1000291a 15->35 36 1000291c 15->36 23 10002835-10002836 16->23 24 100028c6-100028d4 GetCurrentProcessId GetCurrentThreadId call 10001be2 16->24 21->2 72 1000271f-10002726 21->72 22->2 29 10002871-10002886 GetCurrentProcessId GetCurrentThreadId call 10001be2 23->29 30 10002838-10002839 23->30 49 100028d6-100028db 24->49 50 100028dd 24->50 55 10002888 29->55 56 1000288d-100028a1 SetWindowLongW 29->56 30->4 38 1000283f-10002846 30->38 40 10002976-1000297a 32->40 41 1000299a-100029a1 32->41 44 10002920-10002949 call 10001be2 wsprintfW GetLastError GetCurrentProcessId call 10001be2 35->44 36->44 38->4 48 1000284c-1000286c call 10002488 SendMessageW 38->48 51 10002986-10002989 40->51 52 1000297c-10002984 40->52 46 100029a7-100029b2 call 10002488 41->46 47 10002a58-10002a61 41->47 76 10002d77-10002d7c 44->76 46->4 85 100029b8-100029da 46->85 47->4 48->4 61 100028e1-10002900 wsprintfW GetCurrentProcessId 49->61 50->61 51->41 54 1000298b-10002996 call 10001995 51->54 52->40 52->51 54->41 55->56 67 100028a3 56->67 68 100028ab-100028b2 56->68 61->76 69 10002af4-10002afb 62->69 70 10002ac7-10002ad2 call 10002488 62->70 64 10002ab0-10002ab9 call 10002488 63->64 65 10002cf1-10002cf8 63->65 64->65 77 10002cfa-10002d02 65->77 78 10002d1e-10002d26 65->78 67->68 68->4 83 100028b8-100028c1 call 10002488 68->83 86 10002afd-10002b02 69->86 100 10002ad8-10002aef 70->100 101 10002ced 70->101 72->2 84 1000272c-1000273f CreateEventW 72->84 76->4 76->8 90 10002d04 77->90 91 10002d0b-10002d17 FindCloseChangeNotification 77->91 98 10002d28 78->98 99 10002d2c-10002d74 wsprintfW * 4 78->99 83->4 93 10002790 GetLastError 84->93 94 10002741-1000274e CreateEventW 84->94 95 100029e5-10002a19 call 10002146 call 100020b6 85->95 96 100029dc-100029e0 call 10002146 85->96 86->86 97 10002b04-10002b4c GetCommandLineW call 10001d79 86->97 90->91 91->78 107 10002796-1000279c 93->107 94->93 103 10002750-10002772 CreateFileMappingW 94->103 122 10002a25-10002a38 call 10002146 95->122 123 10002a1b-10002a20 call 10002146 95->123 96->95 97->101 114 10002b52-10002b54 97->114 98->99 99->76 100->65 101->65 103->93 108 10002774-1000278a MapViewOfFile 103->108 107->2 111 1000279e-100027ba CreateThread 107->111 108->93 112 1000278c-1000278e 108->112 115 100027c4-100027d4 WaitForSingleObject 111->115 116 100027bc-100027c2 GetLastError 111->116 112->107 114->101 121 10002b5a 114->121 118 100027d6-100027e1 GetExitCodeThread 115->118 119 100027e7 115->119 117 100027eb 116->117 117->2 118->119 119->117 124 10002b60-10002b74 GlobalFree GlobalAlloc 121->124 122->4 133 10002a3e-10002a53 SetCurrentDirectoryW 122->133 123->122 126 10002b80-10002b8c GetModuleFileNameW 124->126 127 10002b76-10002b7e 124->127 129 10002b8e-10002b99 126->129 130 10002ba0-10002bb9 lstrlenW GlobalAlloc 126->130 127->129 129->124 132 10002b9b 129->132 134 10002bc8-10002be7 wsprintfW 130->134 135 10002bbb-10002bc3 130->135 132->101 133->4 136 10002c04-10002c0a 134->136 137 10002be9-10002bf5 call 10001add 134->137 135->101 139 10002c16-10002c1b 136->139 140 10002c0c-10002c10 SetForegroundWindow 136->140 137->136 145 10002bf7-10002bff 137->145 142 10002c3c-10002c4e call 10001ea1 ShellExecuteExW 139->142 143 10002c1d-10002c24 call 10001ba4 139->143 140->139 150 10002c50-10002c54 142->150 151 10002c56-10002c5c GetLastError 142->151 143->142 149 10002c26-10002c3a call 100018f6 143->149 145->101 155 10002c6c-10002c70 149->155 153 10002c60-10002c66 UnhookWindowsHookEx 150->153 151->153 153->155 155->101 156 10002c72-10002c7e GetCurrentProcessId GetCurrentThreadId 155->156 157 10002c80-10002c97 MsgWaitForMultipleObjects 156->157 158 10002ca8-10002cca GetExitCodeProcess 157->158 159 10002c99-10002c9a 157->159 160 10002cd6-10002ce7 CloseHandle 158->160 161 10002ccc-10002cd2 GetLastError 159->161 162 10002c9c-10002ca6 call 10002042 159->162 160->101 163 10002ce9 160->163 161->160 162->157 163->101
                          APIs
                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,10004408,00000001), ref: 10002736
                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10002745
                          • CreateFileMappingW.KERNELBASE(000000FF,00000000,08000004,00000000,00000000,00000000), ref: 10002765
                          • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000), ref: 1000277D
                          • CreateThread.KERNELBASE(00000000,00000001,10002349,00000000,00000000,00000000), ref: 100027AD
                          • GetLastError.KERNEL32 ref: 100027BC
                          • GetCurrentProcessId.KERNEL32 ref: 100027F5
                          • GetCurrentThreadId.KERNEL32 ref: 100027FD
                          • SendMessageW.USER32(00008004,0000053A,00000000), ref: 10002866
                          • GetCurrentProcessId.KERNEL32 ref: 10002871
                          • GetCurrentThreadId.KERNEL32 ref: 10002873
                          • SetWindowLongW.USER32(?,000000FC,100025BA), ref: 10002894
                          • GetCurrentProcessId.KERNEL32 ref: 100028C6
                          • wsprintfW.USER32 ref: 100028F5
                          • GetCurrentProcessId.KERNEL32 ref: 100028FE
                          • GetCurrentProcessId.KERNEL32 ref: 10002905
                          • wsprintfW.USER32 ref: 1000292F
                          • GetLastError.KERNEL32 ref: 10002938
                          • GetCurrentProcessId.KERNEL32 ref: 10002942
                            • Part of subcall function 10001995: CharNextW.USER32(?,?,?,771B2E90,?,771ADF10,1000295B,?,00000000,00000000), ref: 100019CF
                            • Part of subcall function 10001995: CharNextW.USER32(00000000,?,771B2E90,?,771ADF10,1000295B,?,00000000,00000000), ref: 100019DD
                          • SetCurrentDirectoryW.KERNEL32(-10002408,00000001,?,00000017,00000001,00000000), ref: 10002A4D
                          • GetCurrentThreadId.KERNEL32 ref: 10002907
                            • Part of subcall function 10001BE2: SetLastError.KERNEL32(00000000), ref: 10001C22
                          • GetCurrentThreadId.KERNEL32 ref: 100028C8
                            • Part of subcall function 10001BE2: GetVersionExW.KERNEL32(00000114,?,771B2E90), ref: 10001C10
                          • GlobalFree.KERNEL32(?), ref: 10002D8C
                            • Part of subcall function 1000194C: GetVersionExW.KERNEL32(00000114,?), ref: 10001974
                          • GetCommandLineW.KERNEL32(00000000,00000001), ref: 10002B06
                          • GlobalFree.KERNEL32(00000000), ref: 10002B61
                          • GlobalAlloc.KERNEL32(00000040,00000000), ref: 10002B6E
                            • Part of subcall function 10002488: GetWindowThreadProcessId.USER32(?,?), ref: 100024A9
                            • Part of subcall function 10002488: OpenProcess.KERNEL32(00000040,00000000,?,SeDebugPrivilege,00000001,?,?,771B2E90), ref: 100024C6
                            • Part of subcall function 10002488: GetLastError.KERNEL32(?,771B2E90), ref: 100024D3
                          • FindCloseChangeNotification.KERNELBASE ref: 10002D11
                          • wsprintfW.USER32 ref: 10002D47
                          • wsprintfW.USER32 ref: 10002D55
                          • wsprintfW.USER32 ref: 10002D61
                          • wsprintfW.USER32 ref: 10002D72
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Current$Process$Threadwsprintf$CreateErrorLast$Global$CharEventFileFreeNextVersionWindow$AllocChangeCloseCommandDirectoryFindLineLongMappingMessageNotificationOpenSendView
                          • String ID: /UAC:%X /NCRC%s$runas$seclogon
                          • API String ID: 2530454560-462553597
                          • Opcode ID: 73ff17370230964a78374dfa29cc8e79be62d33509881e24be56eff2d626fe21
                          • Instruction ID: ff1822c73bc9f771132c37108fbe12d48ffa4c58f50466b060dbd87fb1f046ef
                          • Opcode Fuzzy Hash: 73ff17370230964a78374dfa29cc8e79be62d33509881e24be56eff2d626fe21
                          • Instruction Fuzzy Hash: 4912BCB0808351AFF701DF64CC88B9E7BE8FB457C4F420819F58492269DBB49D88CB66

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 166 50d4120-50d4195 call 50d6045 call 50d5f42 171 50d49e8 166->171 172 50d419b-50d41a9 166->172 175 50d49ef-50d49fb call 50d6268 171->175 173 50d41af-50d41b5 172->173 174 50d49d3 172->174 177 50d41ba-50d41ca call 50d5e75 173->177 176 50d49da-50d49e6 call 50d6023 174->176 176->175 184 50d41d1-50d41dc 177->184 185 50d41de-50d41e9 184->185 186 50d41eb-50d41f4 184->186 185->186 187 50d41f6-50d4201 185->187 186->184 188 50d49c7-50d49cb 187->188 189 50d4207-50d421b 187->189 188->177 190 50d49d1 188->190 191 50d42a1-50d42c7 lstrcpynW lstrlenW 189->191 192 50d4221-50d4250 lstrcpynW lstrlenW 189->192 190->176 194 50d42ca-50d42d5 191->194 193 50d4253-50d425e 192->193 195 50d426b-50d429c call 50d4b53 call 50d5487 193->195 196 50d4260-50d4269 193->196 197 50d42d7-50d42e0 194->197 198 50d42e2-50d432a call 50d4b53 call 50d5d6d 194->198 195->188 196->193 197->194 207 50d49c0 198->207 208 50d4330-50d4334 198->208 207->188 209 50d433b-50d434b call 50d5e75 208->209 210 50d4336 208->210 216 50d4352-50d435d 209->216 211 50d49b2-50d49be call 50d5d9f 210->211 211->188 217 50d436c-50d4375 216->217 218 50d435f-50d436a 216->218 217->216 218->217 219 50d4377-50d4382 218->219 220 50d43ae-50d43b9 219->220 221 50d4384-50d43a9 lstrlenW 219->221 222 50d43cc-50d43d7 220->222 223 50d43bb-50d43c6 220->223 221->211 225 50d43d9-50d43e2 222->225 226 50d43e7-50d43f2 222->226 223->222 224 50d49a8-50d49ac 223->224 224->208 224->211 227 50d4487-50d4498 call 50d62cf 225->227 226->227 228 50d43f8-50d440b call 50d62cf 226->228 235 50d449b-50d44a6 227->235 233 50d440d-50d444b call 50d62cf lstrcpynW lstrlenW 228->233 234 50d4482 228->234 243 50d444e-50d4459 233->243 234->224 237 50d44a8-50d44b3 235->237 238 50d44b5-50d44be 235->238 237->238 240 50d44c0-50d44cb 237->240 238->235 241 50d44cd-50d44de call 50d5e05 240->241 242 50d44e3-50d44ee 240->242 241->224 245 50d458a-50d459a call 50d62cf 242->245 246 50d44f4-50d4524 lstrcpynW lstrlenW 242->246 247 50d445b-50d4464 243->247 248 50d4466-50d4480 call 50d5b8c 243->248 245->224 257 50d45a0-50d45d8 call 50d62cf lstrcpynW lstrcmpW 245->257 250 50d4527-50d4532 246->250 247->243 248->227 253 50d453f-50d4585 call 50d5b8c lstrlenW call 50d5e4b 250->253 254 50d4534-50d453d 250->254 253->224 254->250 263 50d45de-50d45f7 lstrlenW 257->263 264 50d4662-50d4674 lstrcmpW 257->264 266 50d45fa-50d4605 263->266 267 50d4676-50d467d 264->267 268 50d4682-50d4694 lstrcmpW 264->268 269 50d4614-50d461d 266->269 270 50d4607-50d4612 266->270 271 50d47fa-50d4813 lstrlenW 267->271 272 50d4696-50d469d 268->272 273 50d46a2-50d46b4 lstrcmpW 268->273 269->266 270->269 276 50d461f-50d4655 lstrcpynW call 50d1e77 call 50d5e4b 270->276 271->224 277 50d4819-50d4835 271->277 272->271 274 50d46b6-50d46bd 273->274 275 50d46c2-50d46d4 lstrcmpW 273->275 274->271 278 50d46d6-50d46dd 275->278 279 50d46e2-50d46f4 lstrcmpW 275->279 295 50d465a-50d465d 276->295 285 50d4988-50d49a5 call 50d5e4b 277->285 286 50d483b-50d4846 277->286 278->271 282 50d46f6-50d46fd 279->282 283 50d4702-50d4714 lstrcmpW 279->283 282->271 287 50d4716-50d471d 283->287 288 50d4722-50d4734 lstrcmpW 283->288 285->224 290 50d485f-50d486a 286->290 291 50d4848-50d4858 call 50d5e75 286->291 287->271 293 50d4736-50d473d 288->293 294 50d4742-50d4754 lstrcmpW 288->294 298 50d486c-50d4877 290->298 299 50d4879-50d4884 290->299 291->290 293->271 303 50d4756-50d475d 294->303 304 50d4762-50d4774 lstrcmpW 294->304 295->224 298->299 300 50d48b5-50d48c4 298->300 301 50d4886-50d4891 299->301 302 50d4893-50d489e 299->302 308 50d48d7-50d48db 300->308 309 50d48c6-50d48ca 300->309 301->300 301->302 306 50d497b-50d497f 302->306 307 50d48a4-50d48af 302->307 303->271 310 50d477f-50d4791 lstrcmpW 304->310 311 50d4776-50d477d 304->311 313 50d4981 306->313 314 50d4983 306->314 307->300 307->306 315 50d48dd-50d48e1 308->315 316 50d48ee-50d48f2 308->316 309->308 312 50d48cc-50d48d5 309->312 317 50d479c-50d47ae lstrcmpW 310->317 318 50d4793-50d479a 310->318 311->271 321 50d4903-50d491b 312->321 313->285 314->285 315->316 322 50d48e3-50d48ec 315->322 316->321 323 50d48f4-50d48f8 316->323 319 50d47b9-50d47cb lstrcmpW 317->319 320 50d47b0-50d47b7 317->320 318->271 324 50d47cd-50d47d4 319->324 325 50d47d6-50d47e8 lstrcmpW 319->325 320->271 327 50d491d-50d4921 321->327 328 50d492e-50d4932 321->328 322->321 323->321 326 50d48fa-50d4900 323->326 324->271 331 50d47ea-50d47f1 325->331 332 50d47f3 325->332 326->321 327->328 333 50d4923-50d492c 327->333 329 50d4945-50d4949 328->329 330 50d4934-50d4938 328->330 334 50d495a-50d4978 329->334 336 50d494b-50d494f 329->336 330->329 335 50d493a-50d4943 330->335 331->271 332->271 333->334 334->306 335->334 336->334 337 50d4951-50d4957 336->337 337->334
                          APIs
                            • Part of subcall function 050D6045: lstrcpyW.KERNEL32(?,?), ref: 050D605E
                            • Part of subcall function 050D6045: GlobalFree.KERNEL32 ref: 050D606F
                            • Part of subcall function 050D5F42: CreateFileW.KERNELBASE(00000000,80000000,00000000,00000000,00000003,00000080,00000000), ref: 050D5F83
                            • Part of subcall function 050D5F42: SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000), ref: 050D5F9C
                            • Part of subcall function 050D5F42: GetFileSize.KERNEL32(000000FF,00000000), ref: 050D5FA8
                            • Part of subcall function 050D5F42: GlobalAlloc.KERNEL32(00000040,000000FD), ref: 050D5FC0
                            • Part of subcall function 050D5F42: ReadFile.KERNELBASE(000000FF,00000000,000000FF,00000000,00000000), ref: 050D5FE1
                            • Part of subcall function 050D5F42: CloseHandle.KERNEL32(000000FF), ref: 050D5FEF
                            • Part of subcall function 050D5E75: lstrcpynW.KERNEL32(050D41C4,007437C0,-050D89A1,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5ED1
                            • Part of subcall function 050D5E75: lstrlenW.KERNEL32(050D41C4,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5EDB
                            • Part of subcall function 050D5E75: lstrlenW.KERNEL32(050D41C4,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5F30
                          • lstrcpynW.KERNEL32(05130EC0,"DisableDisallowedTrafficAlert"=dword:00000001,00000248,?,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D4238
                          • lstrlenW.KERNEL32(05130EC0,?,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D4243
                          • lstrcpynW.KERNEL32(05130EC0,"DisableDisallowedTrafficAlert"=dword:00000001,00000248,?,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D42AF
                          • lstrlenW.KERNEL32(05130EC0,?,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D42BA
                            • Part of subcall function 050D5E75: lstrcpynW.KERNEL32(050D41C4,007437C0,00010000,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5F1F
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D4389
                          • lstrcpynW.KERNEL32(050F8A00,050D89DE,050D89DF), ref: 050D4433
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D443E
                          • lstrcpynW.KERNEL32(050F8A00,050D89DE,00020000), ref: 050D450C
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D4517
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D455E
                          • lstrcpynW.KERNEL32(050F8A00,"DisableDisallowedTrafficAlert"=dword:00000001,050D89DF), ref: 050D45C0
                          • lstrcmpW.KERNEL32(050F8A00,dword), ref: 050D45D0
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D45EA
                          • lstrcpynW.KERNEL32(050F8A00,"DisableDisallowedTrafficAlert"=dword:00000001,00000009), ref: 050D462A
                          • lstrcmpW.KERNEL32(050F8A00,hex), ref: 050D466C
                          • lstrcmpW.KERNEL32(050F8A00,hex(0)), ref: 050D468C
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D47FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrlen$lstrcpyn$File$lstrcmp$Global$AllocCloseCreateFreeHandlePointerReadSizelstrcpy
                          • String ID: "DisableDisallowedTrafficAlert"=dword:00000001$C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg$F$F$dword$hex$hex(0)$hex(1)$hex(2)$hex(3)$hex(4)$hex(5)$hex(6)$hex(7)$hex(8)$hex(9)$hex(a)$hex(b)
                          • API String ID: 2960896406-4204981277
                          • Opcode ID: 1b3a3464bd3aba8a8f335b4c651dcd1fd4cebaef4f81174fb5dbaca1fc9bd3c6
                          • Instruction ID: b1f0920ac5dba266420d01260b72adf9880dc294823f497c3a2ed73ca3297d5b
                          • Opcode Fuzzy Hash: 1b3a3464bd3aba8a8f335b4c651dcd1fd4cebaef4f81174fb5dbaca1fc9bd3c6
                          • Instruction Fuzzy Hash: E5327B71A013099BDF14DFA4E886AFEFBB2FF49715F148019E502BA284DBB05985CB71

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 484 4039e3-403a79 #17 SetErrorMode OleInitialize call 40645d SHGetFileInfoW call 40616a GetCommandLineW call 40616a GetModuleHandleW 491 403a83-403a97 call 405e66 CharNextW 484->491 492 403a7b-403a7e 484->492 495 403b2a-403b30 491->495 492->491 496 403b36 495->496 497 403a9c-403aa2 495->497 500 403b55-403b6d GetTempPathW call 403914 496->500 498 403aa4-403aaa 497->498 499 403aac-403ab0 497->499 498->498 498->499 502 403ab2-403ab7 499->502 503 403ab8-403abc 499->503 507 403b93-403bad DeleteFileW call 403679 500->507 508 403b6f-403b8d GetWindowsDirectoryW lstrcatW call 403914 500->508 502->503 505 403b18-403b25 call 405e66 503->505 506 403abe-403ac5 503->506 505->495 521 403b27 505->521 510 403ac7-403ace 506->510 511 403ada-403aec call 403948 506->511 524 403c2c-403c3b call 4039a1 OleUninitialize 507->524 525 403baf-403bb5 507->525 508->507 508->524 516 403ad0-403ad3 510->516 517 403ad5 510->517 522 403b01-403b16 call 403948 511->522 523 403aee-403af5 511->523 516->511 516->517 517->511 521->495 522->505 539 403b38-403b50 call 407ecf call 40616a 522->539 527 403af7-403afa 523->527 528 403afc 523->528 537 403c41-403c51 call 405e00 ExitProcess 524->537 538 403d2e-403d34 524->538 530 403c15-403c1c call 405a8c 525->530 531 403bb7-403bc0 call 405e66 525->531 527->522 527->528 528->522 536 403c21-403c27 call 406248 530->536 542 403bd9-403bdb 531->542 536->524 544 403db1-403db9 538->544 545 403d36-403d53 call 40645d * 3 538->545 539->500 549 403bc2-403bd4 call 403948 542->549 550 403bdd-403be7 542->550 551 403dbb 544->551 552 403dbf 544->552 575 403d55-403d57 545->575 576 403d9d-403da8 ExitWindowsEx 545->576 549->550 563 403bd6 549->563 557 403c57-403c71 lstrcatW lstrcmpiW 550->557 558 403be9-403bf9 call 4068df 550->558 551->552 557->524 562 403c73-403c89 CreateDirectoryW SetCurrentDirectoryW 557->562 558->524 569 403bfb-403c11 call 40616a * 2 558->569 566 403c96-403cb6 call 40616a * 2 562->566 567 403c8b-403c91 call 40616a 562->567 563->542 583 403cbb-403cd7 call 406966 DeleteFileW 566->583 567->566 569->530 575->576 581 403d59-403d5b 575->581 576->544 580 403daa-403dac call 40141d 576->580 580->544 581->576 585 403d5d-403d6f GetCurrentProcess 581->585 590 403d18-403d20 583->590 591 403cd9-403ce9 CopyFileW 583->591 585->576 592 403d71-403d93 585->592 590->583 594 403d22-403d29 call 406dc9 590->594 591->590 593 403ceb-403d0b call 406dc9 call 406966 call 405d9f 591->593 592->576 593->590 604 403d0d-403d14 CloseHandle 593->604 594->524 604->590
                          APIs
                          • #17.COMCTL32 ref: 00403A02
                          • SetErrorMode.KERNELBASE(00008001), ref: 00403A0D
                          • OleInitialize.OLE32(00000000), ref: 00403A14
                            • Part of subcall function 0040645D: GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                            • Part of subcall function 0040645D: LoadLibraryA.KERNELBASE(?,?,?,00000020,00403A26,00000008), ref: 00406476
                            • Part of subcall function 0040645D: GetProcAddress.KERNEL32(00000000), ref: 00406488
                          • SHGetFileInfoW.SHELL32(0040931C,00000000,?,000002B4,00000000), ref: 00403A3C
                            • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                          • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 00403A51
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,00000000), ref: 00403A64
                          • CharNextW.USER32(00000000,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,00000020), ref: 00403A8B
                          • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403B60
                          • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403B75
                          • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403B81
                          • DeleteFileW.KERNELBASE(004D30C0), ref: 00403B98
                          • OleUninitialize.OLE32(?), ref: 00403C31
                          • ExitProcess.KERNEL32 ref: 00403C51
                          • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403C5D
                          • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403C69
                          • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403C75
                          • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403C7C
                          • DeleteFileW.KERNEL32(004331F8,004331F8,?,00477008,004092BC,00473000,?), ref: 00403CCD
                          • CopyFileW.KERNEL32(004DF0D8,004331F8,00000001), ref: 00403CE1
                          • CloseHandle.KERNEL32(00000000,004331F8,004331F8,?,004331F8,00000000), ref: 00403D0E
                          • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403D64
                          • ExitWindowsEx.USER32(00000002,00000000), ref: 00403DA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                          • String ID: /D=$ _?=$"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                          • API String ID: 2435955865-2279026766
                          • Opcode ID: 68266bafc206ec77b9f892d23c4aef905f4494e6b01b225f4942505767497f92
                          • Instruction ID: 4e18f5f1af3a7f331e2e544c63ade91685479340742a394c6c2d6f2448785750
                          • Opcode Fuzzy Hash: 68266bafc206ec77b9f892d23c4aef905f4494e6b01b225f4942505767497f92
