Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AX3-GUI-45.exe

Overview

General Information

Sample name:AX3-GUI-45.exe
Analysis ID:1509202
MD5:ae4414edd46c7769589c35beeee7d0de
SHA1:e0885269d15b87afb2b3b8e570c7c06fc28db7eb
SHA256:00de5f7503d19911ff05e808f91cd24b6a1ac2394048fd83e7061d531cd66b11
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Installs new ROOT certificates
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to get notified if a device is plugged in / out
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64_ra
  • AX3-GUI-45.exe (PID: 6260 cmdline: "C:\Users\user\Desktop\AX3-GUI-45.exe" MD5: AE4414EDD46C7769589C35BEEEE7D0DE)
    • AX3-GUI-45.tmp (PID: 6280 cmdline: "C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp" /SL5="$60364,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" MD5: 48C6508A6FD96E62F8796701A0200C8F)
      • setup-ax3-driver.exe (PID: 6552 cmdline: "C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe" MD5: 0ABD9CF2D191036D778F6F1FBE25FAE1)
        • setup-ax3-driver.tmp (PID: 6584 cmdline: "C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp" /SL5="$20314,681477,54272,C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe" MD5: 67C5A4F36E1C91A3B85E440EDD7AD026)
          • dpinst64.exe (PID: 6724 cmdline: "C:\Program Files\AX3-Driver\DPInst64.exe" /F /SA /SE /SW MD5: BE3C79033FA8302002D9D3A6752F2263)
      • OmGui.exe (PID: 2088 cmdline: "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe" MD5: 12FEEE099449453BA386F8FBA6C72090)
        • csc.exe (PID: 2936 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline" MD5: 2B9482EB5D3AF71029277E18F6C656C0)
          • conhost.exe (PID: 3888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cvtres.exe (PID: 5148 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA99A.tmp" "c:\Users\user\AppData\Local\Temp\CSCA999.tmp" MD5: E118330B4629B12368D91B9DF6488BE0)
  • drvinst.exe (PID: 6836 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a893eec2-cde1-b844-a268-dd04a77ebb2a}\mchp_msd_cdc.inf" "9" "4987fa53f" "000000000000014C" "WinSta0\Default" "000000000000011C" "208" "c:\program files\ax3-driver" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • rundll32.exe (PID: 4188 cmdline: rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6c760311-7d3e-5f44-bbdb-3640e2127551} Global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat MD5: EF3179D498793BF4234F708D3BE28633)
  • AX3-GUI-45.exe (PID: 5864 cmdline: "C:\Users\user\Desktop\AX3-GUI-45.exe" MD5: AE4414EDD46C7769589C35BEEEE7D0DE)
    • AX3-GUI-45.tmp (PID: 1340 cmdline: "C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp" /SL5="$20130,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" MD5: 48C6508A6FD96E62F8796701A0200C8F)
      • AX3-GUI-45.exe (PID: 2452 cmdline: "C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130 MD5: AE4414EDD46C7769589C35BEEEE7D0DE)
        • AX3-GUI-45.tmp (PID: 364 cmdline: "C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp" /SL5="$6035A,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130 MD5: 48C6508A6FD96E62F8796701A0200C8F)
  • OmGui.exe (PID: 3580 cmdline: "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe" MD5: 12FEEE099449453BA386F8FBA6C72090)
    • csc.exe (PID: 4944 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline" MD5: 2B9482EB5D3AF71029277E18F6C656C0)
      • conhost.exe (PID: 876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 6576 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES431B.tmp" "c:\Users\user\AppData\Local\Temp\CSC431A.tmp" MD5: E118330B4629B12368D91B9DF6488BE0)
  • cleanup
No configs have been found
No yara matches
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe, ProcessId: 2088, TargetFilename: C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline

Data Obfuscation

barindex
Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe, ParentCommandLine: "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe", ParentImage: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe, ParentProcessId: 2088, ParentProcessName: OmGui.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline", ProcessId: 2936, ProcessName: csc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AX3-GUI-45.exeVirustotal: Detection: 6%Perma Link
Source: AX3-GUI-45.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.17:49710 version: TLS 1.0
Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.17:49716 version: TLS 1.0
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-DriverJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\unins000.datJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-LFGHU.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-GPPIL.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-VN62H.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-PG9F3.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-SHR07.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C12D7D33-3050-44D8-8ADA-8ADCFA9368A5}_is1Jump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: AX3-GUI-45.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: k0/C:\Users\user\AppData\Local\Temp\6yss2uyv.pdb source: OmGui.exe, 00000025.00000002.2102587867.0000000003AD6000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omgui\obj\x86\Release\OmGui.pdb source: OmGui.exe, 00000010.00000000.1431643900.0000000000C99000.00000002.00000001.01000000.00000011.sdmp, is-E9CM8.tmp.1.dr
Source: Binary string: C:\Newcastle\Projects\Embedded\Bootloader.svn\Software\Booter\Release\booter.pdb source: is-MNQIV.tmp.1.dr
Source: Binary string: C:\Newcastle\Projects\omconvert\src\omconvert\Release\omconvert.pdb source: is-83JS7.tmp.1.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\Release\libomapi.pdb source: OmGui.exe, 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmp, OmGui.exe, 00000025.00000002.2117056134.000000006FC7E000.00000002.00000001.01000000.00000017.sdmp, is-J5C8E.tmp.1.dr
Source: Binary string: DpInst.pdbH source: dpinst64.exe, 00000007.00000000.1226780349.00007FF6AD951000.00000020.00000001.01000000.0000000F.sdmp, is-SHR07.tmp.5.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omapinet\obj\x86\Release\OmApiNet.pdbD source: OmGui.exe, 00000010.00000002.1720028687.0000000007002000.00000002.00000001.01000000.00000016.sdmp, is-LC9GL.tmp.1.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omapinet\obj\x86\Release\OmApiNet.pdb source: OmGui.exe, OmGui.exe, 00000010.00000002.1720028687.0000000007002000.00000002.00000001.01000000.00000016.sdmp, is-LC9GL.tmp.1.dr
Source: Binary string: ISADMINLOGGEDONRelease\isunzlib.pdb source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1196979183.0000000003250000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1428996496.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1196938143.00000000022D0000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.dr
Source: Binary string: DpInst.pdb source: dpinst64.exe, 00000007.00000000.1226780349.00007FF6AD951000.00000020.00000001.01000000.0000000F.sdmp, is-PG9F3.tmp.5.dr, is-SHR07.tmp.5.dr
Source: Binary string: DpInst.pdbp source: is-PG9F3.tmp.5.dr
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D003C20 SetWindowLongW,GetWindowLongW,DefWindowProcW,PostQuitMessage,RegisterDeviceNotificationW,MessageBoxA,UnregisterDeviceNotification,KiUserCallbackDispatcher,DefWindowProcW,16_2_6D003C20
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D01EEDE FindFirstFileExA,16_2_6D01EEDE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC6EEDE FindFirstFileExA,37_2_6FC6EEDE
Source: global trafficHTTP traffic detected: GET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 185.199.111.133 185.199.111.133
Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.17:49710 version: TLS 1.0
Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.17:49716 version: TLS 1.0
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_011AA09A recv,16_2_011AA09A
Source: global trafficHTTP traffic detected: GET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
Source: OmGui.exe, 00000010.00000002.1721430944.0000000009A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsE
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: rundll32.exe, 0000000F.00000002.1325076830.0000025F70419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csc3-2009-2-aia.ve.
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
Source: drvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000009.00000003.1295406730.00000279D7A28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000002.1324344949.0000025F70140000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: drvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000009.00000003.1295406730.00000279D7A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 0000000F.00000002.1324344949.0000025F700DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabbAD
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: OmGui.exe, 00000025.00000002.2096196339.0000000001652000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
Source: OmGui.exe, 00000025.00000002.2096196339.0000000001652000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://ocsp.sectigo.com0
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.usertru
Source: drvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.verisi
Source: rundll32.exe, 0000000F.00000002.1324344949.0000025F700DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.verisign.co
Source: is-0JOM7.tmp.1.drString found in binary or memory: http://phrogz.net/JS/_ReuseLicense.txt
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/cscasha
Source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
Source: OmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: OmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003AF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://subca.ocsp-certum.com01
Source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003894000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025EB000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000018.00000003.1814040575.00000000025FB000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000025DB000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://tinyurl.com/dotnet35setup
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#affix
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#alerts
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#buttons
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#carousel
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#collapse
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#dropdowns
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#modals
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#popovers
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#scrollspy
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#tabs
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#tooltips
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#transitions
Source: is-7QH66.tmp.1.drString found in binary or memory: http://twitter.github.com/bootstrap/javascript.html#typeahead
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmp, is-7QH66.tmp.1.dr, is-QCCS6.tmp.1.dr, is-GA9GG.tmp.1.dr, is-R9IP2.tmp.1.dr, is-233P5.tmp.1.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: http://www.certum.pl/CPS0
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: setup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.innosetup.com/
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: OmGui.exe, 00000010.00000002.1721430944.0000000009A9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: is-7QH66.tmp.1.drString found in binary or memory: http://www.modernizr.com/)
Source: AX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000026BA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openmovement.co.uk
Source: AX3-GUI-45.exe, 00000000.00000003.1093771706.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.00000000035E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openmovement.co.uk:http://www.openmovement.co.uk:http://www.openmovement.co.uk
Source: AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000026CA000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000026BA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openmovement.co.uka
Source: AX3-GUI-45.exe, 00000000.00000003.1439175698.0000000000C4A000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000017.00000003.1817995698.00000000023BA000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 0000001F.00000003.1811571474.000000000248A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openmovement.co.ukq
Source: setup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.remobjects.com/ps
Source: setup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.remobjects.com/psU
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: OmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/digitalinteraction/openmovement/releases/download/AX3-OmGui-v28/AX3-GUI-28.zip
Source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: https://jrsoftware.org/
Source: AX3-GUI-45.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: https://jrsoftware.org0
Source: OmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://openmovement.googlecode.com/svn/downloads/AX3/omgui.ini
Source: OmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003AF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
Source: OmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/AX3-GUI-28.zi
Source: OmGui.exe, 00000010.00000002.1721430944.0000000009A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.i
Source: OmGui.exe, 00000025.00000002.2102587867.0000000003AF8000.00000004.00000800.00020000.00000000.sdmp, is-E9CM8.tmp.1.drString found in binary or memory: https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini
Source: OmGui.exe, 00000010.00000000.1431643900.0000000000B22000.00000002.00000001.01000000.00000011.sdmp, is-E9CM8.tmp.1.drString found in binary or memory: https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini3UPD
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS05
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: https://sectigo.com/CPS0D
Source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drString found in binary or memory: https://www.certum.pl/CPS0
Source: AX3-GUI-45.exe, 00000000.00000003.1095350311.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000000.00000003.1094938915.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000000.1096792574.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AX3-GUI-45.tmp.31.dr, is-524O8.tmp.1.drString found in binary or memory: https://www.innosetup.com/
Source: AX3-GUI-45.exe, 00000000.00000003.1095350311.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000000.00000003.1094938915.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000000.1096792574.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AX3-GUI-45.tmp.31.dr, is-524O8.tmp.1.drString found in binary or memory: https://www.remobjects.com/ps
Source: drvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.verisign.c
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: C:\Program Files\AX3-Driver\dpinst64.exeFile created: C:\Users\user\AppData\Local\Temp\{a893eec2-cde1-b844-a268-dd04a77ebb2a}\SET584D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\mchp_msd_cdc.cat (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\is-VN62H.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\SET6126.tmpJump to dropped file
Source: C:\Program Files\AX3-Driver\dpinst64.exeFile created: C:\Users\user\AppData\Local\Temp\{a893eec2-cde1-b844-a268-dd04a77ebb2a}\mchp_MSD_CDC.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat (copy)Jump to dropped file
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC53C20 SetWindowLongW,GetWindowLongW,NtdllDefWindowProc_W,PostQuitMessage,RegisterDeviceNotificationW,MessageBoxA,UnregisterDeviceNotification,DestroyWindow,NtdllDefWindowProc_W,37_2_6FC53C20
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D002440: InterlockedDecrement,SysFreeString,VariantClear,__cftoe,VariantClear,__cftoe,CreateFileW,DeviceIoControl,CloseHandle,VariantClear,16_2_6D002440
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}Jump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeFile created: C:\Windows\DPINST.LOGJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\mchp_msd_cdc.inf_amd64_4a6fccf2a250c2d5Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmpJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.infJump to behavior
Source: C:\Windows\System32\drvinst.exeFile deleted: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\SET6126.tmpJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D013D5316_2_6D013D53
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00B57016_2_6D00B570
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D02542B16_2_6D02542B
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00AF6016_2_6D00AF60
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D0216FE16_2_6D0216FE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00C01016_2_6D00C010
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D013B2416_2_6D013B24
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00DB8016_2_6D00DB80
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D02125016_2_6D021250
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D0262E016_2_6D0262E0
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0182190016_2_01821900
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0182A32016_2_0182A320
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_018218B016_2_018218B0
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0182A31016_2_0182A310
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0182D97C16_2_0182D97C
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850007016_2_08500070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_085078D816_2_085078D8
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_085045C816_2_085045C8
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_08508E7816_2_08508E78
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850006516_2_08500065
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850007016_2_08500070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_08508E8816_2_08508E88
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850007016_2_08500070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850007016_2_08500070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_085045C016_2_085045C0
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850007016_2_08500070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0182D98016_2_0182D980
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5AF6037_2_6FC5AF60
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC716FE37_2_6FC716FE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC63D5337_2_6FC63D53
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5B57037_2_6FC5B570
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC7542B37_2_6FC7542B
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5DB8037_2_6FC5DB80
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC63B2437_2_6FC63B24
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC762E037_2_6FC762E0
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC7125037_2_6FC71250
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5C01037_2_6FC5C010
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A7A32037_2_05A7A320
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A7190037_2_05A71900
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A718FB37_2_05A718FB
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A7A31037_2_05A7A310
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A7D97037_2_05A7D970
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D782837_2_082D7828
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D007037_2_082D0070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D45C837_2_082D45C8
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D007037_2_082D0070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D006537_2_082D0065
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D007037_2_082D0070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D007037_2_082D0070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D45BA37_2_082D45BA
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_082D007037_2_082D0070
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_05A7D98037_2_05A7D980
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: String function: 6D00A070 appears 73 times
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: String function: 6FC5F2F0 appears 47 times
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: String function: 6D00F2F0 appears 47 times
Source: AX3-GUI-45.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-524O8.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-KA3P3.tmp.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: setup-ax3-driver.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: setup-ax3-driver.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: setup-ax3-driver.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: setup-ax3-driver.tmp.4.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-LFGHU.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-LFGHU.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: is-LFGHU.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-LFGHU.tmp.5.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: AX3-GUI-45.tmp.23.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: AX3-GUI-45.tmp.31.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: AX3-GUI-45.exe, 00000000.00000003.1095350311.000000007FE40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs AX3-GUI-45.exe
Source: AX3-GUI-45.exe, 00000000.00000003.1439175698.0000000000C08000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs AX3-GUI-45.exe
Source: AX3-GUI-45.exe, 00000000.00000000.1093429390.00000000004DD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs AX3-GUI-45.exe
Source: AX3-GUI-45.exe, 00000000.00000003.1094938915.0000000002774000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs AX3-GUI-45.exe
Source: AX3-GUI-45.exe, 00000017.00000003.1817995698.0000000002378000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs AX3-GUI-45.exe
Source: AX3-GUI-45.exe, 0000001F.00000003.1811571474.0000000002448000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs AX3-GUI-45.exe
Source: AX3-GUI-45.exeBinary or memory string: OriginalFileName vs AX3-GUI-45.exe
Source: AX3-GUI-45.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: is-E9CM8.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: _RegDLL.tmp.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal64.expl.evad.winEXE@31/232@1/1
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_06B369EE AdjustTokenPrivileges,16_2_06B369EE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_06B369B7 AdjustTokenPrivileges,16_2_06B369B7
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_074D692E AdjustTokenPrivileges,37_2_074D692E
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_074D68F7 AdjustTokenPrivileges,37_2_074D68F7
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D001610 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoUninitialize,SysAllocString,InterlockedDecrement,SysFreeString,CoUninitialize,CoSetProxyBlanket,_com_issue_error,_com_issue_error,16_2_6D001610
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open MovementJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeMutant created: \Sessions\1\BaseNamedObjects\Global\DPINST_LOG_SCROLLER_MUTEX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3888:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:876:120:WilError_03
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Users\user\Desktop\AX3-GUI-45.exeFile created: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmpJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6c760311-7d3e-5f44-bbdb-3640e2127551} Global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat
Source: AX3-GUI-45.exeVirustotal: Detection: 6%
Source: AX3-GUI-45.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeFile read: C:\Users\user\Desktop\AX3-GUI-45.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\AX3-GUI-45.exe "C:\Users\user\Desktop\AX3-GUI-45.exe"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp" /SL5="$60364,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe"
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess created: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe "C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe"
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp "C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp" /SL5="$20314,681477,54272,C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe"
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess created: C:\Program Files\AX3-Driver\dpinst64.exe "C:\Program Files\AX3-Driver\DPInst64.exe" /F /SA /SE /SW
Source: unknownProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a893eec2-cde1-b844-a268-dd04a77ebb2a}\mchp_msd_cdc.inf" "9" "4987fa53f" "000000000000014C" "WinSta0\Default" "000000000000011C" "208" "c:\program files\ax3-driver"
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6c760311-7d3e-5f44-bbdb-3640e2127551} Global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess created: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe"
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA99A.tmp" "c:\Users\user\AppData\Local\Temp\CSCA999.tmp"
Source: unknownProcess created: C:\Users\user\Desktop\AX3-GUI-45.exe "C:\Users\user\Desktop\AX3-GUI-45.exe"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp" /SL5="$20130,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe"
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess created: C:\Users\user\Desktop\AX3-GUI-45.exe "C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp" /SL5="$6035A,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130
Source: unknownProcess created: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe"
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES431B.tmp" "c:\Users\user\AppData\Local\Temp\CSC431A.tmp"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp" /SL5="$60364,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess created: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe "C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess created: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe "C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe"Jump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp "C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp" /SL5="$20314,681477,54272,C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess created: C:\Program Files\AX3-Driver\dpinst64.exe "C:\Program Files\AX3-Driver\DPInst64.exe" /F /SA /SE /SWJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6c760311-7d3e-5f44-bbdb-3640e2127551} Global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.catJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA99A.tmp" "c:\Users\user\AppData\Local\Temp\CSCA999.tmp"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp" /SL5="$20130,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp "C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp" /SL5="$6035A,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES431B.tmp" "c:\Users\user\AppData\Local\Temp\CSC431A.tmp"
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: sfc.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: spinf.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: pnpui.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: devobj.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: amsi.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasman.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: security.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: schannel.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: mscoree.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cscomp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cryptbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: cryptbase.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netapi32.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netutils.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: edputil.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: slc.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: sppc.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: pcacli.dll
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpSection loaded: sfc_os.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netapi32.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: netutils.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\AX3-GUI-45.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: shfolder.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpSection loaded: dwmapi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mscoree.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: version.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: windows.storage.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wldp.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: profapi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: uxtheme.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: windowscodecs.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dwrite.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: textinputframework.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: coreuicomponents.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: coremessaging.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ntmarta.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: devobj.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: wbemcomn.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: amsi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: textshaping.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: shfolder.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasapi32.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasman.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rtutils.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mswsock.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: winhttp.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dhcpcsvc6.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dhcpcsvc.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: dnsapi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: winnsi.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: rasadhlp.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: fwpuclnt.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: security.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: secur32.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: sspicli.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: schannel.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: mskeyprotect.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ntasn1.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ncrypt.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: ncryptsslp.dll
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeSection loaded: gpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: mscoree.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cscomp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeSection loaded: cryptbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeSection loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: OmGui.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
Source: Uninstall OmGui.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Open Movement\OM GUI\unins000.exe
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-DriverJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\unins000.datJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-LFGHU.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-GPPIL.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-VN62H.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-PG9F3.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDirectory created: C:\Program Files\AX3-Driver\is-SHR07.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C12D7D33-3050-44D8-8ADA-8ADCFA9368A5}_is1Jump to behavior
Source: AX3-GUI-45.exeStatic file information: File size 6029717 > 1048576
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: AX3-GUI-45.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: k0/C:\Users\user\AppData\Local\Temp\6yss2uyv.pdb source: OmGui.exe, 00000025.00000002.2102587867.0000000003AD6000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omgui\obj\x86\Release\OmGui.pdb source: OmGui.exe, 00000010.00000000.1431643900.0000000000C99000.00000002.00000001.01000000.00000011.sdmp, is-E9CM8.tmp.1.dr
Source: Binary string: C:\Newcastle\Projects\Embedded\Bootloader.svn\Software\Booter\Release\booter.pdb source: is-MNQIV.tmp.1.dr
Source: Binary string: C:\Newcastle\Projects\omconvert\src\omconvert\Release\omconvert.pdb source: is-83JS7.tmp.1.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\Release\libomapi.pdb source: OmGui.exe, 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmp, OmGui.exe, 00000025.00000002.2117056134.000000006FC7E000.00000002.00000001.01000000.00000017.sdmp, is-J5C8E.tmp.1.dr
Source: Binary string: DpInst.pdbH source: dpinst64.exe, 00000007.00000000.1226780349.00007FF6AD951000.00000020.00000001.01000000.0000000F.sdmp, is-SHR07.tmp.5.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omapinet\obj\x86\Release\OmApiNet.pdbD source: OmGui.exe, 00000010.00000002.1720028687.0000000007002000.00000002.00000001.01000000.00000016.sdmp, is-LC9GL.tmp.1.dr
Source: Binary string: D:\Newcastle\Projects\openmovement\Software\OM\omapinet\obj\x86\Release\OmApiNet.pdb source: OmGui.exe, OmGui.exe, 00000010.00000002.1720028687.0000000007002000.00000002.00000001.01000000.00000016.sdmp, is-LC9GL.tmp.1.dr
Source: Binary string: ISADMINLOGGEDONRelease\isunzlib.pdb source: AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1196979183.0000000003250000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1428996496.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000003.1196938143.00000000022D0000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.dr
Source: Binary string: DpInst.pdb source: dpinst64.exe, 00000007.00000000.1226780349.00007FF6AD951000.00000020.00000001.01000000.0000000F.sdmp, is-PG9F3.tmp.5.dr, is-SHR07.tmp.5.dr
Source: Binary string: DpInst.pdbp source: is-PG9F3.tmp.5.dr

Data Obfuscation

barindex
Source: is-E9CM8.tmp.1.dr, ExportSvmForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"Jump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
Source: AX3-GUI-45.exeStatic PE information: section name: .didata
Source: AX3-GUI-45.tmp.0.drStatic PE information: section name: .didata
Source: is-524O8.tmp.1.drStatic PE information: section name: .didata
Source: is-83JS7.tmp.1.drStatic PE information: section name: _RDATA
Source: AX3-GUI-45.tmp.23.drStatic PE information: section name: .didata
Source: AX3-GUI-45.tmp.31.drStatic PE information: section name: .didata
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_07005637 push es; ret 16_2_07005946
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00F336 push ecx; ret 16_2_6D00F349
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_0850B1E0 push esp; ret 16_2_0850B1E9
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5F336 push ecx; ret 37_2_6FC5F349
Source: is-E9CM8.tmp.1.drStatic PE information: section name: .text entropy: 7.187953763177532

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\drvinst.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BE36A4562FB2EE05DBB3D32323ADF445084ED656 BlobJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\OMPA Convertor.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\is-SHR07.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\omconvert.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\AX3-GUI-45.exeFile created: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\AX3-GUI-45.exeFile created: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\dpinst32.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-22EDB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\is-J5C8E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\is-PG9F3.tmpJump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeFile created: C:\Users\user\AppData\Local\Temp\6yss2uyv.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeFile created: C:\Users\user\AppData\Local\Temp\lj4v3otx.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-7RMVQ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\is-LC9GL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\is-524O8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\is-83JS7.tmpJump to dropped file
Source: C:\Users\user\Desktop\AX3-GUI-45.exeFile created: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\is-E9CM8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\is-LFGHU.tmpJump to dropped file
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeFile created: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Program Files\AX3-Driver\dpinst64.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\firmware\is-MNQIV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\is-KA3P3.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\firmware\booter.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpFile created: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\cwa-convert.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\Program Files (x86)\Open Movement\OM GUI\libomapi.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\OmGuiJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\OmGui\OmGui.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\OmGui\Uninstall OmGui.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\AX3-Driver\dpinst64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\AX3-GUI-45.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT PNPDeviceID, DeviceID FROM Win32_DiskDrive WHERE InterfaceType='USB'
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT PNPDeviceID, DeviceID FROM Win32_DiskDrive WHERE InterfaceType='USB'
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 1580000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 3470000 memory reserve | memory write watchJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 5470000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 1DA0000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 3860000 memory reserve | memory write watch
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: 5860000 memory commit | memory reserve | memory write watch
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\OMPA Convertor.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\omconvert.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Program Files\AX3-Driver\dpinst32.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Program Files\AX3-Driver\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-22EDB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\is-J5C8E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6yss2uyv.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Program Files\AX3-Driver\is-PG9F3.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lj4v3otx.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-7RMVQ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\is-LC9GL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\is-524O8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\is-83JS7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Program Files\AX3-Driver\is-LFGHU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\firmware\is-MNQIV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\firmware\booter.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\cwa-convert.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpDropped PE file which has not been started: C:\Program Files (x86)\Open Movement\OM GUI\libomapi.dll (copy)Jump to dropped file
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe TID: 792Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe TID: 2848Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe TID: 3932Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D01EEDE FindFirstFileExA,16_2_6D01EEDE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC6EEDE FindFirstFileExA,37_2_6FC6EEDE
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_06B33CD6 GetSystemInfo,16_2_06B33CD6
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (16ms): HyperV-Compute-Host-VirtualMachines-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: AX3-GUI-45.tmp, 00000001.00000003.1436842729.0000000000998000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\W
Source: is-E9CM8.tmp.1.drBinary or memory string: &Tools5svmToolStripMenuItem.Image)svmToolStripMenuItem#Calculate S&VM...AcutPointsToolStripMenuItem.Image5cutPointsToolStripMenuItem1Calculate &Cut Points...3wearTimeToolStripMenuItem/Calculate Wear &Time...%toolStripMenuItem21Calculate &Sleep Time...'toolStripSeparator11pluginsToolStripMenuItem
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (31ms): Microsoft-Hyper-V-Hypervisor-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: AX3-GUI-45.tmp, 00000001.00000003.1436842729.0000000000998000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (15ms): HyperV-Compute-Host-VirtualMachines-merged-Package~31bf3856ad364e35~amd64~~10.0.19041.3031.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:53 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-ClientEdition-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.2364.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Windows-HyperV-OptionalFeature-VirtualMachinePlatform-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:53 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Services-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.2364.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Offline-Core-Group-merged-Package~31bf3856ad364e35~amd64~~10.0.19041.3393.cat
Source: is-E9CM8.tmp.1.drBinary or memory string: svmToolStripMenuItem
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Offline-Core-Group-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: AX3-GUI-45.tmp, 00000018.00000002.1816112671.000000000080F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\i
Source: OmGui.exe, 00000010.00000002.1721430944.0000000009A10000.00000004.00000020.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2113712294.0000000008030000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (16ms): HyperV-Feature-VirtualMachinePlatform-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Windows-HyperV-OptionalFeature-VirtualMachinePlatform-Disabled-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:49 06/10/2023: DONE Adding Catalog File (0ms): HyperV-Primitive-VirtualMachine-Package~31bf3856ad364e35~amd64~~10.0.19041.3393.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): HyperV-Compute-System-VirtualMachine-Package~31bf3856ad364e35~amd64~~10.0.19041.3393.cat
Source: OmGui.exe, 00000025.00000002.2102587867.00000000038ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: svmToolStripMenuItem.Image
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Offline-Common-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: OmGui.exe, 00000025.00000002.2113712294.0000000008067000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: OmGui.exe, 00000010.00000002.1721430944.0000000009A10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlld
Source: OmGui.exe, 00000025.00000002.2096196339.0000000001608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: AX3-GUI-45.tmp, 00000018.00000002.1816112671.000000000080F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: OmGui.exe, 00000010.00000002.1706338731.00000000012F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}a
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:53 06/10/2023: DONE Adding Catalog File (16ms): Microsoft-Hyper-V-Offline-Core-Group-merged-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.2364.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:53 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Offline-Common-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.2364.cat
Source: is-E9CM8.tmp.1.drBinary or memory string: 4svmToolStripMenuItem.Image
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Services-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Package-base-merged-Package~31bf3856ad364e35~amd64~~10.0.19041.2728.cat
Source: OmGui.exe, 00000025.00000002.2096196339.00000000016EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Package-base-Package~31bf3856ad364e35~amd64~~10.0.19041.3031.cat
Source: is-E9CM8.tmp.1.drBinary or memory string: svmToolStripMenuItem_Click
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (0ms): Microsoft-Hyper-V-Online-Services-Package~31bf3856ad364e35~amd64~~10.0.19041.3393.cat
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:50 06/10/2023: DONE Adding Catalog File (15ms): Microsoft-Hyper-V-ClientEdition-Package~31bf3856ad364e35~amd64~~10.0.19041.3448.cat
Source: OmGui.exe, 00000025.00000002.2096196339.0000000001652000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: dberr.txt.9.drBinary or memory string: CatalogDB: 11:48:53 06/10/2023: DONE Adding Catalog File (15ms): Microsoft-Hyper-V-Offline-Core-Group-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.2364.cat