                          • Instruction Fuzzy Hash: FEA1B571504301BBD6207F629D0AE1B7EACAF4075AF11483FF585B61D2DBBC8A448B6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 879 406dfc-406e16 call 4068df 882 406e18-406e2a DeleteFileW 879->882 883 406e2f-406e3a 879->883 884 40702e-407030 882->884 885 406e3c-406e3e 883->885 886 406e4e-406e62 call 40616a 883->886 888 406e44-406e48 885->888 889 406fac-406fb1 885->889 893 406e64-406e6c lstrcatW 886->893 894 406e6e-406e6f call 4068b2 886->894 888->886 888->889 891 406fb3-406fb7 889->891 892 40702c-40702d 889->892 895 406fc0-406fc7 call 406436 891->895 896 406fb9-406fbe 891->896 892->884 897 406e74-406e78 893->897 894->897 895->892 905 406fc9-406fec call 406883 call 406404 call 405f90 RemoveDirectoryW 895->905 898 407016-407023 call 406404 896->898 902 406e84-406e8a lstrcatW 897->902 903 406e7a-406e82 897->903 898->892 906 406e8c-406ead lstrlenW FindFirstFileW 902->906 903->902 903->906 931 407025-407027 call 4050d2 905->931 932 406fee-406ff2 905->932 909 406eb3-406ec8 call 405e66 906->909 910 406f9c 906->910 918 406ed3-406ed7 909->918 919 406eca-406ece 909->919 913 406f9e-406fa1 910->913 913->889 916 406fa3-406fa8 913->916 916->889 922 406ef5-406f05 call 40616a 918->922 923 406ed9-406ee0 918->923 919->918 921 406ed0 919->921 921->918 933 406f07-406f0f 922->933 934 406f1c-406f39 call 406404 call 405f90 DeleteFileW 922->934 924 406ee6-406ee9 923->924 925 406f79-406f8b FindNextFileW 923->925 924->922 928 406eeb-406eef 924->928 925->909 930 406f91-406f9a FindClose 925->930 928->922 928->925 930->913 931->892 936 407011 932->936 937 406ff4-40700f call 406404 call 4050d2 call 406dc9 932->937 933->925 938 406f11-406f1a call 406dfc 933->938 950 406f72-406f74 call 4050d2 934->950 951 406f3b-406f3f 934->951 936->898 937->892 938->925 950->925 954 406f41-406f5c call 406404 call 4050d2 call 406dc9 951->954 955 406f5e-406f70 call 406404 951->955 954->925 955->925
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ), ref: 00406E19
                          • lstrcatW.KERNEL32(0045C928,\*.*), ref: 00406E6A
                          • lstrcatW.KERNEL32(?,00408838), ref: 00406E8A
                          • lstrlenW.KERNEL32(?), ref: 00406E8D
                          • FindFirstFileW.KERNEL32(0045C928,?), ref: 00406EA1
                          • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406F83
                          • FindClose.KERNEL32(?), ref: 00406F94
                          Strings
                          • "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" , xrefs: 00406E05
                          • Delete: DeleteFile failed("%s"), xrefs: 00406F5E
                          • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406FB9
                          • Delete: DeleteFile on Reboot("%s"), xrefs: 00406F41
                          • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406FF4
                          • RMDir: RemoveDirectory("%s"), xrefs: 00406FD0
                          • RMDir: RemoveDirectory failed("%s"), xrefs: 00407011
                          • \*.*, xrefs: 00406E64
                          • Delete: DeleteFile("%s"), xrefs: 00406F1D
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                          • API String ID: 2035342205-724928243
                          • Opcode ID: e25bf17fa5cd8a8754a82c370ef333a2a3ae489cf446f822b8942f902ad3cb12
                          • Instruction ID: 065701ca96279c828ad8c0a907823cf62f9bd73eb8e14a3183d43afd793dd255
                          • Opcode Fuzzy Hash: e25bf17fa5cd8a8754a82c370ef333a2a3ae489cf446f822b8942f902ad3cb12
                          • Instruction Fuzzy Hash: 8951F332404306AADB206B71DC45AAF37B8DF41724B21813FF902721C2DB7C5DA2DA6E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f08b0311c7b190f70b7f6b66510179fe2aae7c875dcf9b09b9f207b7722ad9ec
                          • Instruction ID: 6d9a96506c23ada9e0f5992c1433d3039d4b40deeb0cc045ecd6cd6b38dbc2b7
                          • Opcode Fuzzy Hash: f08b0311c7b190f70b7f6b66510179fe2aae7c875dcf9b09b9f207b7722ad9ec
                          • Instruction Fuzzy Hash: DCF15971908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D378E986CF86
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32(00000000), ref: 7026130B
                          • GetLastError.KERNEL32 ref: 70261412
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CreateErrorLastSnapshotToolhelp32
                          • String ID:
                          • API String ID: 4136412728-0
                          • Opcode ID: 596ae5032470ed2f13e3ddca5b170255ced0b9f7b8d6530e210ff345391b0079
                          • Instruction ID: 8436e669528bb204b1818fcb0fc30fa445e031920286a6074dd3ee5d5226fae0
                          • Opcode Fuzzy Hash: 596ae5032470ed2f13e3ddca5b170255ced0b9f7b8d6530e210ff345391b0079
                          • Instruction Fuzzy Hash: 9051C373A00214DFD715DF61DC86B6D77A4EB44314F348429E905CBF90C6B4B5E4AB92
                          APIs
                          • FindFirstFileW.KERNELBASE(004572D0,0045BED8,004572D0,0040692F,004572D0), ref: 00406441
                          • FindClose.KERNEL32(00000000), ref: 0040644D
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: cabe7cd0e8d0c42d8893e3e2e2c087770211128cd55027c92275192456ad2468
                          • Instruction ID: 304157284c36da419ef03f6d9f2c23ccabbefed464cde17f37dc78c4e58848de
                          • Opcode Fuzzy Hash: cabe7cd0e8d0c42d8893e3e2e2c087770211128cd55027c92275192456ad2468
                          • Instruction Fuzzy Hash: 37D01271504120AFC34027786E0C89B7A599F16331725CA3AB5EAF21E1C7748C3287EC

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 338 4015a0-4015f4 339 4030e3-4030ec 338->339 340 4015fa 338->340 362 4030ee-4030f2 339->362 341 401601-401611 call 406404 340->341 342 401742-40174f 340->342 343 401962-40197d call 40145c GetFullPathNameW 340->343 344 4019ca-4019e6 call 40145c SearchPathW 340->344 345 40176e-401794 call 40145c call 406404 SetFileAttributesW 340->345 346 401650-401668 call 40137e call 406404 call 40139d 340->346 347 4017b1-4017d8 call 40145c call 406404 call 405eb9 340->347 348 401672-401686 call 40145c call 406404 340->348 349 401693-4016ac call 401446 call 406404 340->349 350 401715-401731 340->350 351 401616-40162d call 40145c call 406404 call 4050d2 340->351 352 4016d6-4016db 340->352 353 401736-4030de 340->353 354 401897-4018a7 call 40145c call 406436 340->354 355 4018db-401910 call 40145c * 3 call 406404 MoveFileW 340->355 356 40163c-401645 340->356 357 4016bd-4016d1 call 406404 SetForegroundWindow 340->357 341->362 376 401751-401755 ShowWindow 342->376 377 401758-40175f 342->377 398 4019a3-4019a8 343->398 399 40197f-401984 343->399 344->339 404 4019ec-4019f8 344->404 345->339 418 40179a-4017a6 call 406404 345->418 429 40166d 346->429 442 401864-40186c 347->442 443 4017de-4017fc call 405e66 CreateDirectoryW 347->443 419 401689-40168e call 4050d2 348->419 424 4016b1-4016b8 Sleep 349->424 425 4016ae-4016b0 349->425 350->362 373 401632-401637 351->373 371 401702-401710 352->371 372 4016dd-4016fd call 401446 352->372 353->339 406 4030de call 4060b2 353->406 420 4018c2-4018d6 call 406404 354->420 421 4018a9-4018bd call 406404 354->421 454 401912-401919 355->454 455 40191e-401921 355->455 356->373 374 401647-40164e PostQuitMessage 356->374 357->339 371->339 372->339 373->362 374->373 376->377 377->339 379 401765-401769 ShowWindow 377->379 379->339 412 4019af-4019b2 398->412 411 401986-401989 399->411 399->412 404->339 406->339 411->412 422 40198b-401993 call 406436 411->422 412->339 426 4019b8-4019c5 GetShortPathNameW 412->426 437 4017ab-4017ac 418->437 419->339 420->362 421->362 422->398 447 401995-4019a1 call 40616a 422->447 424->339 425->424 426->339 429->362 437->339 445 401890-401892 442->445 446 40186e-40188b call 4050d2 call 40616a SetCurrentDirectoryW 442->446 458 401846-40184e call 406404 443->458 459 4017fe-401809 GetLastError 443->459 445->419 446->339 447->412 454->419 460 401923-40192b call 406436 455->460 461 40194a-401950 455->461 473 401853-401854 458->473 464 401827-401832 GetFileAttributesW 459->464 465 40180b-401825 GetLastError call 406404 459->465 460->461 478 40192d-401948 call 406dc9 call 4050d2 460->478 463 401957-40195d call 406404 461->463 463->437 471 401834-401844 call 406404 464->471 472 401855-40185e 464->472 465->472 471->473 472->442 472->443 473->472 478->463
                          APIs
                          • PostQuitMessage.USER32(00000000), ref: 00401648
                          • Sleep.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004016B2
                          • SetForegroundWindow.USER32(?), ref: 004016CB
                          • ShowWindow.USER32(?), ref: 00401753
                          • ShowWindow.USER32(?), ref: 00401767
                          • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                          • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                          • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                          • SetCurrentDirectoryW.KERNEL32(?,004CB0B0,?,000000E6,HideCommandLineWindow,?,?,?,000000F0,?,000000F0), ref: 00401885
                          • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                          • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,HideCommandLineWindow,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                          • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                          • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                          • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$HideCommandLineWindow$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                          • API String ID: 2872004960-4099689987
                          • Opcode ID: fba0ab4e7ccf5d8c556da6ed02245b98afa567c62f150e8fa28fa4392de864ab
                          • Instruction ID: 6970006c80b2daef1e7dd2d9cca72418e9fe59065d0b28f5efb0bef5c027f317
                          • Opcode Fuzzy Hash: fba0ab4e7ccf5d8c556da6ed02245b98afa567c62f150e8fa28fa4392de864ab
                          • Instruction Fuzzy Hash: 67B10431A00214EBDB106F61DD459AE3BA9EF04314B25813FF546B61E2DA7D4E41CAAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 605 405a8c-405aa4 call 40645d 608 405aa6-405ab6 call 4060b2 605->608 609 405ab8-405af0 call 406034 605->609 618 405b13-405b3c call 403ff5 call 4068df 608->618 614 405af2-405b03 call 406034 609->614 615 405b08-405b0e lstrcatW 609->615 614->615 615->618 623 405bd0-405bd8 call 4068df 618->623 624 405b42-405b47 618->624 630 405be6-405bed 623->630 631 405bda-405be1 call 406966 623->631 624->623 625 405b4d-405b75 call 406034 624->625 625->623 632 405b77-405b7b 625->632 634 405c06-405c2b LoadImageW 630->634 635 405bef-405bf5 630->635 631->630 636 405b7d-405b8c call 405e66 632->636 637 405b8f-405b9b lstrlenW 632->637 639 405c31-405c73 RegisterClassW 634->639 640 405cc6-405cce call 40141d 634->640 635->634 638 405bf7-405bfc call 403fd4 635->638 636->637 643 405bc3-405bcb call 406883 call 40616a 637->643 644 405b9d-405bab lstrcmpiW 637->644 638->634 646 405d95 639->646 647 405c79-405cc1 SystemParametersInfoW CreateWindowExW 639->647 655 405cd0-405cd3 640->655 656 405cd8-405ce3 call 403ff5 640->656 643->623 644->643 652 405bad-405bb7 GetFileAttributesW 644->652 651 405d97-405d9e 646->651 647->640 657 405bb9-405bbb 652->657 658 405bbd-405bbe call 4068b2 652->658 655->651 663 405ce9-405d06 ShowWindow LoadLibraryW 656->663 664 405d6c-405d74 call 4051a7 656->664 657->643 657->658 658->643 666 405d08-405d0d LoadLibraryW 663->666 667 405d0f-405d21 GetClassInfoW 663->667 671 405d76-405d7c 664->671 672 405d8e-405d90 call 40141d 664->672 666->667 669 405d23-405d33 GetClassInfoW RegisterClassW 667->669 670 405d39-405d6a DialogBoxParamW call 40141d call 403dc8 667->670 669->670 670->651 671->655 674 405d82-405d89 call 40141d 671->674 672->646 674->655
                          APIs
                            • Part of subcall function 0040645D: GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                            • Part of subcall function 0040645D: LoadLibraryA.KERNELBASE(?,?,?,00000020,00403A26,00000008), ref: 00406476
                            • Part of subcall function 0040645D: GetProcAddress.KERNEL32(00000000), ref: 00406488
                          • lstrcatW.KERNEL32(004D30C0,00447250), ref: 00405B0E
                          • lstrlenW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",?,?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00000000,004C70A8,004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000,00000006,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ), ref: 00405B90
                          • lstrcmpiW.KERNEL32(?,.exe,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",?,?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00000000,004C70A8,004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000), ref: 00405BA3
                          • GetFileAttributesW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"), ref: 00405BAE
                            • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405C17
                          • RegisterClassW.USER32(0046AD60), ref: 00405C6A
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C82
                          • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405CBB
                            • Part of subcall function 00403FF5: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00404090
                          • ShowWindow.USER32(00000005,00000000), ref: 00405CF1
                          • LoadLibraryW.KERNEL32(RichEd20), ref: 00405D02
                          • LoadLibraryW.KERNEL32(RichEd32), ref: 00405D0D
                          • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405D1D
                          • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405D2A
                          • RegisterClassW.USER32(0046AD60), ref: 00405D33
                          • DialogBoxParamW.USER32(?,00000000,004055D9,00000000), ref: 00405D52
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$PrD$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                          • API String ID: 608394941-776204145
                          • Opcode ID: 80ca71923c634680d402ef98f9edd294887f2eac5f8585db4802c5967787b579
                          • Instruction ID: 3a6a227fec416dc0362735230570460a00d436347f4cd54f675a02b01ae67812
                          • Opcode Fuzzy Hash: 80ca71923c634680d402ef98f9edd294887f2eac5f8585db4802c5967787b579
                          • Instruction Fuzzy Hash: 1271A071104B00AED720AB65AE45E2737ACEB44745F40443FF945B62E2EBB8AC518F2E
                          APIs
                            • Part of subcall function 70261581: GlobalAlloc.KERNELBASE(00000040,?,702615BA,?,?,7026185F,?,70261017), ref: 7026158B
                            • Part of subcall function 702615A3: lstrcpyW.KERNEL32(00000000,?), ref: 702615C1
                            • Part of subcall function 702615A3: GlobalFree.KERNEL32 ref: 702615D2
                          • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 70261D0B
                          • lstrcpyW.KERNEL32(00000008,?), ref: 70261D59
                          • lstrcpyW.KERNEL32(00000808,?), ref: 70261D63
                          • GlobalFree.KERNEL32(00000000), ref: 70261D7D
                          • GlobalFree.KERNEL32(?), ref: 70261E69
                          • GlobalFree.KERNEL32(?), ref: 70261E6E
                          • GlobalFree.KERNELBASE(?), ref: 70261E73
                          • GlobalFree.KERNEL32(00000000), ref: 7026201A
                          • lstrcpyW.KERNEL32(?,?), ref: 7026217A
                          • GetModuleHandleW.KERNEL32(00000008), ref: 702621EE
                          • LoadLibraryW.KERNELBASE(00000008), ref: 702621FF
                          • lstrcmpiW.KERNEL32(kernel32,00000008), ref: 7026221B
                          • lstrcmpiW.KERNEL32(kernel32.dll,00000008), ref: 70262227
                          • lstrlenW.KERNEL32(00000808), ref: 70262258
                          • lstrcatW.KERNEL32(00000808,702630C8), ref: 7026227C
                          • lstrcpyW.KERNEL32(?,00000808), ref: 702622C7
                          • lstrcatW.KERNEL32(?,00000057), ref: 702622DE
                          • lstrcatW.KERNEL32(00000808,00000057), ref: 70262307
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$lstrcat$Alloclstrcmpi$HandleLibraryLoadModulelstrlen
                          • String ID: W$kernel32$kernel32.dll
                          • API String ID: 2496820534-4093004423
                          • Opcode ID: fe7f559c63842f44d743b299b1a4c6f377517f3aadc97bdae5b153043bc06d51
                          • Instruction ID: e57c06fe7f5558c431aa5342ae9ff8cee9d18bd467a20fc99ce5a6005b2e8454
                          • Opcode Fuzzy Hash: fe7f559c63842f44d743b299b1a4c6f377517f3aadc97bdae5b153043bc06d51
                          • Instruction Fuzzy Hash: CE12CF73E14646DECB118FA4C8846EEB7B5FB08300F24842ED156E7A90D774AAE8DB51

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32(AdvAPI32,?,?,?,00000000,10002713,10004408,00000001), ref: 10001EEB
                          • LoadLibraryA.KERNEL32(ShlWAPI,?,?,00000000,10002713,10004408,00000001), ref: 10001EF4
                          • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 10001F04
                          • LoadLibraryA.KERNEL32(USER32,?,?,00000000,10002713,10004408,00000001), ref: 10001F10
                          • GetProcAddress.KERNEL32(00000000,ChangeWindowMessageFilter), ref: 10001F18
                          • LoadLibraryA.KERNELBASE(SECUR32,?,?,00000000,10002713,10004408,00000001), ref: 10001F24
                          • GetProcAddress.KERNELBASE(00000000,GetUserNameExW), ref: 10001F2C
                          • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW), ref: 10001F39
                          • GetProcAddress.KERNEL32(00000000,SHGetValueA), ref: 10001F46
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: AdvAPI32$ChangeWindowMessageFilter$CheckTokenMembership$CreateProcessWithLogonW$GetUserNameExW$SECUR32$SHGetValueA$ShlWAPI$USER32
                          • API String ID: 2238633743-317704901
                          • Opcode ID: 1f806dab57e0d73e68b652c05fdbd3d85cd45c579f557fb9ea507bcd518f6a85
                          • Instruction ID: 48f6b5e9b9d2b3d9e28081fc1af9a79398f56288de8b1ffb0a0e6babec6ad198
                          • Opcode Fuzzy Hash: 1f806dab57e0d73e68b652c05fdbd3d85cd45c579f557fb9ea507bcd518f6a85
                          • Instruction Fuzzy Hash: A4F0A4E1D012686AE620BBF65C88D8B7EACEB945E13431426F20493128DF7455008AA8

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 00401A76
                          • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe","C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00000000,00000000,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",004CB0B0,00000000,00000000), ref: 00401AA0
                            • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                            • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                            • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$HideCommandLineWindow
                          • API String ID: 4286501637-919641124
                          • Opcode ID: cb2ea112a6d5708afa0a1d6b98d2a639abb6c955421a78b536d05d697647842d
                          • Instruction ID: 08d878c9e80d9a323f30b4f94fb3bca26633bf48a784620ab852fc75793eaf31
                          • Opcode Fuzzy Hash: cb2ea112a6d5708afa0a1d6b98d2a639abb6c955421a78b536d05d697647842d
                          • Instruction Fuzzy Hash: 88511771901114BADB107BB1CD46EAF3A68DF05369F21423FF516B10D3DB7C4A528AAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1050 403679-4036c7 GetTickCount GetModuleFileNameW call 405fb0 1053 4036d3-403701 call 40616a call 4068b2 call 40616a GetFileSize 1050->1053 1054 4036c9-4036ce 1050->1054 1062 403707 1053->1062 1063 4037ee-4037fc call 4032e7 1053->1063 1055 40390d-403911 1054->1055 1065 40370c-403723 1062->1065 1069 403802-403805 1063->1069 1070 403889-40388e 1063->1070 1067 403725 1065->1067 1068 403727-403729 call 403389 1065->1068 1067->1068 1074 40372e-403730 1068->1074 1072 403807-40381f call 4033bb call 403389 1069->1072 1073 403829-403875 GlobalAlloc call 407453 call 405fe0 CreateFileW 1069->1073 1070->1055 1072->1070 1101 403821-403827 1072->1101 1099 403890-4038c0 call 4033bb call 403550 1073->1099 1100 403877-40387c 1073->1100 1077 403881-403888 call 4032e7 1074->1077 1078 403736-40373d 1074->1078 1077->1070 1082 4037b9-4037bd 1078->1082 1083 40373f-403753 call 405f6c 1078->1083 1088 4037c7-4037cd 1082->1088 1089 4037bf-4037c6 call 4032e7 1082->1089 1083->1088 1097 403755-40375c 1083->1097 1090 4037dc-4037e6 1088->1090 1091 4037cf-4037d9 call 4073e2 1088->1091 1089->1088 1090->1065 1098 4037ec 1090->1098 1091->1090 1097->1088 1104 40375e-403765 1097->1104 1098->1063 1111 4038c5-4038c8 1099->1111 1100->1055 1101->1070 1101->1073 1104->1088 1106 403767-40376e 1104->1106 1106->1088 1108 403770-403777 1106->1108 1108->1088 1110 403779-403799 1108->1110 1110->1070 1112 40379f-4037a3 1110->1112 1111->1070 1113 4038ca-4038db 1111->1113 1114 4037a5-4037a9 1112->1114 1115 4037ab-4037b3 1112->1115 1116 4038e3-4038e6 1113->1116 1117 4038dd 1113->1117 1114->1098 1115->1088 1119 4037b5-4037b7 1115->1119 1118 4038e9-4038f1 1116->1118 1117->1116 1118->1118 1120 4038f3-40390b call 405f6c 1118->1120 1119->1088 1120->1055
                          APIs
                          • GetTickCount.KERNEL32 ref: 0040368D
                          • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004), ref: 004036A9
                            • Part of subcall function 00405FB0: GetFileAttributesW.KERNELBASE(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                            • Part of subcall function 00405FB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                          • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003), ref: 004036F2
                          • GlobalAlloc.KERNELBASE(00000040,004091D8), ref: 0040382E
                          • CreateFileW.KERNELBASE(?,C0000000,00000000,00000000,00000002,04000100,00000000,?,004D70C8), ref: 00403867
                          Strings
                          • "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" , xrefs: 00403686
                          • Null, xrefs: 00403770
                          • Inst, xrefs: 0040375E
                          • soft, xrefs: 00403767
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403877
                          • Error launching installer, xrefs: 004036C9
                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403889
                          • XqB, xrefs: 00403834
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Create$AllocAttributesCountGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$XqB$soft
                          • API String ID: 2312874724-3222103968
                          • Opcode ID: dc67487d1d5886e496fe9a95df8d8d004577587b5cb1a975d93318355e81f02c
                          • Instruction ID: f367662fd253c9a4c32130068affbadc700f065c840d768c21b487d0aca010bd
                          • Opcode Fuzzy Hash: dc67487d1d5886e496fe9a95df8d8d004577587b5cb1a975d93318355e81f02c