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00F170 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_6D00F170
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D017DEB mov eax, dword ptr fs:[00000030h]16_2_6D017DEB
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC67DEB mov eax, dword ptr fs:[00000030h]37_2_6FC67DEB
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D01FE76 GetProcessHeap,16_2_6D01FE76
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00E6D9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_6D00E6D9
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00F170 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_6D00F170
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D015063 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_6D015063
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5E6D9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_6FC5E6D9
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC5F170 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_6FC5F170
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 37_2_6FC65063 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_6FC65063
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA99A.tmp" "c:\Users\user\AppData\Local\Temp\CSCA999.tmp"
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES431B.tmp" "c:\Users\user\AppData\Local\Temp\CSC431A.tmp"
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\windows\system32\pnpui.dll,installsecuritypromptrundllw 20 global\{6c760311-7d3e-5f44-bbdb-3640e2127551} global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} c:\windows\system32\driverstore\temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf c:\windows\system32\driverstore\temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.cat
Source: C:\Windows\System32\drvinst.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\windows\system32\pnpui.dll,installsecuritypromptrundllw 20 global\{6c760311-7d3e-5f44-bbdb-3640e2127551} global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} c:\windows\system32\driverstore\temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf c:\windows\system32\driverstore\temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.catJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00F34B cpuid 16_2_6D00F34B
Source: C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll VolumeInformation
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll VolumeInformation
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformation
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D01D78C GetSystemTimeAsFileTime,16_2_6D01D78C
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D01E509 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,16_2_6D01E509
Source: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exeCode function: 16_2_6D00CDE0 OmGetVersion,OmCommand,16_2_6D00CDE0
Source: C:\Windows\System32\drvinst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Windows\System32\drvinst.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\47CEB881EDB1AD96814903261E1BD7EFBFAA5AE6 BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
11
Disable or Modify Tools
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
1
Windows Service
1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Peripheral Device Discovery
Remote Desktop ProtocolData from Removable Media11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Windows Service
3
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
Process Injection
1
Install Root Certificate
NTDS135
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Registry Run Keys / Startup Folder
12
Software Packing
LSA Secrets1
Query Registry
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials121
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job23
Masquerading
Proc Filesystem131
Virtualization/Sandbox Evasion
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt131
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow2
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Rundll32
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1509202 Sample: AX3-GUI-45.exe Startdate: 11/09/2024 Architecture: WINDOWS Score: 64 88 raw.githubusercontent.com 2->88 92 Multi AV Scanner detection for submitted file 2->92 94 .NET source code contains potential unpacker 2->94 96 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 2->96 98 Sigma detected: Dot net compiler compiles file from suspicious location 2->98 10 AX3-GUI-45.exe 2 2->10         started        13 drvinst.exe 1 10 2->13         started        16 AX3-GUI-45.exe 2->16         started        18 OmGui.exe 2->18         started        signatures3 process4 file5 78 C:\Users\user\AppData\...\AX3-GUI-45.tmp, PE32 10->78 dropped 20 AX3-GUI-45.tmp 29 121 10->20         started        100 Installs new ROOT certificates 13->100 23 rundll32.exe 5 13->23         started        80 C:\Users\user\AppData\...\AX3-GUI-45.tmp, PE32 16->80 dropped 25 AX3-GUI-45.tmp 16->25         started        27 csc.exe 18->27         started        signatures6 process7 file8 54 C:\Program Files (x86)\...\OmGui.exe (copy), PE32 20->54 dropped 56 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 20->56 dropped 58 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 20->58 dropped 62 17 other files (none is malicious) 20->62 dropped 29 OmGui.exe 15 11 20->29         started        33 setup-ax3-driver.exe 2 20->33         started        35 AX3-GUI-45.exe 25->35         started        60 C:\Users\user\AppData\Local\...\6yss2uyv.dll, PE32 27->60 dropped 37 conhost.exe 27->37         started        39 cvtres.exe 27->39         started        process9 dnsIp10 90 raw.githubusercontent.com 185.199.111.133, 443, 49710, 49716 FASTLYUS Netherlands 29->90 82 C:\Users\user\AppData\...\lj4v3otx.cmdline, Unicode 29->82 dropped 41 csc.exe 29->41         started        84 C:\Users\user\...\setup-ax3-driver.tmp, PE32 33->84 dropped 44 setup-ax3-driver.tmp 17 13 33->44         started        86 C:\Users\user\AppData\...\AX3-GUI-45.tmp, PE32 35->86 dropped 46 AX3-GUI-45.tmp 35->46         started        file11 process12 file13 64 C:\Users\user\AppData\Local\...\lj4v3otx.dll, PE32 41->64 dropped 48 conhost.exe 41->48         started        50 cvtres.exe 41->50         started        66 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 44->66 dropped 68 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 44->68 dropped 70 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 44->70 dropped 76 7 other files (none is malicious) 44->76 dropped 52 dpinst64.exe 1 8 44->52         started        72 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 46->72 dropped 74 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 46->74 dropped process14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AX3-GUI-45.exe8%ReversingLabs
AX3-GUI-45.exe7%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Open Movement\OM GUI\OmApiNet.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\OMPA Convertor.exe (copy)2%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\cwa-convert.exe (copy)2%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-22EDB.tmp2%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\Convert_CWA\is-7RMVQ.tmp2%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\is-83JS7.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\Plugins\OmConvertPlugin\omconvert.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\firmware\booter.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\firmware\is-MNQIV.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\is-524O8.tmp5%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\is-E9CM8.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\is-J5C8E.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\is-KA3P3.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\is-LC9GL.tmp0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\libomapi.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Open Movement\OM GUI\unins000.exe (copy)5%ReversingLabs
C:\Program Files\AX3-Driver\dpinst32.exe (copy)0%ReversingLabs
C:\Program Files\AX3-Driver\dpinst64.exe (copy)0%ReversingLabs
C:\Program Files\AX3-Driver\is-LFGHU.tmp4%ReversingLabs
C:\Program Files\AX3-Driver\is-PG9F3.tmp0%ReversingLabs
C:\Program Files\AX3-Driver\is-SHR07.tmp0%ReversingLabs
C:\Program Files\AX3-Driver\unins000.exe (copy)4%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_isdecmp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-AABR8.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_isdecmp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-CUPI4.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_isdecmp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-M04BE.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp4%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
raw.githubusercontent.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.fontbureau.com/designers0%URL Reputationsafe
http://www.fontbureau.com0%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
http://twitter.github.com/bootstrap/javascript.html#popovers0%Avira URL Cloudsafe
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini0%Avira URL Cloudsafe
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
http://www.fontbureau.com/designers/?0%Avira URL Cloudsafe
http://www.fontbureau.com/designersG0%Avira URL Cloudsafe
http://crl.microsE0%Avira URL Cloudsafe
http://repository.certum.pl/cscasha2.cer00%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#popovers0%VirustotalBrowse
http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%VirustotalBrowse
http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
http://repository.certum.pl/cscasha2.cer00%VirustotalBrowse
http://www.fontbureau.com/designers/?0%VirustotalBrowse
http://ocsp.sectigo.com00%Avira URL Cloudsafe
http://ocsp.verisi0%Avira URL Cloudsafe
http://www.fontbureau.com/designers?0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#affix0%Avira URL Cloudsafe
http://www.microsoft.co0%Avira URL Cloudsafe
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini1%VirustotalBrowse
http://www.openmovement.co.ukq0%Avira URL Cloudsafe
http://www.tiro.com0%Avira URL Cloudsafe
http://www.goodfont.co.kr0%Avira URL Cloudsafe
http://www.fontbureau.com/designersG0%VirustotalBrowse
http://twitter.github.com/bootstrap/javascript.html#affix0%VirustotalBrowse
http://www.fontbureau.com/designers?0%VirustotalBrowse
http://www.sajatypeworks.com0%Avira URL Cloudsafe
http://www.typography.netD0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#transitions0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
http://www.microsoft.co1%VirustotalBrowse
http://www.goodfont.co.kr0%VirustotalBrowse
http://www.galapagosdesign.com/staff/dennis.htm0%Avira URL Cloudsafe
http://fontfabrik.com0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
http://twitter.github.com/bootstrap/javascript.html#transitions0%VirustotalBrowse
http://twitter.github.com/bootstrap/javascript.html#scrollspy0%Avira URL Cloudsafe
http://www.sajatypeworks.com0%VirustotalBrowse
http://www.tiro.com0%VirustotalBrowse
https://www.remobjects.com/ps0%Avira URL Cloudsafe
http://subca.ocsp-certum.com010%Avira URL Cloudsafe
http://www.galapagosdesign.com/staff/dennis.htm0%VirustotalBrowse
https://www.innosetup.com/0%Avira URL Cloudsafe
https://sectigo.com/CPS0D0%Avira URL Cloudsafe
http://fontfabrik.com0%VirustotalBrowse
http://www.galapagosdesign.com/DPlease0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#collapse0%Avira URL Cloudsafe
https://jrsoftware.org00%Avira URL Cloudsafe
https://sectigo.com/CPS0D0%VirustotalBrowse
http://twitter.github.com/bootstrap/javascript.html#scrollspy0%VirustotalBrowse
http://ocsp.verisign.co0%Avira URL Cloudsafe
https://www.remobjects.com/ps0%VirustotalBrowse
http://www.sandoll.co.kr0%Avira URL Cloudsafe
http://www.fonts.com0%Avira URL Cloudsafe
https://www.innosetup.com/1%VirustotalBrowse
https://jrsoftware.org/0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#collapse0%VirustotalBrowse
http://www.urwpp.deDPlease0%Avira URL Cloudsafe
http://ocsp.verisign.co1%VirustotalBrowse
http://www.galapagosdesign.com/DPlease0%VirustotalBrowse
http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
http://www.sandoll.co.kr0%VirustotalBrowse
http://www.certum.pl/CPS00%Avira URL Cloudsafe
http://www.fonts.com0%VirustotalBrowse
http://www.sakkal.com0%Avira URL Cloudsafe
https://sectigo.com/CPS050%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#carousel0%Avira URL Cloudsafe
http://csc3-2009-2-aia.ve.0%Avira URL Cloudsafe
https://jrsoftware.org/0%VirustotalBrowse
http://www.innosetup.com/0%Avira URL Cloudsafe
http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
http://www.openmovement.co.uk0%Avira URL Cloudsafe
http://phrogz.net/JS/_ReuseLicense.txt0%Avira URL Cloudsafe
http://repository.certum.pl/ctnca.cer090%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#typeahead0%Avira URL Cloudsafe
http://crl.certum.pl/ctnca.crl0k0%Avira URL Cloudsafe
http://www.modernizr.com/)0%Avira URL Cloudsafe
http://ocsp.usertru0%Avira URL Cloudsafe
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.i0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#tooltips0%Avira URL Cloudsafe
http://go.microsoft.0%Avira URL Cloudsafe
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/AX3-GUI-28.zi0%Avira URL Cloudsafe
http://tinyurl.com/dotnet35setup0%Avira URL Cloudsafe
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini3UPD0%Avira URL Cloudsafe
https://www.certum.pl/CPS00%Avira URL Cloudsafe
https://www.verisign.c0%Avira URL Cloudsafe
http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#buttons0%Avira URL Cloudsafe
https://openmovement.googlecode.com/svn/downloads/AX3/omgui.ini0%Avira URL Cloudsafe
http://twitter.github.com/bootstrap/javascript.html#dropdowns0%Avira URL Cloudsafe
http://crl.certum.pl/cscasha2.crl0q0%Avira URL Cloudsafe
http://cscasha2.ocsp-certum.com040%Avira URL Cloudsafe
http://www.carterandcone.coml0%Avira URL Cloudsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%Avira URL Cloudsafe
http://www.fontbureau.com/designers/cabarga.htmlN0%Avira URL Cloudsafe
http://www.openmovement.co.uka0%Avira URL Cloudsafe
http://www.founder.com.cn/cn0%Avira URL Cloudsafe
http://www.fontbureau.com/designers/frere-jones.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
raw.githubusercontent.com
185.199.111.133
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.inifalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUAX3-GUI-45.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designersGOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#popoversis-7QH66.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designers/?OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.microsEOmGui.exe, 00000010.00000002.1721430944.0000000009A9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://repository.certum.pl/cscasha2.cer0AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.founder.com.cn/cn/bTheOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://ocsp.sectigo.com0AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.verisidrvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designers?OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#affixis-7QH66.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.microsoft.coOmGui.exe, 00000010.00000002.1721430944.0000000009A9C000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.openmovement.co.ukqAX3-GUI-45.exe, 00000000.00000003.1439175698.0000000000C4A000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000017.00000003.1817995698.00000000023BA000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 0000001F.00000003.1811571474.000000000248A000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.tiro.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designersOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.goodfont.co.krOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.sajatypeworks.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.typography.netDOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#transitionsis-7QH66.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.founder.com.cn/cn/cTheOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.galapagosdesign.com/staff/dennis.htmOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://fontfabrik.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#scrollspyis-7QH66.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.remobjects.com/psAX3-GUI-45.exe, 00000000.00000003.1095350311.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000000.00000003.1094938915.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000000.1096792574.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AX3-GUI-45.tmp.31.dr, is-524O8.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://subca.ocsp-certum.com01AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
https://www.innosetup.com/AX3-GUI-45.exe, 00000000.00000003.1095350311.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.exe, 00000000.00000003.1094938915.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000000.1096792574.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AX3-GUI-45.tmp.31.dr, is-524O8.tmp.1.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0DAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.galapagosdesign.com/DPleaseOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#collapseis-7QH66.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://jrsoftware.org0AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.verisign.corundll32.exe, 0000000F.00000002.1324344949.0000025F700DE000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.fonts.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.sandoll.co.krOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://jrsoftware.org/AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.urwpp.deDPleaseOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.zhongyicts.com.cnOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.sakkal.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.certum.pl/CPS0AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS05AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#carouselis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://csc3-2009-2-aia.ve.rundll32.exe, 0000000F.00000002.1325076830.0000025F70419000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.innosetup.com/setup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmp, is-7QH66.tmp.1.dr, is-QCCS6.tmp.1.dr, is-GA9GG.tmp.1.dr, is-R9IP2.tmp.1.dr, is-233P5.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.comOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.openmovement.co.ukAX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000026BA000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://phrogz.net/JS/_ReuseLicense.txtis-0JOM7.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://repository.certum.pl/ctnca.cer09AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#typeaheadis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/soap/encoding/OmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003A9B000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.certum.pl/ctnca.crl0kAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.modernizr.com/)is-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.usertruAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.iOmGui.exe, 00000010.00000002.1721430944.0000000009A10000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#tooltipsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.OmGui.exe, 00000025.00000002.2096196339.0000000001652000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/AX3-GUI-28.ziOmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://tinyurl.com/dotnet35setupAX3-GUI-45.tmp, 00000001.00000003.1098497033.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003894000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025EB000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000018.00000003.1814040575.00000000025FB000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000025DB000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
  • Avira URL Cloud: safe
unknown
https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini3UPDOmGui.exe, 00000010.00000000.1431643900.0000000000B22000.00000002.00000001.01000000.00000011.sdmp, is-E9CM8.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
https://www.certum.pl/CPS0AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
https://www.verisign.cdrvinst.exe, 00000009.00000002.1376663620.00000279D7A14000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#buttonsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.LinkId=42127OmGui.exe, 00000025.00000002.2096196339.0000000001652000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://openmovement.googlecode.com/svn/downloads/AX3/omgui.iniOmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#dropdownsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.certum.pl/cscasha2.crl0qAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://cscasha2.ocsp-certum.com04AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.0000000002590000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.carterandcone.comlOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designers/cabarga.htmlNOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.openmovement.co.ukaAX3-GUI-45.tmp, 00000001.00000003.1435213202.00000000026CA000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1807041334.00000000026BA000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.founder.com.cn/cnOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designers/frere-jones.htmlOmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.remobjects.com/psUsetup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://raw.githubusercontent.comOmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003AF8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#AX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.0000000003614000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.drfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#alertsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/digitalinteraction/openmovement/releases/download/AX3-OmGui-v28/AX3-GUI-28.zipOmGui.exe, 00000025.00000002.2102587867.0000000003BEC000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/wsdl/OmGui.exe, 00000010.00000002.1708580813.0000000003471000.00000004.00000800.00020000.00000000.sdmp, OmGui.exe, 00000025.00000002.2102587867.0000000003AF8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.jiyu-kobo.co.jp/OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designers8OmGui.exe, 00000010.00000002.1717835648.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#tabsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.remobjects.com/pssetup-ax3-driver.exe, 00000004.00000003.1195303513.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.exe, 00000004.00000003.1194866477.0000000002480000.00000004.00001000.00020000.00000000.sdmp, setup-ax3-driver.tmp, 00000005.00000000.1195968623.0000000000401000.00000020.00000001.01000000.0000000A.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://twitter.github.com/bootstrap/javascript.html#modalsis-7QH66.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.openmovement.co.uk:http://www.openmovement.co.uk:http://www.openmovement.co.ukAX3-GUI-45.exe, 00000000.00000003.1093771706.0000000002670000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000001.00000003.1098497033.00000000035E0000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://repository.certum.pl/cscashaAX3-GUI-45.tmp, 00000001.00000003.1434841149.0000000003900000.00000004.00001000.00020000.00000000.sdmp, AX3-GUI-45.tmp, 00000020.00000003.1806633669.0000000003920000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
185.199.111.133
raw.githubusercontent.comNetherlands
54113FASTLYUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1509202
Start date and time:2024-09-11 09:14:58 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:42
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:AX3-GUI-45.exe
Detection:MAL
Classification:mal64.expl.evad.winEXE@31/232@1/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 266
  • Number of non-executed functions: 68
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, TextInputHost.exe
  • Excluded domains from analysis (whitelisted): www.bing.com, fp.msedge.net, fs.microsoft.com, afdxtest.z01.azurefd.net, ocsp.digicert.com, slscr.update.microsoft.com, evoke-windowsservices-tas.msedge.net, wac-ring-fallback.msedge.net, 67ede7f7f8e13aca77453ee86d773752.clo.footprintdns.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
TimeTypeDescription
03:16:32API Interceptor1x Sleep call for process: OmGui.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
185.199.111.133M 1votFC.emlGet hashmaliciousUnknownBrowse
    https://www.tiktok.com/link/v2?aid=1988&lang=enFSmPWg&scene=bio_url&target=google.com.////amp/s/%E2%80%8Bce%C2%ADsme%C2%ADdia%E2%80%8B.%C2%ADv%C2%ADn/.dev/tfbft0yf/ZGlhbmUuY3JhaWdAZ3JhY2VoZWFsdGhtaS5vcmc==$%E3%80%82Get hashmaliciousTycoon2FABrowse
      http://xcelenergy.zonaclimber.com/json/activeBC/justin.l.billeter@xcelenergy.comGet hashmaliciousHTMLPhisherBrowse
        https://eu-central-1.protection.sophos.com/?d=tiktok.com&u=aHR0cHM6Ly93d3cudGlrdG9rLmNvbS8vLy8vbGluay92Mj9haWQ9MTk4OCZsYW5nPWVuRlNtUFdnJnNjZW5lPWJpb191cmwmdGFyZ2V0PWdvb2dsZS5jb20uLy8vL2FtcC9zLyVFMiU4MCU4QmMlQzIlQUR0JUMyJUFEaCVFMiU4MCU4Qi4lQzIlQUR2JUMyJUFEbi8uZGV2L0tTcEhUaEhTL2JYZHZiMlJ6UUhOell5NXVjM2N1WjI5MkxtRjE9JCVFMyU4MCU4Mg==&p=m&i=NWQwN2ZmYzMzYTI2ZjgxNDIyYzk1ZDVl&t=TXBncTdKNVIxbE4vUUNSZkZsUHZnc3YwdDVHTUM0SVFZMHhFRHdsSEJmaz0=&h=4d6999c7166643fab3b2cf307a3e9237&s=AVNPUEhUT0NFTkNSWVBUSVb-GMTbEE4rTI_ViOGlBYY0py-Up8IV-uCS_drrL8K4og4uBbd_kdu_CfA_rJxO7PTPyV6BcVDiENaJLwZqW5J9rZ6Yqn61C4tBc2kHdTZ1bRzSSZJILq9JgtGCdbMh-j8Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
          https://www.tiktok.com/////link/v2?aid=1988&lang=enFSmPWg&scene=bio_url&target=google.com.////amp/s/%E2%80%8Bc%C2%ADt%C2%ADh%E2%80%8B.%C2%ADv%C2%ADn/.dev/lemb4ic3/YnJhbmRpLnRyeW9uQGFwZGVncmVlcy5jb20==$%E3%80%82Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
            https://github.com/gitextensions/gitextensions/releases/download/v4.2.1/GitExtensions-4.2.1.17611-b0c0b2848.msiGet hashmaliciousUnknownBrowse
              https://href.li/?https://w1t92zr.pedbuores.com/jv8FND/Get hashmaliciousHTMLPhisherBrowse
                https://sinintermediarios.uy/bc/blockchain.com/email/Get hashmaliciousUnknownBrowse
                  http://anikettiwari47.github.io/NetflixGet hashmaliciousHTMLPhisherBrowse
                    Bootstrapper_1725724037599_1sly5.exeGet hashmaliciousLummaCBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      raw.githubusercontent.comSecuriteInfo.com.Win64.MalwareX-gen.5183.18088.exeGet hashmalicious77Rootkit, AsyncRAT, DcRatBrowse
                      • 185.199.110.133
                      VXLauncher.exeGet hashmaliciousEmpyrean, Discord Token StealerBrowse
                      • 185.199.110.133
                      Bootstrapper_1725724037599_1sly5.exeGet hashmaliciousLummaCBrowse
                      • 185.199.111.133
                      SecuriteInfo.com.Win64.PWSX-gen.14334.8980.exeGet hashmaliciousUnknownBrowse
                      • 185.199.108.133
                      scan_documet_027839.vbsGet hashmaliciousUnknownBrowse
                      • 185.199.110.133
                      Run First.exeGet hashmaliciousUnknownBrowse
                      • 185.199.108.133
                      Run First.exeGet hashmaliciousUnknownBrowse
                      • 185.199.110.133
                      SecuriteInfo.com.Win64.Evo-gen.25168.3752.exeGet hashmaliciousUnknownBrowse
                      • 185.199.111.133
                      SecuriteInfo.com.Win64.Evo-gen.25168.3752.exeGet hashmaliciousUnknownBrowse
                      • 185.199.111.133
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      FASTLYUShttps://go.skimresources.com/?id=129857X1500501&url=https://www.freelansssssssssssssssscer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/45834840-3c14-4374-8f51-bbcadebab762?j=eyJ1IjoiNGRnZ2x2In0Get hashmaliciousHTMLPhisherBrowse
                      • 151.101.2.137
                      https://tpsrentalsystemsgmbhcokg.freshdesk.com/support/solutions/articles/204000000107-tps-rental-systems-gmbh-co-kgGet hashmaliciousHTMLPhisherBrowse
                      • 151.101.130.137
                      https://tpsrentalsystemsgmbhcokg.freshdesk.com/support/solutions/articles/204000000107-tps-rental-systems-gmbh-co-kgGet hashmaliciousHTMLPhisherBrowse
                      • 151.101.2.137
                      http://rivestream.liveGet hashmaliciousUnknownBrowse
                      • 185.199.108.153
                      https://padlet.com/julianhughes009/icm-group-rfq-flxgnyxvlatwoc3iGet hashmaliciousUnknownBrowse
                      • 151.101.2.137
                      http://gulf-uae.com/953442816569005250060051bi2sxgen-pgx-878723564006-ifxyeonkim-isxskyline-holt.comsf-1MC4wGet hashmaliciousHTMLPhisherBrowse
                      • 151.101.66.137
                      https://spot-speckle-gardenia.glitch.me/public/rfyiyuki4342.htmlGet hashmaliciousUnknownBrowse
                      • 151.101.130.137
                      https://awaisni.github.io/awaisbab/index.htmlGet hashmaliciousUnknownBrowse
                      • 199.232.188.159
                      https://coenbseeprolgiin.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                      • 151.101.2.188
                      http://www.viundodal.serv00.net/Get hashmaliciousUnknownBrowse
                      • 199.232.188.159
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      54328bd36c14bd82ddaa0c04b25ed9ad018292540-SuratTeguranPPI-20230814215304.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 185.199.111.133
                      SecuriteInfo.com.Win32.CrypterX-gen.17091.2614.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 185.199.111.133
                      Enquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                      • 185.199.111.133
                      Request for Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 185.199.111.133
                      PO_20248099-1 12,300PCS.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 185.199.111.133
                      BASE OIL AND CHEMICAL PRICE INQUIRY.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 185.199.111.133
                      Demande de devis.Quote Request.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                      • 185.199.111.133
                      RFQ-DL32035.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 185.199.111.133
                      inquiry#60311.vbeGet hashmaliciousSnake KeyloggerBrowse
                      • 185.199.111.133
                      SecuriteInfo.com.BackDoor.AgentTeslaNET.34.20128.22369.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 185.199.111.133
                      No context
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):30720
                      Entropy (8bit):5.561090262634769
                      Encrypted:false
                      SSDEEP:768:G9ivcgdQIeVAOrajN/ccIjOBHaHi6ej0hQ:G9ikgd0Vt+h8FC6eYhQ
                      MD5:5083DA882E58C045E46391E8AC35456F
                      SHA1:9EAE2AA46772286D5ABA504009ED0492031BC102
                      SHA-256:BB2B868D313942BAFEDF896F19C7BE8CA91725A44C29E916DB8FBFB837087EE2
                      SHA-512:1CE7025532A3E98FD420A5EAF5BC0E2BCCCB1141AD803C01F8D286805029932DB41EDDDAFAF97FC6300061D6570980E4F79B219E89D3FD25DD6337923F63D304
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H`c...........!..0..n..........n.... ........... ....................................@.....................................O................................................................................... ............... ..H............text...tm... ...n.................. ..`.rsrc................p..............@..@.reloc...............v..............@..B................P.......H........:...Q..........................................................^~....-.s.........~....*.0...........s....}.....s....}.....(............s......}.......{....(.......{....~....(....&........s......}.......{....(.......{....~....(....&.l(....r...p(............s......}.......{....(.......{....~....(?...&*...0............(.......(.....*..................."..(....*....0..F........{....-=.&(....&...{....,....{....(.......{....,....{....(......}....*F.(G...,...s....z*.0..X...
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1641984
                      Entropy (8bit):7.012562124222005
                      Encrypted:false
                      SSDEEP:49152:s+4PCNQWsNQWsNQWsNQWsNQWsNQWh4NQW:sMuuuuuU
                      MD5:12FEEE099449453BA386F8FBA6C72090
                      SHA1:4BE776CF3F768BAD8F10CA885227494972CBCEBE
                      SHA-256:E96445F1DEA2B0B630ADE704C5C478C0E50A71645473F11297FE7DED2D9F9197
                      SHA-512:E21262C048DAA24BDAEF0F08D544CE06ADE5DF32D99D8D1967F76984AA8ED3780B8E8E03F2C0FE873D578BC52AA0A49F5A814D4B6146BCE13BC65CEEBEE6F95E
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2H`c..............0......~........... ........@.. .......................`............@.....................................O.......8{...................@......t................................................ ............... ..H............text...\.... ...................... ..`.rsrc...8{.......|..................@..@.reloc.......@......................@..B.......................H.......0>...;...........y...0............................................( ...*.0...........(.......(.....*.................0..........~!.....~!.....i......~!.....o......-}...I...("...(#...tI...}....~!............($...-....J...("...(#...tJ...}....~!............($...-....K...("...(#...tK...}.....*.*.0..............7.....~....}........Yn(%...}.......}........Yn(%...}.......}...... .@. (&... ...._-..+. ...@`(&... ...._-..+. ....`}........('.....((...s....}.......}.......o....&*
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3527
                      Entropy (8bit):7.81337128585813
                      Encrypted:false
                      SSDEEP:96:9Ss5YRxkYjabEg39Q5aS4iJ7fPWdSfCwIc31:9Ss5Yrjaob5/VJr+k9
                      MD5:CED13F367E9FDF9CB2045DDBFC606D6B
                      SHA1:7C872ABCF649631BA513C43621605610D9125E95
                      SHA-256:27BC1E463A8F3FD3C193CC5E91A463C356E39D5E81EE45FEDC54BB070B5FC895
                      SHA-512:D2F7A6FBE8AD134F2073AEB76BDBF4D06922193275F72CE8DD6288EE026E7EF66410377FEF45F22355A70FCCFBE198379F1D55C4BA5D041DE96CA088B0BBAD0D
                      Malicious:false
                      Preview:.PNG........IHDR...@...@......iq.... cHRM..z%..............u0...`..:....o._.F....bKGD.......C......pHYs.................vpAg...@...@....`....IDATx...k%wv.?.G..}..j..v.3....!.3a..`<.U..&.@.*.@.!x.E...l.....<..6.......n...-..V..nK.U../...RU....d ...z.U.|..T..&4..MhB...&....I.|..g.q.....E.R..B...!PJ....:q..{.....Zks.Zk.R...xzz...\.~.W_}.O>..w. .Sc.o.V.Ave.>N@..+{}..Y9..Z..`./..w...>.h.Z.....>@)..`0..(.^.>..XQ.Ya.pZ.....,......m..Mk..B......-.S.....O..jS.....g.b.......5..@.....B(.(..8..1f.Z..Q.-.q<..t.. ...d.y.....K.v..crfj.AJ9. ...>_....U^..&ss/...,.Q....Xk.t:...ju.T..!..p^.QsB....*. ...c,R..69.x..f...Zbq.......H..!..!.V....!.y...Honn6...Og......oY..8..u.."E..D..k.V:.....0U.>q._|H..36..+....8..^..c..s.....L....@DQtz...Y...f....{<....._..S.+ ....%..P.....[..l............\..>..\|.,.\Fk.c........8...(...$.._1.~....$.}.8..8....=juK.|...-..9......\Xy..2S.@Yp~f.\`.A.s.....G4.^......WQ,.S,,>......wx.w.s.....0...8N.g. [m.+,.h.a._x..[4[..Gq....R(3
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):563200
                      Entropy (8bit):6.741829920311703
                      Encrypted:false
                      SSDEEP:12288:+l+vI0vyog/UpQ87Lx97MYpk62gSp01ldMIicFIz/Fa5wbevozdw1:+l+g6kUW8Xx9ogDSp01lXicFIDFa5jvo
                      MD5:15B477AA57D8F81CD251D38CA7CB84C6
                      SHA1:CA9A478EDE26638F0D881D1643CAC98C3AFE5F49
                      SHA-256:822F9397A57EE1A5B4D2A25FE4031F5EB960166AC20F3FF7AA417259EF8F403E
                      SHA-512:2B42BC91E3596F16C76D35C6C3DFFBB04735C6AB96ABC6C61E6FFE34BBB0EE5F791FFAA7D4ADB9C6CD15E74E42B67292F4CF940CF9222AE9DD515658DDE6FAF3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7+..Yx..Yx..Yx..x..Yx..x..Yx..x..Yx...x..Yx..Xx..Yx..x..Yx..x..YxRich..Yx................PE..L...#..O.........................................@..................................y....@..................................A..(................................2.................................8<..@............................................text............................... ..`.rdata..............................@..@.data...DC...P... ...<..............@....rsrc................\..............@..@.reloc...:.......:...^..............@..B........................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):7303
                      Entropy (8bit):7.827464019436164
                      Encrypted:false
                      SSDEEP:192:b8yxqckNOgKtcKdAOs/GOR9nDyoQCl1xdjGTlD/uzcV/:bbx9bSKoHDyoQClExGi/
                      MD5:BDFA0CCB43714B182B9EEE4A0CF0DC9A
                      SHA1:14AE738BC83FE1004B9879F3BD72100E74E215C1
                      SHA-256:ED334BA309B7DC4EB164B135E6EC95AC270767C528C7AB649B2AC8FD7EC5C8CA
                      SHA-512:3925369D595CEC2693421FACDBDD76562AD75A56E74C87B41303944A85BECD22A133D3921B02E420E75D63D18953E278E18FB8E4A3CE0CD3FF6F5C7BE516ABC3
                      Malicious:false
                      Preview:GIF89a.....................xi~................................+5.MV.JU..(.'=.J].....!.3K.AW...)..+..5.8Q.C].DZ.Pg.CU.Zm.Vh.aq.`h.....3../..<..<..D.&L.$G.-Q.3V.:\.5R.>`.Dd.Hg.Ii.Ii.Ki.Kk.Lh.Mk.Ro.Sq.[v.e..w..p..}..t..v.....@d.Ae.Eh.Gk.Gi.Gh.Gk.Im.Ik.Im.Ik.Ko.Km.Kk.Lm.Nn.Or.Rs.Ut.Vx.]|.Zw.k..`x....Ek.Lp.Jo.b.....e..m..{......z................................................................D.......M...Y....Y..e.5..L.h......2..=..G.Y..i........u..z..|..~.....w..*.5..A..@.G.G..V.Q.._.P..o.f..u..u..{......w..v..{............#.~%..+..2..3..9..>.9.=..B..D..D..E..G..G..G.C..I..I.A..L..L..Q..R..V..T..[..c..g..m..s....`...u.q..k...4..B.{5..F..G..I..I..J..K..K..K..N..S..V..[.zO..{....u.........B..M....c.....................................!.......,...............H......*\......z4.H.........c.. C...0...?*`.@....Cp.....`..Sf.._........C..P../.0H@J..B..Vty...V..:../*..]..k..;....A-.0..h.../.0..KX.[.0b...$H..E.K..E....t..C...CO..C.i.@..H.9....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1041
                      Entropy (8bit):5.0566730094007655
                      Encrypted:false
                      SSDEEP:24:qTFLURr94A/4VqEQVC/YFTszIRuXgigDDNNbT1JxFK8:EiRr9T/4Vqp4AFMouXrYNpT1HFb
                      MD5:C128D6CD61111599FCBE7BB46EDB1904
                      SHA1:CDF9CEC9BA07708A12D0A02D50E0122385FA253F
                      SHA-256:944D208A5720B207B61144149546F9F50FB48B7281DF8BCE33EB114E20BB95C6
                      SHA-512:74E5A34E3A019D395D5E71BBB9629F6C4C9EE4233C79406898FBCFE673A2B3F753A9C75AA95A54821012EB3794AF1E880A8ACBBA31DB4899270C6DF0FD1D5E53
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>OMPA Convertor.exe</runFilePath>...<htmlFilePath>OMPA convertor.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>64x64 converter.ico</iconName>...<description>Converts binary .cwa files to application-friendly formats. Current version supports specifying a time-slice via the data preview pane. Optional output streams (battery, light, temperature). Multiple timestamp formats available.</description>...<fileName>Convert_CWA</fileName>...<readableName>Convert CWA</readableName>...<outputFile>.csv .wav .raw</outputFile>...<inputFile>.cwa</inputFile>...<wantMetadata>true</wantMetadata>...<outputExtensions>....<extension>csv</extension>...</outputExtensions>...<defaultValues>....<bodyMass>80</bodyMass>....<percentage>0.22</percentage>....<fileStart>fileStart</fileStart>....<fileEnd>fileEnd</fileEnd>...</defaultValues>...<crea
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with very long lines (381), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11977
                      Entropy (8bit):5.193366025833501
                      Encrypted:false
                      SSDEEP:192:kVsDIzjpambe4Ec4h25Uw4aCqtYoqy2qoglZQtpYGTmpo/8pWV9:qtq4Ec4hUr4aLYoqUCX
                      MD5:1A82547F921A171DCF86F23191BFD318
                      SHA1:1CBE6268FC5FFE12A4A707205D0FCC64866A7236
                      SHA-256:E4BD06AA60D4577B6AA586E05EDB9D5B1250599C01C1140C6D88B614B9A0E103
                      SHA-512:420651FDEFF17D16307E875CDD632B5CB7ED54E588BFB8D870AB43BC2E4B402913BE748334D431D5CC9F8663F6C680470E71E6BED297623560F09856E2BFDBEE
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>OpenMovement Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.js"></script> ...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......function fillValues()...{....va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):23220
                      Entropy (8bit):5.0206455590077885
                      Encrypted:false
                      SSDEEP:384:yM1758/eDV9grZKb5u5Ru11zNFnyQCglOfWwRnE+A6V22zHtTjg:/8GDV9grZKbgUzWQCglOfWwRnE+/DzNA
                      MD5:E46CE2784F902577C2E2858BAF1536F0
                      SHA1:B87C9AF4988D92BCFBA4CE80F1BBF267774E115F
                      SHA-256:489239002725E88D06FFFC788210A60C249D401F00C2BE2254F130F6251D2002
                      SHA-512:B822F632A842A070A2A7FB1CFC7A184CAE6219676273CE63B57096FB0C0F39DA7735EE240BB5652F1AE14238D3494AC930395D936EF5BCB6F7552053D375CDE0
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....@-ms-viewport {.. width: device-width;..}.....hidden {.. display: none;.. visibility: hidden;..}.....visible-phone {.. display: none !important;..}.....visible-tablet {.. display: none !important;..}.....hidden-desktop {.. display: none !important;..}....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (16608), with CRLF line terminators
                      Category:dropped
                      Size (bytes):16858
                      Entropy (8bit):5.2955772749108
                      Encrypted:false
                      SSDEEP:384:dd7eicOM8quuhu93fUacuMZoUCfl4UX94Vp1XP:dPcVDmfUac1ZQt4UX96L
                      MD5:B0C3EF20C73BC861FF157EAB023DD09C
                      SHA1:FEE31889CF7E7B1531BF61D8109BE2A6007853D6
                      SHA-256:754073D316DAB747E1634E26EE4FB71EBF38314C24701946812C0E7506242560
                      SHA-512:CB61A0F24025F2C702E0A5EEC5BA6E94AE108A543C21C61445188C4741DB66A27D7195234D8ED992BCE7793C667F7E4041E2E102C87C55C2070BD608CF8ED2A7
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}@-ms-viewport{width:device-width}.hidden{display:none;visibility:hidden}.visible-phone{display:none!important}.visible-tablet{display:none!important}.hidden-desktop{display:none!important}.visible-desktop{display:inherit!important}@media(min-width:768px) and (max-width:979px){.hidden-desktop{display:inherit!important}.visible-desktop{display:none!important}.visible-tablet{display:inherit!importa
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):133405
                      Entropy (8bit):5.11593362125808
                      Encrypted:false
                      SSDEEP:768:3ofP4Kjze9ROUT1aEXxUKPrsPHOR1sqY+R9Ef:3ofAh9kKHXYORmJf
                      MD5:580599C144EF378851955472462F8602
                      SHA1:477A15BEDFC71B900F7B623725FC2693E6304AAB
                      SHA-256:4DA0DD04B0D7747EB30270FE7758BAC2CBF8371ECA251257553E9B489FD229FD
                      SHA-512:4C4D00E70A7C0C6999B237D5466F7EC099B4445BF1A4A9561374D192422C4F41E7C60374BFA0C6DC8D6AF0C8866AE131DD29B82480B60DA93F22108760B1339A
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....article,..aside,..details,..figcaption,..figure,..footer,..header,..hgroup,..nav,..section {.. display: block;..}....audio,..canvas,..video {.. display: inline-block;.. *display: inline;.. *zoom: 1;..}....audio:not([controls]) {.. display: none;..}....html {.. font-
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (65299), with CRLF line terminators
                      Category:dropped
                      Size (bytes):105948
                      Entropy (8bit):5.180897685194033
                      Encrypted:false
                      SSDEEP:768:X71A8XpW5b26LVcUFPaDGObYDUXyyRsPJGaPV4LolQdUONA4QFOfUcnvGcJwjuGR:28AHR7aD4DJhzPB2UONAxtjuGR
                      MD5:016623C5E5773122D7C2AC3B524DD17C
                      SHA1:1ABEFD404CDD720B275CDAFB97D3EE1C87FD97EF
                      SHA-256:3349EBED31517ADA35DA5294A520C4A25CB778F58785726E4B0177120FE25501
                      SHA-512:C36645B0648A21D7B6F4ABD9C315B5B82EBD3D21B48E8B2184D8333C800F0D9F9256FFC0D862AE9FDC6E15A24B3247251FCA9830869A54865255F2BC6DCCAA61
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zoom:1}audio:not([controls]){display:none}html{font-size:100%;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}a:focus{outline:thin dotted #333;outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}a:hover,a:active{outline:0}sub,sup{position:relative
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):23220
                      Entropy (8bit):5.0206455590077885
                      Encrypted:false
                      SSDEEP:384:yM1758/eDV9grZKb5u5Ru11zNFnyQCglOfWwRnE+A6V22zHtTjg:/8GDV9grZKbgUzWQCglOfWwRnE+/DzNA
                      MD5:E46CE2784F902577C2E2858BAF1536F0
                      SHA1:B87C9AF4988D92BCFBA4CE80F1BBF267774E115F
                      SHA-256:489239002725E88D06FFFC788210A60C249D401F00C2BE2254F130F6251D2002
                      SHA-512:B822F632A842A070A2A7FB1CFC7A184CAE6219676273CE63B57096FB0C0F39DA7735EE240BB5652F1AE14238D3494AC930395D936EF5BCB6F7552053D375CDE0
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....@-ms-viewport {.. width: device-width;..}.....hidden {.. display: none;.. visibility: hidden;..}.....visible-phone {.. display: none !important;..}.....visible-tablet {.. display: none !important;..}.....hidden-desktop {.. display: none !important;..}....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:assembler source, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1804
                      Entropy (8bit):5.09134159779664
                      Encrypted:false
                      SSDEEP:48:W/7d3J5Ozvk4QKhQoEXnZBC5UHsUMopRcZbBh:W/RD0HQK6oEXn/wUMLosZ
                      MD5:404B511780FED84B57626F82B83CEF70
                      SHA1:7AFEE211414F83080C7ABC1B32AC120F144E6681
                      SHA-256:D2D92767B7A8743B89368CF353748DA2AAFAA6509375406BC56905F4FC4DAC54
                      SHA-512:D210421D09224773EDC7BA6BC1CC1D0E134FDCBB00FB844B9BE8535588E0B8A58AF260B5530284D90DA19FCE74770F985C5E5D197BB0052A07DDD6FDAB4AB31C
                      Malicious:false
                      Preview:....body {...width: 100%;...height: 100%;...background-color: white;...margin: 0;...padding: 0;......}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url(../img/headerbackground.png);...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 15px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}....div#contentHolder {...position: relative;...width:100%;...height: 1000px;...padding-top: 7px;...background-color: rgb(70,70,70);...border-image: url(../img/innerglow.png) 210 / 210px stretch stretch;..}....div#content {...position: relative;...min-height: 750px;...max-height: 1200px;...width: 90%;...margin: 0px auto 0px auto;...-moz-border-radius: 8px;.. -webkit-border-radius: 8px;...border-radius: 8px;...background-color: white;..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (16608), with CRLF line terminators
                      Category:dropped
                      Size (bytes):16858
                      Entropy (8bit):5.2955772749108
                      Encrypted:false
                      SSDEEP:384:dd7eicOM8quuhu93fUacuMZoUCfl4UX94Vp1XP:dPcVDmfUac1ZQt4UX96L
                      MD5:B0C3EF20C73BC861FF157EAB023DD09C
                      SHA1:FEE31889CF7E7B1531BF61D8109BE2A6007853D6
                      SHA-256:754073D316DAB747E1634E26EE4FB71EBF38314C24701946812C0E7506242560
                      SHA-512:CB61A0F24025F2C702E0A5EEC5BA6E94AE108A543C21C61445188C4741DB66A27D7195234D8ED992BCE7793C667F7E4041E2E102C87C55C2070BD608CF8ED2A7
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}@-ms-viewport{width:device-width}.hidden{display:none;visibility:hidden}.visible-phone{display:none!important}.visible-tablet{display:none!important}.hidden-desktop{display:none!important}.visible-desktop{display:inherit!important}@media(min-width:768px) and (max-width:979px){.hidden-desktop{display:inherit!important}.visible-desktop{display:none!important}.visible-tablet{display:inherit!importa
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (65299), with CRLF line terminators
                      Category:dropped
                      Size (bytes):105948
                      Entropy (8bit):5.180897685194033
                      Encrypted:false
                      SSDEEP:768:X71A8XpW5b26LVcUFPaDGObYDUXyyRsPJGaPV4LolQdUONA4QFOfUcnvGcJwjuGR:28AHR7aD4DJhzPB2UONAxtjuGR
                      MD5:016623C5E5773122D7C2AC3B524DD17C
                      SHA1:1ABEFD404CDD720B275CDAFB97D3EE1C87FD97EF
                      SHA-256:3349EBED31517ADA35DA5294A520C4A25CB778F58785726E4B0177120FE25501
                      SHA-512:C36645B0648A21D7B6F4ABD9C315B5B82EBD3D21B48E8B2184D8333C800F0D9F9256FFC0D862AE9FDC6E15A24B3247251FCA9830869A54865255F2BC6DCCAA61
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zoom:1}audio:not([controls]){display:none}html{font-size:100%;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}a:focus{outline:thin dotted #333;outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}a:hover,a:active{outline:0}sub,sup{position:relative
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):133405
                      Entropy (8bit):5.11593362125808
                      Encrypted:false
                      SSDEEP:768:3ofP4Kjze9ROUT1aEXxUKPrsPHOR1sqY+R9Ef:3ofAh9kKHXYORmJf
                      MD5:580599C144EF378851955472462F8602
                      SHA1:477A15BEDFC71B900F7B623725FC2693E6304AAB
                      SHA-256:4DA0DD04B0D7747EB30270FE7758BAC2CBF8371ECA251257553E9B489FD229FD
                      SHA-512:4C4D00E70A7C0C6999B237D5466F7EC099B4445BF1A4A9561374D192422C4F41E7C60374BFA0C6DC8D6AF0C8866AE131DD29B82480B60DA93F22108760B1339A
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....article,..aside,..details,..figcaption,..figure,..footer,..header,..hgroup,..nav,..section {.. display: block;..}....audio,..canvas,..video {.. display: inline-block;.. *display: inline;.. *zoom: 1;..}....audio:not([controls]) {.. display: none;..}....html {.. font-
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:assembler source, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1804
                      Entropy (8bit):5.09134159779664
                      Encrypted:false
                      SSDEEP:48:W/7d3J5Ozvk4QKhQoEXnZBC5UHsUMopRcZbBh:W/RD0HQK6oEXn/wUMLosZ
                      MD5:404B511780FED84B57626F82B83CEF70
                      SHA1:7AFEE211414F83080C7ABC1B32AC120F144E6681
                      SHA-256:D2D92767B7A8743B89368CF353748DA2AAFAA6509375406BC56905F4FC4DAC54
                      SHA-512:D210421D09224773EDC7BA6BC1CC1D0E134FDCBB00FB844B9BE8535588E0B8A58AF260B5530284D90DA19FCE74770F985C5E5D197BB0052A07DDD6FDAB4AB31C
                      Malicious:false
                      Preview:....body {...width: 100%;...height: 100%;...background-color: white;...margin: 0;...padding: 0;......}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url(../img/headerbackground.png);...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 15px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}....div#contentHolder {...position: relative;...width:100%;...height: 1000px;...padding-top: 7px;...background-color: rgb(70,70,70);...border-image: url(../img/innerglow.png) 210 / 210px stretch stretch;..}....div#content {...position: relative;...min-height: 750px;...max-height: 1200px;...width: 90%;...margin: 0px auto 0px auto;...-moz-border-radius: 8px;.. -webkit-border-radius: 8px;...border-radius: 8px;...background-color: white;..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):555520
                      Entropy (8bit):6.7113933342053205
                      Encrypted:false
                      SSDEEP:12288:3nTww4skH2tol+VkVJrDHcSN+cfRf9JsFdwe:3n0nH2toYkVJrD9Z9Js
                      MD5:33DD5633F19486728639D92992B080F2
                      SHA1:BEDD5820CF9FC7285833AF533C3B08BFA1F4912E
                      SHA-256:88CE021A699D591CBAFC1D1211399CB0E9543EB2A6843C4D07707EE374F3C7D5
                      SHA-512:5DC1602F017AD27E6F36071AE6BE2A900F9C95AABA46A962AD27A62F70B175617840263D15E0CEB413F8513D2704FEE6CA2A7181D5F8BECD3027DCD15197DA03
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........#..p..p..pLrQp..pLrSph.pLrRp..p.q..p.q..p.q..p.3p..p..p..p..q..p._p..p..q..pRich..p................PE..L...S..[.................:...N...............P....@.......................................@..................................3..(....p...........................6..`)..p............................)..@............P...............................text....8.......:.................. ..`.rdata.......P.......>..............@..@.data...p$...@.......,..............@....rsrc........p.......@..............@..@.reloc...6.......8...B..............@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):7303
                      Entropy (8bit):7.827464019436164
                      Encrypted:false
                      SSDEEP:192:b8yxqckNOgKtcKdAOs/GOR9nDyoQCl1xdjGTlD/uzcV/:bbx9bSKoHDyoQClExGi/
                      MD5:BDFA0CCB43714B182B9EEE4A0CF0DC9A
                      SHA1:14AE738BC83FE1004B9879F3BD72100E74E215C1
                      SHA-256:ED334BA309B7DC4EB164B135E6EC95AC270767C528C7AB649B2AC8FD7EC5C8CA
                      SHA-512:3925369D595CEC2693421FACDBDD76562AD75A56E74C87B41303944A85BECD22A133D3921B02E420E75D63D18953E278E18FB8E4A3CE0CD3FF6F5C7BE516ABC3
                      Malicious:false
                      Preview:GIF89a.....................xi~................................+5.MV.JU..(.'=.J].....!.3K.AW...)..+..5.8Q.C].DZ.Pg.CU.Zm.Vh.aq.`h.....3../..<..<..D.&L.$G.-Q.3V.:\.5R.>`.Dd.Hg.Ii.Ii.Ki.Kk.Lh.Mk.Ro.Sq.[v.e..w..p..}..t..v.....@d.Ae.Eh.Gk.Gi.Gh.Gk.Im.Ik.Im.Ik.Ko.Km.Kk.Lm.Nn.Or.Rs.Ut.Vx.]|.Zw.k..`x....Ek.Lp.Jo.b.....e..m..{......z................................................................D.......M...Y....Y..e.5..L.h......2..=..G.Y..i........u..z..|..~.....w..*.5..A..@.G.G..V.Q.._.P..o.f..u..u..{......w..v..{............#.~%..+..2..3..9..>.9.=..B..D..D..E..G..G..G.C..I..I.A..L..L..Q..R..V..T..[..c..g..m..s....`...u.q..k...4..B.{5..F..G..I..I..J..K..K..K..N..S..V..[.zO..{....u.........B..M....c.....................................!.......,...............H......*\......z4.H.........c.. C...0...?*`.@....Cp.....`..Sf.._........C..P../.0H@J..B..Vty...V..:../*..]..k..;....A-.0..h.../.0..KX.[.0b...$H..E.K..E....t..C...CO..C.i.@..H.9....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with very long lines (381), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11977
                      Entropy (8bit):5.193366025833501
                      Encrypted:false
                      SSDEEP:192:kVsDIzjpambe4Ec4h25Uw4aCqtYoqy2qoglZQtpYGTmpo/8pWV9:qtq4Ec4hUr4aLYoqUCX
                      MD5:1A82547F921A171DCF86F23191BFD318
                      SHA1:1CBE6268FC5FFE12A4A707205D0FCC64866A7236
                      SHA-256:E4BD06AA60D4577B6AA586E05EDB9D5B1250599C01C1140C6D88B614B9A0E103
                      SHA-512:420651FDEFF17D16307E875CDD632B5CB7ED54E588BFB8D870AB43BC2E4B402913BE748334D431D5CC9F8663F6C680470E71E6BED297623560F09856E2BFDBEE
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>OpenMovement Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.js"></script> ...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......function fillValues()...{....va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3527
                      Entropy (8bit):7.81337128585813
                      Encrypted:false
                      SSDEEP:96:9Ss5YRxkYjabEg39Q5aS4iJ7fPWdSfCwIc31:9Ss5Yrjaob5/VJr+k9
                      MD5:CED13F367E9FDF9CB2045DDBFC606D6B
                      SHA1:7C872ABCF649631BA513C43621605610D9125E95
                      SHA-256:27BC1E463A8F3FD3C193CC5E91A463C356E39D5E81EE45FEDC54BB070B5FC895
                      SHA-512:D2F7A6FBE8AD134F2073AEB76BDBF4D06922193275F72CE8DD6288EE026E7EF66410377FEF45F22355A70FCCFBE198379F1D55C4BA5D041DE96CA088B0BBAD0D
                      Malicious:false
                      Preview:.PNG........IHDR...@...@......iq.... cHRM..z%..............u0...`..:....o._.F....bKGD.......C......pHYs.................vpAg...@...@....`....IDATx...k%wv.?.G..}..j..v.3....!.3a..`<.U..&.@.*.@.!x.E...l.....<..6.......n...-..V..nK.U../...RU....d ...z.U.|..T..&4..MhB...&....I.|..g.q.....E.R..B...!PJ....:q..{.....Zks.Zk.R...xzz...\.~.W_}.O>..w. .Sc.o.V.Ave.>N@..+{}..Y9..Z..`./..w...>.h.Z.....>@)..`0..(.^.>..XQ.Ya.pZ.....,......m..Mk..B......-.S.....O..jS.....g.b.......5..@.....B(.(..8..1f.Z..Q.-.q<..t.. ...d.y.....K.v..crfj.AJ9. ...>_....U^..&ss/...,.Q....Xk.t:...ju.T..!..p^.QsB....*. ...c,R..69.x..f...Zbq.......H..!..!.V....!.y...Honn6...Og......oY..8..u.."E..D..k.V:.....0U.>q._|H..36..+....8..^..c..s.....L....@DQtz...Y...f....{<....._..S.+ ....%..P.....[..l............\..>..\|.,.\Fk.c........8...(...$.._1.~....$.}.8..8....=juK.|...-..9......\Xy..2S.@Yp~f.\`.A.s.....G4.^......WQ,.S,,>......wx.w.s.....0...8N.g. [m.+,.h.a._x..[4[..Gq....R(3
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1031
                      Entropy (8bit):4.980312923623659
                      Encrypted:false
                      SSDEEP:24:qTLjdsRyeK94A/4VqEQVC/YFTszIRuXgigDDNNjjjvTpxFK8:ELZsRyD9T/4Vqp4AFMouXrYNRjjvTnFb
                      MD5:75220D8A8A097043744CC0C7DAE8A059
                      SHA1:54BFEF1EEA080EF3343A84FE907462152EA16920
                      SHA-256:FF7421F04B2E7E6BC63F319C14D72D9579997E7B0D0E2531998BB8720B629C1B
                      SHA-512:F543E061AFF30C5156F79E7DD1AA3404EE6D7F80915746B9BDF87A99FF9084D04794487EF5043A89014833A79A048E2EC30F2F2FAC893D49C1675D5D1CDF3F18
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>cwa-convert.exe</runFilePath>...<htmlFilePath>cwa-convert.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>cwa-convert.ico</iconName>...<description>Converts binary .cwa files to application-friendly formats. Current version supports specifying a time-slice via the data preview pane. Optional output streams (battery, light, temperature). Multiple timestamp formats available.</description>...<fileName>Convert_CWA</fileName>...<readableName>Convert CWA</readableName>...<outputFile>.csv .wav .raw</outputFile>...<inputFile>.cwa</inputFile>...<wantMetadata>true</wantMetadata>...<outputExtensions>....<extension>csv</extension>....<extension>wav</extension>....<extension>raw</extension>...</outputExtensions>...<defaultValues>....<fileStart>fileStart</fileStart>....<fileEnd>fileEnd</fileEnd>...</defaultValues>...<createsOutput>
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):29667
                      Entropy (8bit):7.9824063070829325
                      Encrypted:false
                      SSDEEP:768:a35VJEyIjCSfZCM+E0CrmlvyX9bHUQzSUNB:cEfj3t+oCxy9gsn
                      MD5:E2750427F8F660E4A6C36328AC604037
                      SHA1:67C00EF19383B9D55D403B6955A3D9FE2424A830
                      SHA-256:1DA61C3C2417EED94DDA50EDC9809DBF1A81DEF8F8EEB1C577DA6D23B7327ABB
                      SHA-512:C4FBC6895D60A661ECA3EEBF9CE93FB62F95D2AEBC281D9C8FA673E71F7541C64DBC1FC7DF661ABB9704473760DC31C42183583B873D774E01847D04BA395B94
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 270 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):10675
                      Entropy (8bit):7.855792547882974
                      Encrypted:false
                      SSDEEP:192:QSDS0tKg9E05TV3AhGhrR2ER422yJGMSfGsxKhe:3JXE05/2ER3tSfGEEe
                      MD5:6622F06BA0239A047BA5F75DE1E40935
                      SHA1:CBBD0EBE6B97427789888EC9826490687B6705B2
                      SHA-256:2B16813F80DEF0F4569B88FDE041FA58BCE96C24221436E994EE265801BF225D
                      SHA-512:D7693BFBE7A5311D375EC8D6920D411F5FC0FFE63E3FF33F50526F095C986B33AA494060D0661EBC359C408DDEBEABC5484E3EFF79DB944563A1D0FDE7B499F1
                      Malicious:false
                      Preview:.PNG........IHDR.............ZF......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 787 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):4140
                      Entropy (8bit):5.514702010098084
                      Encrypted:false
                      SSDEEP:96:NxQY9fW/9RIAAssrTAdZR2zqq11AAssKAxaWsYecssHGGmqq11AAsssHGmqqq11r:NxU/DIAAss+ZR2zqq11AAssKAxaW1ss6
                      MD5:C2E958A624B5FABD241277E3E693F4A2
                      SHA1:BC3C845E83FB79EC5331090E3E634CC69F3E2B6A
                      SHA-256:81C38EBE8D0C41BDCEBD42CD7A09F8537C1B0BD8131019C7C885ABBE94AEAA39
                      SHA-512:2FAAE2695C6DD4386C0BD690364B54BD2E9F464BAFDECF05FD69E693941CD25BBD25A044827154308A8E39080AA2712D2451B34C6077229718FAF90D729FE33D
                      Malicious:false
                      Preview:.PNG........IHDR..............z.2....tEXtSoftware.Adobe ImageReadyq.e<...fiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E" xmpMM:DocumentID="xmp.did:D6A421B3609B11E2AFD8AC757B891629" xmpMM:InstanceID="xmp.iid:D6A421B2609B11E2AFD8AC757B891629" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:A74E67B6215FE211AC06F9441A82FEFD" stRef:documentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..A....\IDATx....m.P.E...M..'t....=R.d.)....>..|>.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 309 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11142
                      Entropy (8bit):7.861240065287498
                      Encrypted:false
                      SSDEEP:192:WSDS0tKg9E05TevtvtvcApAc/oOv7H14UyaNsbpubpApApz/MKopuTPf+lPBXqvS:5JXE05C11OkSvaNsbhpuTPfSPg11Z11I
                      MD5:B71602511773A60551F70AA9BC6049DE
                      SHA1:D3EFDB13568ACD0AF71743B9CA24F7B3E3D0ABD3
                      SHA-256:A1E56FB8C8357790AD47FD5A88C61148CF5F90E8586917F22EC3745B5069B503
                      SHA-512:B7A1433310BCEA55234A64D9F2BBA5612BB0CFF1832490A7BF7CB604747030A3759F92CC121A5BFD1CD1AAAFE324C9183890CC9CDE74F6B070F8628DE3A5FDEE
                      Malicious:false
                      Preview:.PNG........IHDR...5..........Ugd....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3829
                      Entropy (8bit):7.9044616542640895
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTCaFhlF27faJPeDVjj:/SDS0tKg9E05TTF2fCPcVjj
                      MD5:E68A8E1C7F662733E05A9E19170BB9DA
                      SHA1:7F54242A562B045DCEC592D42ABCA3C0CE684163
                      SHA-256:62EEA2930A491164035CE649F74F9A726374BB206C3CC51872F0EBE312C178DD
                      SHA-512:507C83791E4C4623396AE8143502D574600D2D1974087312C42D901ED744FA41F34366D31586C441B23A28CF3E68710C51244DB4B9ADA4014016E70BE743ECAF
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 233 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3665
                      Entropy (8bit):7.900185350830456
                      Encrypted:false
                      SSDEEP:96:tSDZ/I09Da01l+gmkyTt6Hk8nTWRi4KxpbF1b:tSDS0tKg9E05TWRipbF1b
                      MD5:431CAB7131EB26A7694DFDCE34ACDD8D
                      SHA1:7081BAD951A7C71DF8D630AE550F6E1C52654FDE
                      SHA-256:CC097EB188ED451F866F863A96C93B8B717EDB0D2C443C5AC0EDC8D6A74C8738
                      SHA-512:18515EF1F5CFC6F285C0E7C21383C21B8A419A75FE050529531636CF2EB1B58C78344EE7DDC896A065EB73044A4D531223E2EA6C4862EDA209B4C1B3427F9111
                      Malicious:false
                      Preview:.PNG........IHDR.......g......eK....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 815 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4880
                      Entropy (8bit):7.84900618092586
                      Encrypted:false
                      SSDEEP:96:USDZ/I09Da01l+gmkyTt6Hk8nT8VcdaI9R8nG5dNG:USDS0tKg9E05T8lER8G1G
                      MD5:A94D4D23AC6EA1919A7F5F19E99EDA99
                      SHA1:EAC2FFD53CEFEAAF7BBAE0CAF8A65DCECEB0B6DD
                      SHA-256:B3E58EE57FDBE008453B6E2D7F75A448754A99754D57FFFF9A8F02A020DB00FF
                      SHA-512:028C38AB9D20AFC278C6E7BD6918483E9A42AE4BB55331310E74CABF65AA59753E191478EF348C8991A9E72FA858AA5FA4198D87791537A0EC5752955964CF0F
                      Malicious:false
                      Preview:.PNG........IHDR.../...g.......}.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 390, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2924
                      Entropy (8bit):7.875020015401922
                      Encrypted:false
                      SSDEEP:48:p/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODezW:pSDZ/I09Da01l+gmkyTt6Hk8nTGW
                      MD5:32E42A30831D0CCB44FF3C23F84D69FA
                      SHA1:D5B884320A01E5C51E190FDD6E6ED1C8DBEEA7CE
                      SHA-256:22C91ADA2FCF30B9CB358FF18347B7EFD79A5BA3F2AE3C24FD6B0FE9BD851E69
                      SHA-512:BAA928F9B5E51885332B4BAED3C4CB0E6596422736E10600B817ACE0B3C1C3FB39DC16E0EAE70DC95F4EE8134643F8126BD7B43E418C34B79E56C064B9BDCEDA
                      Malicious:false
                      Preview:.PNG........IHDR.............5.|.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 2 x 1000, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3297
                      Entropy (8bit):7.890112387496165
                      Encrypted:false
                      SSDEEP:96:dSDZ/I09Da01l+gmkyTt6Hk8nTDBdUEF5vczDo:dSDS0tKg9E05T3UE50g
                      MD5:A4AB2D64E4DC771743B6293E303A1B60
                      SHA1:883845E2D570FAFFE095D27940F9C081213665D9
                      SHA-256:75499938CFBE25364B01DBCF686371BB2EB0ABEFB4AAEA2BB9EB8357B9140FA0
                      SHA-512:DDC4098359F452FFFEBCF793597E1BA31AC9254ECE2BFD898BFD35236F342677A8436669AEB9F2F02EB8CDACDD9946052EB47FCEC3C61C50FD506D51059CA9C7
                      Malicious:false
                      Preview:.PNG........IHDR............../]....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 871 x 14, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4635
                      Entropy (8bit):7.912550011635644
                      Encrypted:false
                      SSDEEP:96:qSDZ/I09Da01l+gmkyTt6Hk8nTilrjaHqiwp/9p3x:qSDS0tKg9E05Ti9jRVn
                      MD5:490AB873EE03CA84F9D3DAB627B687EE
                      SHA1:72EE8D63AC23FF7E01CE0512A3A04682B7B70A7A
                      SHA-256:52B69E251F97C56B71B337A20086E99BB9C2F6538FDF9E7E531F97D9ED273672
                      SHA-512:1E05174427162C75DE38FD27E0E8698A426646B1452A596BE54C6D466EBA9CF0A50BC4F744F027192EBBBE1BDCDCEE52C55AB990F7D3D212869DF6FFE2289CD7
                      Malicious:false
                      Preview:.PNG........IHDR...g..........Xdj....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4500
                      Entropy (8bit):7.923978058897863
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTvkQZlXRrwPgZVxV6bMY:/SDS0tKg9E05TvkQZlXxwIZVx0bMY
                      MD5:009F1D5F8EF77487A8A0043816C4C995
                      SHA1:D816A6017D610A005798FAE6B8139E2BC6006381
                      SHA-256:C5F8B401CF15110E9EB4EC9EF28EC577A4A9A49F5744A0451D0E25F90B64467C
                      SHA-512:88112FA3A1B44C8382B1CDAA9CEF69ED6DE83A50F190E9A55EF28B6B2C11AE3F6BB7C9B9E94E9E1F4999E8259A4B5F217F35BF043F22443713BBA16C9F51E3F2
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):8777
                      Entropy (8bit):7.923998391913574
                      Encrypted:false
                      SSDEEP:192:41MFu/STZChMGLw/LtI30ukSCeQm9F+xZdqdfQpTTTIyQY7thi7uWB:iMdZ/GLILBmWEiTTTIyQY5hi71
                      MD5:9BBC6E9602998A385C2EA13DF56470FD
                      SHA1:A25C4705320FD63C33790E666872910E702B9BF6
                      SHA-256:F0E0D95A9C8ABCDFABF46348E2D4285829BB0491F5F6AF0E05AF52BFFB6324C4
                      SHA-512:47853ECE55B43CB9CC33C8BBFAABF407389565A0FC1FD042FAC502EA96784B4CFC985EA536622843EF7FAB76AD503157C927BB57332D970AF9B3F092E4C9D5D8
                      Malicious:false
                      Preview:.PNG........IHDR...............{....PLTE........................mmm.................................................................................................................................................................ttt.........................bbb..................................................................eeeggg.....................................xxx...........................................................................................................................................................................................................................................................................................UUU...............................................................................................rO.....tRNS........#.._../.........o.S..?.....C..kD....O.S._........6..>4!~a..@1.._'o..n.....M...3.BQj..p&%!.l.."Xqr;... A[.<`.am}4.3/0I...PCM!6(*gK&YQ.GDP,..`.{.VP.-..x.)h.7.e1]...W..$..1..b.zS.c.O..].....U.;Zi<N#..).86pV.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit gray+alpha, non-interlaced
                      Category:dropped
                      Size (bytes):12799
                      Entropy (8bit):7.954371008999522
                      Encrypted:false
                      SSDEEP:192:CDrgTE80fO3w9Gw/gMmhqb/KEliZ5pjSWw5JTfvJRbNn1tgbn+qFynb21kt1kIhL:CfAc9GugMIQRl65AJzp1aoFt1gk
                      MD5:2516339970D710819585F90773AEBE0A
                      SHA1:84F613631B07D4FE22ACBAB50E551C0FE04BD78B
                      SHA-256:D99E3FA32C641032F08149914B28C2DC6ACF2EC62F70987F2259EABBFA7FC0DE
                      SHA-512:E1BB0066E619679B880F43E85C3367C57CD13411AB012A67E429B21E7FF80A1A5B8F1EB5BFAC4CC272EB2BB606341182E91FF1CF7D59CF8BD811D98EAFD71D5C
                      Malicious:false
                      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..1.IDATx..}ml\E..W..^..D$|n.w'..;v...8.m0..k<f.8....<.h3$.. ...b,mn.... ........0...L Y`6s'.>...Q.........S......n.S.V.;1K.G...s...>Uo...TU.1c..Yu...c..a&...#C,p.....>k.......U.LW..-s.n.3V.q..~N....o...c...I.~L.....{..-....H8%_..M..w.B..6EW..,.p.......Y...2+.(Y....@..&..A./.......3kX.h....-.a.....A....<>P...'\...J.;(.}.#..Qz......:4..%m?nf.ntK*.....l.9J...+.D..I..Yu1Y...Z^..(.]YYE..f@......lX..z].U.t......u...&..5-P...W.}..@t.|.#L..Y..=..s.......,w#.+.R.+.?..a.x...X.0.."..ea).t.G...*.wV..w..V^...rf%xB.(.q..4>....W.G.#...lW.U<......XJV...l.....R...$k.DVr.I....7:.X<.s>%X.1...N..Ez....w...;y..9.z.9.O.%.~..~..u....*.=.....I..x.c.y}....Y(...o....u..N$.^..j......e\..iX...]..;Y-.r........&..>.!..zl.Y.aVHVN..9=..]..=.......mR..M......d...OU.C..J.UiT.}r.W...W'....u..).......F"YU.#..P......&......R.O....wyz..m..$...O.....s? +^.FT.....I.E.q.%..&.....~..>.M...}]......w..A...?.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 390, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):117264
                      Entropy (8bit):7.985263256233834
                      Encrypted:false
                      SSDEEP:1536:YtYlb2phWm3koaEMEYkgaV1zqVj8djBOqPl8s8lW0Yo7M3R4ZQ7higKwTIKuz1Md:E3TTWfkgYhqV2sqt8nW0Yo7+RYgwywk
                      MD5:07C120F2FD1D279B30068C00AE5DC4EE
                      SHA1:FB8F3101EDB6D41B6BEAAFDA7B6FCE100CA3E2C9
                      SHA-256:0D13B0049DB8639F203B8A5DA7E4E8BFFCDE518CA0E87C6435C4293177AB5867
                      SHA-512:BA62884DF4959FFFD26179047A16A1229098B6F7C37A6D735AD7942116D9AC7562B593875AF84C5726BFF80E9D91758DA52AEC07ED16CF2A0BC25CE57CB0D41E
                      Malicious:false
                      Preview:.PNG........IHDR..............6.X....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 250 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10489
                      Entropy (8bit):7.965741081358159
                      Encrypted:false
                      SSDEEP:192:ASDS0tKg9E05Tantmof5IQV5UQbl/Ewe8k4vtX93UpauhqTNf1rPJf:nJXE05SthXRdEwWEVhKDar5
                      MD5:6223ACD59C394F90D91F29CE41D70D83
                      SHA1:061609B97F9027A00D5607C71041F77F4B62D458
                      SHA-256:9F4ABA4B940439681C0499349F3BE94642C858FA548E152EBA13A107F8FDA772
                      SHA-512:7BB4039670205454920DC3B2904F63A10E1A73FC8C0F02F4013619883A56A662E30F9232C7AB2B6891628F48BAED2DA7497B11C9FDEBD55DCE6381CB44D7EEB5
                      Malicious:false
                      Preview:.PNG........IHDR.......g.....)._.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 372, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22359
                      Entropy (8bit):7.7127315592693435
                      Encrypted:false
                      SSDEEP:384:QJXE05wJf+JX2w/e6iAWO9cDrMac3OkjlCqoPusVN3hIITl3rM3idF539dpXCxRT:M354o2w/e6iAfe/Ds7oPusL3hrTl3XZg
                      MD5:931C86E8F1199B0F9E0F260E8D92E1F2
                      SHA1:9A3DE2269005DCBFE6D420F522D2D72485B1D78B
                      SHA-256:F79B831CBE2D4F37D5C6839513C9F8DA481CE6D463AFEECD77D72E36ECF85477
                      SHA-512:47DF3058C52FFDE61B6B0C6AC721B0AD29A84805B6693DFC311DD1241AB43B6943B4BBA6D42D7554278582405A2AC55482FC4A69D01C87C31932354CC3702C59
                      Malicious:false
                      Preview:.PNG........IHDR.......t......lnJ....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 106, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2852
                      Entropy (8bit):7.867842123870298
                      Encrypted:false
                      SSDEEP:48:J/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODK0:JSDZ/I09Da01l+gmkyTt6Hk8nTX
                      MD5:AD8AB8C5E19A7B24E060E9C6B4A8C13D
                      SHA1:3553B00745DB1BC65E8AD0A224BBC49ECCEECA6F
                      SHA-256:117BD3E359D760CB12B5B3F6865FA125A801269523A851542989D91413DC7A3E
                      SHA-512:1CD55120C2761ECF272466B6A2E4A9568A891D209ECDF5FA5EEA5307D4DB7105898F31C2C680C621657DF7CDB2F38D606CA13684184B3A301F2166329401878D
                      Malicious:false
                      Preview:.PNG........IHDR.......j......D.G....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 1100, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):29493
                      Entropy (8bit):7.392034002277657
                      Encrypted:false
                      SSDEEP:768:s35g9ZhweCCYKdYk1oMnG9GZNYlKU/KNs:dZFdYKYEoMnG9GZl0Ki
                      MD5:12CAD92A07320280831AC634DEAE61FE
                      SHA1:D0F827A47195F5D252F865B1E1E5A75367537027
                      SHA-256:0D1C39FD6E82E138B9EEE5B7650A552C9ACBA2F39A6F17F987441CD7AF853E02
                      SHA-512:29DFE8D6D9508E7E9698FAD768208526C1BDB2E5A1C0197D3989FA63BD7F44FB6071C7486CEED15FF87B86E0532643CE08A29B365EECB9FBA30033ED7EBBC5CF
                      Malicious:false
                      Preview:.PNG........IHDR...V...L......a_.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):8777
                      Entropy (8bit):7.923998391913574
                      Encrypted:false
                      SSDEEP:192:41MFu/STZChMGLw/LtI30ukSCeQm9F+xZdqdfQpTTTIyQY7thi7uWB:iMdZ/GLILBmWEiTTTIyQY5hi71
                      MD5:9BBC6E9602998A385C2EA13DF56470FD
                      SHA1:A25C4705320FD63C33790E666872910E702B9BF6
                      SHA-256:F0E0D95A9C8ABCDFABF46348E2D4285829BB0491F5F6AF0E05AF52BFFB6324C4
                      SHA-512:47853ECE55B43CB9CC33C8BBFAABF407389565A0FC1FD042FAC502EA96784B4CFC985EA536622843EF7FAB76AD503157C927BB57332D970AF9B3F092E4C9D5D8
                      Malicious:false
                      Preview:.PNG........IHDR...............{....PLTE........................mmm.................................................................................................................................................................ttt.........................bbb..................................................................eeeggg.....................................xxx...........................................................................................................................................................................................................................................................................................UUU...............................................................................................rO.....tRNS........#.._../.........o.S..?.....C..kD....O.S._........6..>4!~a..@1.._'o..n.....M...3.BQj..p&%!.l.."Xqr;... A[.<`.am}4.3/0I...PCM!6(*gK&YQ.GDP,..`.{.VP.-..x.)h.7.e1]...W..$..1..b.zS.c.O..].....U.;Zi<N#..).86pV.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4500
                      Entropy (8bit):7.923978058897863
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTvkQZlXRrwPgZVxV6bMY:/SDS0tKg9E05TvkQZlXxwIZVx0bMY
                      MD5:009F1D5F8EF77487A8A0043816C4C995
                      SHA1:D816A6017D610A005798FAE6B8139E2BC6006381
                      SHA-256:C5F8B401CF15110E9EB4EC9EF28EC577A4A9A49F5744A0451D0E25F90B64467C
                      SHA-512:88112FA3A1B44C8382B1CDAA9CEF69ED6DE83A50F190E9A55EF28B6B2C11AE3F6BB7C9B9E94E9E1F4999E8259A4B5F217F35BF043F22443713BBA16C9F51E3F2
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 301 x 55, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):7621
                      Entropy (8bit):7.950162226593725
                      Encrypted:false
                      SSDEEP:192:/SDS0tKg9E05TLoQjvrVJ401yyFFuKacEsBK:qJXE05v3BuyyYFFEAK
                      MD5:805B09E6CFFE2948E891319A5329B03B
                      SHA1:C402A1E1C5C2C839E9E3AE444D452D6EBCFA863C
                      SHA-256:E52721BF4652B39B3D017E26866E86320B76DC358214B157D86B3DC58334750B
                      SHA-512:A23AC19A36D67242FF944B463A1B9695C4B6DE8362B3328A88E7E05DE812C3AAAD8E4D698E2CAEE6ADA0EB0BAB1F287248FF4C31CA80BBD2718FD5103179699B
                      Malicious:false
                      Preview:.PNG........IHDR...-...7.....Y.......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 815 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4880
                      Entropy (8bit):7.84900618092586
                      Encrypted:false
                      SSDEEP:96:USDZ/I09Da01l+gmkyTt6Hk8nT8VcdaI9R8nG5dNG:USDS0tKg9E05T8lER8G1G
                      MD5:A94D4D23AC6EA1919A7F5F19E99EDA99
                      SHA1:EAC2FFD53CEFEAAF7BBAE0CAF8A65DCECEB0B6DD
                      SHA-256:B3E58EE57FDBE008453B6E2D7F75A448754A99754D57FFFF9A8F02A020DB00FF
                      SHA-512:028C38AB9D20AFC278C6E7BD6918483E9A42AE4BB55331310E74CABF65AA59753E191478EF348C8991A9E72FA858AA5FA4198D87791537A0EC5752955964CF0F
                      Malicious:false
                      Preview:.PNG........IHDR.../...g.......}.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4680
                      Entropy (8bit):7.929050221960049
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nT7XTm4V+UuyvTh1PUJY:/SDS0tKg9E05T7XTm8puyv1yJY
                      MD5:69E0B7D8FAA49E5AD1A57D910A990C14
                      SHA1:F6205CF0A72590EB48F1311C1A51623D054FA2AC
                      SHA-256:96786E42B70A880F83143FF0D952354DE30B9B51B0F28D36381E49D7ADFE3464
                      SHA-512:5936D03CC1CC302497A955F1388EEC3C73BBE12B42CAF124A5D0EA0808B67AD7E84C71D3BF06E0AF12E7AA56976CBC1ED1DCF25E6236FB88E0F962243604D0C5
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 372, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22359
                      Entropy (8bit):7.7127315592693435
                      Encrypted:false
                      SSDEEP:384:QJXE05wJf+JX2w/e6iAWO9cDrMac3OkjlCqoPusVN3hIITl3rM3idF539dpXCxRT:M354o2w/e6iAfe/Ds7oPusL3hrTl3XZg
                      MD5:931C86E8F1199B0F9E0F260E8D92E1F2
                      SHA1:9A3DE2269005DCBFE6D420F522D2D72485B1D78B
                      SHA-256:F79B831CBE2D4F37D5C6839513C9F8DA481CE6D463AFEECD77D72E36ECF85477
                      SHA-512:47DF3058C52FFDE61B6B0C6AC721B0AD29A84805B6693DFC311DD1241AB43B6943B4BBA6D42D7554278582405A2AC55482FC4A69D01C87C31932354CC3702C59
                      Malicious:false
                      Preview:.PNG........IHDR.......t......lnJ....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 309 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11142
                      Entropy (8bit):7.861240065287498
                      Encrypted:false
                      SSDEEP:192:WSDS0tKg9E05TevtvtvcApAc/oOv7H14UyaNsbpubpApApz/MKopuTPf+lPBXqvS:5JXE05C11OkSvaNsbhpuTPfSPg11Z11I
                      MD5:B71602511773A60551F70AA9BC6049DE
                      SHA1:D3EFDB13568ACD0AF71743B9CA24F7B3E3D0ABD3
                      SHA-256:A1E56FB8C8357790AD47FD5A88C61148CF5F90E8586917F22EC3745B5069B503
                      SHA-512:B7A1433310BCEA55234A64D9F2BBA5612BB0CFF1832490A7BF7CB604747030A3759F92CC121A5BFD1CD1AAAFE324C9183890CC9CDE74F6B070F8628DE3A5FDEE
                      Malicious:false
                      Preview:.PNG........IHDR...5..........Ugd....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 270 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):10675
                      Entropy (8bit):7.855792547882974
                      Encrypted:false
                      SSDEEP:192:QSDS0tKg9E05TV3AhGhrR2ER422yJGMSfGsxKhe:3JXE05/2ER3tSfGEEe
                      MD5:6622F06BA0239A047BA5F75DE1E40935
                      SHA1:CBBD0EBE6B97427789888EC9826490687B6705B2
                      SHA-256:2B16813F80DEF0F4569B88FDE041FA58BCE96C24221436E994EE265801BF225D
                      SHA-512:D7693BFBE7A5311D375EC8D6920D411F5FC0FFE63E3FF33F50526F095C986B33AA494060D0661EBC359C408DDEBEABC5484E3EFF79DB944563A1D0FDE7B499F1
                      Malicious:false
                      Preview:.PNG........IHDR.............ZF......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4700
                      Entropy (8bit):7.921737244447786
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTz1fGKp/56ylQ4k5QqkchRUtWvfK9:/SDS0tKg9E05TZVpR64XnfOK9
                      MD5:417EC14380DFA07363B746B85CAD5BCF
                      SHA1:2E3605AEAFF77E9B82BA6E36081DFF575D72C1B3
                      SHA-256:29346EF5C0DAEE9E69313CDE4AD321099E806B2A787AF225D84A758C4052C631
                      SHA-512:F2677219735E6302C4390811B167A61721562FF76918A885DFE6D97DB9DA6D618FC98D277408876FD9A03F11CB5B3EB79F80C58650ED78A5EBB2F2460ECE1092
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 250 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10489
                      Entropy (8bit):7.965741081358159
                      Encrypted:false
                      SSDEEP:192:ASDS0tKg9E05Tantmof5IQV5UQbl/Ewe8k4vtX93UpauhqTNf1rPJf:nJXE05SthXRdEwWEVhKDar5
                      MD5:6223ACD59C394F90D91F29CE41D70D83
                      SHA1:061609B97F9027A00D5607C71041F77F4B62D458
                      SHA-256:9F4ABA4B940439681C0499349F3BE94642C858FA548E152EBA13A107F8FDA772
                      SHA-512:7BB4039670205454920DC3B2904F63A10E1A73FC8C0F02F4013619883A56A662E30F9232C7AB2B6891628F48BAED2DA7497B11C9FDEBD55DCE6381CB44D7EEB5
                      Malicious:false
                      Preview:.PNG........IHDR.......g.....)._.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):29667
                      Entropy (8bit):7.9824063070829325
                      Encrypted:false
                      SSDEEP:768:a35VJEyIjCSfZCM+E0CrmlvyX9bHUQzSUNB:cEfj3t+oCxy9gsn
                      MD5:E2750427F8F660E4A6C36328AC604037
                      SHA1:67C00EF19383B9D55D403B6955A3D9FE2424A830
                      SHA-256:1DA61C3C2417EED94DDA50EDC9809DBF1A81DEF8F8EEB1C577DA6D23B7327ABB
                      SHA-512:C4FBC6895D60A661ECA3EEBF9CE93FB62F95D2AEBC281D9C8FA673E71F7541C64DBC1FC7DF661ABB9704473760DC31C42183583B873D774E01847D04BA395B94
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3829
                      Entropy (8bit):7.9044616542640895
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTCaFhlF27faJPeDVjj:/SDS0tKg9E05TTF2fCPcVjj
                      MD5:E68A8E1C7F662733E05A9E19170BB9DA
                      SHA1:7F54242A562B045DCEC592D42ABCA3C0CE684163
                      SHA-256:62EEA2930A491164035CE649F74F9A726374BB206C3CC51872F0EBE312C178DD
                      SHA-512:507C83791E4C4623396AE8143502D574600D2D1974087312C42D901ED744FA41F34366D31586C441B23A28CF3E68710C51244DB4B9ADA4014016E70BE743ECAF
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 390, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2924
                      Entropy (8bit):7.875020015401922
                      Encrypted:false
                      SSDEEP:48:p/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODezW:pSDZ/I09Da01l+gmkyTt6Hk8nTGW
                      MD5:32E42A30831D0CCB44FF3C23F84D69FA
                      SHA1:D5B884320A01E5C51E190FDD6E6ED1C8DBEEA7CE
                      SHA-256:22C91ADA2FCF30B9CB358FF18347B7EFD79A5BA3F2AE3C24FD6B0FE9BD851E69
                      SHA-512:BAA928F9B5E51885332B4BAED3C4CB0E6596422736E10600B817ACE0B3C1C3FB39DC16E0EAE70DC95F4EE8134643F8126BD7B43E418C34B79E56C064B9BDCEDA
                      Malicious:false
                      Preview:.PNG........IHDR.............5.|.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 390, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):117264
                      Entropy (8bit):7.985263256233834
                      Encrypted:false
                      SSDEEP:1536:YtYlb2phWm3koaEMEYkgaV1zqVj8djBOqPl8s8lW0Yo7M3R4ZQ7higKwTIKuz1Md:E3TTWfkgYhqV2sqt8nW0Yo7+RYgwywk
                      MD5:07C120F2FD1D279B30068C00AE5DC4EE
                      SHA1:FB8F3101EDB6D41B6BEAAFDA7B6FCE100CA3E2C9
                      SHA-256:0D13B0049DB8639F203B8A5DA7E4E8BFFCDE518CA0E87C6435C4293177AB5867
                      SHA-512:BA62884DF4959FFFD26179047A16A1229098B6F7C37A6D735AD7942116D9AC7562B593875AF84C5726BFF80E9D91758DA52AEC07ED16CF2A0BC25CE57CB0D41E
                      Malicious:false
                      Preview:.PNG........IHDR..............6.X....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 106, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2852
                      Entropy (8bit):7.867842123870298
                      Encrypted:false
                      SSDEEP:48:J/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODK0:JSDZ/I09Da01l+gmkyTt6Hk8nTX
                      MD5:AD8AB8C5E19A7B24E060E9C6B4A8C13D
                      SHA1:3553B00745DB1BC65E8AD0A224BBC49ECCEECA6F
                      SHA-256:117BD3E359D760CB12B5B3F6865FA125A801269523A851542989D91413DC7A3E
                      SHA-512:1CD55120C2761ECF272466B6A2E4A9568A891D209ECDF5FA5EEA5307D4DB7105898F31C2C680C621657DF7CDB2F38D606CA13684184B3A301F2166329401878D
                      Malicious:false
                      Preview:.PNG........IHDR.......j......D.G....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit gray+alpha, non-interlaced
                      Category:dropped
                      Size (bytes):12799
                      Entropy (8bit):7.954371008999522
                      Encrypted:false
                      SSDEEP:192:CDrgTE80fO3w9Gw/gMmhqb/KEliZ5pjSWw5JTfvJRbNn1tgbn+qFynb21kt1kIhL:CfAc9GugMIQRl65AJzp1aoFt1gk
                      MD5:2516339970D710819585F90773AEBE0A
                      SHA1:84F613631B07D4FE22ACBAB50E551C0FE04BD78B
                      SHA-256:D99E3FA32C641032F08149914B28C2DC6ACF2EC62F70987F2259EABBFA7FC0DE
                      SHA-512:E1BB0066E619679B880F43E85C3367C57CD13411AB012A67E429B21E7FF80A1A5B8F1EB5BFAC4CC272EB2BB606341182E91FF1CF7D59CF8BD811D98EAFD71D5C
                      Malicious:false
                      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..1.IDATx..}ml\E..W..^..D$|n.w'..;v...8.m0..k<f.8....<.h3$.. ...b,mn.... ........0...L Y`6s'.>...Q.........S......n.S.V.;1K.G...s...>Uo...TU.1c..Yu...c..a&...#C,p.....>k.......U.LW..-s.n.3V.q..~N....o...c...I.~L.....{..-....H8%_..M..w.B..6EW..,.p.......Y...2+.(Y....@..&..A./.......3kX.h....-.a.....A....<>P...'\...J.;(.}.#..Qz......:4..%m?nf.ntK*.....l.9J...+.D..I..Yu1Y...Z^..(.]YYE..f@......lX..z].U.t......u...&..5-P...W.}..@t.|.#L..Y..=..s.......,w#.+.R.+.?..a.x...X.0.."..ea).t.G...*.wV..w..V^...rf%xB.(.q..4>....W.G.#...lW.U<......XJV...l.....R...$k.DVr.I....7:.X<.s>%X.1...N..Ez....w...;y..9.z.9.O.%.~..~..u....*.=.....I..x.c.y}....Y(...o....u..N$.^..j......e\..iX...]..;Y-.r........&..>.!..zl.Y.aVHVN..9=..]..=.......mR..M......d...OU.C..J.UiT.}r.W...W'....u..).......F"YU.#..P......&......R.O....wyz..m..$...O.....s? +^.FT.....I.E.q.%..&.....~..>.M...}]......w..A...?.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):22421
                      Entropy (8bit):7.382781405693069
                      Encrypted:false
                      SSDEEP:384:cJXE050vbwtRSQniH2Zn+4GjL1rGMNKc0BCEgsFzA0u:I35LCQznsjRrGMN90QEZZA0u
                      MD5:CD3956C0B11967DE8DA88DA7C40ABD8F
                      SHA1:28B3280D98E0FAEFBEEB824F66245D53F688367D
                      SHA-256:4940060CEA6C1D1CF2B4E4F6E66DB8E30CA6452452F918B311E43915D55AA3DF
                      SHA-512:D995A7ECFA327A108DDB303864E359364B7A3FFBD10BED96DC6F2113CA850C404F54968E3B416998A26F53097D4C9DBF7B19CA90586A6C43ED533328B9AF118A
                      Malicious:false
                      Preview:.PNG........IHDR...V.........@\......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 201 x 85, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4778
                      Entropy (8bit):7.839826633357473
                      Encrypted:false
                      SSDEEP:96:/Y2CknYxpCbPe2lWy4UT2fMZal+uAl1BqQ/DPWP9lsGXRTsqP:/hb22qUT2fwPuC/7OP/BRn
                      MD5:9DC9BBECE8B76B1231348B0FD2FBDB88
                      SHA1:C8F71D7F37F6A026E602E2DA0C44E2D9E4453112
                      SHA-256:8F3956EEFD59CDD8E065C28052A7C41927EDC314539F07A38516CE0320356450
                      SHA-512:42858EE60A99621E4DE1EC6D3C3D276FB466C577ABF05191CE119EC433663740196DB22469197CE07E726212269C1696F2C970BFAEAE7AE86A343472F7B67F27
                      Malicious:false
                      Preview:.PNG........IHDR.......U......b.=....tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:631E073F90AD11E2B467D8F586F29896" xmpMM:DocumentID="xmp.did:631E074090AD11E2B467D8F586F29896"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:631E073D90AD11E2B467D8F586F29896" stRef:documentID="xmp.did:631E073E90AD11E2B467D8F586F29896"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.EW.....IDATx..]....... .......!....a..B..I.NX.`..D.w ..e...q.AD...H.....d.(h4.$.(..D.......O.KUwuM....S.].W......