                          • Instruction Fuzzy Hash: DA71C3B1900204AFDB11AFB5DD85BAE7AACAB04755F10807FFA05B72D1CB789E448B5C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1123 10001be2-10001c18 GetVersionExW 1124 10001c21-10001c2f SetLastError 1123->1124 1125 10001c1a-10001c1c 1123->1125 1127 10001c31-10001c33 1124->1127 1128 10001c38-10001c49 OpenThreadToken 1124->1128 1126 10001d75-10001d78 1125->1126 1127->1126 1129 10001c61-10001c96 AllocateAndInitializeSid 1128->1129 1130 10001c4b-10001c5b OpenProcessToken 1128->1130 1132 10001c9c-10001ca4 1129->1132 1133 10001d3d-10001d40 CloseHandle 1129->1133 1130->1129 1131 10001d46-10001d49 1130->1131 1136 10001d4b-10001d55 call 1000194c 1131->1136 1137 10001d6d-10001d72 1131->1137 1134 10001ca6-10001cb2 1132->1134 1135 10001cb9-10001cce GetTokenInformation 1132->1135 1133->1131 1139 10001d33-10001d3c FreeSid 1134->1139 1146 10001cb4-10001cb7 1134->1146 1138 10001cd0-10001cd9 GetLastError 1135->1138 1135->1139 1136->1137 1144 10001d57-10001d5b call 10001b4d 1136->1144 1137->1126 1138->1139 1141 10001cdb-10001cea GlobalAlloc 1138->1141 1139->1133 1141->1139 1145 10001cec-10001cfd GetTokenInformation 1141->1145 1150 10001d60-10001d62 1144->1150 1148 10001d2c-10001d2d GlobalFree 1145->1148 1149 10001cff-10001d04 1145->1149 1146->1139 1148->1139 1149->1148 1151 10001d06 1149->1151 1152 10001d64-10001d68 1150->1152 1153 10001d6a 1150->1153 1154 10001d09-10001d16 EqualSid 1151->1154 1152->1137 1152->1153 1153->1137 1155 10001d18 1154->1155 1156 10001d1f-10001d2a 1154->1156 1155->1156 1156->1148 1156->1154
                          APIs
                          • GetVersionExW.KERNEL32(00000114,?,771B2E90), ref: 10001C10
                          • SetLastError.KERNEL32(00000000), ref: 10001C22
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ErrorLastVersion
                          • String ID:
                          • API String ID: 305913169-0
                          • Opcode ID: f7b22df63fd94ce0db5f842c3456cfde58ddd7e9ce2eb328282e0ef749223a4f
                          • Instruction ID: 781c41f1377e9669cc37b05094e7f240193f75726cfc1e42fe02484d6e0c8e80
                          • Opcode Fuzzy Hash: f7b22df63fd94ce0db5f842c3456cfde58ddd7e9ce2eb328282e0ef749223a4f
                          • Instruction Fuzzy Hash: E251387190025AAFFB10DFA08C89AEEBBB9EF043C1F504466E651A2199D7709A84DB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1157 406966-406971 1158 406973-406982 1157->1158 1159 406984-406998 1157->1159 1158->1159 1160 4069b0-4069b6 1159->1160 1161 40699a-4069a7 1159->1161 1163 406be2-406beb 1160->1163 1164 4069bc-4069bd 1160->1164 1161->1160 1162 4069a9-4069ac 1161->1162 1162->1160 1165 406bf6-406bf7 1163->1165 1166 406bed-406bf1 call 40616a 1163->1166 1167 4069be-4069cb 1164->1167 1166->1165 1169 406be0-406be1 1167->1169 1170 4069d1-4069e1 1167->1170 1169->1163 1171 4069e7-4069ea 1170->1171 1172 406bbb 1170->1172 1173 4069f0-406a2e 1171->1173 1174 406bbe 1171->1174 1172->1174 1175 406a34-406a3f GetVersion 1173->1175 1176 406b4e-406b57 1173->1176 1177 406bc0-406bcc 1174->1177 1178 406bce-406bd1 1174->1178 1181 406a41-406a49 1175->1181 1182 406a5d 1175->1182 1179 406b90-406b99 1176->1179 1180 406b59-406b5c 1176->1180 1183 406bd4-406bda 1177->1183 1178->1183 1185 406ba7-406bb9 lstrlenW 1179->1185 1186 406b9b-406ba2 call 406966 1179->1186 1187 406b6c-406b7b call 40616a 1180->1187 1188 406b5e-406b6a call 4060b2 1180->1188 1181->1182 1189 406a4b-406a4f 1181->1189 1184 406a64-406a6b 1182->1184 1183->1167 1183->1169 1191 406a70-406a72 1184->1191 1192 406a6d-406a6f 1184->1192 1185->1183 1186->1185 1196 406b80-406b86 1187->1196 1188->1196 1189->1182 1195 406a51-406a55 1189->1195 1197 406a74-406a91 call 406034 1191->1197 1198 406aae-406ab1 1191->1198 1192->1191 1195->1182 1200 406a57-406a5b 1195->1200 1196->1185 1201 406b88-406b8e call 406199 1196->1201 1206 406a96-406a9a 1197->1206 1203 406ac1-406ac4 1198->1203 1204 406ab3-406abf GetSystemDirectoryW 1198->1204 1200->1184 1201->1185 1208 406b30-406b32 1203->1208 1209 406ac6-406ad4 GetWindowsDirectoryW 1203->1209 1207 406b34-406b38 1204->1207 1211 406aa0-406aa9 call 406966 1206->1211 1212 406b3a-406b3e 1206->1212 1207->1201 1207->1212 1208->1207 1213 406ad6-406ae0 1208->1213 1209->1208 1211->1207 1212->1201 1215 406b40-406b4c lstrcatW 1212->1215 1216 406ae2-406ae5 1213->1216 1217 406afa-406b10 SHGetSpecialFolderLocation 1213->1217 1215->1201 1216->1217 1218 406ae7-406aee 1216->1218 1219 406b12-406b29 SHGetPathFromIDListW CoTaskMemFree 1217->1219 1220 406b2b-406b2d 1217->1220 1222 406af6-406af8 1218->1222 1219->1207 1219->1220 1220->1208 1222->1207 1222->1217
                          APIs
                          • GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                          • GetSystemDirectoryW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00002004), ref: 00406AB9
                            • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                          • GetWindowsDirectoryW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00002004), ref: 00406ACC
                          • lstrcatW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",\Microsoft\Internet Explorer\Quick Launch), ref: 00406B46
                          • lstrlenW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406BA8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 3581403547-722761395
                          • Opcode ID: 349b504904d19e27fd4f4c91fd092aa9198956906fd02c1d1d814161a489649c
                          • Instruction ID: e48cded74d6947d59e8abd59105747811bc68a9d38b3ce97ffc5bdd505d2dbd5
                          • Opcode Fuzzy Hash: 349b504904d19e27fd4f4c91fd092aa9198956906fd02c1d1d814161a489649c
                          • Instruction Fuzzy Hash: 4171E5B1A00121ABDF20AF68CD44A7A33B5AF55314F12803BE947F62D0E77C99A1CB4D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1223 702628a3-702628b7 1224 702628bb-702628d2 1223->1224 1225 702628d4-702628d9 1224->1225 1226 702628fe-70262903 call 70261592 1224->1226 1225->1226 1228 702628db-702628de 1225->1228 1229 70262908 1226->1229 1230 702628e7-702628e9 1228->1230 1231 702628e0-702628e5 call 702615a3 1228->1231 1232 70262909-70262912 1229->1232 1234 702628eb-702628ee 1230->1234 1235 702628f9-702628fc 1230->1235 1231->1232 1236 70262914-70262916 1232->1236 1237 70262918 1232->1237 1234->1235 1239 702628f0-702628f7 call 70261628 1234->1239 1235->1232 1240 7026291a-70262922 1236->1240 1237->1240 1239->1229 1242 70262a15 1240->1242 1243 70262928-7026292b 1240->1243 1247 70262a18-70262a24 GlobalFree 1242->1247 1245 70262931-70262934 1243->1245 1246 70262a0a-70262a13 call 7026167f 1243->1246 1250 702629fc-70262a08 call 7026167f 1245->1250 1251 7026293a-7026293d 1245->1251 1246->1247 1248 70262a26-70262a34 1247->1248 1249 70262a49-70262a4e 1247->1249 1253 70262a36-70262a3b 1248->1253 1254 70262a40-70262a44 1248->1254 1250->1247 1256 70262943 1251->1256 1257 702629d0-702629f5 GlobalAlloc WideCharToMultiByte 1251->1257 1253->1224 1254->1224 1256->1247 1261 70262949-7026294c 1256->1261 1259 702629f8-702629fa 1257->1259 1259->1247 1262 7026294e-70262951 1261->1262 1263 7026297b-702629ae GlobalAlloc lstrcpynW 1261->1263 1262->1247 1265 70262957-70262960 lstrlenW 1262->1265 1263->1259 1264 702629b0-702629ce GlobalAlloc CLSIDFromString GlobalFree 1263->1264 1264->1247 1265->1247 1266 70262966-70262976 call 7026167f call 70262554 1265->1266 1266->1247
                          APIs
                          • lstrlenW.KERNEL32(?), ref: 70262958
                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 70262985
                          • lstrcpynW.KERNEL32(00000000,?), ref: 70262998
                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 702629B4
                          • CLSIDFromString.OLE32(00000000,00000000), ref: 702629C1
                          • GlobalFree.KERNEL32(00000000), ref: 702629C8
                          • GlobalAlloc.KERNEL32(00000040), ref: 702629D8
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 702629EF
                          • GlobalFree.KERNELBASE(00000000), ref: 70262A19
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Alloc$Free$ByteCharFromMultiStringWidelstrcpynlstrlen
                          • String ID:
                          • API String ID: 916651646-0
                          • Opcode ID: 4c6fb2e99a812b317ccb4c2f73f8cf6f5077eb944436637cf75920b7781a6036
                          • Instruction ID: 1644352724c099e792bd8408c939456af901427a837e47dcec0ceb216eb51a08
                          • Opcode Fuzzy Hash: 4c6fb2e99a812b317ccb4c2f73f8cf6f5077eb944436637cf75920b7781a6036
                          • Instruction Fuzzy Hash: AF41AF731087029FD3258F65CC48B2E77FCEB84361F20491DF546DA990D7B4A8E8AB62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1271 4023f0-4023fd 1272 402403-402419 call 40145c * 2 1271->1272 1273 4024e5-4024f1 call 4050d2 1271->1273 1282 402429-402438 LoadLibraryExW 1272->1282 1283 40241b-402427 GetModuleHandleW 1272->1283 1279 4030e3-4030f2 1273->1279 1285 40243e-40244d call 4064c6 1282->1285 1286 4024ce-4024db call 4050d2 1282->1286 1283->1282 1283->1285 1291 40248c-4024a4 call 4050d2 call 406404 1285->1291 1292 40244f-402455 1285->1292 1286->1273 1301 4024a7-4024aa 1291->1301 1294 402457-402463 call 401435 1292->1294 1295 40246e-402482 1292->1295 1294->1301 1305 402465-40246c 1294->1305 1309 402485 call 70262a4f 1295->1309 1310 402485 call 50d4120 1295->1310 1311 402485 call 50d4822 1295->1311 1312 402485 call 50d2432 1295->1312 1298 402487-40248a 1298->1301 1301->1279 1304 4024b0-4024ba call 403e18 1301->1304 1304->1279 1308 4024c0-4024c9 FreeLibrary 1304->1308 1305->1301 1308->1279 1309->1298 1310->1298 1311->1298 1312->1298
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040241C
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                            • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                            • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                          • FreeLibrary.KERNELBASE(?,?), ref: 004024C3
                          Strings
                          • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                          • Error registering DLL: Could not load %s, xrefs: 004024DB
                          • Error registering DLL: %s not found in %s, xrefs: 0040249A
                          • HideCommandLineWindow, xrefs: 004024CE, 004024E5
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                          • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$HideCommandLineWindow
                          • API String ID: 1033533793-3479902643
                          • Opcode ID: 7126d7f87333a31c50dcaf441315a421a4963bba86a6d5b99edc85380d7bda2a
                          • Instruction ID: d8831ef82082564af9a2e195be03e9e7495047a885a7848ebc2eed903ecf7a42
                          • Opcode Fuzzy Hash: 7126d7f87333a31c50dcaf441315a421a4963bba86a6d5b99edc85380d7bda2a
                          • Instruction Fuzzy Hash: 0B219F35A00208BBCF206FA1CE49A9E7A70AF00314F30813FF512761E1D7BD4A919A5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1313 4033d2-4033fb GetTickCount 1314 403530-403538 call 4032e7 1313->1314 1315 403401-40342c call 4033bb SetFilePointer 1313->1315 1320 40353a-40353f 1314->1320 1321 403431-403443 1315->1321 1322 403445 1321->1322 1323 403447-403455 call 403389 1321->1323 1322->1323 1326 403542-403545 1323->1326 1327 40345b-403467 1323->1327 1326->1320 1328 40346d-403473 1327->1328 1329 403475-40347b 1328->1329 1330 40349e-4034ba call 407473 1328->1330 1329->1330 1331 40347d-40349d call 4032e7 1329->1331 1336 4034c0-4034c8 1330->1336 1337 403547 1330->1337 1331->1330 1339 4034ca-4034e0 WriteFile 1336->1339 1340 4034fc-403502 1336->1340 1338 403549-40354a 1337->1338 1338->1320 1341 4034e2-4034e6 1339->1341 1342 40354c-40354e 1339->1342 1340->1337 1343 403504-403506 1340->1343 1341->1342 1345 4034e8-4034f4 1341->1345 1342->1338 1343->1337 1344 403508-40351b 1343->1344 1344->1321 1346 403521-40352a SetFilePointer 1344->1346 1345->1328 1347 4034fa 1345->1347 1346->1314 1347->1344
                          APIs
                          • GetTickCount.KERNEL32 ref: 004033E7
                            • Part of subcall function 004033BB: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040389E,?), ref: 004033C9
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403583,00000004,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000), ref: 0040341A
                          • WriteFile.KERNELBASE(004271E0,0042D498,000000FF,00000000,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000,?,?), ref: 004034D8
                          • SetFilePointer.KERNELBASE(00058B68,00000000,00000000,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000,?,?,?,004038C5), ref: 0040352A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Pointer$CountTickWrite
                          • String ID: XqB$qB
                          • API String ID: 2146148272-2352303668
                          • Opcode ID: 979a132689fdd3b66ddc975673b61f2c520d6a21d2f47b68d5318fd2806375dd
                          • Instruction ID: 352f119b9731fba5dc1d5d47024dbf085b4ecca43a18aeda97e8958449c38e74
                          • Opcode Fuzzy Hash: 979a132689fdd3b66ddc975673b61f2c520d6a21d2f47b68d5318fd2806375dd
                          • Instruction Fuzzy Hash: F841A372604211AFCB209F29EE4593A3F6CFB1435A784027FE511A23B0CB399E55CB5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1348 70262445-7026245c 1349 7026245e-70262462 1348->1349 1350 70262464-70262466 1349->1350 1351 70262468 1349->1351 1352 7026246a-70262478 call 70261581 1350->1352 1351->1352 1355 702624f3-702624f9 lstrcpyW 1352->1355 1356 7026247a-7026247b 1352->1356 1357 702624ff-70262504 1355->1357 1358 702624e0 1356->1358 1359 7026247d-7026247e 1356->1359 1361 70262506-7026250d 1357->1361 1362 7026251c-70262521 1357->1362 1360 702624e2-702624e8 wsprintfW 1358->1360 1363 702624d3-702624de call 702617bd 1359->1363 1364 70262480-70262481 1359->1364 1368 702624ee-702624f1 1360->1368 1369 70262515-70262516 GlobalFree 1361->1369 1370 7026250f-70262513 1361->1370 1365 70262523-70262526 1362->1365 1366 7026253e-70262549 GlobalFree 1362->1366 1363->1368 1371 70262483-70262484 1364->1371 1372 702624bf-702624d1 MultiByteToWideChar 1364->1372 1373 70262530-70262532 1365->1373 1374 70262528-7026252e call 702615e0 1365->1374 1366->1349 1376 7026254f-70262553 1366->1376 1368->1357 1369->1362 1370->1362 1370->1369 1377 70262486-70262487 1371->1377 1378 702624a1-702624bd lstrcpynW 1371->1378 1372->1357 1373->1366 1380 70262534-7026253c call 7026164f 1373->1380 1386 7026253d 1374->1386 1381 70262490-7026249f StringFromGUID2 1377->1381 1382 70262489-7026248a 1377->1382 1378->1357 1380->1386 1381->1357 1382->1357 1383 7026248c-7026248e 1382->1383 1383->1360 1386->1366
                          APIs
                          • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,70262B4A,00000000), ref: 70262499
                            • Part of subcall function 7026164F: lstrcpyW.KERNEL32(00000018,00000000), ref: 70261674
                          • wsprintfW.USER32 ref: 702624E8
                          • GlobalFree.KERNEL32(?), ref: 70262516
                          • GlobalFree.KERNELBASE(00000000), ref: 7026253F
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FreeGlobal$FromStringlstrcpywsprintf
                          • String ID:
                          • API String ID: 2435812281-0
                          • Opcode ID: edef332e16bc51550339ada3aa60fc62461ae22a73c36de497aee3f83fc55194
                          • Instruction ID: cfb754405a6c6528104f1214423ce95dbcf08adb731389fff0a2b06f9206e04b
                          • Opcode Fuzzy Hash: edef332e16bc51550339ada3aa60fc62461ae22a73c36de497aee3f83fc55194
                          • Instruction Fuzzy Hash: D7310073208902AFD7228F24CE48A1EB7B9EB442547614508F943D6DA4DF349CFCEB22
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000000,00000000,00000003,00000080,00000000), ref: 050D5F83
                          • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000), ref: 050D5F9C
                          • GetFileSize.KERNEL32(000000FF,00000000), ref: 050D5FA8
                          • GlobalAlloc.KERNEL32(00000040,000000FD), ref: 050D5FC0
                          • ReadFile.KERNELBASE(000000FF,00000000,000000FF,00000000,00000000), ref: 050D5FE1
                          • CloseHandle.KERNEL32(000000FF), ref: 050D5FEF
                          • GlobalFree.KERNEL32(00000000), ref: 050D600E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Global$AllocCloseCreateFreeHandlePointerReadSize
                          • String ID:
                          • API String ID: 3525489169-0
                          • Opcode ID: 7a601b565afd43545bc4e114ae0d3d589ebded0eae7d6d8d4c87d109dca5a95a
                          • Instruction ID: 9109fd7e849cbf0f65e5f881d98fc70ac6448f74adfa2fb5c7ff017e36e0f656
                          • Opcode Fuzzy Hash: 7a601b565afd43545bc4e114ae0d3d589ebded0eae7d6d8d4c87d109dca5a95a
                          • Instruction Fuzzy Hash: 59311D74A00308EFDB14DFA4DC59BAEBBB4FB08714F108649FA15AB2C0CBB95605CB64
                          APIs
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                            • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                            • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                            • Part of subcall function 00405D9F: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457288,Error launching installer), ref: 00405DC4
                            • Part of subcall function 00405D9F: CloseHandle.KERNEL32(?), ref: 00405DD1
                          • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                          Strings
                          • Exec: command="%s", xrefs: 00402241
                          • Exec: failed createprocess ("%s"), xrefs: 004022C2
                          • Exec: success ("%s"), xrefs: 00402263
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                          • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                          • API String ID: 2014279497-3433828417
                          • Opcode ID: 17554e249cd14fb5cd0c3b2798a4193156fd42220d6d33eb710891a55c479f0c
                          • Instruction ID: e2ade92b8e8beb45c5288a0de0c91049ee5acc48a81ea59d75a15a872706837f
                          • Opcode Fuzzy Hash: 17554e249cd14fb5cd0c3b2798a4193156fd42220d6d33eb710891a55c479f0c
                          • Instruction Fuzzy Hash: 6E11C232504115EBDB11AFE0DE4AAAE3AA5EF00324B24807FF502B50D1CABC4952DBAD
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                          • WideCharToMultiByte.KERNEL32(?,?,HideCommandLineWindow,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                          • lstrlenA.KERNEL32(?,?,?,HideCommandLineWindow,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                          • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,HideCommandLineWindow,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                          • String ID: HideCommandLineWindow
                          • API String ID: 2568930968-1563606009
                          • Opcode ID: 37df47139288bb5308ab500167525db906f8869ab55d91c6a88dcede18f9fec2
                          • Instruction ID: 2b6f9eedf6ae11cfe1e36f0213f8387d72ebb0b879c85407db03f4e9eb7306d9
                          • Opcode Fuzzy Hash: 37df47139288bb5308ab500167525db906f8869ab55d91c6a88dcede18f9fec2
                          • Instruction Fuzzy Hash: A7016171500204BBDB14AF60DE49D9E3B78EF05359F10443AF646BA1E1D6798982DB68
                          APIs
                            • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWritelstrcpyn
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$<RM>$HideCommandLineWindow$WriteINIStr: wrote [%s] %s=%s in %s
                          • API String ID: 247603264-433023660
                          • Opcode ID: 76e29fefa2fcb51dbbedf7035b1aedb250ed7f53bb72e54dbf76baee11489292
                          • Instruction ID: 42bd81ef3d59a899a4afa764d38de83c0885f73ff342ba6e601af17a918a1269
                          • Opcode Fuzzy Hash: 76e29fefa2fcb51dbbedf7035b1aedb250ed7f53bb72e54dbf76baee11489292
                          • Instruction Fuzzy Hash: D301FF75D00319BACB107FA58D859AF7978AF09345F10403FF11A761E3D7B84A508BAD
                          APIs
                          • SetFilePointer.KERNELBASE(-00069C40,00000000,00000000,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 00403574
                          • ReadFile.KERNELBASE(004091D8,00000004,?,00000000,00000000,00000004,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000,004091D8), ref: 004035A2
                          • ReadFile.KERNELBASE(0042F1E8,00004000,?,00000000,004091D8,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 004035FC
                          • WriteFile.KERNELBASE(00000000,0042F1E8,?,000000FF,00000000,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 00403614
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Read$PointerWrite
                          • String ID:
                          • API String ID: 2113905535-0
                          • Opcode ID: 7052c420235308e1a53cecd41fbf7afbbe8e53aab26b08745c9ca0e470065494
                          • Instruction ID: a63153eef40669f0ed7c1800638863e54a14cc79a46bc24bc920c3bc8af84b95
                          • Opcode Fuzzy Hash: 7052c420235308e1a53cecd41fbf7afbbe8e53aab26b08745c9ca0e470065494
                          • Instruction Fuzzy Hash: 5E31F971500108FBDB21CFA9ED44EAE3BBCEB44351F60483AF904E6290D6359B51DB69
                          APIs
                            • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                          • GlobalFree.KERNELBASE(00000000), ref: 00402387
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FreeGloballstrcpyn
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$Exch: stack < %d elements$Pop: stack empty
                          • API String ID: 1459762280-2584812219
                          • Opcode ID: 18b4178551c86a45abeddca5050921926a3f5ab0cd3fa67d3c4eac0a98504fae
                          • Instruction ID: 00a269db9d122ce218cb6369f3e7d31d5b123713c6f27ce8ba71e52fe8ccb839
                          • Opcode Fuzzy Hash: 18b4178551c86a45abeddca5050921926a3f5ab0cd3fa67d3c4eac0a98504fae
                          • Instruction Fuzzy Hash: 6F21D476601105EBD710AB64DD81A6F77A4EF04318721403FF542B72D2E7789C1186AD
                          APIs
                          • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                          • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                          • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                            • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                          • GlobalFree.KERNELBASE(00000000), ref: 00402387
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                          • String ID:
                          • API String ID: 3376005127-0
                          • Opcode ID: 499cadfa344b62526d7b141b3586f4b269aab55898d88dbec3dfdd6d2d107791
                          • Instruction ID: d706dadd873a054bb948c0373b183cc18cdaf107e69ff1aff3bcb7a8f3beee4c
                          • Opcode Fuzzy Hash: 499cadfa344b62526d7b141b3586f4b269aab55898d88dbec3dfdd6d2d107791
                          • Instruction Fuzzy Hash: 6E114C72900109AFCF01EFA1DD459AE7BB8EF04344F10407AF606F62A0D7799A51DB59
                          APIs
                          • OpenProcessToken.ADVAPI32(000000FF,00000008,00000000,?,?,?,10001D60,?), ref: 10001B64
                          • GetTokenInformation.KERNELBASE(00000000,00000012(TokenIntegrityLevel),?,00000004,?,?,?,?,10001D60,?), ref: 10001B7A