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 233 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3665
                      Entropy (8bit):7.900185350830456
                      Encrypted:false
                      SSDEEP:96:tSDZ/I09Da01l+gmkyTt6Hk8nTWRi4KxpbF1b:tSDS0tKg9E05TWRipbF1b
                      MD5:431CAB7131EB26A7694DFDCE34ACDD8D
                      SHA1:7081BAD951A7C71DF8D630AE550F6E1C52654FDE
                      SHA-256:CC097EB188ED451F866F863A96C93B8B717EDB0D2C443C5AC0EDC8D6A74C8738
                      SHA-512:18515EF1F5CFC6F285C0E7C21383C21B8A419A75FE050529531636CF2EB1B58C78344EE7DDC896A065EB73044A4D531223E2EA6C4862EDA209B4C1B3427F9111
                      Malicious:false
                      Preview:.PNG........IHDR.......g......eK....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 1100, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):29493
                      Entropy (8bit):7.392034002277657
                      Encrypted:false
                      SSDEEP:768:s35g9ZhweCCYKdYk1oMnG9GZNYlKU/KNs:dZFdYKYEoMnG9GZl0Ki
                      MD5:12CAD92A07320280831AC634DEAE61FE
                      SHA1:D0F827A47195F5D252F865B1E1E5A75367537027
                      SHA-256:0D1C39FD6E82E138B9EEE5B7650A552C9ACBA2F39A6F17F987441CD7AF853E02
                      SHA-512:29DFE8D6D9508E7E9698FAD768208526C1BDB2E5A1C0197D3989FA63BD7F44FB6071C7486CEED15FF87B86E0532643CE08A29B365EECB9FBA30033ED7EBBC5CF
                      Malicious:false
                      Preview:.PNG........IHDR...V...L......a_.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4472
                      Entropy (8bit):7.920666209153228
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nT1f7miiCi6BgEkvmfwXh/so3t6H:/SDS0tKg9E05T1Siit0wXmoC
                      MD5:F4ABDED60BBDC1A7F80B1AE87558087D
                      SHA1:8118D40BE94EE3105AD06704F14697D6F4FB71F7
                      SHA-256:ACBCEA1C5EC39151D6EFF46446B3658F74A57E920C83F0CCC4345B0E4825F501
                      SHA-512:54CAE30E9D72908476FCDB9A2FFA5B878EFB923A6DC72F1A6C740965CE2E652386DF11A20B83281363ED104A4A10D79EAAE4FF662EB76E4153FAEB176620AA66
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 2 x 1000, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3297
                      Entropy (8bit):7.890112387496165
                      Encrypted:false
                      SSDEEP:96:dSDZ/I09Da01l+gmkyTt6Hk8nTDBdUEF5vczDo:dSDS0tKg9E05T3UE50g
                      MD5:A4AB2D64E4DC771743B6293E303A1B60
                      SHA1:883845E2D570FAFFE095D27940F9C081213665D9
                      SHA-256:75499938CFBE25364B01DBCF686371BB2EB0ABEFB4AAEA2BB9EB8357B9140FA0
                      SHA-512:DDC4098359F452FFFEBCF793597E1BA31AC9254ECE2BFD898BFD35236F342677A8436669AEB9F2F02EB8CDACDD9946052EB47FCEC3C61C50FD506D51059CA9C7
                      Malicious:false
                      Preview:.PNG........IHDR............../]....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 871 x 14, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4635
                      Entropy (8bit):7.912550011635644
                      Encrypted:false
                      SSDEEP:96:qSDZ/I09Da01l+gmkyTt6Hk8nTilrjaHqiwp/9p3x:qSDS0tKg9E05Ti9jRVn
                      MD5:490AB873EE03CA84F9D3DAB627B687EE
                      SHA1:72EE8D63AC23FF7E01CE0512A3A04682B7B70A7A
                      SHA-256:52B69E251F97C56B71B337A20086E99BB9C2F6538FDF9E7E531F97D9ED273672
                      SHA-512:1E05174427162C75DE38FD27E0E8698A426646B1452A596BE54C6D466EBA9CF0A50BC4F744F027192EBBBE1BDCDCEE52C55AB990F7D3D212869DF6FFE2289CD7
                      Malicious:false
                      Preview:.PNG........IHDR...g..........Xdj....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):28249
                      Entropy (8bit):7.985529844753195
                      Encrypted:false
                      SSDEEP:384:aJXE05uNUCFxUePGYHl4qxT9peH2I9gGM+kwRDzQpdyDDaIJyFlSqhdHY89TGpFR:a35aUC9PT9E2I9hzkw1QuDW4ZVYThcxt
                      MD5:44EB3F5893CD67857BEC32F8A05F399E
                      SHA1:FB46AFC29BB80EA55CC9E5BE676D59BAF9EBD1A0
                      SHA-256:843EEFF4CFE4F69F5EC98EEA3A76104B5224FCFADFE22A07B627872DA8E0E175
                      SHA-512:0DA6AABDEF06F05C4456E2260E744EE58C354F86182CC3FC7DBF2568F85BA4A79C7C304D087879BF3B32F1DEF6B6BBA58CF8978C0FCCDE0CC4EADD72CF840403
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 787 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):4140
                      Entropy (8bit):5.514702010098084
                      Encrypted:false
                      SSDEEP:96:NxQY9fW/9RIAAssrTAdZR2zqq11AAssKAxaWsYecssHGGmqq11AAsssHGmqqq11r:NxU/DIAAss+ZR2zqq11AAssKAxaW1ss6
                      MD5:C2E958A624B5FABD241277E3E693F4A2
                      SHA1:BC3C845E83FB79EC5331090E3E634CC69F3E2B6A
                      SHA-256:81C38EBE8D0C41BDCEBD42CD7A09F8537C1B0BD8131019C7C885ABBE94AEAA39
                      SHA-512:2FAAE2695C6DD4386C0BD690364B54BD2E9F464BAFDECF05FD69E693941CD25BBD25A044827154308A8E39080AA2712D2451B34C6077229718FAF90D729FE33D
                      Malicious:false
                      Preview:.PNG........IHDR..............z.2....tEXtSoftware.Adobe ImageReadyq.e<...fiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E" xmpMM:DocumentID="xmp.did:D6A421B3609B11E2AFD8AC757B891629" xmpMM:InstanceID="xmp.iid:D6A421B2609B11E2AFD8AC757B891629" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:A74E67B6215FE211AC06F9441A82FEFD" stRef:documentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..A....\IDATx....m.P.E...M..'t....=R.d.)....>..|>.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22330
                      Entropy (8bit):7.9810347758665445
                      Encrypted:false
                      SSDEEP:384:aJXE05HwtAKswap8oNDfSFBFm+/e36Uyj5SZv+woGSEzXCJTsS:a35HIANTNDSF7R/M2EzCTF
                      MD5:B4FD985F20B0D373EF0D55E7ECFCD165
                      SHA1:FD96A536C42FBCBD23CAFEADD9122A25A7A848FB
                      SHA-256:9B53EC2BBDF169AF9CC2F4CFEA18A4EC984FFEABAA6A6CD01933E03FAD9C7E07
                      SHA-512:8D64858D589D4BC047779146B595B578497AB2DC2AD883BC4DADA06A60D08C79524F060520F532BD7AF760CE9FEFCC9950D1708E7ABCB80C5B2757C73D3DBBDA
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 201 x 85, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4778
                      Entropy (8bit):7.839826633357473
                      Encrypted:false
                      SSDEEP:96:/Y2CknYxpCbPe2lWy4UT2fMZal+uAl1BqQ/DPWP9lsGXRTsqP:/hb22qUT2fwPuC/7OP/BRn
                      MD5:9DC9BBECE8B76B1231348B0FD2FBDB88
                      SHA1:C8F71D7F37F6A026E602E2DA0C44E2D9E4453112
                      SHA-256:8F3956EEFD59CDD8E065C28052A7C41927EDC314539F07A38516CE0320356450
                      SHA-512:42858EE60A99621E4DE1EC6D3C3D276FB466C577ABF05191CE119EC433663740196DB22469197CE07E726212269C1696F2C970BFAEAE7AE86A343472F7B67F27
                      Malicious:false
                      Preview:.PNG........IHDR.......U......b.=....tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:631E073F90AD11E2B467D8F586F29896" xmpMM:DocumentID="xmp.did:631E074090AD11E2B467D8F586F29896"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:631E073D90AD11E2B467D8F586F29896" stRef:documentID="xmp.did:631E073E90AD11E2B467D8F586F29896"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.EW.....IDATx..]....... .......!....a..B..I.NX.`..D.w ..e...q.AD...H.....d.(h4.$.(..D.......O.KUwuM....S.].W......
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 301 x 55, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):7621
                      Entropy (8bit):7.950162226593725
                      Encrypted:false
                      SSDEEP:192:/SDS0tKg9E05TLoQjvrVJ401yyFFuKacEsBK:qJXE05v3BuyyYFFEAK
                      MD5:805B09E6CFFE2948E891319A5329B03B
                      SHA1:C402A1E1C5C2C839E9E3AE444D452D6EBCFA863C
                      SHA-256:E52721BF4652B39B3D017E26866E86320B76DC358214B157D86B3DC58334750B
                      SHA-512:A23AC19A36D67242FF944B463A1B9695C4B6DE8362B3328A88E7E05DE812C3AAAD8E4D698E2CAEE6ADA0EB0BAB1F287248FF4C31CA80BBD2718FD5103179699B
                      Malicious:false
                      Preview:.PNG........IHDR...-...7.....Y.......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4700
                      Entropy (8bit):7.921737244447786
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nTz1fGKp/56ylQ4k5QqkchRUtWvfK9:/SDS0tKg9E05TZVpR64XnfOK9
                      MD5:417EC14380DFA07363B746B85CAD5BCF
                      SHA1:2E3605AEAFF77E9B82BA6E36081DFF575D72C1B3
                      SHA-256:29346EF5C0DAEE9E69313CDE4AD321099E806B2A787AF225D84A758C4052C631
                      SHA-512:F2677219735E6302C4390811B167A61721562FF76918A885DFE6D97DB9DA6D618FC98D277408876FD9A03F11CB5B3EB79F80C58650ED78A5EBB2F2460ECE1092
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):28249
                      Entropy (8bit):7.985529844753195
                      Encrypted:false
                      SSDEEP:384:aJXE05uNUCFxUePGYHl4qxT9peH2I9gGM+kwRDzQpdyDDaIJyFlSqhdHY89TGpFR:a35aUC9PT9E2I9hzkw1QuDW4ZVYThcxt
                      MD5:44EB3F5893CD67857BEC32F8A05F399E
                      SHA1:FB46AFC29BB80EA55CC9E5BE676D59BAF9EBD1A0
                      SHA-256:843EEFF4CFE4F69F5EC98EEA3A76104B5224FCFADFE22A07B627872DA8E0E175
                      SHA-512:0DA6AABDEF06F05C4456E2260E744EE58C354F86182CC3FC7DBF2568F85BA4A79C7C304D087879BF3B32F1DEF6B6BBA58CF8978C0FCCDE0CC4EADD72CF840403
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 235 x 211, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22330
                      Entropy (8bit):7.9810347758665445
                      Encrypted:false
                      SSDEEP:384:aJXE05HwtAKswap8oNDfSFBFm+/e36Uyj5SZv+woGSEzXCJTsS:a35HIANTNDSF7R/M2EzCTF
                      MD5:B4FD985F20B0D373EF0D55E7ECFCD165
                      SHA1:FD96A536C42FBCBD23CAFEADD9122A25A7A848FB
                      SHA-256:9B53EC2BBDF169AF9CC2F4CFEA18A4EC984FFEABAA6A6CD01933E03FAD9C7E07
                      SHA-512:8D64858D589D4BC047779146B595B578497AB2DC2AD883BC4DADA06A60D08C79524F060520F532BD7AF760CE9FEFCC9950D1708E7ABCB80C5B2757C73D3DBBDA
                      Malicious:false
                      Preview:.PNG........IHDR.............`#......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4680
                      Entropy (8bit):7.929050221960049
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nT7XTm4V+UuyvTh1PUJY:/SDS0tKg9E05T7XTm8puyv1yJY
                      MD5:69E0B7D8FAA49E5AD1A57D910A990C14
                      SHA1:F6205CF0A72590EB48F1311C1A51623D054FA2AC
                      SHA-256:96786E42B70A880F83143FF0D952354DE30B9B51B0F28D36381E49D7ADFE3464
                      SHA-512:5936D03CC1CC302497A955F1388EEC3C73BBE12B42CAF124A5D0EA0808B67AD7E84C71D3BF06E0AF12E7AA56976CBC1ED1DCF25E6236FB88E0F962243604D0C5
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):22421
                      Entropy (8bit):7.382781405693069
                      Encrypted:false
                      SSDEEP:384:cJXE050vbwtRSQniH2Zn+4GjL1rGMNKc0BCEgsFzA0u:I35LCQznsjRrGMN90QEZZA0u
                      MD5:CD3956C0B11967DE8DA88DA7C40ABD8F
                      SHA1:28B3280D98E0FAEFBEEB824F66245D53F688367D
                      SHA-256:4940060CEA6C1D1CF2B4E4F6E66DB8E30CA6452452F918B311E43915D55AA3DF
                      SHA-512:D995A7ECFA327A108DDB303864E359364B7A3FFBD10BED96DC6F2113CA850C404F54968E3B416998A26F53097D4C9DBF7B19CA90586A6C43ED533328B9AF118A
                      Malicious:false
                      Preview:.PNG........IHDR...V.........@\......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 79 x 24, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4472
                      Entropy (8bit):7.920666209153228
                      Encrypted:false
                      SSDEEP:96:/SDZ/I09Da01l+gmkyTt6Hk8nT1f7miiCi6BgEkvmfwXh/so3t6H:/SDS0tKg9E05T1Siit0wXmoC
                      MD5:F4ABDED60BBDC1A7F80B1AE87558087D
                      SHA1:8118D40BE94EE3105AD06704F14697D6F4FB71F7
                      SHA-256:ACBCEA1C5EC39151D6EFF46446B3658F74A57E920C83F0CCC4345B0E4825F501
                      SHA-512:54CAE30E9D72908476FCDB9A2FFA5B878EFB923A6DC72F1A6C740965CE2E652386DF11A20B83281363ED104A4A10D79EAAE4FF662EB76E4153FAEB176620AA66
                      Malicious:false
                      Preview:.PNG........IHDR...O.................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1041
                      Entropy (8bit):5.0566730094007655
                      Encrypted:false
                      SSDEEP:24:qTFLURr94A/4VqEQVC/YFTszIRuXgigDDNNbT1JxFK8:EiRr9T/4Vqp4AFMouXrYNpT1HFb
                      MD5:C128D6CD61111599FCBE7BB46EDB1904
                      SHA1:CDF9CEC9BA07708A12D0A02D50E0122385FA253F
                      SHA-256:944D208A5720B207B61144149546F9F50FB48B7281DF8BCE33EB114E20BB95C6
                      SHA-512:74E5A34E3A019D395D5E71BBB9629F6C4C9EE4233C79406898FBCFE673A2B3F753A9C75AA95A54821012EB3794AF1E880A8ACBBA31DB4899270C6DF0FD1D5E53
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>OMPA Convertor.exe</runFilePath>...<htmlFilePath>OMPA convertor.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>64x64 converter.ico</iconName>...<description>Converts binary .cwa files to application-friendly formats. Current version supports specifying a time-slice via the data preview pane. Optional output streams (battery, light, temperature). Multiple timestamp formats available.</description>...<fileName>Convert_CWA</fileName>...<readableName>Convert CWA</readableName>...<outputFile>.csv .wav .raw</outputFile>...<inputFile>.cwa</inputFile>...<wantMetadata>true</wantMetadata>...<outputExtensions>....<extension>csv</extension>...</outputExtensions>...<defaultValues>....<bodyMass>80</bodyMass>....<percentage>0.22</percentage>....<fileStart>fileStart</fileStart>....<fileEnd>fileEnd</fileEnd>...</defaultValues>...<crea
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):563200
                      Entropy (8bit):6.741829920311703
                      Encrypted:false
                      SSDEEP:12288:+l+vI0vyog/UpQ87Lx97MYpk62gSp01ldMIicFIz/Fa5wbevozdw1:+l+g6kUW8Xx9ogDSp01lXicFIDFa5jvo
                      MD5:15B477AA57D8F81CD251D38CA7CB84C6
                      SHA1:CA9A478EDE26638F0D881D1643CAC98C3AFE5F49
                      SHA-256:822F9397A57EE1A5B4D2A25FE4031F5EB960166AC20F3FF7AA417259EF8F403E
                      SHA-512:2B42BC91E3596F16C76D35C6C3DFFBB04735C6AB96ABC6C61E6FFE34BBB0EE5F791FFAA7D4ADB9C6CD15E74E42B67292F4CF940CF9222AE9DD515658DDE6FAF3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7+..Yx..Yx..Yx..x..Yx..x..Yx..x..Yx...x..Yx..Xx..Yx..x..Yx..x..YxRich..Yx................PE..L...#..O.........................................@..................................y....@..................................A..(................................2.................................8<..@............................................text............................... ..`.rdata..............................@..@.data...DC...P... ...<..............@....rsrc................\..............@..@.reloc...:.......:...^..............@..B........................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with very long lines (381), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11977
                      Entropy (8bit):5.193366025833501
                      Encrypted:false
                      SSDEEP:192:kVsDIzjpambe4Ec4h25Uw4aCqtYoqy2qoglZQtpYGTmpo/8pWV9:qtq4Ec4hUr4aLYoqUCX
                      MD5:1A82547F921A171DCF86F23191BFD318
                      SHA1:1CBE6268FC5FFE12A4A707205D0FCC64866A7236
                      SHA-256:E4BD06AA60D4577B6AA586E05EDB9D5B1250599C01C1140C6D88B614B9A0E103
                      SHA-512:420651FDEFF17D16307E875CDD632B5CB7ED54E588BFB8D870AB43BC2E4B402913BE748334D431D5CC9F8663F6C680470E71E6BED297623560F09856E2BFDBEE
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>OpenMovement Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.js"></script> ...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......function fillValues()...{....va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with very long lines (381), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11977
                      Entropy (8bit):5.193366025833501
                      Encrypted:false
                      SSDEEP:192:kVsDIzjpambe4Ec4h25Uw4aCqtYoqy2qoglZQtpYGTmpo/8pWV9:qtq4Ec4hUr4aLYoqUCX
                      MD5:1A82547F921A171DCF86F23191BFD318
                      SHA1:1CBE6268FC5FFE12A4A707205D0FCC64866A7236
                      SHA-256:E4BD06AA60D4577B6AA586E05EDB9D5B1250599C01C1140C6D88B614B9A0E103
                      SHA-512:420651FDEFF17D16307E875CDD632B5CB7ED54E588BFB8D870AB43BC2E4B402913BE748334D431D5CC9F8663F6C680470E71E6BED297623560F09856E2BFDBEE
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>OpenMovement Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.js"></script> ...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......function fillValues()...{....va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):555520
                      Entropy (8bit):6.7113933342053205
                      Encrypted:false
                      SSDEEP:12288:3nTww4skH2tol+VkVJrDHcSN+cfRf9JsFdwe:3n0nH2toYkVJrD9Z9Js
                      MD5:33DD5633F19486728639D92992B080F2
                      SHA1:BEDD5820CF9FC7285833AF533C3B08BFA1F4912E
                      SHA-256:88CE021A699D591CBAFC1D1211399CB0E9543EB2A6843C4D07707EE374F3C7D5
                      SHA-512:5DC1602F017AD27E6F36071AE6BE2A900F9C95AABA46A962AD27A62F70B175617840263D15E0CEB413F8513D2704FEE6CA2A7181D5F8BECD3027DCD15197DA03
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........#..p..p..pLrQp..pLrSph.pLrRp..p.q..p.q..p.q..p.3p..p..p..p..q..p._p..p..q..pRich..p................PE..L...S..[.................:...N...............P....@.......................................@..................................3..(....p...........................6..`)..p............................)..@............P...............................text....8.......:.................. ..`.rdata.......P.......>..............@..@.data...p$...@.......,..............@....rsrc........p.......@..............@..@.reloc...6.......8...B..............@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3527
                      Entropy (8bit):7.81337128585813
                      Encrypted:false
                      SSDEEP:96:9Ss5YRxkYjabEg39Q5aS4iJ7fPWdSfCwIc31:9Ss5Yrjaob5/VJr+k9
                      MD5:CED13F367E9FDF9CB2045DDBFC606D6B
                      SHA1:7C872ABCF649631BA513C43621605610D9125E95
                      SHA-256:27BC1E463A8F3FD3C193CC5E91A463C356E39D5E81EE45FEDC54BB070B5FC895
                      SHA-512:D2F7A6FBE8AD134F2073AEB76BDBF4D06922193275F72CE8DD6288EE026E7EF66410377FEF45F22355A70FCCFBE198379F1D55C4BA5D041DE96CA088B0BBAD0D
                      Malicious:false
                      Preview:.PNG........IHDR...@...@......iq.... cHRM..z%..............u0...`..:....o._.F....bKGD.......C......pHYs.................vpAg...@...@....`....IDATx...k%wv.?.G..}..j..v.3....!.3a..`<.U..&.@.*.@.!x.E...l.....<..6.......n...-..V..nK.U../...RU....d ...z.U.|..T..&4..MhB...&....I.|..g.q.....E.R..B...!PJ....:q..{.....Zks.Zk.R...xzz...\.~.W_}.O>..w. .Sc.o.V.Ave.>N@..+{}..Y9..Z..`./..w...>.h.Z.....>@)..`0..(.^.>..XQ.Ya.pZ.....,......m..Mk..B......-.S.....O..jS.....g.b.......5..@.....B(.(..8..1f.Z..Q.-.q<..t.. ...d.y.....K.v..crfj.AJ9. ...>_....U^..&ss/...,.Q....Xk.t:...ju.T..!..p^.QsB....*. ...c,R..69.x..f...Zbq.......H..!..!.V....!.y...Honn6...Og......oY..8..u.."E..D..k.V:.....0U.>q._|H..36..+....8..^..c..s.....L....@DQtz...Y...f....{<....._..S.+ ....%..P.....[..l............\..>..\|.,.\Fk.c........8...(...$.._1.~....$.}.8..8....=juK.|...-..9......\Xy..2S.@Yp~f.\`.A.s.....G4.^......WQ,.S,,>......wx.w.s.....0...8N.g. [m.+,.h.a._x..[4[..Gq....R(3
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):7303
                      Entropy (8bit):7.827464019436164
                      Encrypted:false
                      SSDEEP:192:b8yxqckNOgKtcKdAOs/GOR9nDyoQCl1xdjGTlD/uzcV/:bbx9bSKoHDyoQClExGi/
                      MD5:BDFA0CCB43714B182B9EEE4A0CF0DC9A
                      SHA1:14AE738BC83FE1004B9879F3BD72100E74E215C1
                      SHA-256:ED334BA309B7DC4EB164B135E6EC95AC270767C528C7AB649B2AC8FD7EC5C8CA
                      SHA-512:3925369D595CEC2693421FACDBDD76562AD75A56E74C87B41303944A85BECD22A133D3921B02E420E75D63D18953E278E18FB8E4A3CE0CD3FF6F5C7BE516ABC3
                      Malicious:false
                      Preview:GIF89a.....................xi~................................+5.MV.JU..(.'=.J].....!.3K.AW...)..+..5.8Q.C].DZ.Pg.CU.Zm.Vh.aq.`h.....3../..<..<..D.&L.$G.-Q.3V.:\.5R.>`.Dd.Hg.Ii.Ii.Ki.Kk.Lh.Mk.Ro.Sq.[v.e..w..p..}..t..v.....@d.Ae.Eh.Gk.Gi.Gh.Gk.Im.Ik.Im.Ik.Ko.Km.Kk.Lm.Nn.Or.Rs.Ut.Vx.]|.Zw.k..`x....Ek.Lp.Jo.b.....e..m..{......z................................................................D.......M...Y....Y..e.5..L.h......2..=..G.Y..i........u..z..|..~.....w..*.5..A..@.G.G..V.Q.._.P..o.f..u..u..{......w..v..{............#.~%..+..2..3..9..>.9.=..B..D..D..E..G..G..G.C..I..I.A..L..L..Q..R..V..T..[..c..g..m..s....`...u.q..k...4..B.{5..F..G..I..I..J..K..K..K..N..S..V..[.zO..{....u.........B..M....c.....................................!.......,...............H......*\......z4.H.........c.. C...0...?*`.@....Cp.....`..Sf.._........C..P../.0H@J..B..Vty...V..:../*..]..k..;....A-.0..h.../.0..KX.[.0b...$H..E.K..E....t..C...CO..C.i.@..H.9....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1031
                      Entropy (8bit):4.980312923623659
                      Encrypted:false
                      SSDEEP:24:qTLjdsRyeK94A/4VqEQVC/YFTszIRuXgigDDNNjjjvTpxFK8:ELZsRyD9T/4Vqp4AFMouXrYNRjjvTnFb
                      MD5:75220D8A8A097043744CC0C7DAE8A059
                      SHA1:54BFEF1EEA080EF3343A84FE907462152EA16920
                      SHA-256:FF7421F04B2E7E6BC63F319C14D72D9579997E7B0D0E2531998BB8720B629C1B
                      SHA-512:F543E061AFF30C5156F79E7DD1AA3404EE6D7F80915746B9BDF87A99FF9084D04794487EF5043A89014833A79A048E2EC30F2F2FAC893D49C1675D5D1CDF3F18
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>cwa-convert.exe</runFilePath>...<htmlFilePath>cwa-convert.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>cwa-convert.ico</iconName>...<description>Converts binary .cwa files to application-friendly formats. Current version supports specifying a time-slice via the data preview pane. Optional output streams (battery, light, temperature). Multiple timestamp formats available.</description>...<fileName>Convert_CWA</fileName>...<readableName>Convert CWA</readableName>...<outputFile>.csv .wav .raw</outputFile>...<inputFile>.cwa</inputFile>...<wantMetadata>true</wantMetadata>...<outputExtensions>....<extension>csv</extension>....<extension>wav</extension>....<extension>raw</extension>...</outputExtensions>...<defaultValues>....<fileStart>fileStart</fileStart>....<fileEnd>fileEnd</fileEnd>...</defaultValues>...<createsOutput>
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):7303
                      Entropy (8bit):7.827464019436164
                      Encrypted:false
                      SSDEEP:192:b8yxqckNOgKtcKdAOs/GOR9nDyoQCl1xdjGTlD/uzcV/:bbx9bSKoHDyoQClExGi/
                      MD5:BDFA0CCB43714B182B9EEE4A0CF0DC9A
                      SHA1:14AE738BC83FE1004B9879F3BD72100E74E215C1
                      SHA-256:ED334BA309B7DC4EB164B135E6EC95AC270767C528C7AB649B2AC8FD7EC5C8CA
                      SHA-512:3925369D595CEC2693421FACDBDD76562AD75A56E74C87B41303944A85BECD22A133D3921B02E420E75D63D18953E278E18FB8E4A3CE0CD3FF6F5C7BE516ABC3
                      Malicious:false
                      Preview:GIF89a.....................xi~................................+5.MV.JU..(.'=.J].....!.3K.AW...)..+..5.8Q.C].DZ.Pg.CU.Zm.Vh.aq.`h.....3../..<..<..D.&L.$G.-Q.3V.:\.5R.>`.Dd.Hg.Ii.Ii.Ki.Kk.Lh.Mk.Ro.Sq.[v.e..w..p..}..t..v.....@d.Ae.Eh.Gk.Gi.Gh.Gk.Im.Ik.Im.Ik.Ko.Km.Kk.Lm.Nn.Or.Rs.Ut.Vx.]|.Zw.k..`x....Ek.Lp.Jo.b.....e..m..{......z................................................................D.......M...Y....Y..e.5..L.h......2..=..G.Y..i........u..z..|..~.....w..*.5..A..@.G.G..V.Q.._.P..o.f..u..u..{......w..v..{............#.~%..+..2..3..9..>.9.=..B..D..D..E..G..G..G.C..I..I.A..L..L..Q..R..V..T..[..c..g..m..s....`...u.q..k...4..B.{5..F..G..I..I..J..K..K..K..N..S..V..[.zO..{....u.........B..M....c.....................................!.......,...............H......*\......z4.H.........c.. C...0...?*`.@....Cp.....`..Sf.._........C..P../.0H@J..B..Vty...V..:../*..]..k..;....A-.0..h.../.0..KX.[.0b...$H..E.K..E....t..C...CO..C.i.@..H.9....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3527
                      Entropy (8bit):7.81337128585813
                      Encrypted:false
                      SSDEEP:96:9Ss5YRxkYjabEg39Q5aS4iJ7fPWdSfCwIc31:9Ss5Yrjaob5/VJr+k9
                      MD5:CED13F367E9FDF9CB2045DDBFC606D6B
                      SHA1:7C872ABCF649631BA513C43621605610D9125E95
                      SHA-256:27BC1E463A8F3FD3C193CC5E91A463C356E39D5E81EE45FEDC54BB070B5FC895
                      SHA-512:D2F7A6FBE8AD134F2073AEB76BDBF4D06922193275F72CE8DD6288EE026E7EF66410377FEF45F22355A70FCCFBE198379F1D55C4BA5D041DE96CA088B0BBAD0D
                      Malicious:false
                      Preview:.PNG........IHDR...@...@......iq.... cHRM..z%..............u0...`..:....o._.F....bKGD.......C......pHYs.................vpAg...@...@....`....IDATx...k%wv.?.G..}..j..v.3....!.3a..`<.U..&.@.*.@.!x.E...l.....<..6.......n...-..V..nK.U../...RU....d ...z.U.|..T..&4..MhB...&....I.|..g.q.....E.R..B...!PJ....:q..{.....Zks.Zk.R...xzz...\.~.W_}.O>..w. .Sc.o.V.Ave.>N@..+{}..Y9..Z..`./..w...>.h.Z.....>@)..`0..(.^.>..XQ.Ya.pZ.....,......m..Mk..B......-.S.....O..jS.....g.b.......5..@.....B(.(..8..1f.Z..Q.-.q<..t.. ...d.y.....K.v..crfj.AJ9. ...>_....U^..&ss/...,.Q....Xk.t:...ju.T..!..p^.QsB....*. ...c,R..69.x..f...Zbq.......H..!..!.V....!.y...Honn6...Og......oY..8..u.."E..D..k.V:.....0U.>q._|H..36..+....8..^..c..s.....L....@DQtz...Y...f....{<....._..S.+ ....%..P.....[..l............\..>..\|.,.\Fk.c........8...(...$.._1.~....$.}.8..8....=juK.|...-..9......\Xy..2S.@Yp~f.\`.A.s.....G4.^......WQ,.S,,>......wx.w.s.....0...8N.g. [m.+,.h.a._x..[4[..Gq....R(3
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):64027
                      Entropy (8bit):4.836305483874431
                      Encrypted:false
                      SSDEEP:1536:Y0/ZYwdtLLrK7tXuLJAlC0NEojHweGy8VEfrUiOl3ST0uMU:xZ79L2kJmzNvjHwlR+UT3STD7
                      MD5:4D269F4999A9D6766EBA116A79B22F6C
                      SHA1:982A75004C32B52BFADB0D296867780DBA232543
                      SHA-256:CA0B58099DB982806828D46FAAAE6B53FF51BD5207912379BE0B20FF96ED6ADA
                      SHA-512:198D5C7E6D0E274002B25B9F905E52AFFB09E1EDC76480D03D78FD35824C0A62B0F36EC2144A62ECEA8A4B1A6ACC4A455B83AAB8B3512B670A37944276619507
                      Malicious:false
                      Preview:/* ===================================================.. * bootstrap-transition.js v2.3.1.. * http://twitter.github.com/bootstrap/javascript.html#transitions.. * ===================================================.. * Copyright 2012 Twitter, Inc... *.. * Licensed under the Apache License, Version 2.0 (the "License");.. * you may not use this file except in compliance with the License... * You may obtain a copy of the License at.. *.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Unless required by applicable law or agreed to in writing, software.. * distributed under the License is distributed on an "AS IS" BASIS,.. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied... * See the License for the specific language governing permissions and.. * limitations under the License... * ========================================================== */......!function ($) {.... "use strict"; // jshint ;_;...... /* CSS TRANSITION SUPPORT (http://www.modernizr.com/).. *
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (28421), with CRLF line terminators
                      Category:dropped
                      Size (bytes):28543
                      Entropy (8bit):5.002712804901758
                      Encrypted:false
                      SSDEEP:768:I7S57QFwmPK40INVIPcr8gCBQcqYn0SUs8q:t0OANsz0WT
                      MD5:4D2217E6EF811750EF429614897722F7
                      SHA1:81354DCFC6D99A1A43678DD9719D0D279271A02E
                      SHA-256:96708C6D8E2D1D3E2CD83C34B4E30311C6C6BB405CAEF24C66D9C7A336B4BED2
                      SHA-512:648E210FE2C1414EAFB340E2C5522294A47D17734F7840D73C4283140BCE1EC1D42B32C7BEBEDEB7AE791F2B15EB1B601E724126D521B223576DDFBBA2E44DBE
                      Malicious:false
                      Preview:/*!..* Bootstrap.js by @fat & @mdo..* Copyright 2012 Twitter, Inc...* http://www.apache.org/licenses/LICENSE-2.0.txt..*/..!function(e){"use strict";e(function(){e.support.transition=function(){var e=function(){var e=document.createElement("bootstrap"),t={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"},n;for(n in t)if(e.style[n]!==undefined)return t[n]}();return e&&{end:e}}()})}(window.jQuery),!function(e){"use strict";var t='[data-dismiss="alert"]',n=function(n){e(n).on("click",t,this.close)};n.prototype.close=function(t){function s(){i.trigger("closed").remove()}var n=e(this),r=n.attr("data-target"),i;r||(r=n.attr("href"),r=r&&r.replace(/.*(?=#[^\s]*$)/,"")),i=e(r),t&&t.preventDefault(),i.length||(i=n.hasClass("alert")?n:n.parent()),i.trigger(t=e.Event("close"));if(t.isDefaultPrevented())return;i.removeClass("in"),e.support.transition&&i.hasClass("fade")?i.on(e.support.transition.end,s):s()};v
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):64027
                      Entropy (8bit):4.836305483874431
                      Encrypted:false
                      SSDEEP:1536:Y0/ZYwdtLLrK7tXuLJAlC0NEojHweGy8VEfrUiOl3ST0uMU:xZ79L2kJmzNvjHwlR+UT3STD7
                      MD5:4D269F4999A9D6766EBA116A79B22F6C
                      SHA1:982A75004C32B52BFADB0D296867780DBA232543
                      SHA-256:CA0B58099DB982806828D46FAAAE6B53FF51BD5207912379BE0B20FF96ED6ADA
                      SHA-512:198D5C7E6D0E274002B25B9F905E52AFFB09E1EDC76480D03D78FD35824C0A62B0F36EC2144A62ECEA8A4B1A6ACC4A455B83AAB8B3512B670A37944276619507
                      Malicious:false
                      Preview:/* ===================================================.. * bootstrap-transition.js v2.3.1.. * http://twitter.github.com/bootstrap/javascript.html#transitions.. * ===================================================.. * Copyright 2012 Twitter, Inc... *.. * Licensed under the Apache License, Version 2.0 (the "License");.. * you may not use this file except in compliance with the License... * You may obtain a copy of the License at.. *.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Unless required by applicable law or agreed to in writing, software.. * distributed under the License is distributed on an "AS IS" BASIS,.. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied... * See the License for the specific language governing permissions and.. * limitations under the License... * ========================================================== */......!function ($) {.... "use strict"; // jshint ;_;...... /* CSS TRANSITION SUPPORT (http://www.modernizr.com/).. *
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (32089), with CRLF line terminators
                      Category:dropped
                      Size (bytes):92635
                      Entropy (8bit):5.304097832737613
                      Encrypted:false
                      SSDEEP:1536:pnu00HWWaRxkqJg09pYxoxDKLXJrg8hXXO4dK3kyfiLJBhdSZE+I+Qz7rbaN1RUg:pdkWgoBecZRQzmW42qf
                      MD5:874082B265651D732B1E8A97CE2517A6
                      SHA1:EEE9A5B74FA1B59692E17A0420D989D3F82CBE2C
                      SHA-256:7933FF01DB5BE57CA6677DAAAD6BF5009D38D294AB5AA5D998DE3BA47E89CA0E
                      SHA-512:086C1AE8648EE00511C5F4FBC21122A0BCA45B62F4C0D8CC9AEEA147EBB0807A9C3B9EAE3145DFBC2666A8F80D2A80A7A4A04290ABEC496B5524D32A657C1FDE
                      Malicious:false
                      Preview:/*! jQuery v1.9.1 | (c) 2005, 2012 jQuery Foundation, Inc. | jquery.org/license..//@ sourceMappingURL=jquery.min.map..*/(function(e,t){var n,r,i=typeof t,o=e.document,a=e.location,s=e.jQuery,u=e.$,l={},c=[],p="1.9.1",f=c.concat,d=c.push,h=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,b=function(e,t){return new b.fn.init(e,t,r)},x=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,w=/\S+/g,T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,N=/^(?:(<[\w\W]+>)[^>]*|#([\w-]*))$/,C=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,k=/^[\],:{}\s]*$/,E=/(?:^|:|,)(?:\s*\[)+/g,S=/\\(?:["\\\/bfnrt]|u[\da-fA-F]{4})/g,A=/"[^"\\\r\n]*"|true|false|null|-?(?:\d+\.|)\d+(?:[eE][+-]?\d+|)/g,j=/^-ms-/,D=/-([\da-z])/gi,L=function(e,t){return t.toUpperCase()},H=function(e){(o.addEventListener||"load"===e.type||"complete"===o.readyState)&&(q(),b.ready())},q=function(){o.addEventListener?(o.removeEventListener("DOMContentLoaded",H,!1),e.removeEventListener("load",H,!1)):(o.detachEvent("onreadystatechange",H),e.detachEvent("onload",
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (28421), with CRLF line terminators
                      Category:dropped
                      Size (bytes):28543
                      Entropy (8bit):5.002712804901758
                      Encrypted:false
                      SSDEEP:768:I7S57QFwmPK40INVIPcr8gCBQcqYn0SUs8q:t0OANsz0WT
                      MD5:4D2217E6EF811750EF429614897722F7
                      SHA1:81354DCFC6D99A1A43678DD9719D0D279271A02E
                      SHA-256:96708C6D8E2D1D3E2CD83C34B4E30311C6C6BB405CAEF24C66D9C7A336B4BED2
                      SHA-512:648E210FE2C1414EAFB340E2C5522294A47D17734F7840D73C4283140BCE1EC1D42B32C7BEBEDEB7AE791F2B15EB1B601E724126D521B223576DDFBBA2E44DBE
                      Malicious:false
                      Preview:/*!..* Bootstrap.js by @fat & @mdo..* Copyright 2012 Twitter, Inc...* http://www.apache.org/licenses/LICENSE-2.0.txt..*/..!function(e){"use strict";e(function(){e.support.transition=function(){var e=function(){var e=document.createElement("bootstrap"),t={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"},n;for(n in t)if(e.style[n]!==undefined)return t[n]}();return e&&{end:e}}()})}(window.jQuery),!function(e){"use strict";var t='[data-dismiss="alert"]',n=function(n){e(n).on("click",t,this.close)};n.prototype.close=function(t){function s(){i.trigger("closed").remove()}var n=e(this),r=n.attr("data-target"),i;r||(r=n.attr("href"),r=r&&r.replace(/.*(?=#[^\s]*$)/,"")),i=e(r),t&&t.preventDefault(),i.length||(i=n.hasClass("alert")?n:n.parent()),i.trigger(t=e.Event("close"));if(t.isDefaultPrevented())return;i.removeClass("in"),e.support.transition&&i.hasClass("fade")?i.on(e.support.transition.end,s):s()};v
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (32089), with CRLF line terminators
                      Category:dropped
                      Size (bytes):92635
                      Entropy (8bit):5.304097832737613
                      Encrypted:false
                      SSDEEP:1536:pnu00HWWaRxkqJg09pYxoxDKLXJrg8hXXO4dK3kyfiLJBhdSZE+I+Qz7rbaN1RUg:pdkWgoBecZRQzmW42qf
                      MD5:874082B265651D732B1E8A97CE2517A6
                      SHA1:EEE9A5B74FA1B59692E17A0420D989D3F82CBE2C
                      SHA-256:7933FF01DB5BE57CA6677DAAAD6BF5009D38D294AB5AA5D998DE3BA47E89CA0E
                      SHA-512:086C1AE8648EE00511C5F4FBC21122A0BCA45B62F4C0D8CC9AEEA147EBB0807A9C3B9EAE3145DFBC2666A8F80D2A80A7A4A04290ABEC496B5524D32A657C1FDE
                      Malicious:false
                      Preview:/*! jQuery v1.9.1 | (c) 2005, 2012 jQuery Foundation, Inc. | jquery.org/license..//@ sourceMappingURL=jquery.min.map..*/(function(e,t){var n,r,i=typeof t,o=e.document,a=e.location,s=e.jQuery,u=e.$,l={},c=[],p="1.9.1",f=c.concat,d=c.push,h=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,b=function(e,t){return new b.fn.init(e,t,r)},x=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,w=/\S+/g,T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,N=/^(?:(<[\w\W]+>)[^>]*|#([\w-]*))$/,C=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,k=/^[\],:{}\s]*$/,E=/(?:^|:|,)(?:\s*\[)+/g,S=/\\(?:["\\\/bfnrt]|u[\da-fA-F]{4})/g,A=/"[^"\\\r\n]*"|true|false|null|-?(?:\d+\.|)\d+(?:[eE][+-]?\d+|)/g,j=/^-ms-/,D=/-([\da-z])/gi,L=function(e,t){return t.toUpperCase()},H=function(e){(o.addEventListener||"load"===e.type||"complete"===o.readyState)&&(q(),b.ready())},q=function(){o.addEventListener?(o.removeEventListener("DOMContentLoaded",H,!1),e.removeEventListener("load",H,!1)):(o.detachEvent("onreadystatechange",H),e.detachEvent("onload",
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows icon resource - 1 icon, 64x64, 24 bits/pixel
                      Category:dropped
                      Size (bytes):12862
                      Entropy (8bit):0.2567213546428736
                      Encrypted:false
                      SSDEEP:3:vZll/ltl/c/lpRD:ojD
                      MD5:1356714D30EB63F260CEFB0936C6E55E
                      SHA1:79C25404E942D1646AAF2705DCE34D12AF9E5790
                      SHA-256:E99E3672F8699E1E5251EF154B4272AAD404B5190570934E21191C128CD6F586
                      SHA-512:326472320D36763A0C0E069F3CA1A63FF993E5795684233771D12A2834749FBDAE0AED77C0C30DE4B73A40FC1D6ABF54C59D6190940EAD2CDCBE8158F0C8CBCF
                      Malicious:false
                      Preview:......@@......(2......(...@................0............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):1010
                      Entropy (8bit):2.29292695215194
                      Encrypted:false
                      SSDEEP:6:GH2laYz39WzJzdoaFUix1qyP5WKISI+pEwY+/dUpyP8ace:GHCx3mJp3F5x1qc7eva/6pyP8av
                      MD5:EF53B728B8C0C9E76885A88C29577F1F
                      SHA1:486CEB0CC0653C13B2D4582EC326342DF7E58EB5
                      SHA-256:BFF343B1A887C6C81A6945C87AC56A5D51106ED6041A5AF5F79F8E02246A460C
                      SHA-512:59B7CB51D03BE5FA06BBDBFC15A9B3AB12B50ADA520A45CACD8C7B4A480E1D6F25980D744568CDD85B899D65C4D0D8172E9D6C745E605A1FD49719C2157343BA
                      Malicious:false
                      Preview:GIF89a.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3!k.....C..M....S.^....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6712
                      Entropy (8bit):5.165428689402844
                      Encrypted:false
                      SSDEEP:192:BVsDIzEaAbe4Ec4hTzI/biCuRiCbazmQH74axuqbMp:kDq4Ec4hTzI/biCiiCGzmQH74axuj
                      MD5:4479F570ECD29B6C975D5A403379F747
                      SHA1:9A69865844209FB972A56C15E15851873B35A838
                      SHA-256:09EB74ACFCE780F4B726CCE8827544DA75C43ABC54D12CC32F95E14B904A63CB
                      SHA-512:DF5D09E68B77E4E4C6FC3604A40F8B9BFE65CD7921FFAD31C8321846DBFBD237D161D4D0EC17AE461258083D4D746A38F580B620AD9D27301D2BBCA2F3DA7927
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>AX OmConvert Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......var rawInput1;...var rawInput2;......function fillValues()...{....var url = document.URL;........va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):629
                      Entropy (8bit):5.100605671646762
                      Encrypted:false
                      SSDEEP:12:TM3TSmrk4+mG/17LkzYP5r9AfLxvBGGtD/NKWHvD/ifFuIEZe1Q9+Q92S:qTARr9AvNPTKBEQ1FxS
                      MD5:BCD9CF8B8A41D6DB97A9CE6584602C09
                      SHA1:8A0BBF3A5D1DECA2C64C7669B5CAF05161D437D2
                      SHA-256:4382C6B263C873B5A3564951D54542DEDC5B17D9BBBA5B234BFBF90EB8CF25F2
                      SHA-512:2E68F626FFDADB6BB0CB5975057210A70823ECA16CB22EE6DD184FF782EC56D4EEBB5F96F6048215D3485425A36866A09124D61507EF8C6D49E18843944AFD50
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>run-omconvert.cmd</runFilePath>...<htmlFilePath>AX_OMConvert.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>64x64 converter.ico</iconName>...<description>OMConvert</description>...<fileName>OMConvert</fileName>...<readableName>OMConvert</readableName>...<outputExtensions>....<extension></extension>...</outputExtensions>...<numberOfInputFiles>1</numberOfInputFiles>...<wantMetadata>false</wantMetadata>...<requiresCWANames>true</requiresCWANames>..</Plugin>
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):23220
                      Entropy (8bit):5.0206455590077885
                      Encrypted:false
                      SSDEEP:384:yM1758/eDV9grZKb5u5Ru11zNFnyQCglOfWwRnE+A6V22zHtTjg:/8GDV9grZKbgUzWQCglOfWwRnE+/DzNA
                      MD5:E46CE2784F902577C2E2858BAF1536F0
                      SHA1:B87C9AF4988D92BCFBA4CE80F1BBF267774E115F
                      SHA-256:489239002725E88D06FFFC788210A60C249D401F00C2BE2254F130F6251D2002
                      SHA-512:B822F632A842A070A2A7FB1CFC7A184CAE6219676273CE63B57096FB0C0F39DA7735EE240BB5652F1AE14238D3494AC930395D936EF5BCB6F7552053D375CDE0
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....@-ms-viewport {.. width: device-width;..}.....hidden {.. display: none;.. visibility: hidden;..}.....visible-phone {.. display: none !important;..}.....visible-tablet {.. display: none !important;..}.....hidden-desktop {.. display: none !important;..}....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (16608), with CRLF line terminators
                      Category:dropped
                      Size (bytes):16858
                      Entropy (8bit):5.2955772749108
                      Encrypted:false
                      SSDEEP:384:dd7eicOM8quuhu93fUacuMZoUCfl4UX94Vp1XP:dPcVDmfUac1ZQt4UX96L
                      MD5:B0C3EF20C73BC861FF157EAB023DD09C
                      SHA1:FEE31889CF7E7B1531BF61D8109BE2A6007853D6
                      SHA-256:754073D316DAB747E1634E26EE4FB71EBF38314C24701946812C0E7506242560
                      SHA-512:CB61A0F24025F2C702E0A5EEC5BA6E94AE108A543C21C61445188C4741DB66A27D7195234D8ED992BCE7793C667F7E4041E2E102C87C55C2070BD608CF8ED2A7
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}@-ms-viewport{width:device-width}.hidden{display:none;visibility:hidden}.visible-phone{display:none!important}.visible-tablet{display:none!important}.hidden-desktop{display:none!important}.visible-desktop{display:inherit!important}@media(min-width:768px) and (max-width:979px){.hidden-desktop{display:inherit!important}.visible-desktop{display:none!important}.visible-tablet{display:inherit!importa
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):133405
                      Entropy (8bit):5.11593362125808
                      Encrypted:false
                      SSDEEP:768:3ofP4Kjze9ROUT1aEXxUKPrsPHOR1sqY+R9Ef:3ofAh9kKHXYORmJf
                      MD5:580599C144EF378851955472462F8602
                      SHA1:477A15BEDFC71B900F7B623725FC2693E6304AAB
                      SHA-256:4DA0DD04B0D7747EB30270FE7758BAC2CBF8371ECA251257553E9B489FD229FD
                      SHA-512:4C4D00E70A7C0C6999B237D5466F7EC099B4445BF1A4A9561374D192422C4F41E7C60374BFA0C6DC8D6AF0C8866AE131DD29B82480B60DA93F22108760B1339A
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....article,..aside,..details,..figcaption,..figure,..footer,..header,..hgroup,..nav,..section {.. display: block;..}....audio,..canvas,..video {.. display: inline-block;.. *display: inline;.. *zoom: 1;..}....audio:not([controls]) {.. display: none;..}....html {.. font-
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (65299), with CRLF line terminators
                      Category:dropped
                      Size (bytes):105948
                      Entropy (8bit):5.180897685194033
                      Encrypted:false
                      SSDEEP:768:X71A8XpW5b26LVcUFPaDGObYDUXyyRsPJGaPV4LolQdUONA4QFOfUcnvGcJwjuGR:28AHR7aD4DJhzPB2UONAxtjuGR
                      MD5:016623C5E5773122D7C2AC3B524DD17C
                      SHA1:1ABEFD404CDD720B275CDAFB97D3EE1C87FD97EF
                      SHA-256:3349EBED31517ADA35DA5294A520C4A25CB778F58785726E4B0177120FE25501
                      SHA-512:C36645B0648A21D7B6F4ABD9C315B5B82EBD3D21B48E8B2184D8333C800F0D9F9256FFC0D862AE9FDC6E15A24B3247251FCA9830869A54865255F2BC6DCCAA61
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zoom:1}audio:not([controls]){display:none}html{font-size:100%;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}a:focus{outline:thin dotted #333;outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}a:hover,a:active{outline:0}sub,sup{position:relative
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):23220
                      Entropy (8bit):5.0206455590077885
                      Encrypted:false
                      SSDEEP:384:yM1758/eDV9grZKb5u5Ru11zNFnyQCglOfWwRnE+A6V22zHtTjg:/8GDV9grZKbgUzWQCglOfWwRnE+/DzNA
                      MD5:E46CE2784F902577C2E2858BAF1536F0
                      SHA1:B87C9AF4988D92BCFBA4CE80F1BBF267774E115F
                      SHA-256:489239002725E88D06FFFC788210A60C249D401F00C2BE2254F130F6251D2002
                      SHA-512:B822F632A842A070A2A7FB1CFC7A184CAE6219676273CE63B57096FB0C0F39DA7735EE240BB5652F1AE14238D3494AC930395D936EF5BCB6F7552053D375CDE0
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....@-ms-viewport {.. width: device-width;..}.....hidden {.. display: none;.. visibility: hidden;..}.....visible-phone {.. display: none !important;..}.....visible-tablet {.. display: none !important;..}.....hidden-desktop {.. display: none !important;..}....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:assembler source, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1840
                      Entropy (8bit):5.102392171860436
                      Encrypted:false
                      SSDEEP:48:W/9d3J5Ozvk4eKhQGbADUnJ5UjsUMopRcZbBh:W/HD0HeK6GbAonTUwLosZ
                      MD5:AB3E585DB835356D281F3D0F99543096
                      SHA1:3C8A9D6A0848292AACBB37AD1D2E978CD95B8718
                      SHA-256:9846020C95FE0913EAC566A7056C7AF5390D342D76EA7B4451989A39D9ACC9C4
                      SHA-512:6E853AF69AD050F54DBEF55BBB94EDBB248FC580820EF86B1AF145FD103EF1531A3CEBA8A236E348F7E7F119E009AB091C0094A5818A761889A8318B60312F19
                      Malicious:false
                      Preview:....body {...width: 100%;...height: 100%;.../*background-color: white;*/...background-color: #888888;...margin: 0;...padding: 0;......}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url(../img/headerbackground.png);...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 15px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}..../*..div#contentHolder {...position: relative;...width:100%;...height: 1000px;...padding-top: 7px;...background-color: #E3E3E3;...border-image: url(../img/innerglow.png) 210 / 210px stretch stretch;..}..*/....div#content {...position: relative;.../*min-height: 750px;...max-height: 1200px;*/...width: 90%;...margin: 0px auto 0px auto;...-moz-border-radius: 8px;.. -webkit-border-radius: 8px;...border-ra
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4608
                      Entropy (8bit):5.17412998780235
                      Encrypted:false
                      SSDEEP:96:VlX/iDPh0QKHB4n0qYCKPumYlAnE8FZz6aAkGTh6HO99HOii3ia3NpiQD/w:raOBm0T72mYlAnrFApP6Hg9H3iSa9piD
                      MD5:8694D89D8D9E003E08597E65E94A4D87
                      SHA1:4699F6F73633A89CC279F3FEC2A7E112B73FC6E8
                      SHA-256:9E15360AE6FA9224A20328F881A94CB45351CF10A1E04D038711E1CD8D9E617C
                      SHA-512:5051CAFC944F6AF977CD0A89F7FBF298DD246CD6DE3C6C38B92FD60781178294ADB1196EA4686CBAADA81A0663B780B37D2BBD7613B8FE517BCB4ECCFCAFEA97
                      Malicious:false
                      Preview:..<style>..@font-face { .. .font-family: Bebas; .. .src: url("./svg/font_bebas.svg#BebasNeueRegular") format("svg");...}...h2 { font-family: "Bebas";}....body {...width: 100%;...background-color: white;...margin: 0;...padding: 0;..}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url('../images/headerbackground.png');...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 34px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}....div#contentHolder {...position: relative;...width:100%;...height: 390px;...padding-top: 20px;...background-color: rgb(227,227,227);...border-image: url('../images/innerglow.png') 211 / 220px stretch stretch;..}....div#content {...position: relative;...max-height: 428px;...width: 950px;...margin: 0px
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (65299), with CRLF line terminators
                      Category:dropped
                      Size (bytes):105948
                      Entropy (8bit):5.180897685194033
                      Encrypted:false
                      SSDEEP:768:X71A8XpW5b26LVcUFPaDGObYDUXyyRsPJGaPV4LolQdUONA4QFOfUcnvGcJwjuGR:28AHR7aD4DJhzPB2UONAxtjuGR
                      MD5:016623C5E5773122D7C2AC3B524DD17C
                      SHA1:1ABEFD404CDD720B275CDAFB97D3EE1C87FD97EF
                      SHA-256:3349EBED31517ADA35DA5294A520C4A25CB778F58785726E4B0177120FE25501
                      SHA-512:C36645B0648A21D7B6F4ABD9C315B5B82EBD3D21B48E8B2184D8333C800F0D9F9256FFC0D862AE9FDC6E15A24B3247251FCA9830869A54865255F2BC6DCCAA61
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zoom:1}audio:not([controls]){display:none}html{font-size:100%;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}a:focus{outline:thin dotted #333;outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}a:hover,a:active{outline:0}sub,sup{position:relative
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):133405
                      Entropy (8bit):5.11593362125808
                      Encrypted:false
                      SSDEEP:768:3ofP4Kjze9ROUT1aEXxUKPrsPHOR1sqY+R9Ef:3ofAh9kKHXYORmJf
                      MD5:580599C144EF378851955472462F8602
                      SHA1:477A15BEDFC71B900F7B623725FC2693E6304AAB
                      SHA-256:4DA0DD04B0D7747EB30270FE7758BAC2CBF8371ECA251257553E9B489FD229FD
                      SHA-512:4C4D00E70A7C0C6999B237D5466F7EC099B4445BF1A4A9561374D192422C4F41E7C60374BFA0C6DC8D6AF0C8866AE131DD29B82480B60DA93F22108760B1339A
                      Malicious:false
                      Preview:/*!.. * Bootstrap v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.....clearfix {.. *zoom: 1;..}.....clearfix:before,...clearfix:after {.. display: table;.. line-height: 0;.. content: "";..}.....clearfix:after {.. clear: both;..}.....hide-text {.. font: 0/0 a;.. color: transparent;.. text-shadow: none;.. background-color: transparent;.. border: 0;..}.....input-block-level {.. display: block;.. width: 100%;.. min-height: 30px;.. -webkit-box-sizing: border-box;.. -moz-box-sizing: border-box;.. box-sizing: border-box;..}....article,..aside,..details,..figcaption,..figure,..footer,..header,..hgroup,..nav,..section {.. display: block;..}....audio,..canvas,..video {.. display: inline-block;.. *display: inline;.. *zoom: 1;..}....audio:not([controls]) {.. display: none;..}....html {.. font-
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (16608), with CRLF line terminators
                      Category:dropped
                      Size (bytes):16858
                      Entropy (8bit):5.2955772749108
                      Encrypted:false
                      SSDEEP:384:dd7eicOM8quuhu93fUacuMZoUCfl4UX94Vp1XP:dPcVDmfUac1ZQt4UX96L
                      MD5:B0C3EF20C73BC861FF157EAB023DD09C
                      SHA1:FEE31889CF7E7B1531BF61D8109BE2A6007853D6
                      SHA-256:754073D316DAB747E1634E26EE4FB71EBF38314C24701946812C0E7506242560
                      SHA-512:CB61A0F24025F2C702E0A5EEC5BA6E94AE108A543C21C61445188C4741DB66A27D7195234D8ED992BCE7793C667F7E4041E2E102C87C55C2070BD608CF8ED2A7
                      Malicious:false
                      Preview:/*!.. * Bootstrap Responsive v2.3.1.. *.. * Copyright 2012 Twitter, Inc.. * Licensed under the Apache License v2.0.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Designed and built with all the love in the world @twitter by @mdo and @fat... */.clearfix{*zoom:1}.clearfix:before,.clearfix:after{display:table;line-height:0;content:""}.clearfix:after{clear:both}.hide-text{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.input-block-level{display:block;width:100%;min-height:30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}@-ms-viewport{width:device-width}.hidden{display:none;visibility:hidden}.visible-phone{display:none!important}.visible-tablet{display:none!important}.hidden-desktop{display:none!important}.visible-desktop{display:inherit!important}@media(min-width:768px) and (max-width:979px){.hidden-desktop{display:inherit!important}.visible-desktop{display:none!important}.visible-tablet{display:inherit!importa
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:assembler source, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1840
                      Entropy (8bit):5.102392171860436
                      Encrypted:false
                      SSDEEP:48:W/9d3J5Ozvk4eKhQGbADUnJ5UjsUMopRcZbBh:W/HD0HeK6GbAonTUwLosZ
                      MD5:AB3E585DB835356D281F3D0F99543096
                      SHA1:3C8A9D6A0848292AACBB37AD1D2E978CD95B8718
                      SHA-256:9846020C95FE0913EAC566A7056C7AF5390D342D76EA7B4451989A39D9ACC9C4
                      SHA-512:6E853AF69AD050F54DBEF55BBB94EDBB248FC580820EF86B1AF145FD103EF1531A3CEBA8A236E348F7E7F119E009AB091C0094A5818A761889A8318B60312F19
                      Malicious:false
                      Preview:....body {...width: 100%;...height: 100%;.../*background-color: white;*/...background-color: #888888;...margin: 0;...padding: 0;......}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url(../img/headerbackground.png);...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 15px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}..../*..div#contentHolder {...position: relative;...width:100%;...height: 1000px;...padding-top: 7px;...background-color: #E3E3E3;...border-image: url(../img/innerglow.png) 210 / 210px stretch stretch;..}..*/....div#content {...position: relative;.../*min-height: 750px;...max-height: 1200px;*/...width: 90%;...margin: 0px auto 0px auto;...-moz-border-radius: 8px;.. -webkit-border-radius: 8px;...border-ra
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4608
                      Entropy (8bit):5.17412998780235
                      Encrypted:false
                      SSDEEP:96:VlX/iDPh0QKHB4n0qYCKPumYlAnE8FZz6aAkGTh6HO99HOii3ia3NpiQD/w:raOBm0T72mYlAnrFApP6Hg9H3iSa9piD
                      MD5:8694D89D8D9E003E08597E65E94A4D87
                      SHA1:4699F6F73633A89CC279F3FEC2A7E112B73FC6E8
                      SHA-256:9E15360AE6FA9224A20328F881A94CB45351CF10A1E04D038711E1CD8D9E617C
                      SHA-512:5051CAFC944F6AF977CD0A89F7FBF298DD246CD6DE3C6C38B92FD60781178294ADB1196EA4686CBAADA81A0663B780B37D2BBD7613B8FE517BCB4ECCFCAFEA97
                      Malicious:false
                      Preview:..<style>..@font-face { .. .font-family: Bebas; .. .src: url("./svg/font_bebas.svg#BebasNeueRegular") format("svg");...}...h2 { font-family: "Bebas";}....body {...width: 100%;...background-color: white;...margin: 0;...padding: 0;..}....div#header {...height: 106px;...background-color: white;...width: 100%;...margin: 0;...padding: 0;...background-image: url('../images/headerbackground.png');...background-repeat: repeat-x; ..}....div#header img {...position:relative;...top: 34px;...left:10px;...transition: left 1s;...-moz-transition: left 1s; /* Firefox 4 */...-webkit-transition: left 1s; /* Safari and Chrome */...-o-transition: left 1s; /* Opera */..}....div#header h1 {...margin: 0;..}....div#contentHolder {...position: relative;...width:100%;...height: 390px;...padding-top: 20px;...background-color: rgb(227,227,227);...border-image: url('../images/innerglow.png') 211 / 220px stretch stretch;..}....div#content {...position: relative;...max-height: 428px;...width: 950px;...margin: 0px
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 270 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):10675
                      Entropy (8bit):7.855792547882974
                      Encrypted:false
                      SSDEEP:192:QSDS0tKg9E05TV3AhGhrR2ER422yJGMSfGsxKhe:3JXE05/2ER3tSfGEEe
                      MD5:6622F06BA0239A047BA5F75DE1E40935
                      SHA1:CBBD0EBE6B97427789888EC9826490687B6705B2
                      SHA-256:2B16813F80DEF0F4569B88FDE041FA58BCE96C24221436E994EE265801BF225D
                      SHA-512:D7693BFBE7A5311D375EC8D6920D411F5FC0FFE63E3FF33F50526F095C986B33AA494060D0661EBC359C408DDEBEABC5484E3EFF79DB944563A1D0FDE7B499F1
                      Malicious:false
                      Preview:.PNG........IHDR.............ZF......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 787 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):4140
                      Entropy (8bit):5.514702010098084
                      Encrypted:false
                      SSDEEP:96:NxQY9fW/9RIAAssrTAdZR2zqq11AAssKAxaWsYecssHGGmqq11AAsssHGmqqq11r:NxU/DIAAss+ZR2zqq11AAssKAxaW1ss6
                      MD5:C2E958A624B5FABD241277E3E693F4A2