                          • SetLastError.KERNEL32(00000000,?,?,?,10001D60,?), ref: 10001B86
                          • GetLastError.KERNEL32(?,?,?,10001D60,?), ref: 10001B8C
                          • CloseHandle.KERNEL32(00000000,?,?,?,10001D60,?), ref: 10001B97
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ErrorLastToken$CloseHandleInformationOpenProcess
                          • String ID:
                          • API String ID: 4040495316-0
                          • Opcode ID: 6d9e3710b4c717eafaab26f657cf2c10de98fd6e4a3aea65354d4a14066186e3
                          • Instruction ID: 0cd616b1b210e777e24bf8a6dc9bd802a97b1b10b282f73080bbef1cfd2adf0e
                          • Opcode Fuzzy Hash: 6d9e3710b4c717eafaab26f657cf2c10de98fd6e4a3aea65354d4a14066186e3
                          • Instruction Fuzzy Hash: F8F01D76600228BBEB109B90CC49BD97BACEF047E2F104155FA55E2094DBB49A40DBA0
                          APIs
                            • Part of subcall function 70261C1B: GlobalFree.KERNEL32(?), ref: 70261E69
                            • Part of subcall function 70261C1B: GlobalFree.KERNEL32(?), ref: 70261E6E
                            • Part of subcall function 70261C1B: GlobalFree.KERNELBASE(?), ref: 70261E73
                          • GlobalFree.KERNEL32(00000000), ref: 70262AFA
                          • FreeLibrary.KERNEL32(?), ref: 70262B71
                          • GlobalFree.KERNELBASE(00000000), ref: 70262B96
                            • Part of subcall function 702623C1: GlobalAlloc.KERNEL32(00000040,00000000), ref: 702623F3
                            • Part of subcall function 702625B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,?,70262ACB,00000000), ref: 70262611
                            • Part of subcall function 70261904: lstrcpyW.KERNEL32(00000000,error), ref: 70261929
                            • Part of subcall function 70262445: wsprintfW.USER32 ref: 702624E8
                            • Part of subcall function 70262445: GlobalFree.KERNEL32(?), ref: 70262516
                            • Part of subcall function 70262445: GlobalFree.KERNELBASE(00000000), ref: 7026253F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                          • String ID:
                          • API String ID: 1767494692-3916222277
                          • Opcode ID: 93fc9c37e1da9f2b9755197c8cfaf5a70e4959b856634a35ffdc7cc82889dd55
                          • Instruction ID: 91628636527932751b77ebcc65566cea5efd840676984bc8780c423d192348af
                          • Opcode Fuzzy Hash: 93fc9c37e1da9f2b9755197c8cfaf5a70e4959b856634a35ffdc7cc82889dd55
                          • Instruction Fuzzy Hash: 5E31DA73504A429ECB159F64C8C5B9D3BB8EB04314F148429F9475ED96CBF4A8ECDB22
                          APIs
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                            • Part of subcall function 00406436: FindFirstFileW.KERNELBASE(004572D0,0045BED8,004572D0,0040692F,004572D0), ref: 00406441
                            • Part of subcall function 00406436: FindClose.KERNEL32(00000000), ref: 0040644D
                          • lstrlenW.KERNEL32 ref: 004026B4
                          • lstrlenW.KERNEL32(00000000), ref: 004026C1
                          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                          • String ID: CopyFiles "%s"->"%s"
                          • API String ID: 2577523808-3778932970
                          • Opcode ID: 882c708a540b1b6e40822fa95cd5da4fbfff49ab246fdf6d56c9b4995ea32088
                          • Instruction ID: c5bc72853f8421da741d5617367b4824c82a14243d7aff776d7bb0801c040b7d
                          • Opcode Fuzzy Hash: 882c708a540b1b6e40822fa95cd5da4fbfff49ab246fdf6d56c9b4995ea32088
                          • Instruction Fuzzy Hash: 94114F71D00214AACB10BBBA994699FBBBCEF04314F10843FE506F7292E6B985118B59
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405FFE
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403946,004D30C0,004D70C8), ref: 00406019
                          Strings
                          • "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" , xrefs: 00405FE9
                          • nsa, xrefs: 00405FED
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $nsa
                          • API String ID: 1716503409-2838144880
                          • Opcode ID: 4c34e6a0a90932f4b551cf1a0ac55fda76427712b032f8561b8497f4a2d6824a
                          • Instruction ID: be25c3b17c8933440b05da9cd673d95fc9e669a54b60c2a7ae19a21696f833e6
                          • Opcode Fuzzy Hash: 4c34e6a0a90932f4b551cf1a0ac55fda76427712b032f8561b8497f4a2d6824a
                          • Instruction Fuzzy Hash: 03F06776600208ABDB10CF59DD09A9EBBADEF94710F00803FFA45E7290E6B09A54C768
                          APIs
                            • Part of subcall function 702615A3: lstrcpyW.KERNEL32(00000000,?), ref: 702615C1
                            • Part of subcall function 702615A3: GlobalFree.KERNEL32 ref: 702615D2
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 7026118F
                          • GlobalFree.KERNEL32(00000000), ref: 702611D0
                          • GlobalFree.KERNEL32(00000000), ref: 702611F0
                          • GlobalFree.KERNEL32(00000000), ref: 70261204
                          • GlobalFree.KERNELBASE(?), ref: 7026122E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Free$Alloclstrcpy
                          • String ID:
                          • API String ID: 852173138-0
                          • Opcode ID: 3cd4176b1ef7d31f65dffaf290c2f8c2c3cd3040218c358189a07dccc21ee8e2
                          • Instruction ID: f64a512ba13b0c185de00e760b671bc364258fa72ed0780e09965dd4bd5d41a9
                          • Opcode Fuzzy Hash: 3cd4176b1ef7d31f65dffaf290c2f8c2c3cd3040218c358189a07dccc21ee8e2
                          • Instruction Fuzzy Hash: B631EC73A042129FD3018FA9CC49B5D77FCEB462547284559FA85CBF60E6B4F890A720
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 004064D1
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004064E7
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004064F6
                          • GlobalFree.KERNEL32(00000000), ref: 004064FF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                          • String ID:
                          • API String ID: 2883127279-0
                          • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                          • Instruction ID: cca72bce24a91bf59807d1cc254d6b8728fe87be69838ce7ea74a844989b610b
                          • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                          • Instruction Fuzzy Hash: 68E0D8312001107BE2101B269E8CD677EADDFCA7B2B05013EF685F11A0CE308C11D638
                          APIs
                          • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                          • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: PrivateProfileStringlstrcmp
                          • String ID: !N~
                          • API String ID: 623250636-529124213
                          • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                          • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                          • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                          • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457288,Error launching installer), ref: 00405DC4
                          • CloseHandle.KERNEL32(?), ref: 00405DD1
                          Strings
                          • Error launching installer, xrefs: 00405DA8
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: 2afcd463f825584facbc8802dab800c5bb1591f62b8a6ee26e2c87f99b5cd2cd
                          • Instruction ID: 382474dafc83c3ab62cfa3b3aa405e4b9d7c85dbe04cfe36e17f81e43d348e98
                          • Opcode Fuzzy Hash: 2afcd463f825584facbc8802dab800c5bb1591f62b8a6ee26e2c87f99b5cd2cd
                          • Instruction Fuzzy Hash: 6BE0EC70510309AFEB009B64ED0997B7BBCFB00305F508576BD51E2661D779D9148A68
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c36cb06954edc7335e9d92b109141cbd09c7a7193fbcbb3a0e0d18f944b47e5e
                          • Instruction ID: 7372baf4ca72983a720edb26d3aa8eb56cdb2bb7098e1cb2460684513cc098eb
                          • Opcode Fuzzy Hash: c36cb06954edc7335e9d92b109141cbd09c7a7193fbcbb3a0e0d18f944b47e5e
                          • Instruction Fuzzy Hash: 38A14671914248EBDB18CF18C8946ED3BE1FF44355F10912AFD5AAB290D738E981CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f400c994127adfbf61058f0df631bf6e0d69df8ab50e85f6c29bef2e618aba5
                          • Instruction ID: 19be9bd041eb831dc497f9eed389fffc0b40ebad8130cd8a8cc9c73c743c8dd7
                          • Opcode Fuzzy Hash: 1f400c994127adfbf61058f0df631bf6e0d69df8ab50e85f6c29bef2e618aba5
                          • Instruction Fuzzy Hash: FC913471904248EBDF18CF18C8947E93BA1FF44399F10912AFC5AAB291C738E985CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0eb3c0e8f84787af47df7413a68d2a7b57c255642fcd00871c8e2605327e1244
                          • Instruction ID: 7f7ee5045e18535129bde91f801cc5c524a8174eb8871a5b0dc4d7b8e610d919
                          • Opcode Fuzzy Hash: 0eb3c0e8f84787af47df7413a68d2a7b57c255642fcd00871c8e2605327e1244
                          • Instruction Fuzzy Hash: 40814871918248EBDB14CF29C8447ED3BA1FF44355F10812AFD6AAB290D778E985CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dcf24dacc8478a35d58cb1e451b5f07b4fbd3d5e90387a27a31f51ce211858d9
                          • Instruction ID: 0b2195dfed2d2eaf31799a866d23b30a47b9bddfdc78d95a245e633d29955650
                          • Opcode Fuzzy Hash: dcf24dacc8478a35d58cb1e451b5f07b4fbd3d5e90387a27a31f51ce211858d9
                          • Instruction Fuzzy Hash: 41711271914248EBDF28CF18C844AE93BE1FF48355F10812AFD5AAB291D738E985CF85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1648e0811c9f97d55a3022652a548649fa1c26b9f6cb7626f8a21e4732b448f
                          • Instruction ID: e9ed1edde03ce079a1eac7925ffd26eceee2e589c91d04c2349d82a358760cac
                          • Opcode Fuzzy Hash: b1648e0811c9f97d55a3022652a548649fa1c26b9f6cb7626f8a21e4732b448f
                          • Instruction Fuzzy Hash: 51713471918248EBDF18CF18C844BE93BB1FF44345F10812AFD5AAA291C738E985CF86
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 231398222cbd9f561c647f948b9b3d3c6184bd44b9bf4c4e3e1677bf7cb27c81
                          • Instruction ID: 372954581a63a42c771a5a1ecf6877848c3696302c905df1bb59de476e0b08a4
                          • Opcode Fuzzy Hash: 231398222cbd9f561c647f948b9b3d3c6184bd44b9bf4c4e3e1677bf7cb27c81
                          • Instruction Fuzzy Hash: FB613671904248EBEB28CF18C844BAD3BB1FF44345F10912AFD56AA291D778E985CF86
                          APIs
                          • GlobalFree.KERNEL32(?), ref: 00407526
                          • GlobalAlloc.KERNELBASE(00000040,?,00000000,00004000,0042F1E8), ref: 0040752F
                          • GlobalFree.KERNEL32(?), ref: 0040759E
                          • GlobalAlloc.KERNELBASE(00000040,?,00000000,00004000,0042F1E8), ref: 004075A9
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID:
                          • API String ID: 3394109436-0
                          • Opcode ID: 6fc4b81007277366271f5ed8f4823a6fbaedd18a17911aa1f8adf1f3d20f8d2f
                          • Instruction ID: 69d61f3c28aa3c4651f1fcdc65fbd76dba6520ab561f69162c86fd3f3c29a3b1
                          • Opcode Fuzzy Hash: 6fc4b81007277366271f5ed8f4823a6fbaedd18a17911aa1f8adf1f3d20f8d2f
                          • Instruction Fuzzy Hash: C9514471914248EBDB28CF19C854AAD3BE1FF44355F10812AFD5AAA291C738E981CF85
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000001,?), ref: 00402BED
                          • MultiByteToWideChar.KERNEL32(?,?,?,00000001,?,00000002), ref: 00402C14
                            • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ByteCharFileMultiReadWidewsprintf
                          • String ID:
                          • API String ID: 2364376003-0
                          • Opcode ID: 14d2e5f0a76c930811b8f64fdfc0fa0e2f8275d22f94cac74b50ae0c6de7aed3
                          • Instruction ID: b736646ffbb8274f0b2c0f55679a0b09e5904d597d9e4d846d7759ba10fa4134
                          • Opcode Fuzzy Hash: 14d2e5f0a76c930811b8f64fdfc0fa0e2f8275d22f94cac74b50ae0c6de7aed3
                          • Instruction Fuzzy Hash: 8E31B535908148BAEB119F648A88AFE7778EF01314F14407BE492F62D4D2B98E81C759
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe","C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"), ref: 0040605E
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe","C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"), ref: 00406080
                          • RegCloseKey.ADVAPI32(?,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe","C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"), ref: 004060A7
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: ce379d2cd2c6934f93681775daff6b6b388132cfaa10fc4de9bcc8a3fbe1b6f0
                          • Instruction ID: 98a2f5c40708be4a22a19e2b3dffd551e29741b81bdf7905c269ac5831645af6
                          • Opcode Fuzzy Hash: ce379d2cd2c6934f93681775daff6b6b388132cfaa10fc4de9bcc8a3fbe1b6f0
                          • Instruction Fuzzy Hash: F301487125020AAADF21CF64ED05BDB3BE9EF18354F014426FA05E2160E335E964DBA9
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                          • LoadLibraryA.KERNELBASE(?,?,?,00000020,00403A26,00000008), ref: 00406476
                          • GetProcAddress.KERNEL32(00000000), ref: 00406488
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AddressHandleLibraryLoadModuleProc
                          • String ID:
                          • API String ID: 310444273-0
                          • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                          • Instruction ID: 834e98854e3cd4bdbc26171f75450eebe3d36459cd124193f5d9cd80cd5e6d51
                          • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                          • Instruction Fuzzy Hash: 97D012312001059BC6001B65AF08A5F776DEF95611707C03EF546F3131EB34D415A6AD
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                          • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                          • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                          • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: bb163b9fe6ad53c4c24c626dc6eb2012a5604aa560a8fbe1d65a356919806daf
                          • Instruction ID: 0718ebe39a3ec8d134d715fe04010489d3ea4afa24b2ee2dc260a56d563539cd
                          • Opcode Fuzzy Hash: bb163b9fe6ad53c4c24c626dc6eb2012a5604aa560a8fbe1d65a356919806daf
                          • Instruction Fuzzy Hash: C9D09E71654202EFEF098F60DE1AF6EBBA2EB94B00F01852CB396540F0DA725819DB15
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402DC0
                            • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: 10236523b1b82d1dfa0b6a0d4cdd1d04937be490d17512a33b5600199dc53e43
                          • Instruction ID: b489a4299bf93da238d67b2395a4f637ce1eda5adeec28224da557ff73f55b49
                          • Opcode Fuzzy Hash: 10236523b1b82d1dfa0b6a0d4cdd1d04937be490d17512a33b5600199dc53e43
                          • Instruction Fuzzy Hash: 77E04F72601104ABD711EBA5AD42CAE7A6CAB00359B14443BF102F5091C67A8A50863D
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,050D2927,?,?,050D2927,00000000,05130EC0,00000000,00000000), ref: 050D5D8F
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: f285971f2bd5eca80a8c3a8170ec208493a3192f96efc00a360a29e97ea161b0
                          • Instruction ID: b90a7e174e6f6ac56b1831b63f15fd13af4ac0962b860834e7531eb24b664d39
                          • Opcode Fuzzy Hash: f285971f2bd5eca80a8c3a8170ec208493a3192f96efc00a360a29e97ea161b0
                          • Instruction Fuzzy Hash: 83E075B5654108BBDB04CF88D992FAB7BA9EB4C750F108248FE0897280D671ED118BA4
                          APIs
                          • ReadFile.KERNELBASE(004091D8,00000000,00000000,00000000,0042F1E8,004271E0,00403453,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000), ref: 004033A0
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                          • Instruction ID: c6c40d3f4f7261540deed743693c79d8b23b6d840c968e3368c6ef78f45d931b
                          • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                          • Instruction Fuzzy Hash: B0E08C32114118BBCB119E929C40AE77B5CEB043A2F008432BE54E9290DA30DA04DBA8
                          APIs
                          • RegSetValueExW.KERNELBASE(050F8A00,00000003,00000000,?,00000000,050D298F,00000000,?,050D298F,00000000,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,00000000,00000003,050F8A00,?), ref: 050D5E65
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 96d05c809d8c181353b84f1dce5b576fb58cbe761a2bb231b32136d3840bef35
                          • Instruction ID: 506600832678f977bc2a174b96fc638c2db82420810cf9f0d87268d642baa36a
                          • Opcode Fuzzy Hash: 96d05c809d8c181353b84f1dce5b576fb58cbe761a2bb231b32136d3840bef35
                          • Instruction Fuzzy Hash: 0DE0B6B5614208BFCB04CF88D841E9F7BACEB4C310F008148FE08C7240C631ED118BA0
                          APIs
                            • Part of subcall function 00406199: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                            • Part of subcall function 00406199: CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                            • Part of subcall function 00406199: CharNextW.USER32(?,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                            • Part of subcall function 00406199: CharPrevW.USER32(?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                          • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403B6B), ref: 00403935
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Char$Next$CreateDirectoryPrev
                          • String ID:
                          • API String ID: 4115351271-0
                          • Opcode ID: f4befcb6106095d9d06c1b39d32d6196981096d2805c3ce9a3ed86820828cee4
                          • Instruction ID: 5ea94fba79f3f21d5ad716e498331d560289176cc766b9bc92f8e515fc4ca6d3
                          • Opcode Fuzzy Hash: f4befcb6106095d9d06c1b39d32d6196981096d2805c3ce9a3ed86820828cee4
                          • Instruction Fuzzy Hash: 14D0C922147D3136C592376A7D06FCF090D8F0279AB0A407BF949B91CA5FAC4B8285FE
                          APIs
                          • VirtualProtect.KERNELBASE(70264020,00000004,00000040,70264028), ref: 70262746
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 028d8afcab27be29925b54d66307c32bccd6048476c247e734976de6a53c2c17
                          • Instruction ID: 2182a0be114ed88218ef0a3613f33e82aeb7beb69749b91fb70f243e8579e4fe
                          • Opcode Fuzzy Hash: 028d8afcab27be29925b54d66307c32bccd6048476c247e734976de6a53c2c17
                          • Instruction Fuzzy Hash: BEE0C073919361DEC359CF7A9C887167AF0A31A306B21C52AEBC8DEAA0D3F04144BB15
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00020019,00000000,00000000,?,050D13BB,?,?,050D13BB,?,?,00000000,00020019,?), ref: 050D5D31
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 64728c486a7af5ec150edb532711d3d41523e4fe50248565462330104fb42b04
                          • Instruction ID: 02133ee1275e9c916756f4eda7d54f40def6f3b70c3b7d6ce12486b404d95156
                          • Opcode Fuzzy Hash: 64728c486a7af5ec150edb532711d3d41523e4fe50248565462330104fb42b04
                          • Instruction Fuzzy Hash: 01D042B5615108FBCB04CF99D946E9FBBACEB48650F108149BE08D7240D671AE118BA1
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040389E,?), ref: 004033C9
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                          • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                          • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                          • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,?,702615BA,?,?,7026185F,?,70261017), ref: 7026158B
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: a8f837c23d3f93b5e03da40ec3bce854b897fc4839e8f86696ae352a18a4cf7f
                          • Instruction ID: 7a704159488335939a73fe7b07341056897f08ddcd022005ddc0fbef1e166200
                          • Opcode Fuzzy Hash: a8f837c23d3f93b5e03da40ec3bce854b897fc4839e8f86696ae352a18a4cf7f
                          • Instruction Fuzzy Hash: 50B012732080005FEE008B15CC0EF303AA4E700308F204040F704C9450C2F048049514
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 0040528F
                          • GetDlgItem.USER32(?,000003EE), ref: 0040529E
                          • GetClientRect.USER32(?,?), ref: 004052F6
                          • GetSystemMetrics.USER32(00000015), ref: 004052FE
                          • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 0040531F
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405330
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405343
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405351
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405364
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405386
                          • ShowWindow.USER32(?,00000008), ref: 0040539A
                          • GetDlgItem.USER32(?,000003EC), ref: 004053BB
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004053CB
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004053E0
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004053EC
                          • GetDlgItem.USER32(?,000003F8), ref: 004052AD
                            • Part of subcall function 00403EF8: SendMessageW.USER32(00000028,?,00000001,00405914), ref: 00403F06
                            • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          • GetDlgItem.USER32(?,000003EC), ref: 0040540B
                          • CreateThread.KERNEL32(00000000,00000000,Function_000051A7,00000000), ref: 00405419
                          • CloseHandle.KERNEL32(00000000), ref: 00405420
                          • ShowWindow.USER32(00000000), ref: 00405447
                          • ShowWindow.USER32(?,00000008), ref: 0040544C
                          • ShowWindow.USER32(00000008), ref: 00405493
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054C5
                          • CreatePopupMenu.USER32 ref: 004054D6
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004054EB
                          • GetWindowRect.USER32(?,?), ref: 004054FE
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405520
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040555B
                          • OpenClipboard.USER32(00000000), ref: 0040556B
                          • EmptyClipboard.USER32 ref: 00405571
                          • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040557D
                          • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405587
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040559B
                          • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 004055BD
                          • SetClipboardData.USER32(0000000D,00000000), ref: 004055C8
                          • CloseClipboard.USER32 ref: 004055CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                          • String ID: New install of "%s" to "%s"$PrD${
                          • API String ID: 2110491804-2508554099
                          • Opcode ID: 11dd572734fdcc9cd5cd232e0012044d14f9f12b4c407c8bff242ac5f06050a0
                          • Instruction ID: 894ce410e52ba77d1203c8417793cf84406b50b5a57a64d435ed06079733cfed
                          • Opcode Fuzzy Hash: 11dd572734fdcc9cd5cd232e0012044d14f9f12b4c407c8bff242ac5f06050a0
                          • Instruction Fuzzy Hash: 25B15B70800608FFDB119F60DE85EAE7B79FB44355F00813AFA45BA1A0CBB98A519F59
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404AF3
                          • GetDlgItem.USER32(?,00000408), ref: 00404B00
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B4F
                          • LoadBitmapW.USER32(0000006E), ref: 00404B62
                          • SetWindowLongW.USER32(?,000000FC,Function_00004A2C), ref: 00404B7C
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B8E
                          • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404BA2
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404BB8
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BC4
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BD4
                          • DeleteObject.GDI32(?), ref: 00404BD9
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C04
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C10
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB1
                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404CD4
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CE5
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404D0F
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D1E
                          • ShowWindow.USER32(?,00000005), ref: 00404D2F
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E2D
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404E88
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404E9D
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EC1
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404EE7
                          • ImageList_Destroy.COMCTL32(?), ref: 00404EFC
                          • GlobalFree.KERNEL32(?), ref: 00404F0C
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F7C
                          • SendMessageW.USER32(?,00001102,?,?), ref: 0040502A
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405039
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00405059
                          • ShowWindow.USER32(?,00000000), ref: 004050A9
                          • GetDlgItem.USER32(?,000003FE), ref: 004050B4
                          • ShowWindow.USER32(00000000), ref: 004050BB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $ @$M$N
                          • API String ID: 1638840714-3479655940
                          • Opcode ID: 331d57f919298572917719af16d59c3eea641a000a84375da397a5fe01c84ea5
                          • Instruction ID: ce2321f3f297f3fbf41fbef512ec3ccbffa26c3bd4bbee077dcac70070df60a7
                          • Opcode Fuzzy Hash: 331d57f919298572917719af16d59c3eea641a000a84375da397a5fe01c84ea5
                          • Instruction Fuzzy Hash: CC025AB0900209AFDF209FA4DD45AAE7BB5FB84314F10413AF615B62E1D7B88E91DF58
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 10001583
                          • lstrlenW.KERNEL32(?), ref: 10001615
                          • lstrlenW.KERNEL32(?), ref: 1000161D
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000162B
                          • wsprintfW.USER32 ref: 10001663
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 1000169F
                          • GetLastError.KERNEL32 ref: 100016B0
                            • Part of subcall function 10001480: GetDlgItem.USER32(?,00000001), ref: 100014BF
                            • Part of subcall function 10001480: EnableWindow.USER32(00000000), ref: 100014C2
                          • GetDlgItem.USER32(?,000003EC), ref: 100016DB
                          • SendMessageW.USER32(00000000), ref: 100016E4
                          • GetDlgItem.USER32(?,000003ED), ref: 100016FC
                          • SendMessageW.USER32(00000000), ref: 100016FF
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000001,00000000,?,00000000,00000000,00000000,00000044,?), ref: 10001753
                          • GetLastError.KERNEL32 ref: 10001767
                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,00000000), ref: 1000179C
                          • MessageBoxW.USER32(?,?,00000000,00000030), ref: 100017B4
                          • LocalFree.KERNEL32(?), ref: 100017BD
                          • GetLastError.KERNEL32 ref: 100017C5
                          • GlobalFree.KERNEL32(?), ref: 100017CC
                          • CloseHandle.KERNEL32(?), ref: 100017D5
                          • EndDialog.USER32(?,-00000001), ref: 100017F9
                          • SetWindowLongW.USER32(?,000000EB,?), ref: 1000181E
                          • GetDlgItem.USER32(?,000003EC), ref: 1000183D
                          • SendMessageW.USER32(00000000), ref: 10001846
                          • GetDlgItem.USER32(?,000003ED), ref: 1000185B
                          • SendMessageW.USER32(00000000), ref: 1000185E
                          • LoadLibraryA.KERNEL32(SHELL32), ref: 10001865
                          • LoadImageW.USER32(00000000,000000C2,00000001,00000020,00000020,00008000), ref: 1000187C
                          • GetDlgItem.USER32(?,000003EA), ref: 10001891
                          • SendMessageW.USER32(00000000), ref: 10001894
                          • SendMessageW.USER32(?,0000000C,00000000), ref: 100018A3
                          • DestroyWindow.USER32(?), ref: 100018E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Message$ItemSend$Window$ErrorLast$CreateFreeGlobalLoadLongProcesslstrlen$AllocCloseDestroyDialogEnableFormatHandleImageLibraryLocalLogonWithwsprintf
                          • String ID: %s%s%s$D$SHELL32
                          • API String ID: 2856953046-1920488832
                          • Opcode ID: ea474140cac456f78d6d3e5b7960cb7afc163cd58573efcf63ed2d4fe950c5e0
                          • Instruction ID: 6eee2769d5493dfee740adc41000da3eadc798a05ffbb18bc8d5d8c70be693c2
                          • Opcode Fuzzy Hash: ea474140cac456f78d6d3e5b7960cb7afc163cd58573efcf63ed2d4fe950c5e0
                          • Instruction Fuzzy Hash: 18A1BF71600259BFFB11DFA0CC84EEE7BBDEB447C1F114029FA05A71A8DA719E419B61
                          APIs
                          • GetDlgItem.USER32(?,000003F0), ref: 00404659
                          • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404667
                          • GetDlgItem.USER32(?,000003FB), ref: 00404687
                          • GetAsyncKeyState.USER32(00000010), ref: 0040468E
                          • GetDlgItem.USER32(?,000003F0), ref: 004046A3
                          • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 004046B4
                          • SetWindowTextW.USER32(?,?), ref: 004046E3
                          • SHBrowseForFolderW.SHELL32(?), ref: 0040479D
                          • lstrcmpiW.KERNEL32("C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe",00447250,00000000,?,?), ref: 004047DA
                          • lstrcatW.KERNEL32(?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"), ref: 004047E6
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047F6
                          • CoTaskMemFree.OLE32(00000000), ref: 004047A8
                            • Part of subcall function 00405DE4: GetDlgItemTextW.USER32(00000001,00000001,00002004,004040E1), ref: 00405DF7
                            • Part of subcall function 00406199: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                            • Part of subcall function 00406199: CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                            • Part of subcall function 00406199: CharNextW.USER32(?,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                            • Part of subcall function 00406199: CharPrevW.USER32(?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                            • Part of subcall function 00403FD4: lstrcatW.KERNEL32(00000000,00000000), ref: 00403FEF
                          • GetDiskFreeSpaceW.KERNEL32(00443248,?,?,0000040F,?,00443248,00443248,?,00000000,00443248,?,?,000003FB,?), ref: 004048B9
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004048D4
                            • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                          • SetDlgItemTextW.USER32(00000000,00000400,0040931C), ref: 0040494D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"$A$H2D$PrD
                          • API String ID: 3347642858-365947127
                          • Opcode ID: 563870873e52b2e0a3cdb2865a86a3a579f559fabb233f753f9e034d7750c1c3
                          • Instruction ID: b0b3c754d12335248bfc7248cfd16ee1359f8a3788a1353c85d9a997a926ad80
                          • Opcode Fuzzy Hash: 563870873e52b2e0a3cdb2865a86a3a579f559fabb233f753f9e034d7750c1c3
                          • Instruction Fuzzy Hash: A9B184B1900205ABDF11AFA1CD85AAF7BB8EF84315F10843BF705B72D1D7789A418B69
                          APIs
                          • GetWindowLongW.USER32(?,000000FA), ref: 10001307
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 1000131A
                          • lstrcatW.KERNEL32(?,lng), ref: 10001340
                            • Part of subcall function 1000128A: GetPrivateProfileStringW.KERNEL32(MyRunAsStrings,000000FF,00000000,?,00000208,?), ref: 100012AC
                            • Part of subcall function 1000128A: SendMessageW.USER32(00000000), ref: 100012EC
                            • Part of subcall function 1000128A: GetDlgItem.USER32(?,000000FF), ref: 100012E5
                          • GetDlgItem.USER32(?,000003E8), ref: 10001400
                          • GetPrivateProfileIntW.KERNEL32(MyRunAsCfg,DisableCurrUserOpt,00000000,?), ref: 10001422
                          • EnableWindow.USER32(?,00000000), ref: 1000142C
                          • GetPrivateProfileIntW.KERNEL32(MyRunAsCfg,HideCurrUserOpt,00000000,?), ref: 10001440
                          • ShowWindow.USER32(?,00000000), ref: 1000144B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: PrivateProfileWindow$Item$EnableFileLongMessageModuleNameSendShowStringlstrcat
                          • String ID: Cancel$DisableCurrUserOpt$DlgTitle$HelpText$HideCurrUserOpt$MyRunAsCfg$OptCurrUser$OptOtherUser$Pwd$Username$lng
                          • API String ID: 269917529-1606624064
                          • Opcode ID: 862e5e30289adcc3691008639fd92c3349852e4b1b12bdd8b44c85aff9c9fdda
                          • Instruction ID: 72e3e7567a4b2d08d3af25829a5d8fef434853eb0c6f4d8b40b6ac70311a2b67
                          • Opcode Fuzzy Hash: 862e5e30289adcc3691008639fd92c3349852e4b1b12bdd8b44c85aff9c9fdda
                          • Instruction Fuzzy Hash: 44318BF140016C7AF710DB518C88EEB3A6CEB997C5F414565FB15E2089DEB09EC08A78
                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00407057
                          • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00407091
                          • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 0040710A
                          • lstrcpynA.KERNEL32(?,?,00000005), ref: 00407116
                          • lstrcmpA.KERNEL32(name,?), ref: 00407128
                          • CloseHandle.KERNEL32(?), ref: 00407347
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                          • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                          • API String ID: 1916479912-1189179171
                          • Opcode ID: 0715d5e28a72504c5accadc8c16e1503c0709497f081ba3703715ed6f8973fce
                          • Instruction ID: a1a783c1589cc2114d60951c227a61dfc271eaab027b45fbce8ea6a895ba6447
                          • Opcode Fuzzy Hash: 0715d5e28a72504c5accadc8c16e1503c0709497f081ba3703715ed6f8973fce
                          • Instruction Fuzzy Hash: DC91C170D1412DAADF04EBE5C9909FEBBB9EF48301F00406AF592F7290E6385A05EB75
                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 100011EC
                          • wsprintfW.USER32 ref: 1000121C
                          • GetDlgItem.USER32(?,000003E8), ref: 1000123D
                          • SendMessageW.USER32(00000000), ref: 10001246
                          • LoadLibraryA.KERNEL32(SHELL32,00005503,?,00000204), ref: 1000125A
                          • LoadStringW.USER32(00000000), ref: 10001261
                          • GetDlgItem.USER32(?,000003EC), ref: 1000127E
                          • SendMessageW.USER32(00000000), ref: 10001281
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ItemLoadMessageSend$LibraryNameStringUserwsprintf
                          • String ID: SHELL32
                          • API String ID: 970484078-1756878077
                          • Opcode ID: f617acc9506dc185ec153b645465450b41fe0ffbb218363b05879e49e8b089b4
                          • Instruction ID: 99095764c372e153b6451f99a75ed4cd9f4541ce9e740321d50607094a9c9112
                          • Opcode Fuzzy Hash: f617acc9506dc185ec153b645465450b41fe0ffbb218363b05879e49e8b089b4
                          • Instruction Fuzzy Hash: B021E0B2900128EAEB11EB94DC85FDA77BCEB046C1F018196F705F7154DA709F498FA4
                          APIs
                          • OpenProcessToken.ADVAPI32(000000FF,00000028,771B2E90,00000000,100024C0,SeDebugPrivilege,00000001,?,?,771B2E90), ref: 10001A5A
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000010,?), ref: 10001A73
                          • AdjustTokenPrivileges.ADVAPI32(771B2E90,00000000,00000001,00000010,00000001,00000010), ref: 10001AA3
                          • GetLastError.KERNEL32 ref: 10001AAF
                          • CloseHandle.KERNEL32(771B2E90), ref: 10001AD0
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Token$AdjustCloseErrorHandleLastLookupOpenPrivilegePrivilegesProcessValue
                          • String ID:
                          • API String ID: 379965542-0
                          • Opcode ID: 0f232aef3a96b309bd6a0f3cca63768b85361136d919c17ad0cba15be69951ab
                          • Instruction ID: 641a09e4c9f4efc63bdbeae1072b8237f19d681d31db9b5d384132f34a18873b
                          • Opcode Fuzzy Hash: 0f232aef3a96b309bd6a0f3cca63768b85361136d919c17ad0cba15be69951ab
                          • Instruction Fuzzy Hash: 8811E876A0024DAFEB01CFE4CCC5AEEBBFCEB04384F104565E551D6194D7B49A849B61
                          APIs
                          • lstrcpyW.KERNEL32(050F8A00,050D886C), ref: 050D56DA
                          • wsprintfW.USER32 ref: 050D5702
                          • lstrcatW.KERNEL32(050F8A00,=hex:), ref: 050D575B
                          • lstrcatW.KERNEL32(050F8A00,=hex(0):), ref: 050D5776
                          • lstrcatW.KERNEL32(050F8A00,=hex(2):), ref: 050D5791
                          • lstrcatW.KERNEL32(050F8A00,050D893C), ref: 050D5855
                          • lstrlenW.KERNEL32(050F8A00,05120EC0,00000000), ref: 050D5866
                          • WriteFile.KERNEL32(05120EC0,050F8A00,00000000), ref: 050D5878
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D5888
                          • lstrcpyW.KERNEL32(050F8A00,050D8944), ref: 050D58BB
                          • wsprintfW.USER32 ref: 050D5914
                          • lstrcatW.KERNEL32(050F8A00,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5927
                          • lstrlenW.KERNEL32(050F8A00), ref: 050D593C
                          • lstrcatW.KERNEL32(050F8A00,050D8958), ref: 050D5956
                          • lstrcatW.KERNEL32(050F8A00,\), ref: 050D5968
                          • lstrlenW.KERNEL32(050F8A00,05120EC0,00000000), ref: 050D5979
                          • WriteFile.KERNEL32(05120EC0,050F8A00,00000000), ref: 050D598B
                          • lstrcatW.KERNEL32(050F8A00,050D8968), ref: 050D59BC
                          • lstrcatW.KERNEL32(050F8A00,"DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D59CC
                          • lstrcatW.KERNEL32(050F8A00,"), ref: 050D59DC
                          • lstrlenW.KERNEL32(050F8A00,05120EC0,00000000), ref: 050D59ED
                          • WriteFile.KERNEL32(05120EC0,050F8A00,00000000), ref: 050D59FF
                          • wsprintfW.USER32 ref: 050D5A22
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,05120EC0,00000000), ref: 050D5A36
                          • WriteFile.KERNEL32(05120EC0,"DisableDisallowedTrafficAlert"=dword:00000001,00000000), ref: 050D5A48
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcat$lstrlen$FileWrite$wsprintf$lstrcpy
                          • String ID: "$"%s"$"DisableDisallowedTrafficAlert"=dword:00000001$%02x,$%s=dword:%08x$=hex(0):$=hex(2):$=hex(5):$=hex(6):$=hex(7):$=hex(8):$=hex(9):$=hex(a):$=hex(b):$=hex:$C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg$\
                          • API String ID: 1628572585-183838596
                          • Opcode ID: a27a70e1f71311d26b2ce04b44b2c5047a8d6d7ad3ebace06f67c8f6c83266c7
                          • Instruction ID: 701d82eadec43e4d90a3181b64fdf22a4c40f63f2548650998d7d3c2888e39af
                          • Opcode Fuzzy Hash: a27a70e1f71311d26b2ce04b44b2c5047a8d6d7ad3ebace06f67c8f6c83266c7
                          • Instruction Fuzzy Hash: A0917530644345EBDF549F94FD4ABAEBBB2FF00616F008054FE12A9184CBB45A64DBB2
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 00406520
                          • lstrlenW.KERNEL32(?), ref: 0040652D
                          • GetVersionExW.KERNEL32(?), ref: 0040658B
                            • Part of subcall function 0040618C: CharUpperW.USER32(?,00406562,?), ref: 00406192
                          • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 004065CA
                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004065E9
                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004065F3
                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004065FE
                          • FreeLibrary.KERNEL32(00000000), ref: 00406635
                          • GlobalFree.KERNEL32(?), ref: 0040663E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                          • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                          • API String ID: 20674999-2124804629
                          • Opcode ID: 40333aef454c47322eec6f7f9158de98af9d91ef9b06c0be04974d32da86a69b
                          • Instruction ID: 8cac56bd889a6922fafa0e84fcbe499284ae1ad590ea9cc90dd23bfef8a88dc9
                          • Opcode Fuzzy Hash: 40333aef454c47322eec6f7f9158de98af9d91ef9b06c0be04974d32da86a69b
                          • Instruction Fuzzy Hash: 18918671900219EBDF10AFA5CD88AAE7AB8FF45341F11807AE546F2290DB788A55CF58
                          APIs
                            • Part of subcall function 050D6045: lstrcpyW.KERNEL32(?,?), ref: 050D605E
                            • Part of subcall function 050D6045: GlobalFree.KERNEL32 ref: 050D606F
                            • Part of subcall function 050D4B53: lstrlenW.KERNEL32(?), ref: 050D4B60
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(?,?,?), ref: 050D4C48
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(00000000,?,?), ref: 050D4CD3
                          • FindWindowExW.USER32(?,00000000,#32770,00000000), ref: 050D3B57
                          • GetDlgItem.USER32(00000000), ref: 050D3B5E
                          • CreateFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,00000004,00000000,00000000,00000003,00000000,00000000), ref: 050D3C15
                          • CreateFileW.KERNEL32(C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,40000000,00000000,00000000,00000002,00000080,00000000), ref: 050D3C54
                          • WriteFile.KERNEL32(000000FF,050D8140,00000002,?,00000000), ref: 050D3C98
                          • lstrlenW.KERNEL32(Windows Registry Editor Version 5.00,?,00000000), ref: 050D3CB5
                          • WriteFile.KERNEL32(000000FF,Windows Registry Editor Version 5.00,00000000), ref: 050D3CCA
                          • lstrcpynW.KERNEL32(-00000008,05130EC0,00000124), ref: 050D3D08
                          • lstrcpynW.KERNEL32(05130EC0,-00000008,00000124), ref: 050D3D53
                          • SendMessageW.USER32(00000000,0000000C,00000000,05130EC0), ref: 050D3D99
                          • wsprintfW.USER32 ref: 050D3DE5
                          • wsprintfW.USER32 ref: 050D3E29
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,?,00000000), ref: 050D3E40
                          • WriteFile.KERNEL32(000000FF,"DisableDisallowedTrafficAlert"=dword:00000001,00000000), ref: 050D3E55
                          • wsprintfW.USER32 ref: 050D3E71
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,?,00000000), ref: 050D3E88
                          • WriteFile.KERNEL32(000000FF,"DisableDisallowedTrafficAlert"=dword:00000001,00000000), ref: 050D3E9D
                          • lstrcmpiW.KERNEL32(05118C60,?), ref: 050D3F48
                          • lstrcpynW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,05130EC0,00000124), ref: 050D4006
                          • lstrcatW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,050D8228), ref: 050D4023
                          • lstrcatW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001,05118A00), ref: 050D4033
                          • lstrcpynW.KERNEL32(-00000008,"DisableDisallowedTrafficAlert"=dword:00000001,00000124), ref: 050D4076
                          • lstrlenW.KERNEL32(050D822C,?,00000000), ref: 050D40B2
                          • WriteFile.KERNEL32(000000FF,050D8234,00000000), ref: 050D40C7
                          • CloseHandle.KERNEL32(000000FF), ref: 050D40D4
                          • SendMessageW.USER32(00000000,0000000C,00000000,050D89D4), ref: 050D410C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$lstrcpyn$Writelstrlen$wsprintf$CreateMessageSendlstrcat$CloseFindFreeGlobalHandleItemWindowlstrcmpilstrcpy
                          • String ID: [%s\%s]$[%s]$[-%s\%s]$"DisableDisallowedTrafficAlert"=dword:00000001$#32770$/A=$/B=$/D=$/G=$/N=$C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg$Windows Registry Editor Version 5.00$Windows Registry Editor Version 5.00
                          • API String ID: 3381506926-2071499515
                          • Opcode ID: 22dbd562a1b379e33b6ec4f147184710093ed61359966cf9e7cb86c752c1f806
                          • Instruction ID: eea21c44f0785bf61629c034360500c983ecced5aa531e9312f865f300003255