                      SHA1:BC3C845E83FB79EC5331090E3E634CC69F3E2B6A
                      SHA-256:81C38EBE8D0C41BDCEBD42CD7A09F8537C1B0BD8131019C7C885ABBE94AEAA39
                      SHA-512:2FAAE2695C6DD4386C0BD690364B54BD2E9F464BAFDECF05FD69E693941CD25BBD25A044827154308A8E39080AA2712D2451B34C6077229718FAF90D729FE33D
                      Malicious:false
                      Preview:.PNG........IHDR..............z.2....tEXtSoftware.Adobe ImageReadyq.e<...fiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E" xmpMM:DocumentID="xmp.did:D6A421B3609B11E2AFD8AC757B891629" xmpMM:InstanceID="xmp.iid:D6A421B2609B11E2AFD8AC757B891629" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:A74E67B6215FE211AC06F9441A82FEFD" stRef:documentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..A....\IDATx....m.P.E...M..'t....=R.d.)....>..|>.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 309 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11142
                      Entropy (8bit):7.861240065287498
                      Encrypted:false
                      SSDEEP:192:WSDS0tKg9E05TevtvtvcApAc/oOv7H14UyaNsbpubpApApz/MKopuTPf+lPBXqvS:5JXE05C11OkSvaNsbhpuTPfSPg11Z11I
                      MD5:B71602511773A60551F70AA9BC6049DE
                      SHA1:D3EFDB13568ACD0AF71743B9CA24F7B3E3D0ABD3
                      SHA-256:A1E56FB8C8357790AD47FD5A88C61148CF5F90E8586917F22EC3745B5069B503
                      SHA-512:B7A1433310BCEA55234A64D9F2BBA5612BB0CFF1832490A7BF7CB604747030A3759F92CC121A5BFD1CD1AAAFE324C9183890CC9CDE74F6B070F8628DE3A5FDEE
                      Malicious:false
                      Preview:.PNG........IHDR...5..........Ugd....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 34, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2856
                      Entropy (8bit):7.87078826366413
                      Encrypted:false
                      SSDEEP:48:O/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODdF:OSDZ/I09Da01l+gmkyTt6Hk8nTdF
                      MD5:3D4F3A59BE46F9075AB045C3A3ED04CB
                      SHA1:12531CA08CCE65ACCFE8463EC517D9B26EB95278
                      SHA-256:AA5D027475B1F6EC88DFDCD84C57D19E20DD86CEEA61BF42D66B3E09D68638E9
                      SHA-512:20FF97F577904E2246A78913DC40CAB1511F8C4D11A722EAF2FFFC065844FC92A2DDBCE69E67C736C73EF58DC9878B8919599EAD4EAFD73A0B050B854FB57F7A
                      Malicious:false
                      Preview:.PNG........IHDR......."......O$F....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 390, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2924
                      Entropy (8bit):7.875020015401922
                      Encrypted:false
                      SSDEEP:48:p/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODezW:pSDZ/I09Da01l+gmkyTt6Hk8nTGW
                      MD5:32E42A30831D0CCB44FF3C23F84D69FA
                      SHA1:D5B884320A01E5C51E190FDD6E6ED1C8DBEEA7CE
                      SHA-256:22C91ADA2FCF30B9CB358FF18347B7EFD79A5BA3F2AE3C24FD6B0FE9BD851E69
                      SHA-512:BAA928F9B5E51885332B4BAED3C4CB0E6596422736E10600B817ACE0B3C1C3FB39DC16E0EAE70DC95F4EE8134643F8126BD7B43E418C34B79E56C064B9BDCEDA
                      Malicious:false
                      Preview:.PNG........IHDR.............5.|.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 2 x 1000, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3297
                      Entropy (8bit):7.890112387496165
                      Encrypted:false
                      SSDEEP:96:dSDZ/I09Da01l+gmkyTt6Hk8nTDBdUEF5vczDo:dSDS0tKg9E05T3UE50g
                      MD5:A4AB2D64E4DC771743B6293E303A1B60
                      SHA1:883845E2D570FAFFE095D27940F9C081213665D9
                      SHA-256:75499938CFBE25364B01DBCF686371BB2EB0ABEFB4AAEA2BB9EB8357B9140FA0
                      SHA-512:DDC4098359F452FFFEBCF793597E1BA31AC9254ECE2BFD898BFD35236F342677A8436669AEB9F2F02EB8CDACDD9946052EB47FCEC3C61C50FD506D51059CA9C7
                      Malicious:false
                      Preview:.PNG........IHDR............../]....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 871 x 14, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4635
                      Entropy (8bit):7.912550011635644
                      Encrypted:false
                      SSDEEP:96:qSDZ/I09Da01l+gmkyTt6Hk8nTilrjaHqiwp/9p3x:qSDS0tKg9E05Ti9jRVn
                      MD5:490AB873EE03CA84F9D3DAB627B687EE
                      SHA1:72EE8D63AC23FF7E01CE0512A3A04682B7B70A7A
                      SHA-256:52B69E251F97C56B71B337A20086E99BB9C2F6538FDF9E7E531F97D9ED273672
                      SHA-512:1E05174427162C75DE38FD27E0E8698A426646B1452A596BE54C6D466EBA9CF0A50BC4F744F027192EBBBE1BDCDCEE52C55AB990F7D3D212869DF6FFE2289CD7
                      Malicious:false
                      Preview:.PNG........IHDR...g..........Xdj....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):8777
                      Entropy (8bit):7.923998391913574
                      Encrypted:false
                      SSDEEP:192:41MFu/STZChMGLw/LtI30ukSCeQm9F+xZdqdfQpTTTIyQY7thi7uWB:iMdZ/GLILBmWEiTTTIyQY5hi71
                      MD5:9BBC6E9602998A385C2EA13DF56470FD
                      SHA1:A25C4705320FD63C33790E666872910E702B9BF6
                      SHA-256:F0E0D95A9C8ABCDFABF46348E2D4285829BB0491F5F6AF0E05AF52BFFB6324C4
                      SHA-512:47853ECE55B43CB9CC33C8BBFAABF407389565A0FC1FD042FAC502EA96784B4CFC985EA536622843EF7FAB76AD503157C927BB57332D970AF9B3F092E4C9D5D8
                      Malicious:false
                      Preview:.PNG........IHDR...............{....PLTE........................mmm.................................................................................................................................................................ttt.........................bbb..................................................................eeeggg.....................................xxx...........................................................................................................................................................................................................................................................................................UUU...............................................................................................rO.....tRNS........#.._../.........o.S..?.....C..kD....O.S._........6..>4!~a..@1.._'o..n.....M...3.BQj..p&%!.l.."Xqr;... A[.<`.am}4.3/0I...PCM!6(*gK&YQ.GDP,..`.{.VP.-..x.)h.7.e1]...W..$..1..b.zS.c.O..].....U.;Zi<N#..).86pV.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit gray+alpha, non-interlaced
                      Category:dropped
                      Size (bytes):12799
                      Entropy (8bit):7.954371008999522
                      Encrypted:false
                      SSDEEP:192:CDrgTE80fO3w9Gw/gMmhqb/KEliZ5pjSWw5JTfvJRbNn1tgbn+qFynb21kt1kIhL:CfAc9GugMIQRl65AJzp1aoFt1gk
                      MD5:2516339970D710819585F90773AEBE0A
                      SHA1:84F613631B07D4FE22ACBAB50E551C0FE04BD78B
                      SHA-256:D99E3FA32C641032F08149914B28C2DC6ACF2EC62F70987F2259EABBFA7FC0DE
                      SHA-512:E1BB0066E619679B880F43E85C3367C57CD13411AB012A67E429B21E7FF80A1A5B8F1EB5BFAC4CC272EB2BB606341182E91FF1CF7D59CF8BD811D98EAFD71D5C
                      Malicious:false
                      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..1.IDATx..}ml\E..W..^..D$|n.w'..;v...8.m0..k<f.8....<.h3$.. ...b,mn.... ........0...L Y`6s'.>...Q.........S......n.S.V.;1K.G...s...>Uo...TU.1c..Yu...c..a&...#C,p.....>k.......U.LW..-s.n.3V.q..~N....o...c...I.~L.....{..-....H8%_..M..w.B..6EW..,.p.......Y...2+.(Y....@..&..A./.......3kX.h....-.a.....A....<>P...'\...J.;(.}.#..Qz......:4..%m?nf.ntK*.....l.9J...+.D..I..Yu1Y...Z^..(.]YYE..f@......lX..z].U.t......u...&..5-P...W.}..@t.|.#L..Y..=..s.......,w#.+.R.+.?..a.x...X.0.."..ea).t.G...*.wV..w..V^...rf%xB.(.q..4>....W.G.#...lW.U<......XJV...l.....R...$k.DVr.I....7:.X<.s>%X.1...N..Ez....w...;y..9.z.9.O.%.~..~..u....*.=.....I..x.c.y}....Y(...o....u..N$.^..j......e\..iX...]..;Y-.r........&..>.!..zl.Y.aVHVN..9=..]..=.......mR..M......d...OU.C..J.UiT.}r.W...W'....u..).......F"YU.#..P......&......R.O....wyz..m..$...O.....s? +^.FT.....I.E.q.%..&.....~..>.M...}]......w..A...?.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 390, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):117264
                      Entropy (8bit):7.985263256233834
                      Encrypted:false
                      SSDEEP:1536:YtYlb2phWm3koaEMEYkgaV1zqVj8djBOqPl8s8lW0Yo7M3R4ZQ7higKwTIKuz1Md:E3TTWfkgYhqV2sqt8nW0Yo7+RYgwywk
                      MD5:07C120F2FD1D279B30068C00AE5DC4EE
                      SHA1:FB8F3101EDB6D41B6BEAAFDA7B6FCE100CA3E2C9
                      SHA-256:0D13B0049DB8639F203B8A5DA7E4E8BFFCDE518CA0E87C6435C4293177AB5867
                      SHA-512:BA62884DF4959FFFD26179047A16A1229098B6F7C37A6D735AD7942116D9AC7562B593875AF84C5726BFF80E9D91758DA52AEC07ED16CF2A0BC25CE57CB0D41E
                      Malicious:false
                      Preview:.PNG........IHDR..............6.X....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 250 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10489
                      Entropy (8bit):7.965741081358159
                      Encrypted:false
                      SSDEEP:192:ASDS0tKg9E05Tantmof5IQV5UQbl/Ewe8k4vtX93UpauhqTNf1rPJf:nJXE05SthXRdEwWEVhKDar5
                      MD5:6223ACD59C394F90D91F29CE41D70D83
                      SHA1:061609B97F9027A00D5607C71041F77F4B62D458
                      SHA-256:9F4ABA4B940439681C0499349F3BE94642C858FA548E152EBA13A107F8FDA772
                      SHA-512:7BB4039670205454920DC3B2904F63A10E1A73FC8C0F02F4013619883A56A662E30F9232C7AB2B6891628F48BAED2DA7497B11C9FDEBD55DCE6381CB44D7EEB5
                      Malicious:false
                      Preview:.PNG........IHDR.......g.....)._.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 372, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22359
                      Entropy (8bit):7.7127315592693435
                      Encrypted:false
                      SSDEEP:384:QJXE05wJf+JX2w/e6iAWO9cDrMac3OkjlCqoPusVN3hIITl3rM3idF539dpXCxRT:M354o2w/e6iAfe/Ds7oPusL3hrTl3XZg
                      MD5:931C86E8F1199B0F9E0F260E8D92E1F2
                      SHA1:9A3DE2269005DCBFE6D420F522D2D72485B1D78B
                      SHA-256:F79B831CBE2D4F37D5C6839513C9F8DA481CE6D463AFEECD77D72E36ECF85477
                      SHA-512:47DF3058C52FFDE61B6B0C6AC721B0AD29A84805B6693DFC311DD1241AB43B6943B4BBA6D42D7554278582405A2AC55482FC4A69D01C87C31932354CC3702C59
                      Malicious:false
                      Preview:.PNG........IHDR.......t......lnJ....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 106, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2852
                      Entropy (8bit):7.867842123870298
                      Encrypted:false
                      SSDEEP:48:J/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODK0:JSDZ/I09Da01l+gmkyTt6Hk8nTX
                      MD5:AD8AB8C5E19A7B24E060E9C6B4A8C13D
                      SHA1:3553B00745DB1BC65E8AD0A224BBC49ECCEECA6F
                      SHA-256:117BD3E359D760CB12B5B3F6865FA125A801269523A851542989D91413DC7A3E
                      SHA-512:1CD55120C2761ECF272466B6A2E4A9568A891D209ECDF5FA5EEA5307D4DB7105898F31C2C680C621657DF7CDB2F38D606CA13684184B3A301F2166329401878D
                      Malicious:false
                      Preview:.PNG........IHDR.......j......D.G....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 1100, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):29493
                      Entropy (8bit):7.392034002277657
                      Encrypted:false
                      SSDEEP:768:s35g9ZhweCCYKdYk1oMnG9GZNYlKU/KNs:dZFdYKYEoMnG9GZl0Ki
                      MD5:12CAD92A07320280831AC634DEAE61FE
                      SHA1:D0F827A47195F5D252F865B1E1E5A75367537027
                      SHA-256:0D1C39FD6E82E138B9EEE5B7650A552C9ACBA2F39A6F17F987441CD7AF853E02
                      SHA-512:29DFE8D6D9508E7E9698FAD768208526C1BDB2E5A1C0197D3989FA63BD7F44FB6071C7486CEED15FF87B86E0532643CE08A29B365EECB9FBA30033ED7EBBC5CF
                      Malicious:false
                      Preview:.PNG........IHDR...V...L......a_.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 390, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2924
                      Entropy (8bit):7.875020015401922
                      Encrypted:false
                      SSDEEP:48:p/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODezW:pSDZ/I09Da01l+gmkyTt6Hk8nTGW
                      MD5:32E42A30831D0CCB44FF3C23F84D69FA
                      SHA1:D5B884320A01E5C51E190FDD6E6ED1C8DBEEA7CE
                      SHA-256:22C91ADA2FCF30B9CB358FF18347B7EFD79A5BA3F2AE3C24FD6B0FE9BD851E69
                      SHA-512:BAA928F9B5E51885332B4BAED3C4CB0E6596422736E10600B817ACE0B3C1C3FB39DC16E0EAE70DC95F4EE8134643F8126BD7B43E418C34B79E56C064B9BDCEDA
                      Malicious:false
                      Preview:.PNG........IHDR.............5.|.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 106, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2852
                      Entropy (8bit):7.867842123870298
                      Encrypted:false
                      SSDEEP:48:J/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODK0:JSDZ/I09Da01l+gmkyTt6Hk8nTX
                      MD5:AD8AB8C5E19A7B24E060E9C6B4A8C13D
                      SHA1:3553B00745DB1BC65E8AD0A224BBC49ECCEECA6F
                      SHA-256:117BD3E359D760CB12B5B3F6865FA125A801269523A851542989D91413DC7A3E
                      SHA-512:1CD55120C2761ECF272466B6A2E4A9568A891D209ECDF5FA5EEA5307D4DB7105898F31C2C680C621657DF7CDB2F38D606CA13684184B3A301F2166329401878D
                      Malicious:false
                      Preview:.PNG........IHDR.......j......D.G....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 2 x 1000, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3297
                      Entropy (8bit):7.890112387496165
                      Encrypted:false
                      SSDEEP:96:dSDZ/I09Da01l+gmkyTt6Hk8nTDBdUEF5vczDo:dSDS0tKg9E05T3UE50g
                      MD5:A4AB2D64E4DC771743B6293E303A1B60
                      SHA1:883845E2D570FAFFE095D27940F9C081213665D9
                      SHA-256:75499938CFBE25364B01DBCF686371BB2EB0ABEFB4AAEA2BB9EB8357B9140FA0
                      SHA-512:DDC4098359F452FFFEBCF793597E1BA31AC9254ECE2BFD898BFD35236F342677A8436669AEB9F2F02EB8CDACDD9946052EB47FCEC3C61C50FD506D51059CA9C7
                      Malicious:false
                      Preview:.PNG........IHDR............../]....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 510 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):421
                      Entropy (8bit):5.424079850413463
                      Encrypted:false
                      SSDEEP:12:6v/7K2x/o/Gv6EKye3Kye3Kye3Kye3Kye3Kye3Kye3Kyo2c:wO5EKy+Ky+Ky+Ky+Ky+Ky+Ky+Kyhc
                      MD5:5B3377A8D99FA9152876FD03173135C1
                      SHA1:EC4FD8EA4C4D0A2E2BE1D7A321651C20C707FC90
                      SHA-256:CD0D90488118A8F73E8CAF4BB031CFFD3DF09FC8A5F00A5B42747C7F438E1B01
                      SHA-512:A6061C2A861E5E667C26A0B9427401A666050464CC416497EA0926892693FBA0B5B1EAC8AF7169E53C6B6E3A48A4794906B6994C31C51F6ADBB09909EA4D2426
                      Malicious:false
                      Preview:.PNG........IHDR.......@.............sRGB.........gAMA......a.....pHYs...t...t..f.x....tEXtSoftware.Paint.NET v3.5.11G.B7....IDATx^..1..@....o.b`.L(hxw....L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3...{......i.....IEND.B`.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 309 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11142
                      Entropy (8bit):7.861240065287498
                      Encrypted:false
                      SSDEEP:192:WSDS0tKg9E05TevtvtvcApAc/oOv7H14UyaNsbpubpApApz/MKopuTPf+lPBXqvS:5JXE05C11OkSvaNsbhpuTPfSPg11Z11I
                      MD5:B71602511773A60551F70AA9BC6049DE
                      SHA1:D3EFDB13568ACD0AF71743B9CA24F7B3E3D0ABD3
                      SHA-256:A1E56FB8C8357790AD47FD5A88C61148CF5F90E8586917F22EC3745B5069B503
                      SHA-512:B7A1433310BCEA55234A64D9F2BBA5612BB0CFF1832490A7BF7CB604747030A3759F92CC121A5BFD1CD1AAAFE324C9183890CC9CDE74F6B070F8628DE3A5FDEE
                      Malicious:false
                      Preview:.PNG........IHDR...5..........Ugd....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):8777
                      Entropy (8bit):7.923998391913574
                      Encrypted:false
                      SSDEEP:192:41MFu/STZChMGLw/LtI30ukSCeQm9F+xZdqdfQpTTTIyQY7thi7uWB:iMdZ/GLILBmWEiTTTIyQY5hi71
                      MD5:9BBC6E9602998A385C2EA13DF56470FD
                      SHA1:A25C4705320FD63C33790E666872910E702B9BF6
                      SHA-256:F0E0D95A9C8ABCDFABF46348E2D4285829BB0491F5F6AF0E05AF52BFFB6324C4
                      SHA-512:47853ECE55B43CB9CC33C8BBFAABF407389565A0FC1FD042FAC502EA96784B4CFC985EA536622843EF7FAB76AD503157C927BB57332D970AF9B3F092E4C9D5D8
                      Malicious:false
                      Preview:.PNG........IHDR...............{....PLTE........................mmm.................................................................................................................................................................ttt.........................bbb..................................................................eeeggg.....................................xxx...........................................................................................................................................................................................................................................................................................UUU...............................................................................................rO.....tRNS........#.._../.........o.S..?.....C..kD....O.S._........6..>4!~a..@1.._'o..n.....M...3.BQj..p&%!.l.."Xqr;... A[.<`.am}4.3/0I...PCM!6(*gK&YQ.GDP,..`.{.VP.-..x.)h.7.e1]...W..$..1..b.zS.c.O..].....U.;Zi<N#..).86pV.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 372, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):22359
                      Entropy (8bit):7.7127315592693435
                      Encrypted:false
                      SSDEEP:384:QJXE05wJf+JX2w/e6iAWO9cDrMac3OkjlCqoPusVN3hIITl3rM3idF539dpXCxRT:M354o2w/e6iAfe/Ds7oPusL3hrTl3XZg
                      MD5:931C86E8F1199B0F9E0F260E8D92E1F2
                      SHA1:9A3DE2269005DCBFE6D420F522D2D72485B1D78B
                      SHA-256:F79B831CBE2D4F37D5C6839513C9F8DA481CE6D463AFEECD77D72E36ECF85477
                      SHA-512:47DF3058C52FFDE61B6B0C6AC721B0AD29A84805B6693DFC311DD1241AB43B6943B4BBA6D42D7554278582405A2AC55482FC4A69D01C87C31932354CC3702C59
                      Malicious:false
                      Preview:.PNG........IHDR.......t......lnJ....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):22421
                      Entropy (8bit):7.382781405693069
                      Encrypted:false
                      SSDEEP:384:cJXE050vbwtRSQniH2Zn+4GjL1rGMNKc0BCEgsFzA0u:I35LCQznsjRrGMN90QEZZA0u
                      MD5:CD3956C0B11967DE8DA88DA7C40ABD8F
                      SHA1:28B3280D98E0FAEFBEEB824F66245D53F688367D
                      SHA-256:4940060CEA6C1D1CF2B4E4F6E66DB8E30CA6452452F918B311E43915D55AA3DF
                      SHA-512:D995A7ECFA327A108DDB303864E359364B7A3FFBD10BED96DC6F2113CA850C404F54968E3B416998A26F53097D4C9DBF7B19CA90586A6C43ED533328B9AF118A
                      Malicious:false
                      Preview:.PNG........IHDR...V.........@\......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1 x 34, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):2856
                      Entropy (8bit):7.87078826366413
                      Encrypted:false
                      SSDEEP:48:O/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODdF:OSDZ/I09Da01l+gmkyTt6Hk8nTdF
                      MD5:3D4F3A59BE46F9075AB045C3A3ED04CB
                      SHA1:12531CA08CCE65ACCFE8463EC517D9B26EB95278
                      SHA-256:AA5D027475B1F6EC88DFDCD84C57D19E20DD86CEEA61BF42D66B3E09D68638E9
                      SHA-512:20FF97F577904E2246A78913DC40CAB1511F8C4D11A722EAF2FFFC065844FC92A2DDBCE69E67C736C73EF58DC9878B8919599EAD4EAFD73A0B050B854FB57F7A
                      Malicious:false
                      Preview:.PNG........IHDR......."......O$F....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 469 x 159, 8-bit gray+alpha, non-interlaced
                      Category:dropped
                      Size (bytes):12799
                      Entropy (8bit):7.954371008999522
                      Encrypted:false
                      SSDEEP:192:CDrgTE80fO3w9Gw/gMmhqb/KEliZ5pjSWw5JTfvJRbNn1tgbn+qFynb21kt1kIhL:CfAc9GugMIQRl65AJzp1aoFt1gk
                      MD5:2516339970D710819585F90773AEBE0A
                      SHA1:84F613631B07D4FE22ACBAB50E551C0FE04BD78B
                      SHA-256:D99E3FA32C641032F08149914B28C2DC6ACF2EC62F70987F2259EABBFA7FC0DE
                      SHA-512:E1BB0066E619679B880F43E85C3367C57CD13411AB012A67E429B21E7FF80A1A5B8F1EB5BFAC4CC272EB2BB606341182E91FF1CF7D59CF8BD811D98EAFD71D5C
                      Malicious:false
                      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..1.IDATx..}ml\E..W..^..D$|n.w'..;v...8.m0..k<f.8....<.h3$.. ...b,mn.... ........0...L Y`6s'.>...Q.........S......n.S.V.;1K.G...s...>Uo...TU.1c..Yu...c..a&...#C,p.....>k.......U.LW..-s.n.3V.q..~N....o...c...I.~L.....{..-....H8%_..M..w.B..6EW..,.p.......Y...2+.(Y....@..&..A./.......3kX.h....-.a.....A....<>P...'\...J.;(.}.#..Qz......:4..%m?nf.ntK*.....l.9J...+.D..I..Yu1Y...Z^..(.]YYE..f@......lX..z].U.t......u...&..5-P...W.}..@t.|.#L..Y..=..s.......,w#.+.R.+.?..a.x...X.0.."..ea).t.G...*.wV..w..V^...rf%xB.(.q..4>....W.G.#...lW.U<......XJV...l.....R...$k.DVr.I....7:.X<.s>%X.1...N..Ez....w...;y..9.z.9.O.%.~..~..u....*.=.....I..x.c.y}....Y(...o....u..N$.^..j......e\..iX...]..;Y-.r........&..>.!..zl.Y.aVHVN..9=..]..=.......mR..M......d...OU.C..J.UiT.}r.W...W'....u..).......F"YU.#..P......&......R.O....wyz..m..$...O.....s? +^.FT.....I.E.q.%..&.....~..>.M...}]......w..A...?.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 1100, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):29493
                      Entropy (8bit):7.392034002277657
                      Encrypted:false
                      SSDEEP:768:s35g9ZhweCCYKdYk1oMnG9GZNYlKU/KNs:dZFdYKYEoMnG9GZl0Ki
                      MD5:12CAD92A07320280831AC634DEAE61FE
                      SHA1:D0F827A47195F5D252F865B1E1E5A75367537027
                      SHA-256:0D1C39FD6E82E138B9EEE5B7650A552C9ACBA2F39A6F17F987441CD7AF853E02
                      SHA-512:29DFE8D6D9508E7E9698FAD768208526C1BDB2E5A1C0197D3989FA63BD7F44FB6071C7486CEED15FF87B86E0532643CE08A29B365EECB9FBA30033ED7EBBC5CF
                      Malicious:false
                      Preview:.PNG........IHDR...V...L......a_.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 787 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):4140
                      Entropy (8bit):5.514702010098084
                      Encrypted:false
                      SSDEEP:96:NxQY9fW/9RIAAssrTAdZR2zqq11AAssKAxaWsYecssHGGmqq11AAsssHGmqqq11r:NxU/DIAAss+ZR2zqq11AAssKAxaW1ss6
                      MD5:C2E958A624B5FABD241277E3E693F4A2
                      SHA1:BC3C845E83FB79EC5331090E3E634CC69F3E2B6A
                      SHA-256:81C38EBE8D0C41BDCEBD42CD7A09F8537C1B0BD8131019C7C885ABBE94AEAA39
                      SHA-512:2FAAE2695C6DD4386C0BD690364B54BD2E9F464BAFDECF05FD69E693941CD25BBD25A044827154308A8E39080AA2712D2451B34C6077229718FAF90D729FE33D
                      Malicious:false
                      Preview:.PNG........IHDR..............z.2....tEXtSoftware.Adobe ImageReadyq.e<...fiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E" xmpMM:DocumentID="xmp.did:D6A421B3609B11E2AFD8AC757B891629" xmpMM:InstanceID="xmp.iid:D6A421B2609B11E2AFD8AC757B891629" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:A74E67B6215FE211AC06F9441A82FEFD" stRef:documentID="xmp.did:BCF20EC0435BE211BC1DEA2D3863842E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..A....\IDATx....m.P.E...M..'t....=R.d.)....>..|>.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 947 x 390, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):117264
                      Entropy (8bit):7.985263256233834
                      Encrypted:false
                      SSDEEP:1536:YtYlb2phWm3koaEMEYkgaV1zqVj8djBOqPl8s8lW0Yo7M3R4ZQ7higKwTIKuz1Md:E3TTWfkgYhqV2sqt8nW0Yo7+RYgwywk
                      MD5:07C120F2FD1D279B30068C00AE5DC4EE
                      SHA1:FB8F3101EDB6D41B6BEAAFDA7B6FCE100CA3E2C9
                      SHA-256:0D13B0049DB8639F203B8A5DA7E4E8BFFCDE518CA0E87C6435C4293177AB5867
                      SHA-512:BA62884DF4959FFFD26179047A16A1229098B6F7C37A6D735AD7942116D9AC7562B593875AF84C5726BFF80E9D91758DA52AEC07ED16CF2A0BC25CE57CB0D41E
                      Malicious:false
                      Preview:.PNG........IHDR..............6.X....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 270 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):10675
                      Entropy (8bit):7.855792547882974
                      Encrypted:false
                      SSDEEP:192:QSDS0tKg9E05TV3AhGhrR2ER422yJGMSfGsxKhe:3JXE05/2ER3tSfGEEe
                      MD5:6622F06BA0239A047BA5F75DE1E40935
                      SHA1:CBBD0EBE6B97427789888EC9826490687B6705B2
                      SHA-256:2B16813F80DEF0F4569B88FDE041FA58BCE96C24221436E994EE265801BF225D
                      SHA-512:D7693BFBE7A5311D375EC8D6920D411F5FC0FFE63E3FF33F50526F095C986B33AA494060D0661EBC359C408DDEBEABC5484E3EFF79DB944563A1D0FDE7B499F1
                      Malicious:false
                      Preview:.PNG........IHDR.............ZF......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 871 x 14, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4635
                      Entropy (8bit):7.912550011635644
                      Encrypted:false
                      SSDEEP:96:qSDZ/I09Da01l+gmkyTt6Hk8nTilrjaHqiwp/9p3x:qSDS0tKg9E05Ti9jRVn
                      MD5:490AB873EE03CA84F9D3DAB627B687EE
                      SHA1:72EE8D63AC23FF7E01CE0512A3A04682B7B70A7A
                      SHA-256:52B69E251F97C56B71B337A20086E99BB9C2F6538FDF9E7E531F97D9ED273672
                      SHA-512:1E05174427162C75DE38FD27E0E8698A426646B1452A596BE54C6D466EBA9CF0A50BC4F744F027192EBBBE1BDCDCEE52C55AB990F7D3D212869DF6FFE2289CD7
                      Malicious:false
                      Preview:.PNG........IHDR...g..........Xdj....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 250 x 103, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10489
                      Entropy (8bit):7.965741081358159
                      Encrypted:false
                      SSDEEP:192:ASDS0tKg9E05Tantmof5IQV5UQbl/Ewe8k4vtX93UpauhqTNf1rPJf:nJXE05SthXRdEwWEVhKDar5
                      MD5:6223ACD59C394F90D91F29CE41D70D83
                      SHA1:061609B97F9027A00D5607C71041F77F4B62D458
                      SHA-256:9F4ABA4B940439681C0499349F3BE94642C858FA548E152EBA13A107F8FDA772
                      SHA-512:7BB4039670205454920DC3B2904F63A10E1A73FC8C0F02F4013619883A56A662E30F9232C7AB2B6891628F48BAED2DA7497B11C9FDEBD55DCE6381CB44D7EEB5
                      Malicious:false
                      Preview:.PNG........IHDR.......g.....)._.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 510 x 64, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):421
                      Entropy (8bit):5.424079850413463
                      Encrypted:false
                      SSDEEP:12:6v/7K2x/o/Gv6EKye3Kye3Kye3Kye3Kye3Kye3Kye3Kyo2c:wO5EKy+Ky+Ky+Ky+Ky+Ky+Ky+Kyhc
                      MD5:5B3377A8D99FA9152876FD03173135C1
                      SHA1:EC4FD8EA4C4D0A2E2BE1D7A321651C20C707FC90
                      SHA-256:CD0D90488118A8F73E8CAF4BB031CFFD3DF09FC8A5F00A5B42747C7F438E1B01
                      SHA-512:A6061C2A861E5E667C26A0B9427401A666050464CC416497EA0926892693FBA0B5B1EAC8AF7169E53C6B6E3A48A4794906B6994C31C51F6ADBB09909EA4D2426
                      Malicious:false
                      Preview:.PNG........IHDR.......@.............sRGB.........gAMA......a.....pHYs...t...t..f.x....tEXtSoftware.Paint.NET v3.5.11G.B7....IDATx^..1..@....o.b`.L(hxw....L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3.....@.L..i&..4..h...4....f..M3...{......i.....IEND.B`.
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):22421
                      Entropy (8bit):7.382781405693069
                      Encrypted:false
                      SSDEEP:384:cJXE050vbwtRSQniH2Zn+4GjL1rGMNKc0BCEgsFzA0u:I35LCQznsjRrGMN90QEZZA0u
                      MD5:CD3956C0B11967DE8DA88DA7C40ABD8F
                      SHA1:28B3280D98E0FAEFBEEB824F66245D53F688367D
                      SHA-256:4940060CEA6C1D1CF2B4E4F6E66DB8E30CA6452452F918B311E43915D55AA3DF
                      SHA-512:D995A7ECFA327A108DDB303864E359364B7A3FFBD10BED96DC6F2113CA850C404F54968E3B416998A26F53097D4C9DBF7B19CA90586A6C43ED533328B9AF118A
                      Malicious:false
                      Preview:.PNG........IHDR...V.........@\......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6712
                      Entropy (8bit):5.165428689402844
                      Encrypted:false
                      SSDEEP:192:BVsDIzEaAbe4Ec4hTzI/biCuRiCbazmQH74axuqbMp:kDq4Ec4hTzI/biCiiCGzmQH74axuj
                      MD5:4479F570ECD29B6C975D5A403379F747
                      SHA1:9A69865844209FB972A56C15E15851873B35A838
                      SHA-256:09EB74ACFCE780F4B726CCE8827544DA75C43ABC54D12CC32F95E14B904A63CB
                      SHA-512:DF5D09E68B77E4E4C6FC3604A40F8B9BFE65CD7921FFAD31C8321846DBFBD237D161D4D0EC17AE461258083D4D746A38F580B620AD9D27301D2BBCA2F3DA7927
                      Malicious:false
                      Preview:<!DOCTYPE html> ..<html>..<meta http-equiv="X-UA-Compatible" content="IE=Edge" />..<meta charset="utf-8">...<title>AX OmConvert Converter</title>...<link href="./css/bootstrap-responsive.css" rel="stylesheet">...<link href="./css/bootstrap.css" rel="stylesheet">...<link href="./css/page.css" rel="stylesheet">...<script type="text/javascript" src="./js/jquery.min.js"></script>...<script type="text/javascript" src="./js/bootstrap.min.js"></script>.....<script language="javascript">..function positionLogo() {...document.getElementById('logo').style.left = document.getElementById('content').offsetLeft + 'px';..}....</script>.... Leave this script as it is otherwise the program won't pick it up and it won't run. -->..<script language="javascript" type="text/javascript">.. //var $ = function (e) { return document.getElementById(e); }......var blockStart = -1;...var blockCount = -1;......var rawInput1;...var rawInput2;......function fillValues()...{....var url = document.URL;........va
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:GIF image data, version 89a, 128 x 128
                      Category:dropped
                      Size (bytes):1010
                      Entropy (8bit):2.29292695215194
                      Encrypted:false
                      SSDEEP:6:GH2laYz39WzJzdoaFUix1qyP5WKISI+pEwY+/dUpyP8ace:GHCx3mJp3F5x1qc7eva/6pyP8av
                      MD5:EF53B728B8C0C9E76885A88C29577F1F
                      SHA1:486CEB0CC0653C13B2D4582EC326342DF7E58EB5
                      SHA-256:BFF343B1A887C6C81A6945C87AC56A5D51106ED6041A5AF5F79F8E02246A460C
                      SHA-512:59B7CB51D03BE5FA06BBDBFC15A9B3AB12B50ADA520A45CACD8C7B4A480E1D6F25980D744568CDD85B899D65C4D0D8172E9D6C745E605A1FD49719C2157343BA
                      Malicious:false
                      Preview:GIF89a.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3!k.....C..M....S.^....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):213504
                      Entropy (8bit):6.709248017183754
                      Encrypted:false
                      SSDEEP:6144:ZxGwK8gQiqm4NvHRZVJOqQ1EFO1VxkJlof0jFjzyYdsmSLfTN/oOuusrn4HJ:ZxGwK8gQiqm4NvHRZVJOqQ1EFO1VxkJ8
                      MD5:D05718285DF704EED58EF4B1FE6761A0
                      SHA1:4FA2A4F16B998C0F553EE6B57A780E39323E6A85
                      SHA-256:E5FA5DE8F79FA702C8D2B1164D2E319CB6F597AD700EA9FF04D2273311505943
                      SHA-512:C6F3F2C36FCBE0AA43124716D49D119399E8D1B0D6F61F2DE3A23B8775EE45E7DC5F304B90A0AAE51883E7F7928DB4A04ECCBCEF60EB46CC5B74DD3BD3229BF0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]q>*..Py..Py..Py...y..Py...y..Py...y..Py...y..Py.vSx..Py.vUx:.Py.vTx..Py.h.y..Py..Qyz.Py%wXx..Py%w.y..Py%wRx..PyRich..Py........................PE..L......[.................l..........A.............@.......................................@.....................................(....`.......................p..........p...............................@...............4............................text....k.......l.................. ..`.rdata...............p..............@..@.data........0......................@..._RDATA.......P......................@..@.rsrc........`.......$..............@..@.reloc.......p.......&..............@..B................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows icon resource - 1 icon, 64x64, 24 bits/pixel
                      Category:dropped
                      Size (bytes):12862
                      Entropy (8bit):0.2567213546428736
                      Encrypted:false
                      SSDEEP:3:vZll/ltl/c/lpRD:ojD
                      MD5:1356714D30EB63F260CEFB0936C6E55E
                      SHA1:79C25404E942D1646AAF2705DCE34D12AF9E5790
                      SHA-256:E99E3672F8699E1E5251EF154B4272AAD404B5190570934E21191C128CD6F586
                      SHA-512:326472320D36763A0C0E069F3CA1A63FF993E5795684233771D12A2834749FBDAE0AED77C0C30DE4B73A40FC1D6ABF54C59D6190940EAD2CDCBE8158F0C8CBCF
                      Malicious:false
                      Preview:......@@......(2......(...@................0............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):629
                      Entropy (8bit):5.100605671646762
                      Encrypted:false
                      SSDEEP:12:TM3TSmrk4+mG/17LkzYP5r9AfLxvBGGtD/NKWHvD/ifFuIEZe1Q9+Q92S:qTARr9AvNPTKBEQ1FxS
                      MD5:BCD9CF8B8A41D6DB97A9CE6584602C09
                      SHA1:8A0BBF3A5D1DECA2C64C7669B5CAF05161D437D2
                      SHA-256:4382C6B263C873B5A3564951D54542DEDC5B17D9BBBA5B234BFBF90EB8CF25F2
                      SHA-512:2E68F626FFDADB6BB0CB5975057210A70823ECA16CB22EE6DD184FF782EC56D4EEBB5F96F6048215D3485425A36866A09124D61507EF8C6D49E18843944AFD50
                      Malicious:false
                      Preview:<?xml version='1.0'?>.. This is a sample XML document -->..<Plugin>...<height>500</height>...<width>700</width>...<runFilePath>run-omconvert.cmd</runFilePath>...<htmlFilePath>AX_OMConvert.html</htmlFilePath>...<savedValuesFilePath>saved.xml</savedValuesFilePath>...<iconName>64x64 converter.ico</iconName>...<description>OMConvert</description>...<fileName>OMConvert</fileName>...<readableName>OMConvert</readableName>...<outputExtensions>....<extension></extension>...</outputExtensions>...<numberOfInputFiles>1</numberOfInputFiles>...<wantMetadata>false</wantMetadata>...<requiresCWANames>true</requiresCWANames>..</Plugin>
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1400
                      Entropy (8bit):5.326275339578517
                      Encrypted:false
                      SSDEEP:24:LLiOeidBLv0ZdCla1ONH2KNC2Ip1vv4lbS9q4HvUHH83HSaSlHlRB4L43bdD43aA:fiOeidB3y1wm88iaSvnJbMaA
                      MD5:8F25B67F5F848AD2BF34B0E8465A683C
                      SHA1:58B67E0D5A0A371B111D03FC45BD8D891CBF5878
                      SHA-256:E60CACD6F47040008D07AA8BAF516D116420149E373FE8F23C9AFF4F157C903F
                      SHA-512:EA48B245C95D3482EB97CC82AF6750D890CB46CBC2800EFB82EE289148175315FFFC75F200CC98C79B876AE2C14CE36E063B0CD05E77F799DD518A478A6E04B2
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0....::: Check arguments..if "%~1"=="" goto ERROR_NO_SOURCE..rem if not "%~2"=="" goto ERROR_TOO_MANY_ARGS..if not exist "%~1" goto ERROR_SOURCE_NOT_FOUND..set INPUT=%~f1..set OUTPUT=%~dpn1....::: Choose a temporary output folder..set TEMPDIR=%TEMP%\CBR-%RANDOM%..mkdir "%TEMPDIR%"....::: Run the script..echo OMCONVERT: INPUT: %INPUT%..rem echo INPUT: %INPUT% 1>&2..echo OMCONVERT: OUTPUT: %OUTPUT%..rem echo OUTPUT: %OUTPUT% 1>&2..echo OMCONVERT: TEMPORARY: %TEMPDIR%..rem echo TEMPORARY: %TEMPDIR% 1>&2..echo OMCONVERT: Running: omconvert.exe "%INPUT%" "%TEMPDIR%"..if not exist omconvert.exe echo OMCONVERT: Executable not found.....if exist omconvert.exe omconvert.exe "%INPUT%" -out "%TEMPDIR%\file.wav" -svm-file "%TEMPDIR%\file.svm.csv" -wtv-file "%TEMPDIR%\file.wtv.csv" -paee-file "%TEMPDIR%\file.paee.csv"....::: Move files from the temporary folder..move "%TEMPDIR%\file.wav" "%OUTPUT%.wav" >nul..move "%TEMPDIR%\file.svm.csv" "%OUTPUT%.svm.csv" >nul..move "%TE
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):64027
                      Entropy (8bit):4.836305483874431
                      Encrypted:false
                      SSDEEP:1536:Y0/ZYwdtLLrK7tXuLJAlC0NEojHweGy8VEfrUiOl3ST0uMU:xZ79L2kJmzNvjHwlR+UT3STD7
                      MD5:4D269F4999A9D6766EBA116A79B22F6C
                      SHA1:982A75004C32B52BFADB0D296867780DBA232543
                      SHA-256:CA0B58099DB982806828D46FAAAE6B53FF51BD5207912379BE0B20FF96ED6ADA
                      SHA-512:198D5C7E6D0E274002B25B9F905E52AFFB09E1EDC76480D03D78FD35824C0A62B0F36EC2144A62ECEA8A4B1A6ACC4A455B83AAB8B3512B670A37944276619507
                      Malicious:false
                      Preview:/* ===================================================.. * bootstrap-transition.js v2.3.1.. * http://twitter.github.com/bootstrap/javascript.html#transitions.. * ===================================================.. * Copyright 2012 Twitter, Inc... *.. * Licensed under the Apache License, Version 2.0 (the "License");.. * you may not use this file except in compliance with the License... * You may obtain a copy of the License at.. *.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Unless required by applicable law or agreed to in writing, software.. * distributed under the License is distributed on an "AS IS" BASIS,.. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied... * See the License for the specific language governing permissions and.. * limitations under the License... * ========================================================== */......!function ($) {.... "use strict"; // jshint ;_;...... /* CSS TRANSITION SUPPORT (http://www.modernizr.com/).. *
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (28421), with CRLF line terminators
                      Category:dropped
                      Size (bytes):28543
                      Entropy (8bit):5.002712804901758
                      Encrypted:false
                      SSDEEP:768:I7S57QFwmPK40INVIPcr8gCBQcqYn0SUs8q:t0OANsz0WT
                      MD5:4D2217E6EF811750EF429614897722F7
                      SHA1:81354DCFC6D99A1A43678DD9719D0D279271A02E
                      SHA-256:96708C6D8E2D1D3E2CD83C34B4E30311C6C6BB405CAEF24C66D9C7A336B4BED2
                      SHA-512:648E210FE2C1414EAFB340E2C5522294A47D17734F7840D73C4283140BCE1EC1D42B32C7BEBEDEB7AE791F2B15EB1B601E724126D521B223576DDFBBA2E44DBE
                      Malicious:false
                      Preview:/*!..* Bootstrap.js by @fat & @mdo..* Copyright 2012 Twitter, Inc...* http://www.apache.org/licenses/LICENSE-2.0.txt..*/..!function(e){"use strict";e(function(){e.support.transition=function(){var e=function(){var e=document.createElement("bootstrap"),t={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"},n;for(n in t)if(e.style[n]!==undefined)return t[n]}();return e&&{end:e}}()})}(window.jQuery),!function(e){"use strict";var t='[data-dismiss="alert"]',n=function(n){e(n).on("click",t,this.close)};n.prototype.close=function(t){function s(){i.trigger("closed").remove()}var n=e(this),r=n.attr("data-target"),i;r||(r=n.attr("href"),r=r&&r.replace(/.*(?=#[^\s]*$)/,"")),i=e(r),t&&t.preventDefault(),i.length||(i=n.hasClass("alert")?n:n.parent()),i.trigger(t=e.Event("close"));if(t.isDefaultPrevented())return;i.removeClass("in"),e.support.transition&&i.hasClass("fade")?i.on(e.support.transition.end,s):s()};v
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4637
                      Entropy (8bit):5.283122109416986
                      Encrypted:false
                      SSDEEP:96:JzqhusqHcm22mclSXcgEmYiMqca8UnbXxsUiYisGeGEFt4ly+b52ixBBukB20bLV:Jzqhuj8m2vrcgEmYiMqca80bxsUiYisM
                      MD5:4DE79723652420E759270FDA9C507915
                      SHA1:705C2D98CB777504EAFCA979D907717E9631DF7A
                      SHA-256:D2D4888A6BA0CE82090782138F1DE42221D35FB5EB566105B2FB3BF5629E533B
                      SHA-512:9727127B58160F3D8CBFC4782F09FCEEE0486C08BCCBAE5D0A94CF81B6598DC7DA1DECA179FC3ABF2588D71A8D994439A7235CF937B0395E8F63A333864F28AC
                      Malicious:false
                      Preview://*** This code is copyright 2002-2003 by Gavin Kistner, !@phrogz.net..//*** It is covered under the license viewable at http://phrogz.net/JS/_ReuseLicense.txt..//*** Reuse or modification is free provided you abide by the terms of that license...//*** (Including the first two lines above in your source code satisfies the conditions.)....// Include this code (with notice above ;) in your library; read below for how to use it.....Date.prototype.customFormat = function(formatString){...var YYYY,YY,MMMM,MMM,MM,M,DDDD,DDD,DD,D,hhh,hh,h,mm,m,ss,s,ampm,AMPM,dMod,th;...var dateObject = this;...YY = ((YYYY=dateObject.getFullYear())+"").slice(-2);...MM = (M=dateObject.getMonth()+1)<10?('0'+M):M;...MMM = (MMMM=["January","February","March","April","May","June","July","August","September","October","November","December"][M-1]).substring(0,3);...DD = (D=dateObject.getDate())<10?('0'+D):D;...DDD = (DDDD=["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"][dateObject.getDay()]).s
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1809656
                      Entropy (8bit):4.209663989639158
                      Encrypted:false
                      SSDEEP:3072:R23rm6ZJ2D+lXqBmp4u6gzgSmZwJSxT6Ycey7RtgigsL:K9t
                      MD5:ACFBA1BAD17C2BC4DBAC9F78F326525E
                      SHA1:EACA1E718802059FFC51F9944368268BBBBA265B
                      SHA-256:DFB1A880DA3B66ECFCC7C95B1E3BE91E7A4C46DE268BC786AB0800D50EA5D380
                      SHA-512:04E2D9D3EEE43B2921022A821C33082B890059267E0997DBE107CEBFDCA03F2DE8DB5578D0987D470936F7A9DF7F9B64CE2CF0108FEF43302F2A0438742F425F
                      Malicious:false
                      Preview:function readData() {.. var data = ..{..."PAjson": {...."Device": {....."Type": "AX3",....."Model": "17",....."ID": "12345",....."Firmware": "R36",....."Calibration": "0,0,0"....},...."Recording": {....."StartTime": "2000-14-10 12:34:56:789",....."StopTime": "2000-15-10 12:34:56:789",....."LocationSite": "wrist",....."LocationSide": "left",....."TimeZone": "GMT+1"....},...."Subject": {....."Code": "Participant1",....."DOB": "1981-14-10",....."Sex": "male",....."Heightcm": "183",....."Weightkg": "78",....."Handedness": "right",....."Notes": "Neque porro quisquam est qui dolorem"....},...."Study": {....."Centre": "Newcastle",....."Code": "Study #1",....."Investigator": "A Apple",....."ExerciseType": "Daily Living",....."ConfigOperator": "B Bannana",....."ConfigTime": "2000-14-10 00:00:00:000",....."ConfigNotes": "Ipsum quia dolor sit amet, consectetur"....},...."Extract": {....."Operator": "C Cherry",....."Time": "2000-16-10 12:34:56:789",....."Notes": "Lorem ipsum dolor sit amet, con
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4637
                      Entropy (8bit):5.283122109416986
                      Encrypted:false
                      SSDEEP:96:JzqhusqHcm22mclSXcgEmYiMqca8UnbXxsUiYisGeGEFt4ly+b52ixBBukB20bLV:Jzqhuj8m2vrcgEmYiMqca80bxsUiYisM
                      MD5:4DE79723652420E759270FDA9C507915
                      SHA1:705C2D98CB777504EAFCA979D907717E9631DF7A
                      SHA-256:D2D4888A6BA0CE82090782138F1DE42221D35FB5EB566105B2FB3BF5629E533B
                      SHA-512:9727127B58160F3D8CBFC4782F09FCEEE0486C08BCCBAE5D0A94CF81B6598DC7DA1DECA179FC3ABF2588D71A8D994439A7235CF937B0395E8F63A333864F28AC
                      Malicious:false
                      Preview://*** This code is copyright 2002-2003 by Gavin Kistner, !@phrogz.net..//*** It is covered under the license viewable at http://phrogz.net/JS/_ReuseLicense.txt..//*** Reuse or modification is free provided you abide by the terms of that license...//*** (Including the first two lines above in your source code satisfies the conditions.)....// Include this code (with notice above ;) in your library; read below for how to use it.....Date.prototype.customFormat = function(formatString){...var YYYY,YY,MMMM,MMM,MM,M,DDDD,DDD,DD,D,hhh,hh,h,mm,m,ss,s,ampm,AMPM,dMod,th;...var dateObject = this;...YY = ((YYYY=dateObject.getFullYear())+"").slice(-2);...MM = (M=dateObject.getMonth()+1)<10?('0'+M):M;...MMM = (MMMM=["January","February","March","April","May","June","July","August","September","October","November","December"][M-1]).substring(0,3);...DD = (D=dateObject.getDate())<10?('0'+D):D;...DDD = (DDDD=["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"][dateObject.getDay()]).s
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (32089), with CRLF line terminators
                      Category:dropped
                      Size (bytes):92635
                      Entropy (8bit):5.304097832737613
                      Encrypted:false
                      SSDEEP:1536:pnu00HWWaRxkqJg09pYxoxDKLXJrg8hXXO4dK3kyfiLJBhdSZE+I+Qz7rbaN1RUg:pdkWgoBecZRQzmW42qf
                      MD5:874082B265651D732B1E8A97CE2517A6
                      SHA1:EEE9A5B74FA1B59692E17A0420D989D3F82CBE2C
                      SHA-256:7933FF01DB5BE57CA6677DAAAD6BF5009D38D294AB5AA5D998DE3BA47E89CA0E
                      SHA-512:086C1AE8648EE00511C5F4FBC21122A0BCA45B62F4C0D8CC9AEEA147EBB0807A9C3B9EAE3145DFBC2666A8F80D2A80A7A4A04290ABEC496B5524D32A657C1FDE
                      Malicious:false
                      Preview:/*! jQuery v1.9.1 | (c) 2005, 2012 jQuery Foundation, Inc. | jquery.org/license..//@ sourceMappingURL=jquery.min.map..*/(function(e,t){var n,r,i=typeof t,o=e.document,a=e.location,s=e.jQuery,u=e.$,l={},c=[],p="1.9.1",f=c.concat,d=c.push,h=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,b=function(e,t){return new b.fn.init(e,t,r)},x=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,w=/\S+/g,T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,N=/^(?:(<[\w\W]+>)[^>]*|#([\w-]*))$/,C=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,k=/^[\],:{}\s]*$/,E=/(?:^|:|,)(?:\s*\[)+/g,S=/\\(?:["\\\/bfnrt]|u[\da-fA-F]{4})/g,A=/"[^"\\\r\n]*"|true|false|null|-?(?:\d+\.|)\d+(?:[eE][+-]?\d+|)/g,j=/^-ms-/,D=/-([\da-z])/gi,L=function(e,t){return t.toUpperCase()},H=function(e){(o.addEventListener||"load"===e.type||"complete"===o.readyState)&&(q(),b.ready())},q=function(){o.addEventListener?(o.removeEventListener("DOMContentLoaded",H,!1),e.removeEventListener("load",H,!1)):(o.detachEvent("onreadystatechange",H),e.detachEvent("onload",
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):64027
                      Entropy (8bit):4.836305483874431
                      Encrypted:false
                      SSDEEP:1536:Y0/ZYwdtLLrK7tXuLJAlC0NEojHweGy8VEfrUiOl3ST0uMU:xZ79L2kJmzNvjHwlR+UT3STD7
                      MD5:4D269F4999A9D6766EBA116A79B22F6C
                      SHA1:982A75004C32B52BFADB0D296867780DBA232543
                      SHA-256:CA0B58099DB982806828D46FAAAE6B53FF51BD5207912379BE0B20FF96ED6ADA
                      SHA-512:198D5C7E6D0E274002B25B9F905E52AFFB09E1EDC76480D03D78FD35824C0A62B0F36EC2144A62ECEA8A4B1A6ACC4A455B83AAB8B3512B670A37944276619507
                      Malicious:false
                      Preview:/* ===================================================.. * bootstrap-transition.js v2.3.1.. * http://twitter.github.com/bootstrap/javascript.html#transitions.. * ===================================================.. * Copyright 2012 Twitter, Inc... *.. * Licensed under the Apache License, Version 2.0 (the "License");.. * you may not use this file except in compliance with the License... * You may obtain a copy of the License at.. *.. * http://www.apache.org/licenses/LICENSE-2.0.. *.. * Unless required by applicable law or agreed to in writing, software.. * distributed under the License is distributed on an "AS IS" BASIS,.. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied... * See the License for the specific language governing permissions and.. * limitations under the License... * ========================================================== */......!function ($) {.... "use strict"; // jshint ;_;...... /* CSS TRANSITION SUPPORT (http://www.modernizr.com/).. *
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (28421), with CRLF line terminators
                      Category:dropped
                      Size (bytes):28543
                      Entropy (8bit):5.002712804901758
                      Encrypted:false
                      SSDEEP:768:I7S57QFwmPK40INVIPcr8gCBQcqYn0SUs8q:t0OANsz0WT
                      MD5:4D2217E6EF811750EF429614897722F7
                      SHA1:81354DCFC6D99A1A43678DD9719D0D279271A02E
                      SHA-256:96708C6D8E2D1D3E2CD83C34B4E30311C6C6BB405CAEF24C66D9C7A336B4BED2
                      SHA-512:648E210FE2C1414EAFB340E2C5522294A47D17734F7840D73C4283140BCE1EC1D42B32C7BEBEDEB7AE791F2B15EB1B601E724126D521B223576DDFBBA2E44DBE
                      Malicious:false
                      Preview:/*!..* Bootstrap.js by @fat & @mdo..* Copyright 2012 Twitter, Inc...* http://www.apache.org/licenses/LICENSE-2.0.txt..*/..!function(e){"use strict";e(function(){e.support.transition=function(){var e=function(){var e=document.createElement("bootstrap"),t={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"},n;for(n in t)if(e.style[n]!==undefined)return t[n]}();return e&&{end:e}}()})}(window.jQuery),!function(e){"use strict";var t='[data-dismiss="alert"]',n=function(n){e(n).on("click",t,this.close)};n.prototype.close=function(t){function s(){i.trigger("closed").remove()}var n=e(this),r=n.attr("data-target"),i;r||(r=n.attr("href"),r=r&&r.replace(/.*(?=#[^\s]*$)/,"")),i=e(r),t&&t.preventDefault(),i.length||(i=n.hasClass("alert")?n:n.parent()),i.trigger(t=e.Event("close"));if(t.isDefaultPrevented())return;i.removeClass("in"),e.support.transition&&i.hasClass("fade")?i.on(e.support.transition.end,s):s()};v
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with very long lines (32089), with CRLF line terminators
                      Category:dropped
                      Size (bytes):92635
                      Entropy (8bit):5.304097832737613
                      Encrypted:false
                      SSDEEP:1536:pnu00HWWaRxkqJg09pYxoxDKLXJrg8hXXO4dK3kyfiLJBhdSZE+I+Qz7rbaN1RUg:pdkWgoBecZRQzmW42qf
                      MD5:874082B265651D732B1E8A97CE2517A6
                      SHA1:EEE9A5B74FA1B59692E17A0420D989D3F82CBE2C
                      SHA-256:7933FF01DB5BE57CA6677DAAAD6BF5009D38D294AB5AA5D998DE3BA47E89CA0E
                      SHA-512:086C1AE8648EE00511C5F4FBC21122A0BCA45B62F4C0D8CC9AEEA147EBB0807A9C3B9EAE3145DFBC2666A8F80D2A80A7A4A04290ABEC496B5524D32A657C1FDE
                      Malicious:false
                      Preview:/*! jQuery v1.9.1 | (c) 2005, 2012 jQuery Foundation, Inc. | jquery.org/license..//@ sourceMappingURL=jquery.min.map..*/(function(e,t){var n,r,i=typeof t,o=e.document,a=e.location,s=e.jQuery,u=e.$,l={},c=[],p="1.9.1",f=c.concat,d=c.push,h=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,b=function(e,t){return new b.fn.init(e,t,r)},x=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,w=/\S+/g,T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,N=/^(?:(<[\w\W]+>)[^>]*|#([\w-]*))$/,C=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,k=/^[\],:{}\s]*$/,E=/(?:^|:|,)(?:\s*\[)+/g,S=/\\(?:["\\\/bfnrt]|u[\da-fA-F]{4})/g,A=/"[^"\\\r\n]*"|true|false|null|-?(?:\d+\.|)\d+(?:[eE][+-]?\d+|)/g,j=/^-ms-/,D=/-([\da-z])/gi,L=function(e,t){return t.toUpperCase()},H=function(e){(o.addEventListener||"load"===e.type||"complete"===o.readyState)&&(q(),b.ready())},q=function(){o.addEventListener?(o.removeEventListener("DOMContentLoaded",H,!1),e.removeEventListener("load",H,!1)):(o.detachEvent("onreadystatechange",H),e.detachEvent("onload",
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1809656
                      Entropy (8bit):4.209663989639158
                      Encrypted:false
                      SSDEEP:3072:R23rm6ZJ2D+lXqBmp4u6gzgSmZwJSxT6Ycey7RtgigsL:K9t
                      MD5:ACFBA1BAD17C2BC4DBAC9F78F326525E
                      SHA1:EACA1E718802059FFC51F9944368268BBBBA265B
                      SHA-256:DFB1A880DA3B66ECFCC7C95B1E3BE91E7A4C46DE268BC786AB0800D50EA5D380
                      SHA-512:04E2D9D3EEE43B2921022A821C33082B890059267E0997DBE107CEBFDCA03F2DE8DB5578D0987D470936F7A9DF7F9B64CE2CF0108FEF43302F2A0438742F425F
                      Malicious:false
                      Preview:function readData() {.. var data = ..{..."PAjson": {...."Device": {....."Type": "AX3",....."Model": "17",....."ID": "12345",....."Firmware": "R36",....."Calibration": "0,0,0"....},...."Recording": {....."StartTime": "2000-14-10 12:34:56:789",....."StopTime": "2000-15-10 12:34:56:789",....."LocationSite": "wrist",....."LocationSide": "left",....."TimeZone": "GMT+1"....},...."Subject": {....."Code": "Participant1",....."DOB": "1981-14-10",....."Sex": "male",....."Heightcm": "183",....."Weightkg": "78",....."Handedness": "right",....."Notes": "Neque porro quisquam est qui dolorem"....},...."Study": {....."Centre": "Newcastle",....."Code": "Study #1",....."Investigator": "A Apple",....."ExerciseType": "Daily Living",....."ConfigOperator": "B Bannana",....."ConfigTime": "2000-14-10 00:00:00:000",....."ConfigNotes": "Ipsum quia dolor sit amet, consectetur"....},...."Extract": {....."Operator": "C Cherry",....."Time": "2000-16-10 12:34:56:789",....."Notes": "Lorem ipsum dolor sit amet, con
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):213504
                      Entropy (8bit):6.709248017183754
                      Encrypted:false
                      SSDEEP:6144:ZxGwK8gQiqm4NvHRZVJOqQ1EFO1VxkJlof0jFjzyYdsmSLfTN/oOuusrn4HJ:ZxGwK8gQiqm4NvHRZVJOqQ1EFO1VxkJ8
                      MD5:D05718285DF704EED58EF4B1FE6761A0
                      SHA1:4FA2A4F16B998C0F553EE6B57A780E39323E6A85
                      SHA-256:E5FA5DE8F79FA702C8D2B1164D2E319CB6F597AD700EA9FF04D2273311505943
                      SHA-512:C6F3F2C36FCBE0AA43124716D49D119399E8D1B0D6F61F2DE3A23B8775EE45E7DC5F304B90A0AAE51883E7F7928DB4A04ECCBCEF60EB46CC5B74DD3BD3229BF0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]q>*..Py..Py..Py...y..Py...y..Py...y..Py...y..Py.vSx..Py.vUx:.Py.vTx..Py.h.y..Py..Qyz.Py%wXx..Py%w.y..Py%wRx..PyRich..Py........................PE..L......[.................l..........A.............@.......................................@.....................................(....`.......................p..........p...............................@...............4............................text....k.......l.................. ..`.rdata...............p..............@..@.data........0......................@..._RDATA.......P......................@..@.rsrc........`.......$..............@..@.reloc.......p.......&..............@..B................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1400
                      Entropy (8bit):5.326275339578517
                      Encrypted:false
                      SSDEEP:24:LLiOeidBLv0ZdCla1ONH2KNC2Ip1vv4lbS9q4HvUHH83HSaSlHlRB4L43bdD43aA:fiOeidB3y1wm88iaSvnJbMaA
                      MD5:8F25B67F5F848AD2BF34B0E8465A683C
                      SHA1:58B67E0D5A0A371B111D03FC45BD8D891CBF5878
                      SHA-256:E60CACD6F47040008D07AA8BAF516D116420149E373FE8F23C9AFF4F157C903F
                      SHA-512:EA48B245C95D3482EB97CC82AF6750D890CB46CBC2800EFB82EE289148175315FFFC75F200CC98C79B876AE2C14CE36E063B0CD05E77F799DD518A478A6E04B2
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0....::: Check arguments..if "%~1"=="" goto ERROR_NO_SOURCE..rem if not "%~2"=="" goto ERROR_TOO_MANY_ARGS..if not exist "%~1" goto ERROR_SOURCE_NOT_FOUND..set INPUT=%~f1..set OUTPUT=%~dpn1....::: Choose a temporary output folder..set TEMPDIR=%TEMP%\CBR-%RANDOM%..mkdir "%TEMPDIR%"....::: Run the script..echo OMCONVERT: INPUT: %INPUT%..rem echo INPUT: %INPUT% 1>&2..echo OMCONVERT: OUTPUT: %OUTPUT%..rem echo OUTPUT: %OUTPUT% 1>&2..echo OMCONVERT: TEMPORARY: %TEMPDIR%..rem echo TEMPORARY: %TEMPDIR% 1>&2..echo OMCONVERT: Running: omconvert.exe "%INPUT%" "%TEMPDIR%"..if not exist omconvert.exe echo OMCONVERT: Executable not found.....if exist omconvert.exe omconvert.exe "%INPUT%" -out "%TEMPDIR%\file.wav" -svm-file "%TEMPDIR%\file.svm.csv" -wtv-file "%TEMPDIR%\file.wtv.csv" -paee-file "%TEMPDIR%\file.paee.csv"....::: Move files from the temporary folder..move "%TEMPDIR%\file.wav" "%OUTPUT%.wav" >nul..move "%TEMPDIR%\file.svm.csv" "%OUTPUT%.svm.csv" >nul..move "%TE
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.7796597855256095
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvDvDAb+fRFUK2v9XVFoq98zNCIv:hevbDJXi9XVFoqqRCS
                      MD5:AD509AD20E7A48AB060D8433483AD9B5
                      SHA1:0E566D999A2CE33DCD6FCA3206E4D54A1EAD0A4C
                      SHA-256:047AA251D846EE9179299A5591DBEE119D71DB4EA20F15D45CFCC338D0AB3695
                      SHA-512:7F2CF5636B8138128F150681F3B4FA84F8355620435BB80233D7C9960A0C3EBFC47AF4B507D35EEE324E1F75E02E24D609C505BF35A63C4F5CD90731F41C6BA2
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX6 Bootload: %~n0..booter.exe -copy 0x3A800 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):741679
                      Entropy (8bit):3.3787652271328286
                      Encrypted:false
                      SSDEEP:12288:Pz13L3BiigW2i2uqhMSIY/hSsQLqwH/g+mgl6HOCZn:Pzaf
                      MD5:BD5E717AEFD02037723B196D249CC183
                      SHA1:8CB2BEB61F61984E0CBDBDE94E22089C7383AC84
                      SHA-256:7A8946F7E2F96DBC2DED5C97B5558F4277BB26A47023A30F8B156F03F7CFCC22
                      SHA-512:43D4A9661D92ACB584B03E2514B84D699430ED74E4D61DFF45C1B8CE066CE9CDB27C8BCA66C653BEC58AFF491D95BD57EBA066626B9E6618DC81EB08CB16AB64
                      Malicious:false
                      Preview::020000040000fa..:0800000090350400000000002f..:020000040000fa..:1000080004300000083000000c3000001030000000..:1000180014300000183000001c30000020300000b0..:1000280024300000283000002c3000003030000060..:1000380034300000383000003c3000004030000010..:1000480044300000483000004c30000050300000c0..:1000580054300000583000005c3000006030000070..:1000680064300000683000006c3000007030000020..:1000780074300000783000007c30000080300000d0..:1000880084300000883000008c3000009030000080..:1000980094300000983000009c300000a030000030..:1000a800a4300000a8300000ac300000b0300000e0..:1000b800b4300000b8300000bc300000c030000090..:1000c800c4300000c8300000cc300000d030000040..:1000d800d4300000d8300000dc300000e0300000f0..:1000e800e4300000e8300000ec300000f0300000a0..:1000f800f4300000f8300000fc300000003100004f..:1001080004310000083100000c31000010310000fb..:1001180014310000183100001c31000020310000ab..:1001280024310000283100002c310000303100005b..:1001380034310000383100003c310000403100000b..:1001480044310000483100004c3100005031
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.758242691024847
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvkZAb+fRFUK2vOVPFt98zNCIv:hevgJXi6PPqRCS
                      MD5:B3E5875611A7950F56A82EE3CD1E271B
                      SHA1:52CDD253F4E142D4E834B359B2FFABE5C126DCAA
                      SHA-256:7B87569B590F6D6E434638EB5242785F6F5A1EF98EB63ECF93FA8408BEC9CB42
                      SHA-512:AA7034EBBD36BD064C4C18624B98F185EEA277EAE728CF33E4DD9451A439D37C5652D2440668C97669E8F77889AD7DFB263974BE01F1B8F1ADE8BC3E55EB0E5D
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX3 Bootload: %~n0..booter.exe -copy 0x2A000 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):334821
                      Entropy (8bit):3.296637841715141
                      Encrypted:false
                      SSDEEP:1536:bS1CmtHqiix2BwOTY3+oG2FO6s7CdrUpaX9zNhREz3YEwE58ab2Us+HSOluMWX5w:/H89x6fZdZphcAUfgOAnAGQRl7
                      MD5:32ADB156B64D4A3BF8EA9E521769C683
                      SHA1:3E8D4C14296BD395AA84FE8CD311B3217E4553C0
                      SHA-256:FBBE84FE5450F1D1BEC9A7B830FB2C0830E77EC19B85C4D1BAF7809B61FDC9E3
                      SHA-512:38A1741EDB7283C3AF7142BA6A844A4FFA4459F53F61D56C9BEA31A4B8AA26DF05F4D6C04A387A3D48C8B31942A75CAC0D05D64C8770A1F02110D4B25EC379BE
                      Malicious:false
                      Preview::020000040000fa..:080000001015040000000000cf..:020000040000fa..:102a20006fe522000e7f24000e01880000000000e8..:102a30000c00070040992e00010020001100070043..:102a4000000020000000e000020032000000020050..:102a500000000000e6ca0200000000000040da00aa..:102a60000000fe004440a900603021000000e000aa..:102a70000300320000002000a00188004440a800ac..:102a80000000060091018800800078000000eb0043..:102a900015003700e280400032a0b4009101ba0076..:102aa000e280400032a0b4009102ba00e28040000f..:102ab00032a0b4000002eb00472bde00f507b200a5..:102ac000602ce10004003a000059eb008301e900aa..:102ad000fdff3e00040037006128e10001003200e4..:102ae0000082eb00040007001101ba000200e000c0..:102af000e8ff3a00000006003159ba008301e900fe..:102b00000c0032002159ba008301e90008003200ac..:102b10000400e00003003a00e280400032a0b4006c..:102b2000f5ff370011d9ba008301e900faff3a0036..:102b30008100e800e180400032a0b40000000600ff..:102b400096f404000000000060fa04000000000099..:102b5000dcf9040000000000daf9040000000000c5..:102b6000ccf90400000000001efa04000000
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.758242691024847
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvkZAb+fRFUK2vOVPFt98zNCIv:hevgJXi6PPqRCS
                      MD5:B3E5875611A7950F56A82EE3CD1E271B
                      SHA1:52CDD253F4E142D4E834B359B2FFABE5C126DCAA
                      SHA-256:7B87569B590F6D6E434638EB5242785F6F5A1EF98EB63ECF93FA8408BEC9CB42
                      SHA-512:AA7034EBBD36BD064C4C18624B98F185EEA277EAE728CF33E4DD9451A439D37C5652D2440668C97669E8F77889AD7DFB263974BE01F1B8F1ADE8BC3E55EB0E5D
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX3 Bootload: %~n0..booter.exe -copy 0x2A000 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):337121
                      Entropy (8bit):3.2902188223876294
                      Encrypted:false
                      SSDEEP:1536:yt54CmtVuiuZ21w/TgADOWzt8AuC/B8IImIIUIPv/MnQueAtc35pMXgrget6o+F3:cxzUk5QO3fkHqbUxd8JSb7
                      MD5:79D2A921B36F8D8BA223C1693D1BFFBF
                      SHA1:8E5A13D2D094A08A108A25C690C29F9637D6C124
                      SHA-256:E482F652BDAC3396FC27BF75424206E2CBFC8F856593D8D764121C0BD820ED19
                      SHA-512:E87B6975C11F1A7AC146E9EA2C20D10FB89EB379E992D85B7AF336672BB430C3424292DB5A8505CFEAECC4977D79C4E4028073F115BA6F5A8B228C365E1714A5
                      Malicious:false
                      Preview::020000040000fa..:080000001015040000000000cf..:020000040000fa..:102a20000fe422000e7f24000e0188000000000049..:102a30000c000700c0a92e000100200011000700b3..:102a4000000020000000e000020032000000020050..:102a50000000000088cb0200000000000040da0007..:102a60000000fe004440a900a03121000000e00069..:102a70000300320000002000a00188004440a800ac..:102a80000000060091018800800078000000eb0043..:102a900015003700e280400032a0b4009101ba0076..:102aa000e280400032a0b4009102ba00e28040000f..:102ab00032a0b4000002eb00472bde00f507b200a5..:102ac000602ce10004003a000059eb008301e900aa..:102ad000fdff3e00040037006128e10001003200e4..:102ae0000082eb00040007001101ba000200e000c0..:102af000e8ff3a00000006003159ba008301e900fe..:102b00000c0032002159ba008301e90008003200ac..:102b10000400e00003003a00e280400032a0b4006c..:102b2000f5ff370011d9ba008301e900faff3a0036..:102b30008100e800e180400032a0b40000000600ff..:102b40008cf504000000000060fc040000000000a0..:102b5000dcfb040000000000dafb040000000000c1..:102b6000ccfb0400000000001efc04000000
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):115200
                      Entropy (8bit):6.4799426777001425
                      Encrypted:false
                      SSDEEP:3072:OZN2VprpIak+a4uTSnEFH+IkoSQMjP7e:CsPIBlmESQ0K
                      MD5:162874F2AC02AE9D085356139523D079
                      SHA1:52DABDCFF93FCC80C6A60AEB92C8E6D552557F78
                      SHA-256:A9B24E41BA27B039E0E2C75A0EE5FCC837B8694DCCD130175A69DE3A84C0A8E0
                      SHA-512:7B93C3D83E7F00C1B16314920EE18E09D7EE32B18F84EEF28AF268B1D02F2B3906EB206AE76FCB4126E436B59F6A19E000C16FEAD9DB2FD071E933721F018687
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2..yvn.*vn.*vn.*{<e*Qn.*{<[*an.*{<d*.n.*...*sn.*vn.*.n.*S.`*rn.*S.X*wn.*{<_*wn.*S.Z*wn.*Richvn.*................PE..L.....*T.................2...........Y.......P....@..........................0............@....................................<....................................Q..8...........................@...@............P..h............................text....1.......2.................. ..`.rdata...c...P...d...6..............@..@.data...h2..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:Generic INItialization configuration [AX664]
                      Category:dropped
                      Size (bytes):935
                      Entropy (8bit):5.133101727156174
                      Encrypted:false
                      SSDEEP:24:cPhJF/3LiRkFwYFy7Fqd6rupVPo2dk9yc:cJJxiR08S6ypVPldk0c
                      MD5:56F0ECE0585EAE72AD15E40E21D1D2C2
                      SHA1:E6D28934D8E754717DCBC98376D0B3DCFD4C7AA5
                      SHA-256:79FE0C6E5783FAD4B04AE72AE35B3B56D9D74D182238A9E4E48AD4D7FF916F60
                      SHA-512:87DE83E5A1D337E81F3D9A88D97CB880000BB1AFE3AEC4C10A49757FC02B2EE2BD658A8BE36C9FC93209A056855975DB1C4FA300C57947AAF163C85EC1D0800A
                      Malicious:false
                      Preview:; Bootload configuration file....; V36 base version..; V42 added Spansion NAND to whitelist, had incorrect optimizer setting (size)..; V44 fix for optimizer setting (speed)..; V45 added Micro NAND to whitelist..; V46 USB descriptors changed for Linux and Mac compatibility..; V47 removed main code pre-charge loop (retains bootloader pre-charge)..; V48 extended serial number from 16- to 32-bits....[CWA17].._version=CWA17_45.._executable=firmware\CWA17_45.cmd..CWA17_42=V42 is known to have a potential problem which can limit the recording duration...;CWA17_44=V44 is temporarily marked for upgrade just for debugging.....[AX664].._version=AX664_51.._executable=firmware\AX664_51.cmd..;AX664_10=V10 (internal) is out of date...;AX664_46=V46 (internal) is out of date...;AX664_47=V47 (internal) is out of date...;AX664_48=V48 (internal) is out of date...;AX664_49=V49 (internal) is out of date...;AX664_50=V50 (beta) is out of date...