                          • Opcode Fuzzy Hash: 22dbd562a1b379e33b6ec4f147184710093ed61359966cf9e7cb86c752c1f806
                          • Instruction Fuzzy Hash: C602D4B1A41314AAEB60DB50EC4AFEEF7B5BF44705F148188F609661C0DBB59A84CF35
                          APIs
                          • lstrlenW.KERNEL32(?), ref: 050D4B60
                          • lstrcpynW.KERNEL32(?,?,?), ref: 050D4C48
                          • lstrcpynW.KERNEL32(00000000,?,?), ref: 050D4CD3
                          • lstrcmpiW.KERNEL32(?,HKEY_CLASSES_ROOT), ref: 050D4CE5
                          • lstrcmpiW.KERNEL32(?,HKCR), ref: 050D4CFB
                          • lstrcpyW.KERNEL32(00000000,HKEY_CLASSES_ROOT), ref: 050D4D1D
                          • lstrcmpiW.KERNEL32(?,HKEY_CURRENT_USER), ref: 050D4D34
                          • lstrcmpiW.KERNEL32(?,HKCU), ref: 050D4D4A
                          • lstrcpyW.KERNEL32(00000000,HKEY_CURRENT_USER), ref: 050D4D6C
                          • lstrcmpiW.KERNEL32(?,HKEY_LOCAL_MACHINE), ref: 050D4D83
                          • lstrcmpiW.KERNEL32(?,HKLM), ref: 050D4D99
                          • lstrcpyW.KERNEL32(00000000,HKEY_LOCAL_MACHINE), ref: 050D4DBB
                          • lstrcmpiW.KERNEL32(?,HKEY_USERS), ref: 050D4DD2
                          • lstrcmpiW.KERNEL32(?,HKU), ref: 050D4DE8
                          • lstrcpyW.KERNEL32(00000000,HKEY_USERS), ref: 050D4E0A
                          • lstrcmpiW.KERNEL32(?,HKEY_PERFORMANCE_DATA), ref: 050D4E21
                          • lstrcmpiW.KERNEL32(?,HKPD), ref: 050D4E37
                          • lstrcpyW.KERNEL32(00000000,HKEY_PERFORMANCE_DATA), ref: 050D4E59
                          • lstrcmpiW.KERNEL32(?,HKEY_CURRENT_CONFIG), ref: 050D4E70
                          • lstrcmpiW.KERNEL32(?,HKCC), ref: 050D4E86
                          • lstrcpyW.KERNEL32(00000000,HKEY_CURRENT_CONFIG), ref: 050D4EA8
                          • lstrcmpiW.KERNEL32(?,HKEY_DYN_DATA), ref: 050D4EBC
                          • lstrcmpiW.KERNEL32(?,HKDD), ref: 050D4ED2
                          • lstrcpyW.KERNEL32(00000000,HKEY_DYN_DATA), ref: 050D4EF4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcmpi$lstrcpy$lstrcpyn$lstrlen
                          • String ID: HKCC$HKCR$HKCU$HKDD$HKEY_CLASSES_ROOT$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_CURRENT_USER$HKEY_DYN_DATA$HKEY_DYN_DATA$HKEY_LOCAL_MACHINE$HKEY_LOCAL_MACHINE$HKEY_PERFORMANCE_DATA$HKEY_PERFORMANCE_DATA$HKEY_USERS$HKEY_USERS$HKLM$HKPD$HKU
                          • API String ID: 2222171190-2311977196
                          • Opcode ID: 2db3cefade2d08be3a232fe0a5a186fd9cba98e8a72ac9337d3224a304d388e7
                          • Instruction ID: 5cd1f67c68a75571f22214bc43d1b38b8efecbef54abffe10dc23c7b3d534688
                          • Opcode Fuzzy Hash: 2db3cefade2d08be3a232fe0a5a186fd9cba98e8a72ac9337d3224a304d388e7
                          • Instruction Fuzzy Hash: 82B11B70605319EBCF64CF64EC89FAEBBB5FF84701F508599E80A9A240DBB49941CF64
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00405615
                          • ShowWindow.USER32(?), ref: 00405632
                          • DestroyWindow.USER32 ref: 00405646
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405662
                          • GetDlgItem.USER32(?,?), ref: 00405683
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405697
                          • IsWindowEnabled.USER32(00000000), ref: 0040569E
                          • GetDlgItem.USER32(?,00000001), ref: 0040574D
                          • GetDlgItem.USER32(?,00000002), ref: 00405757
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00405771
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004057C2
                          • GetDlgItem.USER32(?,00000003), ref: 00405868
                          • ShowWindow.USER32(00000000,?), ref: 0040588A
                          • EnableWindow.USER32(?,?), ref: 0040589C
                          • EnableWindow.USER32(?,?), ref: 004058B7
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004058CD
                          • EnableMenuItem.USER32(00000000), ref: 004058D4
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004058EC
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004058FF
                          • lstrlenW.KERNEL32(00447250,?,00447250,0046ADC0), ref: 00405928
                          • SetWindowTextW.USER32(?,00447250), ref: 0040593C
                          • ShowWindow.USER32(?,0000000A), ref: 00405A70
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID: PrD
                          • API String ID: 184305955-4282739039
                          • Opcode ID: a563f3c2c599501beef882c1b7706b334ab1ef7dde5fcc94fc7aa6df061418cd
                          • Instruction ID: e32f65a829e85eadb9633a2d0af490baa2bc81b7fdf0bb2ead4b0685e6b50708
                          • Opcode Fuzzy Hash: a563f3c2c599501beef882c1b7706b334ab1ef7dde5fcc94fc7aa6df061418cd
                          • Instruction Fuzzy Hash: 87C1AF71500B04EBDB216F61EE89E2B3BA9FB45346F00053EF545B21F0DA799891AF1E
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004042CD
                          • GetDlgItem.USER32(?,000003E8), ref: 004042E1
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004042FE
                          • GetSysColor.USER32(?), ref: 0040430F
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040431D
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040432B
                          • lstrlenW.KERNEL32(?), ref: 00404336
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404343
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404352
                            • Part of subcall function 0040412A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404284,?), ref: 00404141
                            • Part of subcall function 0040412A: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404284,?), ref: 00404150
                            • Part of subcall function 0040412A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404284,?), ref: 00404164
                          • GetDlgItem.USER32(?,0000040A), ref: 004043AA
                          • SendMessageW.USER32(00000000), ref: 004043B1
                          • GetDlgItem.USER32(?,000003E8), ref: 004043DE
                          • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 00404421
                          • LoadCursorW.USER32(00000000,00007F02), ref: 0040442F
                          • SetCursor.USER32(00000000), ref: 00404432
                          • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 00404447
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00404453
                          • SetCursor.USER32(00000000), ref: 00404456
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404485
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404497
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                          • String ID: @%F$N$open
                          • API String ID: 3928313111-3849437375
                          • Opcode ID: 4ce468f3699d88ed665c706f7775ee9aa6dc059267c0d14d93e3607c8b30f664
                          • Instruction ID: 5e7a78df94721a13c93f88c26dc0e1e940185c2092e6ea244a57a3ff362b188b
                          • Opcode Fuzzy Hash: 4ce468f3699d88ed665c706f7775ee9aa6dc059267c0d14d93e3607c8b30f664
                          • Instruction Fuzzy Hash: 9D71B1B1900609BFDF109F60DD85E6A7B69FB84315F00813AFA04B62D1C778A991CF99
                          APIs
                          • lstrcmpiW.KERNEL32(050D133D,REG_BINARY,?,050D133D,050F8A00), ref: 050D4F1E
                          • lstrcmpiW.KERNEL32(050D133D,REG_DWORD,?,050D133D,050F8A00), ref: 050D4F3B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcmpi
                          • String ID: REG_BINARY$REG_DWORD$REG_DWORD_BIG_ENDIAN$REG_EXPAND_SZ$REG_FULL_RESOURCE_DESCRIPTOR$REG_LINK$REG_MULTI_SZ$REG_NONE$REG_QWORD$REG_RESOURCE_LIST$REG_RESOURCE_REQUIREMENTS_LIST$REG_SZ
                          • API String ID: 1586166983-3251115134
                          • Opcode ID: 9e26fad8a027873c82b9485fa485dc6f9765d78eb97b3649d2ffdee74fd84037
                          • Instruction ID: 9c1e0b752ea474a7dab62e6fc203e9a2539553e31cc4fe0156706e14a17d132c
                          • Opcode Fuzzy Hash: 9e26fad8a027873c82b9485fa485dc6f9765d78eb97b3649d2ffdee74fd84037
                          • Instruction Fuzzy Hash: E0310970354305BBDB509B65FC5AF6EBEAAAB01B90F40C514BD06CB280EA79D8518BB0
                          APIs
                          • lstrcpyW.KERNEL32(0045B2D8,NUL), ref: 00406C0A
                          • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F,?,00000000,000000F1,?), ref: 00406C29
                          • GetShortPathNameW.KERNEL32(000000F1,0045B2D8,00000400), ref: 00406C32
                            • Part of subcall function 00405F16: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406D34,00000000,[Rename]), ref: 00405F26
                            • Part of subcall function 00405F16: lstrlenA.KERNEL32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F58
                          • GetShortPathNameW.KERNEL32(000000F1,00460930,00000400), ref: 00406C53
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2D8,000000FF,0045BAD8,00000400,00000000,00000000,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F), ref: 00406C7C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00460930,000000FF,0045C128,00000400,00000000,00000000,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F), ref: 00406C94
                          • wsprintfA.USER32 ref: 00406CAE
                          • GetFileSize.KERNEL32(00000000,00000000,00460930,C0000000,00000004,00460930,?,?,00000000,000000F1,?), ref: 00406CE6
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406CF5
                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406D11
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406D41
                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C528,00000000,-0000000A,004098AC,00000000,[Rename]), ref: 00406D98
                            • Part of subcall function 00405FB0: GetFileAttributesW.KERNELBASE(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                            • Part of subcall function 00405FB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                          • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406DAC
                          • GlobalFree.KERNEL32(00000000), ref: 00406DB3
                          • CloseHandle.KERNEL32(?), ref: 00406DBD
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                          • String ID: %s=%s$0F$NUL$[Rename]
                          • API String ID: 565278875-2063020953
                          • Opcode ID: e0014d3f174d201f701c5d3f5aee3fb449f0ed8f00eb016f1380403eef9c3722
                          • Instruction ID: 01698a087521ae3c061db779a59327618d621d7377b5f04441123a8e0743360b
                          • Opcode Fuzzy Hash: e0014d3f174d201f701c5d3f5aee3fb449f0ed8f00eb016f1380403eef9c3722
                          • Instruction Fuzzy Hash: B6413732204209BFC2202BA1DD88D6F3AACDF86764B16043EF546F22D1DA3DD819867D
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,00030E10), ref: 050D1024
                            • Part of subcall function 050D6045: lstrcpyW.KERNEL32(?,?), ref: 050D605E
                            • Part of subcall function 050D6045: GlobalFree.KERNEL32 ref: 050D606F
                            • Part of subcall function 050D4B53: lstrlenW.KERNEL32(?), ref: 050D4B60
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(?,?,?), ref: 050D4C48
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(00000000,?,?), ref: 050D4CD3
                          • FindWindowExW.USER32(?,00000000,#32770,00000000), ref: 050D12E0
                          • GetDlgItem.USER32(00000000), ref: 050D12E7
                          • GlobalFree.KERNEL32(?), ref: 050D13FA
                            • Part of subcall function 050D4F12: lstrcmpiW.KERNEL32(050D133D,REG_BINARY,?,050D133D,050F8A00), ref: 050D4F1E
                            • Part of subcall function 050D5D1B: RegOpenKeyExW.KERNELBASE(00020019,00000000,00000000,?,050D13BB,?,?,050D13BB,?,?,00000000,00020019,?), ref: 050D5D31
                            • Part of subcall function 050D5D9F: RegCloseKey.ADVAPI32(050D13D4,?,?,050D13D4,?), ref: 050D5DA7
                            • Part of subcall function 050D6268: wsprintfW.USER32 ref: 050D6280
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Freelstrcpyn$AllocCloseFindItemOpenWindowlstrcmpilstrcpylstrlenwsprintf
                          • String ID: "DisableDisallowedTrafficAlert"=dword:00000001$#32770$/B=$/G=$/K=$/N=$/NI=$/NS=$/S=$/T=$/V=
                          • API String ID: 1121994691-1995937050
                          • Opcode ID: 3d661cbf806cfb8cbc11579232812e49489d5806a67e062e64dd814791125403
                          • Instruction ID: 924b8b92ecabdf915310f02a75c463ae47fe69fe8fb59f53e4c747b4b9f546fe
                          • Opcode Fuzzy Hash: 3d661cbf806cfb8cbc11579232812e49489d5806a67e062e64dd814791125403
                          • Instruction Fuzzy Hash: 6E918D74655300ABEB50DB10FC57FEEBAA1BF00744F18C164FA055AA81DFB9A442CB7A
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                          • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                          • DeleteObject.GDI32(?), ref: 004010F6
                          • CreateFontIndirectW.GDI32(?), ref: 0040110E
                          • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                          • SelectObject.GDI32(00000000,?), ref: 00401149
                          • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                          • SelectObject.GDI32(00000000,00000000), ref: 00401169
                          • DeleteObject.GDI32(?), ref: 0040116E
                          • EndPaint.USER32(?,?), ref: 00401177
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                          • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                          • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                          • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                          APIs
                          • lstrcmpiW.KERNEL32(?,?), ref: 050D1901
                            • Part of subcall function 050D60CF: GlobalAlloc.KERNEL32(00000040,?,?,050D140A,050D8060), ref: 050D60E5
                            • Part of subcall function 050D60CF: lstrcpynW.KERNEL32(00000004,?,?,050D140A,050D8060), ref: 050D60FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AllocGloballstrcmpilstrcpyn
                          • String ID: "DisableDisallowedTrafficAlert"=dword:00000001$BANNER$REG_KEY
                          • API String ID: 791246173-3827714242
                          • Opcode ID: 4831736b271707edba949a064fac2ad88d764c1294892ce96f0d046199c1eb1f
                          • Instruction ID: d07aaee6dd5459be72594ece61b78993c68a52df735546c78ceb6fc14f81c543
                          • Opcode Fuzzy Hash: 4831736b271707edba949a064fac2ad88d764c1294892ce96f0d046199c1eb1f
                          • Instruction Fuzzy Hash: BB125F706193009BDB04CB14E897BFEBBA6BF44345F18C129F5059B681DF39A542CB7A
                          APIs
                          • GetClassNameW.USER32(?,?,0000001E), ref: 10001E12
                          • lstrcmpiW.KERNEL32(?,#32770), ref: 10001E1D
                          • GetDlgItem.USER32(?,00000105), ref: 10001E3B
                          • GetClassNameW.USER32(00000000), ref: 10001E3E
                          • lstrcmpiW.KERNEL32(?,SysCredential), ref: 10001E49
                          • GetDlgItem.USER32(?,00000106), ref: 10001E65
                          • SendMessageW.USER32(00000000), ref: 10001E6E
                          • GetDlgItem.USER32(?,00000104), ref: 10001E82
                          • SendMessageW.USER32(00000000), ref: 10001E85
                          • CallNextHookEx.USER32(00000000,?,?), ref: 10001E94
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Item$ClassMessageNameSendlstrcmpi$CallHookNext
                          • String ID: #32770$SysCredential
                          • API String ID: 1156005039-2483313885
                          • Opcode ID: 089ab9db27a33d557b0723fcdc9cd5293fa2ba8d2f3fe58a0801f9a03ce5cffb
                          • Instruction ID: 184430e2f011cc33a40a60741d721aa7ca2ac319d4a280f09fdd692187c7b284
                          • Opcode Fuzzy Hash: 089ab9db27a33d557b0723fcdc9cd5293fa2ba8d2f3fe58a0801f9a03ce5cffb
                          • Instruction Fuzzy Hash: 23115171A40359BBFB21EBA5CC89FCE77BCEB04785F114815FB51A60A4DBB0E8448B64
                          APIs
                          • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                          • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                          • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                          • RegCloseKey.ADVAPI32(?), ref: 004029E4
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          Strings
                          • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                          • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                          • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                          • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                          • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                          • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrlen$CloseCreateValuewvsprintf
                          • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                          • API String ID: 1641139501-220328614
                          • Opcode ID: 3ae8cee2063955009b0802897bce6cd90532588b84fc30e495d30c60ac9c7f0c
                          • Instruction ID: 5079a85d00332eb89b956210b0bf8ab3b344c965529248026cf182ae6f79859d
                          • Opcode Fuzzy Hash: 3ae8cee2063955009b0802897bce6cd90532588b84fc30e495d30c60ac9c7f0c
                          • Instruction Fuzzy Hash: B741AEB2D00208FFDF11AF91CE46EAEBBB9EB04704F21403BF605721A2D6794B519B59
                          APIs
                          • GetWindowThreadProcessId.USER32(?,?), ref: 100024A9
                            • Part of subcall function 10001A46: OpenProcessToken.ADVAPI32(000000FF,00000028,771B2E90,00000000,100024C0,SeDebugPrivilege,00000001,?,?,771B2E90), ref: 10001A5A
                            • Part of subcall function 10001A46: LookupPrivilegeValueW.ADVAPI32(00000000,00000010,?), ref: 10001A73
                            • Part of subcall function 10001A46: AdjustTokenPrivileges.ADVAPI32(771B2E90,00000000,00000001,00000010,00000001,00000010), ref: 10001AA3
                            • Part of subcall function 10001A46: GetLastError.KERNEL32 ref: 10001AAF
                            • Part of subcall function 10001A46: CloseHandle.KERNEL32(771B2E90), ref: 10001AD0
                          • OpenProcess.KERNEL32(00000040,00000000,?,SeDebugPrivilege,00000001,?,?,771B2E90), ref: 100024C6
                          • GetLastError.KERNEL32(?,771B2E90), ref: 100024D3
                          • DuplicateHandle.KERNEL32(000000FF,000000FF,00000000,?,00000040,00000000,00000001,?,771B2E90), ref: 100024EC
                          • SendMessageW.USER32(00008004,00000539,?,SeDebugPrivilege), ref: 10002515
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Process$ErrorHandleLastOpenToken$AdjustCloseDuplicateLookupMessagePrivilegePrivilegesSendThreadValueWindow
                          • String ID: SeDebugPrivilege
                          • API String ID: 3436673191-2896544425
                          • Opcode ID: 3f575ee20474554fa290eb5dc8a05ffa52b684c4e48b86f9c3c8d50086696208
                          • Instruction ID: f28064a67212c5a8eeb97c9990993a0e7589225466916cf5252ee1b79bd4334c
                          • Opcode Fuzzy Hash: 3f575ee20474554fa290eb5dc8a05ffa52b684c4e48b86f9c3c8d50086696208
                          • Instruction Fuzzy Hash: DF21D1B1A00628BFF701DF908CC5FAA3B6EE7043D5F120121F300A20E8DBB04E559B28
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                          • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                          • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                          • GlobalFree.KERNEL32(00000000), ref: 00402F17
                          • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                          • DeleteFileW.KERNEL32(?), ref: 00402F56
                          Strings
                          • created uninstaller: %d, "%s", xrefs: 00402F3B
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                          • String ID: created uninstaller: %d, "%s"
                          • API String ID: 3294113728-3145124454
                          • Opcode ID: 06e6189e5d07374b733879bc4861fab23cc752c40dce92ef7b4482c5c8a3de7f
                          • Instruction ID: 57b2aa6120a879797d080cb9b9733de2ac9adc2ca39637b5dc0b79c3231e6313
                          • Opcode Fuzzy Hash: 06e6189e5d07374b733879bc4861fab23cc752c40dce92ef7b4482c5c8a3de7f
                          • Instruction Fuzzy Hash: BA31C272800115BBCB11AFA8CE45DAF7FB8EF08324F10023AF655B61E1DB794E419B98
                          APIs
                          • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406435,00000000), ref: 0040625F
                          • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,00406435,00000000), ref: 0040629D
                          • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 004062D6
                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 004062E2
                          • lstrcatW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),004096A8), ref: 004062FC
                          • lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),?,?,00406435,00000000), ref: 00406303
                          • WriteFile.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00000000,00406435,00000000,?,?,00406435,00000000), ref: 00406318
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                          • String ID: Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"")
                          • API String ID: 3734993849-3283049713
                          • Opcode ID: 9fa50d1adb4a17e963d4e637509519975a2aeadd9521b9408314cb2d14ea49f5
                          • Instruction ID: e74be36d315582b52cf8810fbf669e52dd667146d2b91da865e79faa34e4d15c
                          • Opcode Fuzzy Hash: 9fa50d1adb4a17e963d4e637509519975a2aeadd9521b9408314cb2d14ea49f5
                          • Instruction Fuzzy Hash: 1A21C271500240FBD710AFA4DD88DA73728EB41374B25C33AFA26B61E0E7784995CBAD
                          APIs
                          • SendMessageW.USER32(00008003,00000000,00000000), ref: 10002600
                          • SendMessageW.USER32(00008003,00000001,00000000), ref: 1000260F
                          • PostMessageW.USER32(?,00000408,?,00000000), ref: 1000262A
                          • GetWindowRect.USER32(?,?), ref: 10002633
                          • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00000001), ref: 10002649
                          • PostMessageW.USER32(00008002,?,?), ref: 10002660
                          • CallWindowProcW.USER32(?,00000047,?,?), ref: 10002680
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Message$Window$PostSend$CallProcRect
                          • String ID: G
                          • API String ID: 3451797191-985283518
                          • Opcode ID: 276970862d3a67256e407dc1d8ec7596bd3ebb39545d5d82955e00c61c88e694
                          • Instruction ID: 918a90b7578ccc224bbcf0950e32afede6c57029d1e046dd772ed2f5749f82d9
                          • Opcode Fuzzy Hash: 276970862d3a67256e407dc1d8ec7596bd3ebb39545d5d82955e00c61c88e694
                          • Instruction Fuzzy Hash: 1B215EB550012DBEEF119F94CD85EAE3F79FB04395F014015FA44A50B4C7B24D61EB64
                          APIs
                          • GetWindowLongW.USER32(?,000000F0), ref: 1000224C
                          • SetForegroundWindow.USER32(?), ref: 1000225A
                          • ShowWindow.USER32(?,00000000), ref: 10002265
                          • DuplicateHandle.KERNEL32(000000FF,00000000,?,00000006,00000000,00000000), ref: 100022BC
                          • DuplicateHandle.KERNEL32(000000FF,?,?,?,00100002,00000000,00000000), ref: 100022F2
                          • DestroyWindow.USER32(?), ref: 1000231D
                          • PostMessageW.USER32(00000000,00000012,00000000,00000000), ref: 1000232D
                          • DefWindowProcW.USER32(?,?,?,?), ref: 1000233D
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Window$DuplicateHandle$DestroyForegroundLongMessagePostProcShow
                          • String ID:
                          • API String ID: 947104246-0
                          • Opcode ID: be6f18889104940bc08923d782848733ff92bcea5006720bf1062cb5151e37cd
                          • Instruction ID: 872890f326dd86a1f175bb7553751e41c479adeaadde458f9f7537b73c1eaa25
                          • Opcode Fuzzy Hash: be6f18889104940bc08923d782848733ff92bcea5006720bf1062cb5151e37cd
                          • Instruction Fuzzy Hash: 184157B160421AEBFB50CFA8CC85B9A3BA4FB047C0F118121F955D61ACDBB4EE50DB60
                          APIs
                          • GetCurrentProcessId.KERNEL32 ref: 10001FD0
                          • GetCurrentThreadId.KERNEL32 ref: 10001FD6
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 10001FFE
                          • WaitForSingleObject.KERNEL32(000000FF), ref: 1000200C
                          • CloseHandle.KERNEL32 ref: 10002018
                          • CloseHandle.KERNEL32 ref: 10002020
                          • CloseHandle.KERNEL32 ref: 10002028
                          • UnmapViewOfFile.KERNEL32 ref: 10002030
                          • CloseHandle.KERNEL32 ref: 1000203C
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CloseHandle$Current$FileMessageObjectProcessSendSingleThreadUnmapViewWait
                          • String ID:
                          • API String ID: 1555270478-0
                          • Opcode ID: 9e60369701609aae8eb9e9b471fbe79b5df2cf09f0236b1b1ba66e4d4f198a8f
                          • Instruction ID: 694c6f7247dcef14e850320db2a395f96bfe1e563e75d3cfc277fa498a93e4c8
                          • Opcode Fuzzy Hash: 9e60369701609aae8eb9e9b471fbe79b5df2cf09f0236b1b1ba66e4d4f198a8f
                          • Instruction Fuzzy Hash: F0F0B7B0801175EFFB116B60CD88B8A3FA5FB043D2B024121F2519107DDF7108A1EF58
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 00403F44
                          • GetSysColor.USER32(00000000), ref: 00403F60
                          • SetTextColor.GDI32(?,00000000), ref: 00403F6C
                          • SetBkMode.GDI32(?,?), ref: 00403F78
                          • GetSysColor.USER32(?), ref: 00403F8B
                          • SetBkColor.GDI32(?,?), ref: 00403F9B
                          • DeleteObject.GDI32(?), ref: 00403FB5
                          • CreateBrushIndirect.GDI32(?), ref: 00403FBF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                          • Instruction ID: d1251e89d25211f29e22ed1568f44ff950bb01ff11d0b068515cddd17a3a0421
                          • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                          • Instruction Fuzzy Hash: 26115171904705ABC7219F78DE08B5BBFF8AF01715B05893DE886E22A0D738EA488B54
                          APIs
                          • lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                          • lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                          • lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                          • SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                            • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                          • String ID:
                          • API String ID: 2740478559-0
                          • Opcode ID: 5e5d700da742a3d6d340dab77f0fdb3d38b9a8a0b9685d170e55f73d5ea00312
                          • Instruction ID: 8b6ba25b3567668a3d709078441474e2f94ee86325c17f48cbe0efe0ef4ad692
                          • Opcode Fuzzy Hash: 5e5d700da742a3d6d340dab77f0fdb3d38b9a8a0b9685d170e55f73d5ea00312
                          • Instruction Fuzzy Hash: 2021AF71C00618BECF129FA5DD84A9FBFB5EF48314F10813AF908BA290D7784A509F99
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                          • CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                          • CharNextW.USER32(?,004D70C8,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                          • CharPrevW.USER32(?,?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                          Strings
                          • "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" , xrefs: 004061A3
                          • *?|<>/":, xrefs: 004061EB
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" $*?|<>/":
                          • API String ID: 589700163-317551869
                          • Opcode ID: 1d09d8738e5602742b586041446eac83eeb7776b51f76f2679a8714e99ae6001
                          • Instruction ID: 45f9d4f3dcf6299a058aa2101cc88fb20adbc263b608899fab4a560a17f1b311
                          • Opcode Fuzzy Hash: 1d09d8738e5602742b586041446eac83eeb7776b51f76f2679a8714e99ae6001
                          • Instruction Fuzzy Hash: 0E11C82580062195CB307B698C4097B76E8AE55790756443FECC6F72C2EB7C9CA1C2AD
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00403302
                          • GetTickCount.KERNEL32 ref: 00403320
                          • wsprintfW.USER32 ref: 0040334E
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                            • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                            • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                          • CreateDialogParamW.USER32(0000006F,00000000,00403268,00000000), ref: 00403372
                          • ShowWindow.USER32(00000000,00000005), ref: 00403380
                            • Part of subcall function 0040324C: MulDiv.KERNEL32(00000000,00000064,000034B0), ref: 00403261
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 96c2a724128113feeb2dba6851438288d590ea99915262e15a0359641590fb8d
                          • Instruction ID: 7cd9398b14f8ade0b0fcf895a8ee56c548843aa05ddcd0bd44aa2535a42f6e46
                          • Opcode Fuzzy Hash: 96c2a724128113feeb2dba6851438288d590ea99915262e15a0359641590fb8d
                          • Instruction Fuzzy Hash: 5C011E30445610EBC721AFA4EE89A9E7E6CEB05706B14413FFE45B11E0CB785A858BAD
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004049C9
                          • GetMessagePos.USER32 ref: 004049D1
                          • ScreenToClient.USER32(?,?), ref: 004049E9
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 004049FB
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404A21
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                          • Instruction ID: 27f0785cdc5f68d0066a8e7a1d7e71ccbf55bb55bf6eb3414b3d297d9b41ad7b
                          • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                          • Instruction Fuzzy Hash: 81015271A4021CBADB00DB94DD85BEEBBB8AF54711F10412ABA50B61D0D7B45A058BA5
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00403286
                          • wsprintfW.USER32 ref: 004032BA
                          • SetWindowTextW.USER32(?,?), ref: 004032CA
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032DC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: dee786f0fd9cdd3f8c0fb31302e7a2050583a55b44ce5b4915f07339fad65024
                          • Instruction ID: bfe6641e6ef7cc7b54ecc28104225e3c2b90f8d7ad59e83b9ab1f1d0914f92a4
                          • Opcode Fuzzy Hash: dee786f0fd9cdd3f8c0fb31302e7a2050583a55b44ce5b4915f07339fad65024
                          • Instruction Fuzzy Hash: CAF0317050010DABDF209F61DD4ABAA3B69EB10349F00807EFA46B91D1CBB986598F99
                          APIs
                          • GetDlgItem.USER32(?,000003E8), ref: 10001501
                          • SendMessageW.USER32(00000000), ref: 1000150A
                          • GetDlgItem.USER32(?,000003E9), ref: 10001523
                          • SendMessageW.USER32(00000000), ref: 10001526
                          • GetDlgItem.USER32(000003EF,000003EC), ref: 10001550
                          • EnableWindow.USER32(00000000), ref: 10001553
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Item$MessageSend$EnableWindow
                          • String ID:
                          • API String ID: 2158911739-0
                          • Opcode ID: 24ba21cfe8c34813aa998a640d71c42d4387c6654da2b463e93e8f323967fa4b
                          • Instruction ID: e2d2e6678e631a738ddc6b4dee7cc50119bb28f1d5d7ae6152070b5b63b1966e
                          • Opcode Fuzzy Hash: 24ba21cfe8c34813aa998a640d71c42d4387c6654da2b463e93e8f323967fa4b
                          • Instruction Fuzzy Hash: CA117C71900258BFFF02AFA5DC84AEE3FADEB40394F04C466F9149B1A5C6748A51DF90
                          APIs
                          • IsDialogMessageW.USER32(?,00000006), ref: 10002066
                          • TranslateMessage.USER32(00000006), ref: 10002074
                          • DispatchMessageW.USER32(00000006), ref: 1000207E
                          • PeekMessageW.USER32(00000006,00000000,00000000,00000000,00000001), ref: 1000208D
                          • GetCurrentProcessId.KERNEL32 ref: 10002099
                          • GetCurrentThreadId.KERNEL32 ref: 1000209F
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Message$Current$DialogDispatchPeekProcessThreadTranslate
                          • String ID:
                          • API String ID: 1591844402-0
                          • Opcode ID: db7d7b526615e9639b7f9b6bf0b22303f1866cf65982a1d94fd2c8c014de09d0
                          • Instruction ID: 331d87cadb7f605eddd9b04f27fcaea5197d82334009f26882172e6f8b3aaa53
                          • Opcode Fuzzy Hash: db7d7b526615e9639b7f9b6bf0b22303f1866cf65982a1d94fd2c8c014de09d0
                          • Instruction Fuzzy Hash: F1018F7290025AEBEB10DFA5CC888DF7BBCEB847C0B104025FA46D301EE7749985CBA0
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,80000000,00000000), ref: 10001AF1
                          • OpenServiceW.ADVAPI32(00000000,?,00000004,00000000,00000000), ref: 10001B05
                          • QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B1C
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 10001B2F
                          • CloseServiceHandle.ADVAPI32(00000000), ref: 10001B32
                          • GetLastError.KERNEL32 ref: 10001B38
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Service$CloseHandleOpen$ErrorLastManagerQueryStatus
                          • String ID:
                          • API String ID: 3744063808-0
                          • Opcode ID: d4c2a254ee82679244d82d9af3f9926c066a3018744546f3792a4dc0a2d47459
                          • Instruction ID: 15a920e18fdd7bb7d9efb61c7c743de53b5eda2f3bc62133ff02163150c1d3b6
                          • Opcode Fuzzy Hash: d4c2a254ee82679244d82d9af3f9926c066a3018744546f3792a4dc0a2d47459
                          • Instruction Fuzzy Hash: DDF0283AA083A87BFB1257B18C88FEE7F7CEB482D1F000065FA81A1199D7B4C549C761
                          APIs
                            • Part of subcall function 050D6045: lstrcpyW.KERNEL32(?,?), ref: 050D605E
                            • Part of subcall function 050D6045: GlobalFree.KERNEL32 ref: 050D606F
                            • Part of subcall function 050D4B53: lstrlenW.KERNEL32(?), ref: 050D4B60
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(?,?,?), ref: 050D4C48
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(00000000,?,?), ref: 050D4CD3
                            • Part of subcall function 050D5D1B: RegOpenKeyExW.KERNELBASE(00020019,00000000,00000000,?,050D13BB,?,?,050D13BB,?,?,00000000,00020019,?), ref: 050D5D31
                            • Part of subcall function 050D5E21: RegQueryValueExW.ADVAPI32(05120EC0,?,00000000,?,00000000,050D27E4,?,?,050D27E4,00000000,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,00000000,?,05120EC0,00010000), ref: 050D5E3B
                          • RegSetValueExW.ADVAPI32(?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,00000000,00000003,05120EC0,?), ref: 050D31ED
                          • lstrcatW.KERNEL32(05120EC0,"DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D32F8
                          • lstrlenW.KERNEL32(05120EC0), ref: 050D3303
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Valuelstrcpynlstrlen$FreeGlobalOpenQuerylstrcatlstrcpy
                          • String ID: "DisableDisallowedTrafficAlert"=dword:00000001$C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg
                          • API String ID: 3157898717-1899092919
                          • Opcode ID: 53351db51777ac1252776b8e6cab87a464114de1f5e9963049324956325488e4
                          • Instruction ID: ff33f0296d387e10bf29fe1e5de31ad8bab2ff448085d8905d39738f9c8df99b
                          • Opcode Fuzzy Hash: 53351db51777ac1252776b8e6cab87a464114de1f5e9963049324956325488e4
                          • Instruction Fuzzy Hash: 57914A74E01309DBCB25DF98D84ABEEFBB1FF48700F188598E51567240D7756A84CB62
                          APIs
                          • lstrlenW.KERNEL32(00447250,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447250,?), ref: 004045AA
                          • wsprintfW.USER32 ref: 004045B7
                          • SetDlgItemTextW.USER32(?,00447250,000000DF), ref: 004045CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$PrD
                          • API String ID: 3540041739-1882686053
                          • Opcode ID: 737b4354604b69ed49da521882824f7eacafb09e8a5ec505cdcd8fffed629745
                          • Instruction ID: 7880dc7fd7a5c0d30aad69498be6142e37c8297d3eb74307a1111cd8f0787a4b
                          • Opcode Fuzzy Hash: 737b4354604b69ed49da521882824f7eacafb09e8a5ec505cdcd8fffed629745
                          • Instruction Fuzzy Hash: B211BD72B002043BCB10AA799D45E9E725EEBC5374F10423BF619F30E0E6788B268669
                          APIs
                            • Part of subcall function 050D6045: lstrcpyW.KERNEL32(?,?), ref: 050D605E
                            • Part of subcall function 050D6045: GlobalFree.KERNEL32 ref: 050D606F
                            • Part of subcall function 050D4B53: lstrlenW.KERNEL32(?), ref: 050D4B60
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(?,?,?), ref: 050D4C48
                            • Part of subcall function 050D4B53: lstrcpynW.KERNEL32(00000000,?,?), ref: 050D4CD3
                            • Part of subcall function 050D5D1B: RegOpenKeyExW.KERNELBASE(00020019,00000000,00000000,?,050D13BB,?,?,050D13BB,?,?,00000000,00020019,?), ref: 050D5D31
                            • Part of subcall function 050D5E21: RegQueryValueExW.ADVAPI32(05120EC0,?,00000000,?,00000000,050D27E4,?,?,050D27E4,00000000,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg,00000000,?,05120EC0,00010000), ref: 050D5E3B
                            • Part of subcall function 050D5D9F: RegCloseKey.ADVAPI32(050D13D4,?,?,050D13D4,?), ref: 050D5DA7
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D2F07
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D2F3A
                          • lstrlenW.KERNEL32("DisableDisallowedTrafficAlert"=dword:00000001), ref: 050D2F49
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrlen$lstrcpyn$CloseFreeGlobalOpenQueryValuelstrcpy
                          • String ID: "DisableDisallowedTrafficAlert"=dword:00000001$C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg
                          • API String ID: 1616757396-1899092919
                          • Opcode ID: 6d761eff6f10c068248bdbb05a06e9464ed1cabe95c301999d5a6b5a0296b531
                          • Instruction ID: 9a35dc00995bb2da8fc2d858c3e94d9edb548192ff4ca2e55e3770482d1927a4
                          • Opcode Fuzzy Hash: 6d761eff6f10c068248bdbb05a06e9464ed1cabe95c301999d5a6b5a0296b531
                          • Instruction Fuzzy Hash: 3A513774E0030AEBDB14DF98E84ABEEFBB5FF18305F108569E50166280E7755A84CBB1
                          APIs
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                          • RegCloseKey.ADVAPI32(?), ref: 00401504
                          • RegCloseKey.ADVAPI32(?), ref: 00401529
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: b0e9a248c90bc4b219d82b224dbd9c03938a54c8e2e96de430ad7f277ae3d019
                          • Instruction ID: 926a3fd6ba00d5bb97a34cee5b023bebcb5cad9bd68352020a6bff24d96e3699
                          • Opcode Fuzzy Hash: b0e9a248c90bc4b219d82b224dbd9c03938a54c8e2e96de430ad7f277ae3d019
                          • Instruction Fuzzy Hash: C3114972500008FFDF119F90EE85DAA3B7AFB54348F00403AFA06B5170D7759E549A29
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000808,702622A8,?,00000808), ref: 70261967
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000808,702622A8,?,00000808), ref: 7026196E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000808,702622A8,?,00000808), ref: 70261982
                          • GetProcAddress.KERNEL32(702622A8,00000000), ref: 70261989
                          • GlobalFree.KERNEL32(00000000), ref: 70261992
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: f367c12ec365d9b6862d9e994a76a46aae55daff992b72e6ca67cac7f00a6008
                          • Instruction ID: 37374bae435f386f7d8cb27ec9e35d97638abd43d543e61e878b417d1572e5a5
                          • Opcode Fuzzy Hash: f367c12ec365d9b6862d9e994a76a46aae55daff992b72e6ca67cac7f00a6008
                          • Instruction Fuzzy Hash: A1F0127310A1347BD62017A78C4CE9BFE9CDF4B2F5B114211F218951A0C6615C05D6F1
                          APIs
                          • GetDlgItem.USER32(?), ref: 004020A3
                          • GetClientRect.USER32(00000000,?), ref: 004020B0
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                          • DeleteObject.GDI32(00000000), ref: 004020EE
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                          • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                          • Opcode Fuzzy Hash: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                          • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                          • Instruction ID: e9a18080beffe971bb15df4a8f5444ede2e1f7f3a5df9d200604b6a011215d0a
                          • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                          • Instruction Fuzzy Hash: 32219171900209ABDF15AFB4D986ABD7BB9AF00348F14413EF602F60E2D6798A80D758
                          APIs
                            • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                          • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          Strings
                          • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                          • DeleteRegKey: "%s\%s", xrefs: 00402843
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                          • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                          • API String ID: 1697273262-1764544995
                          • Opcode ID: cd7a3895cbf7e5bafa2e80516e790e490515dfbff2c3e86001fc46b126d543a9
                          • Instruction ID: 374c3c3b6278fb1c2beb817405795feef458ca782ed8724690096ffa3588498b
                          • Opcode Fuzzy Hash: cd7a3895cbf7e5bafa2e80516e790e490515dfbff2c3e86001fc46b126d543a9
                          • Instruction Fuzzy Hash: BA11C472A00111ABDB10BFA5DD4AABE3AA4EB00354F10443FF50AB61D2D6788A50869D
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00404A62
                          • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404AD0
                            • Part of subcall function 00403F0F: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403F21
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID: $PrD
                          • API String ID: 3748168415-683102269
                          • Opcode ID: ce2b7f03bb1297be540aa9391ce969a8123c951ec3d3b567541a8540a2105a5e
                          • Instruction ID: 796ae977d962bd2fb4eacbf10a92dd87c42d9844f52e2d7c2fef9845d3ca3dba
                          • Opcode Fuzzy Hash: ce2b7f03bb1297be540aa9391ce969a8123c951ec3d3b567541a8540a2105a5e
                          • Instruction Fuzzy Hash: 5C118FB1684208ABDF219F61DC40E9B3668BF84369F00803BFA0579192C37C8D519FAD
                          APIs
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                            • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                            • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361), ref: 0040512D
                            • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                            • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                          • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          Strings
                          • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                          • HideCommandLineWindow, xrefs: 004021D6
                          • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                          • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d$HideCommandLineWindow
                          • API String ID: 3156913733-3435373328
                          • Opcode ID: d74c362f720958c7a1ea5317b04e4df155dd8d33f350e4367a20e0d4617c29db
                          • Instruction ID: 385da8b202b2a045014f9446d3cad8c85c99a9e265c35722db0b8e87639932c1
                          • Opcode Fuzzy Hash: d74c362f720958c7a1ea5317b04e4df155dd8d33f350e4367a20e0d4617c29db
                          • Instruction Fuzzy Hash: C5018FB2B40214B6D72077B69C87F7B2A9CDB41758B20443BF642F60E3E5BD8851927D
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcatwsprintf
                          • String ID: %02x%c$...
                          • API String ID: 3065427908-1057055748
                          • Opcode ID: 85df159639746478037a26c2e7b04b1779f54c746bce4477c4c8f2341ae68883
                          • Instruction ID: 49b15afb37c1c3cbf89587828b9fbcb2b479192470e11d1a121134da54663489
                          • Opcode Fuzzy Hash: 85df159639746478037a26c2e7b04b1779f54c746bce4477c4c8f2341ae68883
                          • Instruction Fuzzy Hash: 1201D232510219AFCB01CF58CD85A9EBBB9EB44704F218136F856F3280D6749EA48BA8
                          APIs
                          • OleInitialize.OLE32(00000000), ref: 004051B7
                            • Part of subcall function 00403F0F: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403F21
                          • OleUninitialize.OLE32(00000404,00000000), ref: 00405205
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                          • String ID: Section: "%s"$Skipping section: "%s"
                          • API String ID: 2266616436-4211696005
                          • Opcode ID: 9faf3df30d8341890c428f77cd47873b5149034e1ce4e1928ca9eebd2d14ad04
                          • Instruction ID: b096c94640e0452ae870d043d7677ea343cceb766e7301fd1a80b39db48c4c93
                          • Opcode Fuzzy Hash: 9faf3df30d8341890c428f77cd47873b5149034e1ce4e1928ca9eebd2d14ad04
                          • Instruction Fuzzy Hash: 54F0D6329047009BE2106754AD02B5777A4DF84714F14003FFE44721E2DAF848418A1D
                          APIs
                          • GetPrivateProfileStringW.KERNEL32(MyRunAsStrings,000000FF,00000000,?,00000208,?), ref: 100012AC
                          • SendMessageW.USER32(00000000), ref: 100012EC
                            • Part of subcall function 100011A5: GetUserNameW.ADVAPI32(?,?), ref: 100011EC
                            • Part of subcall function 100011A5: wsprintfW.USER32 ref: 1000121C
                            • Part of subcall function 100011A5: GetDlgItem.USER32(?,000003E8), ref: 1000123D
                            • Part of subcall function 100011A5: SendMessageW.USER32(00000000), ref: 10001246
                            • Part of subcall function 100011A5: LoadLibraryA.KERNEL32(SHELL32,00005503,?,00000204), ref: 1000125A
                            • Part of subcall function 100011A5: LoadStringW.USER32(00000000), ref: 10001261
                            • Part of subcall function 100011A5: GetDlgItem.USER32(?,000003EC), ref: 1000127E
                            • Part of subcall function 100011A5: SendMessageW.USER32(00000000), ref: 10001281
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: MessageSend$ItemLoadString$LibraryNamePrivateProfileUserwsprintf
                          • String ID: MyRunAsStrings
                          • API String ID: 2667165715-2281671616
                          • Opcode ID: c8de4ed148812fc98f465fcd8cdc01c027a7dee28ce45558fe763cb554ad6401
                          • Instruction ID: 2c1487b17c35e209138c33c1b13d63161124646cd3dd881dc6dcb0be1a7f4c85
                          • Opcode Fuzzy Hash: c8de4ed148812fc98f465fcd8cdc01c027a7dee28ce45558fe763cb554ad6401
                          • Instruction Fuzzy Hash: 41F0E27050025AEBFF119F50DC49FCA3A79EB017D5F004625BA20A00E8C7B19AB19A5A
                          APIs
                            • Part of subcall function 70261581: GlobalAlloc.KERNELBASE(00000040,?,702615BA,?,?,7026185F,?,70261017), ref: 7026158B
                          • lstrcpyW.KERNEL32(00000000,error), ref: 70261929
                          • wsprintfW.USER32 ref: 70261942
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: AllocGloballstrcpywsprintf
                          • String ID: callback%d$error
                          • API String ID: 2689062267-1307476583
                          • Opcode ID: 786d98f1615aa72295d9c3cd9e6cadf5b3f6aaf0a5ecc6dca34e88afebea3d9b
                          • Instruction ID: b5e3f85a35c2281b94234d90c2733b714cf71913e14fb166ed5face83cbb0d00
                          • Opcode Fuzzy Hash: 786d98f1615aa72295d9c3cd9e6cadf5b3f6aaf0a5ecc6dca34e88afebea3d9b
                          • Instruction Fuzzy Hash: E9E0D83370D011E783125A255C58A8D36795F023387284610F95ADAF91C316E9F95682
                          APIs
                            • Part of subcall function 702615A3: lstrcpyW.KERNEL32(00000000,?), ref: 702615C1
                            • Part of subcall function 702615A3: GlobalFree.KERNEL32 ref: 702615D2
                          • GlobalFree.KERNEL32(?), ref: 70261A04
                          • GlobalFree.KERNEL32(?), ref: 70261A9C
                          • GlobalFree.KERNEL32(?), ref: 70261AA1
                          • __alldvrm.LIBCMT ref: 70261ACB
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FreeGlobal$__alldvrmlstrcpy
                          • String ID:
                          • API String ID: 1811517867-0
                          • Opcode ID: b04ac85641ea8886eb22c97759c1611e834f188e40ad711f2ffa1c8a96b9cf93
                          • Instruction ID: 82113a73981242847814d899ec16fa3ea85eefa7141033842156e266238502da
                          • Opcode Fuzzy Hash: b04ac85641ea8886eb22c97759c1611e834f188e40ad711f2ffa1c8a96b9cf93
                          • Instruction Fuzzy Hash: E9510337F011069ACB12DFE4C88566DB77AEF4420872D815AE40693F54E674BFF0DA91
                          APIs
                            • Part of subcall function 70261C1B: GlobalFree.KERNEL32(?), ref: 70261E69
                            • Part of subcall function 70261C1B: GlobalFree.KERNEL32(?), ref: 70261E6E
                            • Part of subcall function 70261C1B: GlobalFree.KERNELBASE(?), ref: 70261E73
                          • GlobalFree.KERNEL32(00000000), ref: 70262868
                            • Part of subcall function 702615E0: GlobalAlloc.KERNEL32(00000040,?,?,702618AA,?), ref: 702615F6
                            • Part of subcall function 702615E0: lstrcpynW.KERNEL32(00000004,?,?,702618AA,?), ref: 7026160C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2612156353.0000000070261000.00000020.00000001.01000000.00000006.sdmp, Offset: 70260000, based on PE: true
                          • Associated: 00000002.00000002.2612108950.0000000070260000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612237169.0000000070263000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000002.00000002.2612310355.0000000070265000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_70260000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Global$Free$Alloclstrcpyn
                          • String ID: error
                          • API String ID: 4250884139-1574812785
                          • Opcode ID: e8ae5c9445f8e1b792c9be4fae004fccaa41dfed839a5cd2a47c7d6b401898fb
                          • Instruction ID: ddf65d2697e035e5e8ab8cd35672cc6bf38df676175bf81516756c05ba17f506
                          • Opcode Fuzzy Hash: e8ae5c9445f8e1b792c9be4fae004fccaa41dfed839a5cd2a47c7d6b401898fb
                          • Instruction Fuzzy Hash: 40010833A09611AEC3119BA4DC49B4E77E85F40394F14441AF586D7A10DBB4B8E85F73
                          APIs
                          • GetDC.USER32(?), ref: 00402100
                          • GetDeviceCaps.GDI32(00000000), ref: 00402107
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                            • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                          • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                            • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                          • String ID:
                          • API String ID: 1599320355-0
                          • Opcode ID: 600f7a39d98bd087a3fa73ce05d1baab7dfc82f361ba09517c53b02978263ded
                          • Instruction ID: b852d753667c04f7f8403c46551348dceb61737b9063f8de5ee225c6b1b91025
                          • Opcode Fuzzy Hash: 600f7a39d98bd087a3fa73ce05d1baab7dfc82f361ba09517c53b02978263ded
                          • Instruction Fuzzy Hash: B6018472A44650EFE701DBB4ED46BDA3FA4A725315F10C43AF541F61E3C678444A8B2D
                          APIs
                            • Part of subcall function 00407033: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00407057
                          • lstrcpynW.KERNEL32(?,?,00000009), ref: 0040739A
                          • lstrcmpW.KERNEL32(?,Version ), ref: 004073AB
                          • lstrcpynW.KERNEL32(?,?,?), ref: 004073C2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcpyn$CreateFilelstrcmp
                          • String ID: Version
                          • API String ID: 512980652-315105994
                          • Opcode ID: 5b254390c235843b3cd14036e60a35d0405450d943fe7c22a996b54282ed20ac
                          • Instruction ID: be0c1bc54e1f5d3dac358994bef49e147f417753078ca6f75dbba3536d9e97a2
                          • Opcode Fuzzy Hash: 5b254390c235843b3cd14036e60a35d0405450d943fe7c22a996b54282ed20ac
                          • Instruction Fuzzy Hash: 68F08172A0021CABDB109AA49D46EDA777CEB44700F000076FA00F6180E6B5AE058BA5
                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 100014A7
                          • SendMessageW.USER32(00000000), ref: 100014AA
                          • GetDlgItem.USER32(?,00000001), ref: 100014BF
                          • EnableWindow.USER32(00000000), ref: 100014C2
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Item$EnableMessageSendWindow
                          • String ID:
                          • API String ID: 3471810782-0
                          • Opcode ID: cdc701835a18efdbc5b32e1473691a6e8baa4da8af65885cbc45cdedd92b3f4c
                          • Instruction ID: 8cb8bfa5ab36a404cc4ceb61c09436c2d8d817dce6776651a9d7fe6f52899f3f
                          • Opcode Fuzzy Hash: cdc701835a18efdbc5b32e1473691a6e8baa4da8af65885cbc45cdedd92b3f4c
                          • Instruction Fuzzy Hash: B8E06D705082206AFA109F308C88AFB7E9DEB44390F004806F940EA0E9C665CC91DA60
                          APIs
                          • CoCreateInstance.OLE32(00409B54,?,00000001,00409B34,?), ref: 0040257E
                          Strings
                          • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                          • HideCommandLineWindow, xrefs: 00402646, 00402659
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d$HideCommandLineWindow
                          • API String ID: 542301482-4244415611
                          • Opcode ID: 72f94041dc772d4d9adb032695cde8a813159a995c234bec806880be495e7e30
                          • Instruction ID: 8d6901ad6a64056badc23f129c971549208a59aeacbb917aec9ee0bd4eb55a7e
                          • Opcode Fuzzy Hash: 72f94041dc772d4d9adb032695cde8a813159a995c234bec806880be495e7e30
                          • Instruction Fuzzy Hash: F9414E74A00205AFCB04EFA0CC99EAE7B79EF48314B20456AF915EB2E1C679A941CB54
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000011), ref: 00402CAA
                          • WriteFile.KERNEL32(00000000,?,HideCommandLineWindow,00000000,?,?,00000000,00000011), ref: 00402CCC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: FileWritelstrlen
                          • String ID: HideCommandLineWindow
                          • API String ID: 427699356-1563606009
                          • Opcode ID: 51da3d6124d797b8f7165eed9bac9ad292a782a8f6b34c2fe15836bcfb95dec3
                          • Instruction ID: 17b6097557221931d6ab36d6d47baa216711e37936d94999af4c5ae25bfb5482
                          • Opcode Fuzzy Hash: 51da3d6124d797b8f7165eed9bac9ad292a782a8f6b34c2fe15836bcfb95dec3
                          • Instruction Fuzzy Hash: 01F08972615204ABDB14EBB1DE45AAF7268DF00319F10443FE143F21D2D67D8645962D
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                            • Part of subcall function 00406404: lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                            • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                          • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Window$EnableShowlstrlenwvsprintf
                          • String ID: HideWindow
                          • API String ID: 1249568736-780306582
                          • Opcode ID: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                          • Instruction ID: d6a52e45258e13aa606ad2b2b5c1a00533a470e73934100eb5490deb1737a6ec
                          • Opcode Fuzzy Hash: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                          • Instruction Fuzzy Hash: 02E09232A05111DBCB08BBB5A7495AE76B4EA5532A725007FE243F20D1DA7D8D01C62D
                          APIs
                          • SHGetValueA.SHLWAPI(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\System,EnableLUA,?,?,?), ref: 10001BCC
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Policies\System, xrefs: 10001BC2
                          • EnableLUA, xrefs: 10001BBD
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611971739.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000002.00000002.2611924610.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612016933.0000000010004000.00000004.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 00000002.00000002.2612061033.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_10000000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: EnableLUA$Software\Microsoft\Windows\CurrentVersion\Policies\System
                          • API String ID: 3702945584-2158134279
                          • Opcode ID: 09b2d0f02fb7775a930ed96b6b852410dd262c409d82556381042c822823b52e
                          • Instruction ID: 1a8543b653faaba41de9d809f226dd19f5be5b3a25162012483473e9e2a03304
                          • Opcode Fuzzy Hash: 09b2d0f02fb7775a930ed96b6b852410dd262c409d82556381042c822823b52e
                          • Instruction Fuzzy Hash: 39E0E6B5A00108B6EB01DBA1AC45BDFB7FCE7042C8F514165AA02F2044FB70DA04C695
                          APIs
                          • FreeLibrary.KERNEL32(?,"C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" ,00000000,771B2EE0,004039D5,-00000002,00403C31,?), ref: 00403DFD
                          • GlobalFree.KERNEL32(?), ref: 00403E04
                          Strings
                          • "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe" , xrefs: 00403DF5
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: "C:\Users\user\AppData\Local\Temp\7ZipSfx.000\PsiphonPortable.exe"
                          • API String ID: 1100898210-3495464675
                          • Opcode ID: 3e6e65f7e0b148a2159587eab1eb2803a36fbd9c76a6a57b41a6511bb26f2982
                          • Instruction ID: 7b5d0e754ab654fd3587ae2081214c4606cb6cc152fa8691e9eece175d85dce4
                          • Opcode Fuzzy Hash: 3e6e65f7e0b148a2159587eab1eb2803a36fbd9c76a6a57b41a6511bb26f2982
                          • Instruction Fuzzy Hash: 29E0C2334141209BD7321F04E904B1B7B68BF45B72F05016EF8C03B2608B345C4286D8
                          APIs
                          • lstrlenW.KERNEL32(Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                          • wvsprintfW.USER32(00000000,?,?), ref: 00406428
                            • Part of subcall function 00406248: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406435,00000000), ref: 0040625F
                          Strings
                          • Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe""), xrefs: 00406406, 0040640B
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: CloseHandlelstrlenwvsprintf
                          • String ID: Exec: success (""C:\Users\user\AppData\Local\Temp\7ZipSfx.000\App\Psiphon\psiphon3.exe"")
                          • API String ID: 3509786178-3283049713
                          • Opcode ID: 1d2697fad80eb9d0b70210806a91cde17483bf3f8fbb3d9bc72772a253d3c35e
                          • Instruction ID: 2283ea6708b2d64b9e6789b455a10468216e6ae22039c90fe2b3791cf276606a
                          • Opcode Fuzzy Hash: 1d2697fad80eb9d0b70210806a91cde17483bf3f8fbb3d9bc72772a253d3c35e
                          • Instruction Fuzzy Hash: 3ED05E34060316BACA006BA0DD09A997764FBE0384F50052EF443C2070FA748004C70A
                          APIs
                          • lstrcpynW.KERNEL32(050D41C4,007437C0,-050D89A1,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5ED1
                          • lstrlenW.KERNEL32(050D41C4,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5EDB
                          • lstrcpynW.KERNEL32(050D41C4,007437C0,00010000,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5F1F
                          • lstrlenW.KERNEL32(050D41C4,?,?,050D41C4,"DisableDisallowedTrafficAlert"=dword:00000001,?,C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Data\settings\Psiphon.reg), ref: 050D5F30
                          Memory Dump Source
                          • Source File: 00000002.00000002.2611660380.00000000050D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 050D0000, based on PE: true
                          • Associated: 00000002.00000002.2611613713.00000000050D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611705494.00000000050D7000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611748941.00000000050D8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611799136.0000000005120000.00000004.00000001.01000000.0000000B.sdmpDownload File
                          • Associated: 00000002.00000002.2611847122.0000000005132000.00000002.00000001.01000000.0000000B.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_50d0000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrcpynlstrlen
                          • String ID:
                          • API String ID: 2914866366-0
                          • Opcode ID: 622482a14d26770258d59f65da299a20ac37f032d79a546cf74f06001e53571f
                          • Instruction ID: a6a30bf588e6b81db97c6fd8c4c715ad45697c7e7726020f6b7358457f0e2ebd
                          • Opcode Fuzzy Hash: 622482a14d26770258d59f65da299a20ac37f032d79a546cf74f06001e53571f
                          • Instruction Fuzzy Hash: 6411FE71622204DFC718DF68EC56A6EBBAAFF48210B888015FD45CB244DB39D442CB73
                          APIs
                          • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406D34,00000000,[Rename]), ref: 00405F26
                          • lstrcmpiA.KERNEL32(?,?), ref: 00405F3E
                          • CharNextA.USER32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F4F
                          • lstrlenA.KERNEL32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F58
                          Memory Dump Source
                          • Source File: 00000002.00000002.2598050819.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.2597624770.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598347908.0000000000408000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040B000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000040F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000413000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000041F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000427000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000461000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000483000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000048F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.00000000004C3000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000513000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.000000000053F000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2598668262.0000000000557000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2604623380.00000000005B8000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_PsiphonPortable.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 1c7a2535a4787e8fd3488feaed5d2e4763c3f1a0d20cb74bb0a69d7059b13449
                          • Instruction ID: 33cf2896678c50374ca0d6f3786bc4b10779684cabbb7c7083e1740f3960db9f
                          • Opcode Fuzzy Hash: 1c7a2535a4787e8fd3488feaed5d2e4763c3f1a0d20cb74bb0a69d7059b13449
                          • Instruction Fuzzy Hash: E5F0C231105944AFCB019FA4CD04D9F7BA8EF5A350B2540AAE840E7210D634DE01DBA4
                          Strings
                          • "psicash#modal-psicash-logout-offline-logout-anyway-button": "Log toch uit", "psicash#modal-psicash-logou, xrefs: 0E806C41, 0E807370
                          • 2|, xrefs: 0E8067C3
                          • "psicash#modal-psicash-logout-offline-logout-anyway-button": "Log toch uit", "psicash#modal-psicash-logout-offlin, xrefs: 0E8067E1, 0E80719E
                          • |!yk, xrefs: 0E8066FA
                          • |!yk, xrefs: 0E806A55
                          Memory Dump Source
                          • Source File: 00000004.00000003.1629001132.000000000E806000.00000004.00000800.00020000.00000000.sdmp, Offset: 0E806000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_3_e806000_psiphon3.jbxd
                          Similarity
                          • API ID:
                          • String ID: "psicash#modal-psicash-logout-offline-logout-anyway-button": "Log toch uit", "psicash#modal-psicash-logou$ "psicash#modal-psicash-logout-offline-logout-anyway-button": "Log toch uit", "psicash#modal-psicash-logout-offlin$2|$|!yk$|!yk
                          • API String ID: 0-4105545856
                          • Opcode ID: 51acaf3421835a01d9474d8a9de0c5a48ee7a422248845a43e5598f04cd8f7d3
                          • Instruction ID: 6a954674f4397d99d276d25a9d760d8a9ea55f7c9b9421d31e70388b80e51979
                          • Opcode Fuzzy Hash: 51acaf3421835a01d9474d8a9de0c5a48ee7a422248845a43e5598f04cd8f7d3
                          • Instruction Fuzzy Hash: EF52DD70A40304DFEBA4CF68C981B6AB3E1BF88314F54451AE906EBBD1D375AC51CBA1
                          Memory Dump Source
                          • Source File: 00000004.00000003.1462945420.000000000E972000.00000004.00000800.00020000.00000000.sdmp, Offset: 0E972000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_3_e972000_psiphon3.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c143ee51d8a651d312a44353240b1456bd027ae57384b1f50b7cc8288971e737
                          • Instruction ID: 9f0557f6c883352b07fb3603b7d2ebf16c43aa724cc3549b8f49212953709e7e
                          • Opcode Fuzzy Hash: c143ee51d8a651d312a44353240b1456bd027ae57384b1f50b7cc8288971e737
                          • Instruction Fuzzy Hash: 77213A70758200AFFB14CF58CC91A7DB3ADEB85210F148D59E98597654D231DC4ADF51
                          Strings
                          • bad g0 stackbad key sizebad rdlengthbad recoverybad value %dc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receivecheck fail: client_authzclient_helloclose notifyclose_notifyconjure_stuncontent-typecontext.TODOdata_on_idledebug_redactdecode_e, xrefs: 0044700A
                          • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sendSocks5Response: Failed write response: %ssending payload data in non-established statesending reset packet in non-establi, xrefs: 004470E7
                          • %, xrefs: 00447124
                          • runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sendSocks5Response: Failed write response: %ssending payload data in non-established statesending reset packet in non-established statessh: only handshakeTransport can se, xrefs: 0044708C
                          • runtime: g0 stack [runtime: heapInUse=runtime: pcdata is runtime: preempt g0runtime: totalFree=sampling period=%dsemaRoot rotateLeftserver_entry_regionserver_entry_sourceserver_key_exchangeskip this directoryssh: pty-req failedstart cpu profilingstopm holding, xrefs: 00446F9B
                          • CreateWaitableTimerEx when creating timer failedCryptoSetupClient: no encryption level specifiedDNSResolverCacheExtensionVerifiedTTLMillisecondsInt.GobDecode: encoding version %d not supportedReceived %d bytes on stream %d, allowed %d bytesRecordRemoteServerLi, xrefs: 004470C0
                          • VirtualQuery for stack base failed[ServerStateStart] Cookie mismatch[handshake] clean old session : %s" is anonymous but has PkgPath seta stream with ID %d already existsabort chunk, with following errorsadding nil Certificate to CertPoolall registration attem, xrefs: 00447065
                          • runtime.minit: duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setslice of unknown type in field %d: %Tssh: StderrPipe after process startedssh: StdoutPipe after process starteds, xrefs: 0044711B
                          • )*.*=+++-+=, ---=->.1///=/i00010X0b0o0s0x11131425535556586263657072808385879699: :=::]; <-<<<==#==="> >=>>??A3A4CHCNCSCcCfCoCsDHDSHSIDINKXLPLlLmLoLtLuMBMDMFMGMRMXMcMeMnNONSNdNlNoOKOUPXPcPdPePfPiPoPsRPRTSTScSkSmSoTATeToV1V2V3V5V6YiZlZpZs[ [][^" ")":">"\*\.\:, xrefs: 00446FEF
                          • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:, xrefs: 00447031
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2598354940.0000000000411000.00000020.00000001.01000000.00000017.sdmp, Offset: 00410000, based on PE: true
                          • Associated: 0000000C.00000002.2598081473.0000000000410000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2608457403.0000000000C95000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2608457403.0000000000F82000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613191373.00000000014E7000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613267345.00000000014F3000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613339771.00000000014F4000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613412691.00000000014F5000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613588387.0000000001575000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613634336.000000000157A000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613713982.000000000157B000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613765660.000000000157C000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613839776.000000000157D000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613914863.000000000157F000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.0000000001580000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.000000000158C000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.00000000015AC000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.00000000015B0000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2614309302.00000000015C0000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2614381124.00000000015C1000.00000002.00000001.01000000.00000017.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_410000_psiphon-tunnel-core.jbxd
                          Similarity
                          • API ID:
                          • String ID: %$)*.*=+++-+=, ---=->.1///=/i00010X0b0o0s0x11131425535556586263657072808385879699: :=::]; <-<<<==#==="> >=>>??A3A4CHCNCSCcCfCoCsDHDSHSIDINKXLPLlLmLoLtLuMBMDMFMGMRMXMcMeMnNONSNdNlNoOKOUPXPcPdPePfPiPoPsRPRTSTScSkSmSoTATeToV1V2V3V5V6YiZlZpZs[ [][^" ")":">"\*\.\:$CreateWaitableTimerEx when creating timer failedCryptoSetupClient: no encryption level specifiedDNSResolverCacheExtensionVerifiedTTLMillisecondsInt.GobDecode: encoding version %d not supportedReceived %d bytes on stream %d, allowed %d bytesRecordRemoteServerLi$VirtualQuery for stack base failed[ServerStateStart] Cookie mismatch[handshake] clean old session : %s" is anonymous but has PkgPath seta stream with ID %d already existsabort chunk, with following errorsadding nil Certificate to CertPoolall registration attem$bad g0 stackbad key sizebad rdlengthbad recoverybad value %dc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receivecheck fail: client_authzclient_helloclose notifyclose_notifyconjure_stuncontent-typecontext.TODOdata_on_idledebug_redactdecode_e$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sendSocks5Response: Failed write response: %ssending payload data in non-established statesending reset packet in non-establi$runtime.minit: duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setslice of unknown type in field %d: %Tssh: StderrPipe after process startedssh: StdoutPipe after process starteds$runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sendSocks5Response: Failed write response: %ssending payload data in non-established statesending reset packet in non-established statessh: only handshakeTransport can se$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:$runtime: g0 stack [runtime: heapInUse=runtime: pcdata is runtime: preempt g0runtime: totalFree=sampling period=%dsemaRoot rotateLeftserver_entry_regionserver_entry_sourceserver_key_exchangeskip this directoryssh: pty-req failedstart cpu profilingstopm holding
                          • API String ID: 0-513651817
                          • Opcode ID: 2ea05ce083bc68afbbae2dc362491bc6fd34ecdb372936e59c18e5054fcfe2da
                          • Instruction ID: ed5480e22aee70535fea2887c8931f75a6090d884a89b4938b0cc388233ab9f8
                          • Opcode Fuzzy Hash: 2ea05ce083bc68afbbae2dc362491bc6fd34ecdb372936e59c18e5054fcfe2da
                          • Instruction Fuzzy Hash: 5A8101B450A3059FE340EF66C18575ABBE4BF88708F05892EF48897342D7B8D849CF5A
                          Strings
                          • p->status= s.nelems= schedtick= span.list= timerslen=# Sys = %d#EXT-X-KEY:#EXT-X-MAP:%!(BADPREC)%s Op: %s%s Sub: [%s %s,%d,%d%s (%d): %s%s-%s-%s-%s%s=%s %s=%d) at entry++[redacted], elemsize=, npages = , settings:,BANDWIDTH=,BYTERANGE=,GROUP-ID=",LANGUA, xrefs: 00457B57
                          • m->p= max= min= next= p->m= prev= span=#%#x% util%.0fm %.1f%c%.2fm %0.16X%0.16x%d %s%s ]%s: %s%v: %v%w: %d%w: %s%w: %t%w: %v' for (...), i = , id: , not , val ,%d-%d,TIME=,URI=".local.onion.proto0.%02d0x%04X390625::/128:https<-chan</a>.ACPKIXAcceptAn, xrefs: 00457B0B
                          • releasep: invalid argrequest_connection_idrotatingSyncFrequencyruntime: confused by runtime: mappedReady=runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: totalMapped=runtime: work.nwait= secretbox.Open failedsequence tag mismatchset bit , xrefs: 00457BA1
                          • releasep: m=remote errorrsa-sha2-256rsa-sha2-512rsa_fixed_dhruby_packageruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptserver_authzserver_hellosetupapi.dllshort bufferspanSetSpinesplit_tunnelssh-userauthstatus code string_valuesweepWaitersswift_pr, xrefs: 00457AE9
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2598354940.0000000000411000.00000020.00000001.01000000.00000017.sdmp, Offset: 00410000, based on PE: true
                          • Associated: 0000000C.00000002.2598081473.0000000000410000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2608457403.0000000000C95000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2608457403.0000000000F82000.00000002.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613191373.00000000014E7000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613267345.00000000014F3000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613339771.00000000014F4000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613412691.00000000014F5000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613588387.0000000001575000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613634336.000000000157A000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613713982.000000000157B000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613765660.000000000157C000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613839776.000000000157D000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613914863.000000000157F000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.0000000001580000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.000000000158C000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.00000000015AC000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2613996022.00000000015B0000.00000004.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2614309302.00000000015C0000.00000008.00000001.01000000.00000017.sdmpDownload File
                          • Associated: 0000000C.00000002.2614381124.00000000015C1000.00000002.00000001.01000000.00000017.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_410000_psiphon-tunnel-core.jbxd
                          Similarity
                          • API ID:
                          • String ID: m->p= max= min= next= p->m= prev= span=#%#x% util%.0fm %.1f%c%.2fm %0.16X%0.16x%d %s%s ]%s: %s%v: %v%w: %d%w: %s%w: %t%w: %v' for (...), i = , id: , not , val ,%d-%d,TIME=,URI=".local.onion.proto0.%02d0x%04X390625::/128:https<-chan</a>.ACPKIXAcceptAn$ p->status= s.nelems= schedtick= span.list= timerslen=# Sys = %d#EXT-X-KEY:#EXT-X-MAP:%!(BADPREC)%s Op: %s%s Sub: [%s %s,%d,%d%s (%d): %s%s-%s-%s-%s%s=%s %s=%d) at entry++[redacted], elemsize=, npages = , settings:,BANDWIDTH=,BYTERANGE=,GROUP-ID=",LANGUA$releasep: invalid argrequest_connection_idrotatingSyncFrequencyruntime: confused by runtime: mappedReady=runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: totalMapped=runtime: work.nwait= secretbox.Open failedsequence tag mismatchset bit $releasep: m=remote errorrsa-sha2-256rsa-sha2-512rsa_fixed_dhruby_packageruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptserver_authzserver_hellosetupapi.dllshort bufferspanSetSpinesplit_tunnelssh-userauthstatus code string_valuesweepWaitersswift_pr
                          • API String ID: 0-3870917423
                          • Opcode ID: 77ee2ae002edfec4ba69424a74fd418fd7b8ec1d6efdff4c80eeff82d8621ece
                          • Instruction ID: a6849ef70b9f48b947dd40933684af522c62dfe52fa8f84c50bba747e1a44c85
                          • Opcode Fuzzy Hash: 77ee2ae002edfec4ba69424a74fd418fd7b8ec1d6efdff4c80eeff82d8621ece
                          • Instruction Fuzzy Hash: 2031F4B4509744DFE340EF25C18575EBBE4BF88708F05896EE88887312D7789988CFA6