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):741679
                      Entropy (8bit):3.3787652271328286
                      Encrypted:false
                      SSDEEP:12288:Pz13L3BiigW2i2uqhMSIY/hSsQLqwH/g+mgl6HOCZn:Pzaf
                      MD5:BD5E717AEFD02037723B196D249CC183
                      SHA1:8CB2BEB61F61984E0CBDBDE94E22089C7383AC84
                      SHA-256:7A8946F7E2F96DBC2DED5C97B5558F4277BB26A47023A30F8B156F03F7CFCC22
                      SHA-512:43D4A9661D92ACB584B03E2514B84D699430ED74E4D61DFF45C1B8CE066CE9CDB27C8BCA66C653BEC58AFF491D95BD57EBA066626B9E6618DC81EB08CB16AB64
                      Malicious:false
                      Preview::020000040000fa..:0800000090350400000000002f..:020000040000fa..:1000080004300000083000000c3000001030000000..:1000180014300000183000001c30000020300000b0..:1000280024300000283000002c3000003030000060..:1000380034300000383000003c3000004030000010..:1000480044300000483000004c30000050300000c0..:1000580054300000583000005c3000006030000070..:1000680064300000683000006c3000007030000020..:1000780074300000783000007c30000080300000d0..:1000880084300000883000008c3000009030000080..:1000980094300000983000009c300000a030000030..:1000a800a4300000a8300000ac300000b0300000e0..:1000b800b4300000b8300000bc300000c030000090..:1000c800c4300000c8300000cc300000d030000040..:1000d800d4300000d8300000dc300000e0300000f0..:1000e800e4300000e8300000ec300000f0300000a0..:1000f800f4300000f8300000fc300000003100004f..:1001080004310000083100000c31000010310000fb..:1001180014310000183100001c31000020310000ab..:1001280024310000283100002c310000303100005b..:1001380034310000383100003c310000403100000b..:1001480044310000483100004c3100005031
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.7796597855256095
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvDvDAb+fRFUK2v9XVFoq98zNCIv:hevbDJXi9XVFoqqRCS
                      MD5:AD509AD20E7A48AB060D8433483AD9B5
                      SHA1:0E566D999A2CE33DCD6FCA3206E4D54A1EAD0A4C
                      SHA-256:047AA251D846EE9179299A5591DBEE119D71DB4EA20F15D45CFCC338D0AB3695
                      SHA-512:7F2CF5636B8138128F150681F3B4FA84F8355620435BB80233D7C9960A0C3EBFC47AF4B507D35EEE324E1F75E02E24D609C505BF35A63C4F5CD90731F41C6BA2
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX6 Bootload: %~n0..booter.exe -copy 0x3A800 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):337121
                      Entropy (8bit):3.2902188223876294
                      Encrypted:false
                      SSDEEP:1536:yt54CmtVuiuZ21w/TgADOWzt8AuC/B8IImIIUIPv/MnQueAtc35pMXgrget6o+F3:cxzUk5QO3fkHqbUxd8JSb7
                      MD5:79D2A921B36F8D8BA223C1693D1BFFBF
                      SHA1:8E5A13D2D094A08A108A25C690C29F9637D6C124
                      SHA-256:E482F652BDAC3396FC27BF75424206E2CBFC8F856593D8D764121C0BD820ED19
                      SHA-512:E87B6975C11F1A7AC146E9EA2C20D10FB89EB379E992D85B7AF336672BB430C3424292DB5A8505CFEAECC4977D79C4E4028073F115BA6F5A8B228C365E1714A5
                      Malicious:false
                      Preview::020000040000fa..:080000001015040000000000cf..:020000040000fa..:102a20000fe422000e7f24000e0188000000000049..:102a30000c000700c0a92e000100200011000700b3..:102a4000000020000000e000020032000000020050..:102a50000000000088cb0200000000000040da0007..:102a60000000fe004440a900a03121000000e00069..:102a70000300320000002000a00188004440a800ac..:102a80000000060091018800800078000000eb0043..:102a900015003700e280400032a0b4009101ba0076..:102aa000e280400032a0b4009102ba00e28040000f..:102ab00032a0b4000002eb00472bde00f507b200a5..:102ac000602ce10004003a000059eb008301e900aa..:102ad000fdff3e00040037006128e10001003200e4..:102ae0000082eb00040007001101ba000200e000c0..:102af000e8ff3a00000006003159ba008301e900fe..:102b00000c0032002159ba008301e90008003200ac..:102b10000400e00003003a00e280400032a0b4006c..:102b2000f5ff370011d9ba008301e900faff3a0036..:102b30008100e800e180400032a0b40000000600ff..:102b40008cf504000000000060fc040000000000a0..:102b5000dcfb040000000000dafb040000000000c1..:102b6000ccfb0400000000001efc04000000
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:Generic INItialization configuration [AX664]
                      Category:dropped
                      Size (bytes):935
                      Entropy (8bit):5.133101727156174
                      Encrypted:false
                      SSDEEP:24:cPhJF/3LiRkFwYFy7Fqd6rupVPo2dk9yc:cJJxiR08S6ypVPldk0c
                      MD5:56F0ECE0585EAE72AD15E40E21D1D2C2
                      SHA1:E6D28934D8E754717DCBC98376D0B3DCFD4C7AA5
                      SHA-256:79FE0C6E5783FAD4B04AE72AE35B3B56D9D74D182238A9E4E48AD4D7FF916F60
                      SHA-512:87DE83E5A1D337E81F3D9A88D97CB880000BB1AFE3AEC4C10A49757FC02B2EE2BD658A8BE36C9FC93209A056855975DB1C4FA300C57947AAF163C85EC1D0800A
                      Malicious:false
                      Preview:; Bootload configuration file....; V36 base version..; V42 added Spansion NAND to whitelist, had incorrect optimizer setting (size)..; V44 fix for optimizer setting (speed)..; V45 added Micro NAND to whitelist..; V46 USB descriptors changed for Linux and Mac compatibility..; V47 removed main code pre-charge loop (retains bootloader pre-charge)..; V48 extended serial number from 16- to 32-bits....[CWA17].._version=CWA17_45.._executable=firmware\CWA17_45.cmd..CWA17_42=V42 is known to have a potential problem which can limit the recording duration...;CWA17_44=V44 is temporarily marked for upgrade just for debugging.....[AX664].._version=AX664_51.._executable=firmware\AX664_51.cmd..;AX664_10=V10 (internal) is out of date...;AX664_46=V46 (internal) is out of date...;AX664_47=V47 (internal) is out of date...;AX664_48=V48 (internal) is out of date...;AX664_49=V49 (internal) is out of date...;AX664_50=V50 (beta) is out of date...
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):334821
                      Entropy (8bit):3.296637841715141
                      Encrypted:false
                      SSDEEP:1536:bS1CmtHqiix2BwOTY3+oG2FO6s7CdrUpaX9zNhREz3YEwE58ab2Us+HSOluMWX5w:/H89x6fZdZphcAUfgOAnAGQRl7
                      MD5:32ADB156B64D4A3BF8EA9E521769C683
                      SHA1:3E8D4C14296BD395AA84FE8CD311B3217E4553C0
                      SHA-256:FBBE84FE5450F1D1BEC9A7B830FB2C0830E77EC19B85C4D1BAF7809B61FDC9E3
                      SHA-512:38A1741EDB7283C3AF7142BA6A844A4FFA4459F53F61D56C9BEA31A4B8AA26DF05F4D6C04A387A3D48C8B31942A75CAC0D05D64C8770A1F02110D4B25EC379BE
                      Malicious:false
                      Preview::020000040000fa..:080000001015040000000000cf..:020000040000fa..:102a20006fe522000e7f24000e01880000000000e8..:102a30000c00070040992e00010020001100070043..:102a4000000020000000e000020032000000020050..:102a500000000000e6ca0200000000000040da00aa..:102a60000000fe004440a900603021000000e000aa..:102a70000300320000002000a00188004440a800ac..:102a80000000060091018800800078000000eb0043..:102a900015003700e280400032a0b4009101ba0076..:102aa000e280400032a0b4009102ba00e28040000f..:102ab00032a0b4000002eb00472bde00f507b200a5..:102ac000602ce10004003a000059eb008301e900aa..:102ad000fdff3e00040037006128e10001003200e4..:102ae0000082eb00040007001101ba000200e000c0..:102af000e8ff3a00000006003159ba008301e900fe..:102b00000c0032002159ba008301e90008003200ac..:102b10000400e00003003a00e280400032a0b4006c..:102b2000f5ff370011d9ba008301e900faff3a0036..:102b30008100e800e180400032a0b40000000600ff..:102b400096f404000000000060fa04000000000099..:102b5000dcf9040000000000daf9040000000000c5..:102b6000ccf90400000000001efa04000000
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.758242691024847
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvkZAb+fRFUK2vOVPFt98zNCIv:hevgJXi6PPqRCS
                      MD5:B3E5875611A7950F56A82EE3CD1E271B
                      SHA1:52CDD253F4E142D4E834B359B2FFABE5C126DCAA
                      SHA-256:7B87569B590F6D6E434638EB5242785F6F5A1EF98EB63ECF93FA8408BEC9CB42
                      SHA-512:AA7034EBBD36BD064C4C18624B98F185EEA277EAE728CF33E4DD9451A439D37C5652D2440668C97669E8F77889AD7DFB263974BE01F1B8F1ADE8BC3E55EB0E5D
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX3 Bootload: %~n0..booter.exe -copy 0x2A000 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):115200
                      Entropy (8bit):6.4799426777001425
                      Encrypted:false
                      SSDEEP:3072:OZN2VprpIak+a4uTSnEFH+IkoSQMjP7e:CsPIBlmESQ0K
                      MD5:162874F2AC02AE9D085356139523D079
                      SHA1:52DABDCFF93FCC80C6A60AEB92C8E6D552557F78
                      SHA-256:A9B24E41BA27B039E0E2C75A0EE5FCC837B8694DCCD130175A69DE3A84C0A8E0
                      SHA-512:7B93C3D83E7F00C1B16314920EE18E09D7EE32B18F84EEF28AF268B1D02F2B3906EB206AE76FCB4126E436B59F6A19E000C16FEAD9DB2FD071E933721F018687
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2..yvn.*vn.*vn.*{<e*Qn.*{<[*an.*{<d*.n.*...*sn.*vn.*.n.*S.`*rn.*S.X*wn.*{<_*wn.*S.Z*wn.*Richvn.*................PE..L.....*T.................2...........Y.......P....@..........................0............@....................................<....................................Q..8...........................@...@............P..h............................text....1.......2.................. ..`.rdata...c...P...d...6..............@..@.data...h2..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):100
                      Entropy (8bit):4.758242691024847
                      Encrypted:false
                      SSDEEP:3:mKDDVBFFyvkZAb+fRFUK2vOVPFt98zNCIv:hevgJXi6PPqRCS
                      MD5:B3E5875611A7950F56A82EE3CD1E271B
                      SHA1:52CDD253F4E142D4E834B359B2FFABE5C126DCAA
                      SHA-256:7B87569B590F6D6E434638EB5242785F6F5A1EF98EB63ECF93FA8408BEC9CB42
                      SHA-512:AA7034EBBD36BD064C4C18624B98F185EEA277EAE728CF33E4DD9451A439D37C5652D2440668C97669E8F77889AD7DFB263974BE01F1B8F1ADE8BC3E55EB0E5D
                      Malicious:false
                      Preview:@echo off..cd /d %~dp0..echo AX3 Bootload: %~n0..booter.exe -copy 0x2A000 8 -timeout 15 "%~n0.hex"..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3227197
                      Entropy (8bit):6.289855362233436
                      Encrypted:false
                      SSDEEP:49152:+dx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjK333yD:/HDYsqiPRhINnq95FoHVBK3338
                      MD5:B507E2C856B2EE24E3E2142B831E0B9F
                      SHA1:44CA805FCF65745FAA403F35E61FBFB7DAEEE850
                      SHA-256:F827E6209A340544E4986DA98747AC822D52F88A6C7811872DDC2E3CCB4D3E72
                      SHA-512:B96644A7FEDAD50244FFC25D77DE0527980A350E60B9D9B24372838B19D983A890E189A01A6ADECEDE6B0940AA611C7EE8A7D623CC1264DBAB01C513B7D3E59B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 5%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,.........`V,......`,...@...........................1...........@......@....................-.......-..9............................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc................"-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1641984
                      Entropy (8bit):7.012562124222005
                      Encrypted:false
                      SSDEEP:49152:s+4PCNQWsNQWsNQWsNQWsNQWsNQWh4NQW:sMuuuuuU
                      MD5:12FEEE099449453BA386F8FBA6C72090
                      SHA1:4BE776CF3F768BAD8F10CA885227494972CBCEBE
                      SHA-256:E96445F1DEA2B0B630ADE704C5C478C0E50A71645473F11297FE7DED2D9F9197
                      SHA-512:E21262C048DAA24BDAEF0F08D544CE06ADE5DF32D99D8D1967F76984AA8ED3780B8E8E03F2C0FE873D578BC52AA0A49F5A814D4B6146BCE13BC65CEEBEE6F95E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2H`c..............0......~........... ........@.. .......................`............@.....................................O.......8{...................@......t................................................ ............... ..H............text...\.... ...................... ..`.rsrc...8{.......|..................@..@.reloc.......@......................@..B.......................H.......0>...;...........y...0............................................( ...*.0...........(.......(.....*.................0..........~!.....~!.....i......~!.....o......-}...I...("...(#...tI...}....~!............($...-....J...("...(#...tJ...}....~!............($...-....K...("...(#...tK...}.....*.*.0..............7.....~....}........Yn(%...}.......}........Yn(%...}.......}...... .@. (&... ...._-..+. ...@`(&... ...._-..+. ....`}........('.....((...s....}.......}.......o....&*
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):206848
                      Entropy (8bit):6.617501453617938
                      Encrypted:false
                      SSDEEP:6144:McgtGETY7RhzLkLS8smeiOe/Tg18j/zyC:sTYzzLkLSmeiL/Tk8zGC
                      MD5:5B075AE6C4F10D56EF8D6A8B275DC3ED
                      SHA1:F3159D2A45C7373A790CB118B0D534F53DF18333
                      SHA-256:7B87B238F6AB12DE618BF86EC10B71481E30529EA6F06A102C004BEBD488DE02
                      SHA-512:4B50E32D484D3A0894192E6137AC96C99BAABEE4B49DAC6E442B1963AA7517E2D4BF75FCBC781A0C8BFE300FDAD77B4A376BE3528CA0E63B51959DFB1151E99C
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........r..!..!..!h.r!..!h.p!D..!h.q!..!B+D!..!.. ..!.. ..!.. ...!...!..!...!..!..!...!y. ..!y. ..!y.|!..!y. ..!Rich..!........PE..L....H`c...........!.....Z..........;........p...............................`............@.........................`...t............0.......................@..........p...........................0...@............p..H............................text....Y.......Z.................. ..`.rdata..\....p.......^..............@..@.data...............................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):930090
                      Entropy (8bit):7.977011759378819
                      Encrypted:false
                      SSDEEP:24576:5naARrEWuWdE8cb6IcDVPK6O8XwYJGQJxkTC:5a978y6bDVPKkZh
                      MD5:0ABD9CF2D191036D778F6F1FBE25FAE1
                      SHA1:89D8721A34C9DD33DBE3E84D88CF74E7B5C48499
                      SHA-256:8274A7E0259278A1CE04260115E6C96AD0917A37971E8CA58ABEEB6D92AB2615
                      SHA-512:17BDA1DE1606B554C7030E5210DD97148AE20819CAFC1B142721937D5C9784F3FF1E735E31BB608DEF81F0352A0A59CF6843617F2B802EAA11933086D954B8A5
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......@.............@..........................@...................@..............................P........,..........................................................................................................CODE....d........................... ..`DATA....L...........................@...BSS.....L................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):30720
                      Entropy (8bit):5.561090262634769
                      Encrypted:false
                      SSDEEP:768:G9ivcgdQIeVAOrajN/ccIjOBHaHi6ej0hQ:G9ikgd0Vt+h8FC6eYhQ
                      MD5:5083DA882E58C045E46391E8AC35456F
                      SHA1:9EAE2AA46772286D5ABA504009ED0492031BC102
                      SHA-256:BB2B868D313942BAFEDF896F19C7BE8CA91725A44C29E916DB8FBFB837087EE2
                      SHA-512:1CE7025532A3E98FD420A5EAF5BC0E2BCCCB1141AD803C01F8D286805029932DB41EDDDAFAF97FC6300061D6570980E4F79B219E89D3FD25DD6337923F63D304
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H`c...........!..0..n..........n.... ........... ....................................@.....................................O................................................................................... ............... ..H............text...tm... ...n.................. ..`.rsrc................p..............@..@.reloc...............v..............@..B................P.......H........:...Q..........................................................^~....-.s.........~....*.0...........s....}.....s....}.....(............s......}.......{....(.......{....~....(....&........s......}.......{....(.......{....~....(....&.l(....r...p(............s......}.......{....(.......{....~....(?...&*...0............(.......(.....*..................."..(....*....0..F........{....-=.&(....&...{....,....{....(.......{....,....{....(......}....*F.(G...,...s....z*.0..X...
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows icon resource - 12 icons, 48x48, 16 colors, 4 bits/pixel, 32x32, 16 colors, 4 bits/pixel
                      Category:dropped
                      Size (bytes):29926
                      Entropy (8bit):5.218447102517391
                      Encrypted:false
                      SSDEEP:384:+nBHx5lVcxQSv2Kf9KKUnuA8YQV/xCs3gKJZAUL4p1zKX311o6C:6B7tSUKUuA8YQVpCs3ggSS4p1zq11TC
                      MD5:875539C4A4049BDD4D3AB2A7C7499438
                      SHA1:8F3155CA9A39CCCD0620894BFF19DB0E44DEB742
                      SHA-256:CAAAF43617BA6F896E7347CC239CE95BC5CA2CF31DAE225B827371DD71D3FEB2
                      SHA-512:6EA74CB7011E2291015704E258C03FEAC75CE20B8B6FD8F0C60684A77D0488D5D80834DA24A07E8F8EC4AB90F32B4FDD734C7F8259F56273EBE17E0B8A06A204
                      Malicious:false
                      Preview:......00......h....... ......................................(.......00..........&... ..........................v$..........h...>+..00.... ..%...0.. .... .....NV........ ......f........ .h...~p..(...0...`.................................................................................................................................................................................................................................................................................x............................................{x..x.....................{x....................w{......................;y.{x...................y.{.............................................sx.{....................;{w.{....................{{77......................w.7s..................{{z..3{.....................z.sx..................{.....................{{..z...p................w......................w......z.p.................x.....x..............{xx...z.zz..............x..x....................s.....;.j{`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):206848
                      Entropy (8bit):6.617501453617938
                      Encrypted:false
                      SSDEEP:6144:McgtGETY7RhzLkLS8smeiOe/Tg18j/zyC:sTYzzLkLSmeiL/Tk8zGC
                      MD5:5B075AE6C4F10D56EF8D6A8B275DC3ED
                      SHA1:F3159D2A45C7373A790CB118B0D534F53DF18333
                      SHA-256:7B87B238F6AB12DE618BF86EC10B71481E30529EA6F06A102C004BEBD488DE02
                      SHA-512:4B50E32D484D3A0894192E6137AC96C99BAABEE4B49DAC6E442B1963AA7517E2D4BF75FCBC781A0C8BFE300FDAD77B4A376BE3528CA0E63B51959DFB1151E99C
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........r..!..!..!h.r!..!h.p!D..!h.q!..!B+D!..!.. ..!.. ..!.. ...!...!..!...!..!..!...!y. ..!y. ..!y.|!..!y. ..!Rich..!........PE..L....H`c...........!.....Z..........;........p...............................`............@.........................`...t............0.......................@..........p...........................0...@............p..H............................text....Y.......Z.................. ..`.rdata..\....p.......^..............@..@.data...............................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):930090
                      Entropy (8bit):7.977011759378819
                      Encrypted:false
                      SSDEEP:24576:5naARrEWuWdE8cb6IcDVPK6O8XwYJGQJxkTC:5a978y6bDVPKkZh
                      MD5:0ABD9CF2D191036D778F6F1FBE25FAE1
                      SHA1:89D8721A34C9DD33DBE3E84D88CF74E7B5C48499
                      SHA-256:8274A7E0259278A1CE04260115E6C96AD0917A37971E8CA58ABEEB6D92AB2615
                      SHA-512:17BDA1DE1606B554C7030E5210DD97148AE20819CAFC1B142721937D5C9784F3FF1E735E31BB608DEF81F0352A0A59CF6843617F2B802EAA11933086D954B8A5
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......@.............@..........................@...................@..............................P........,..........................................................................................................CODE....d........................... ..`DATA....L...........................@...BSS.....L................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:InnoSetup Log OmGui {8CDD410D-4556-4A8A-BF86-D67276A10EA5}, version 0x418, 26449 bytes, 376483\37\user\37, C:\Program Files (x86)\Open Movement\OM GU
                      Category:dropped
                      Size (bytes):26449
                      Entropy (8bit):3.674967140919137
                      Encrypted:false
                      SSDEEP:768:g/qDfb0zaQv/4pnYyS3z3M8JiIKerbFgxJOZ8FDFFVdpsZwVSpoZR9KV0pHL2Zqi:gy0zaQv/4pnYyS3z3M8JiIKerbFgxJO/
                      MD5:861EF31D849EB6BAF16CB8B47F12F557
                      SHA1:8D4C571F5114243849ED80677933AD4D0C945445
                      SHA-256:A41A159EAD13679F27F9093FEC2B68BA2BCEBEB39EC7A77CC3133D87AB6F506C
                      SHA-512:4966F44D132C42B9D688856B7E777DB4342BAB795799A572C09119238F4CC0A31E4537C4E1D5B7BA3A2BB2E79FF57DEDE5061D488F627F142D78115397585E95
                      Malicious:false
                      Preview:Inno Setup Uninstall Log (b)....................................{8CDD410D-4556-4A8A-BF86-D67276A10EA5}..........................................................................................OmGui...............................................................................................................................p...Qg....................................................................................................................#.........u/+................3.7.6.4.8.3......t.o.r.r.e.s......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.O.p.e.n. .M.o.v.e.m.e.n.t.\.O.M. .G.U.I..................&.... .....8........IFPS....#........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.........TMSGBOXTYPE.........TEXECWAIT....
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3227197
                      Entropy (8bit):6.289855362233436
                      Encrypted:false
                      SSDEEP:49152:+dx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjK333yD:/HDYsqiPRhINnq95FoHVBK3338
                      MD5:B507E2C856B2EE24E3E2142B831E0B9F
                      SHA1:44CA805FCF65745FAA403F35E61FBFB7DAEEE850
                      SHA-256:F827E6209A340544E4986DA98747AC822D52F88A6C7811872DDC2E3CCB4D3E72
                      SHA-512:B96644A7FEDAD50244FFC25D77DE0527980A350E60B9D9B24372838B19D983A890E189A01A6ADECEDE6B0940AA611C7EE8A7D623CC1264DBAB01C513B7D3E59B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 5%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,.........`V,......`,...@...........................1...........@......@....................-.......-..9............................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc................"-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows icon resource - 12 icons, 48x48, 16 colors, 4 bits/pixel, 32x32, 16 colors, 4 bits/pixel
                      Category:dropped
                      Size (bytes):29926
                      Entropy (8bit):5.218447102517391
                      Encrypted:false
                      SSDEEP:384:+nBHx5lVcxQSv2Kf9KKUnuA8YQV/xCs3gKJZAUL4p1zKX311o6C:6B7tSUKUuA8YQVpCs3ggSS4p1zq11TC
                      MD5:875539C4A4049BDD4D3AB2A7C7499438
                      SHA1:8F3155CA9A39CCCD0620894BFF19DB0E44DEB742
                      SHA-256:CAAAF43617BA6F896E7347CC239CE95BC5CA2CF31DAE225B827371DD71D3FEB2
                      SHA-512:6EA74CB7011E2291015704E258C03FEAC75CE20B8B6FD8F0C60684A77D0488D5D80834DA24A07E8F8EC4AB90F32B4FDD734C7F8259F56273EBE17E0B8A06A204
                      Malicious:false
                      Preview:......00......h....... ......................................(.......00..........&... ..........................v$..........h...>+..00.... ..%...0.. .... .....NV........ ......f........ .h...~p..(...0...`.................................................................................................................................................................................................................................................................................x............................................{x..x.....................{x....................w{......................;y.{x...................y.{.............................................sx.{....................;{w.{....................{{77......................w.7s..................{{z..3{.....................z.sx..................{.....................{{..z...p................w......................w......z.p.................x.....x..............{xx...z.zz..............x..x....................s.....;.j{`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):921992
                      Entropy (8bit):5.698587665358091
                      Encrypted:false
                      SSDEEP:6144:EZtaKSpwmx5ATm/LC3fwf3OoU9xkYSr/mdBTRhKWIjsRP/1HHm/hHAM8i6r+LyIU:EZxSpwmxvL/f3vCN1PMaLi6rAyIQjF
                      MD5:30A0AFEE4AEA59772DB6434F1C0511AB
                      SHA1:5D5C2D9B7736E018D2B36963E834D1AA0E32AF09
                      SHA-256:D84149976BC94A21B21AA0BC99FCBDEE9D1AD4F3387D8B62B90F805AC300BA05
                      SHA-512:5E8A85E2D028AD351BE255AE2C39BB518A10A4A467FD656E2472286FEE504EED87AFE7D4A728D7F8BC4261245C1DB8577DEEEE2388F39EB7EE48298E37949F53
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p..o4..<4..<4..<=.`<"..<=.v<...<=.f<)..<4..<@..<=.q<o..<=.a<5..<=.d<5..<Rich4..<................PE..L......J................. ..........j........0...............................0......p.....@...... ..............................,....p..lY......................XC...................................=..@...............L............................text............ .................. ..`.data...`>...0.......$..............@....rsrc....`...p...Z...<..............@..@.reloc..._.......`..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1050104
                      Entropy (8bit):5.617498652730841
                      Encrypted:false
                      SSDEEP:12288:uIId79EaUTvwieMozMEcOigSpuPMaLium:xIdqaWw1MsbTScP0
                      MD5:BE3C79033FA8302002D9D3A6752F2263
                      SHA1:A01147731F2E500282ECA5ECE149BCC5423B59D6
                      SHA-256:181BF85D3B5900FF8ABED34BC415AFC37FC322D9D7702E14D144F96A908F5CAB
                      SHA-512:77097F220CC6D22112B314D3E42B6EEDB9CCD72BEB655B34656326C2C63FB9209977DDAC20E9C53C4EC7CCC8EA6910F400F050F4B0CB98C9F42F89617965AAEA
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g9I.#X'.#X'.#X'.* ..!X'.* ..7X'.* ..<X'.#X&.Y'.* ..fX'.* ...X'...Y."X'.* .."X'.* .."X'.Rich#X'.................PE..d......J..........".......................................................................@.......... ......................................H...@.......pY...0..\m.......%...........................................................................................text............................... ..`.data... ...........................@....pdata..\m...0...n..................@..@.rsrc....`.......Z...v..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):715038
                      Entropy (8bit):6.506108541840392
                      Encrypted:false
                      SSDEEP:12288:RRObekMtkfohrPUs37uzHnA6zgpKq35eERXprNrHIR3+j1vGgZpDExycl:LObekYkfohrP337uzHnA6cgqpeEFHR9+
                      MD5:4E28A215B82F587828879C6B4252617E
                      SHA1:7AE5C9C4816AA1E1B2F112D25167E39C6F2F24C8
                      SHA-256:8AB70A2820EF47EF5D97AE7B4F41FA9F4FAB3C4273893E8A0908A36FD0DD8F13
                      SHA-512:97AD579FFCB7D11B5CB1F1EB9FCAEA83F889E504C187592424381980F9B951B928091B8E587979B9CB68A2BE4A01D7B757D616A667BE7D651F6846AD4341C0CE
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 4%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f..........pr............@..............................................@...............................%..................................................................................................................CODE.....d.......f.................. ..`DATA.................j..............@...BSS..................|...................idata...%.......&...|..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):921992
                      Entropy (8bit):5.698587665358091
                      Encrypted:false
                      SSDEEP:6144:EZtaKSpwmx5ATm/LC3fwf3OoU9xkYSr/mdBTRhKWIjsRP/1HHm/hHAM8i6r+LyIU:EZxSpwmxvL/f3vCN1PMaLi6rAyIQjF
                      MD5:30A0AFEE4AEA59772DB6434F1C0511AB
                      SHA1:5D5C2D9B7736E018D2B36963E834D1AA0E32AF09
                      SHA-256:D84149976BC94A21B21AA0BC99FCBDEE9D1AD4F3387D8B62B90F805AC300BA05
                      SHA-512:5E8A85E2D028AD351BE255AE2C39BB518A10A4A467FD656E2472286FEE504EED87AFE7D4A728D7F8BC4261245C1DB8577DEEEE2388F39EB7EE48298E37949F53
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p..o4..<4..<4..<=.`<"..<=.v<...<=.f<)..<4..<@..<=.q<o..<=.a<5..<=.d<5..<Rich4..<................PE..L......J................. ..........j........0...............................0......p.....@...... ..............................,....p..lY......................XC...................................=..@...............L............................text............ .................. ..`.data...`>...0.......$..............@....rsrc....`...p...Z...<..............@..@.reloc..._.......`..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1050104
                      Entropy (8bit):5.617498652730841
                      Encrypted:false
                      SSDEEP:12288:uIId79EaUTvwieMozMEcOigSpuPMaLium:xIdqaWw1MsbTScP0
                      MD5:BE3C79033FA8302002D9D3A6752F2263
                      SHA1:A01147731F2E500282ECA5ECE149BCC5423B59D6
                      SHA-256:181BF85D3B5900FF8ABED34BC415AFC37FC322D9D7702E14D144F96A908F5CAB
                      SHA-512:77097F220CC6D22112B314D3E42B6EEDB9CCD72BEB655B34656326C2C63FB9209977DDAC20E9C53C4EC7CCC8EA6910F400F050F4B0CB98C9F42F89617965AAEA
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g9I.#X'.#X'.#X'.* ..!X'.* ..7X'.* ..<X'.#X&.Y'.* ..fX'.* ...X'...Y."X'.* .."X'.* .."X'.Rich#X'.................PE..d......J..........".......................................................................@.......... ......................................H...@.......pY...0..\m.......%...........................................................................................text............................... ..`.data... ...........................@....pdata..\m...0...n..................@..@.rsrc....`.......Z...v..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:InnoSetup Log 64-bit AX3-Driver {C12D7D33-3050-44D8-8ADA-8ADCFA9368A5}, version 0x30, 1802 bytes, 376483\user, "C:\Program Files\AX3-Driver"
                      Category:dropped
                      Size (bytes):1802
                      Entropy (8bit):4.682725354394425
                      Encrypted:false
                      SSDEEP:24:tCwwJbtRg9B30VM+EZVRURyRSIRsGXYgIK/dJSFb7ObKV3aMUbuJs:tjwJhyq4Z7ICSssGIgIK8O2C3
                      MD5:7000C0EE3439C5F32C11CE0DCF6604E5
                      SHA1:F9943A6179E770223ED9FE96315E8C472FB825BA
                      SHA-256:D2376A4F1649F396D97F84F2EA7012008EFE16D74305DB5F6F604519B0E2CD58
                      SHA-512:4E49F38200263C00C11A92567297305AFEB752F4652C371EB9AB1DA99C25E38362BFCE31E265459B155BA03A8C72E42FACBA38EACCEA6F8B50A69E25E5F49269
                      Malicious:false
                      Preview:Inno Setup Uninstall Log (b) 64-bit.............................{C12D7D33-3050-44D8-8ADA-8ADCFA9368A5}..........................................................................................AX3-Driver......................................................................................................................0...........%.................................................................................................................=.>........xIB......<....376483.user.C:\Program Files\AX3-Driver.............,.... ..........IFPS.............................................................................................................BOOLEAN......................!MAIN....-1..IS64BITINSTALLMODE...... .................................C:\Program Files\AX3-Driver>C:\ProgramData\Microsoft\Windows\Start Menu\Programs\(Default).(Default).english...........NameAndVersion....%1 version %2....AdditionalIcons....Additional icons:....CreateDesktopIcon....Create a &desktop icon....Creat
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):715038
                      Entropy (8bit):6.506108541840392
                      Encrypted:false
                      SSDEEP:12288:RRObekMtkfohrPUs37uzHnA6zgpKq35eERXprNrHIR3+j1vGgZpDExycl:LObekYkfohrP337uzHnA6cgqpeEFHR9+
                      MD5:4E28A215B82F587828879C6B4252617E
                      SHA1:7AE5C9C4816AA1E1B2F112D25167E39C6F2F24C8
                      SHA-256:8AB70A2820EF47EF5D97AE7B4F41FA9F4FAB3C4273893E8A0908A36FD0DD8F13
                      SHA-512:97AD579FFCB7D11B5CB1F1EB9FCAEA83F889E504C187592424381980F9B951B928091B8E587979B9CB68A2BE4A01D7B757D616A667BE7D651F6846AD4341C0CE
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 4%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f..........pr............@..............................................@...............................%..................................................................................................................CODE.....d.......f.................. ..`DATA.................j..............@...BSS..................|...................idata...%.......&...|..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Sep 11 06:15:38 2024, mtime=Wed Sep 11 06:15:38 2024, atime=Tue Nov 1 01:12:02 2022, length=1641984, window=hide
                      Category:dropped
                      Size (bytes):1233
                      Entropy (8bit):4.623486380883102
                      Encrypted:false
                      SSDEEP:24:8m/1bXl/v3KE+dOEscgjHcmcC1AXfqdqACdZdjqtdZdjhVUUVz/qygm:8mNb539+dOTcycmcCeP9dZdutdZdFWbX
                      MD5:FA7B4D485760072335897E8035EB26CE
                      SHA1:66DD5CDCB968C502047A490172E1091E92317768
                      SHA-256:25AB00DC0D713667430DC1C64A9E1EE0FBEC2EC2F450E31BEDEBAEEEA0EAECE9
                      SHA-512:4F0D2D30AACA702D4591C2BFC02135F73C0D0B38672C4C8E5ADE5B6951299433E05A256C20BB47A714A94FF2A2FC55A4AC3558D61DD34B3A9CCB9730B79BB434
                      Malicious:false
                      Preview:L..................F.... .....dg......fg......qT.................................P.O. .:i.....+00.../C:\.....................1.....+Y.9..PROGRA~2.........O.I+Y.9....................V.......q.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....d.1.....+Y.9..OPENMO~1..L......+Y.9+Y.9....~.........................O.p.e.n. .M.o.v.e.m.e.n.t.....T.1.....+Y.9..OMGUI~1.>......+Y.9+Y.9...........................y0.O.M. .G.U.I.....\.2.....aU.. .OmGui.exe.D......+Y.9+Y.9..............................O.m.G.u.i...e.x.e.......d...............-.......c.............9n.....C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe..D.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.O.p.e.n. .M.o.v.e.m.e.n.t.\.O.M. .G.U.I.\.O.m.G.u.i...e.x.e.+.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.O.p.e.n. .M.o.v.e.m.e.n.t.\.O.M. .G.U.I.........*................@Z|...K.J.........`.......X.......376483...........hT..CrF.f4... ...F...../....%..hT..CrF.f4..
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Sep 11 06:15:38 2024, mtime=Wed Sep 11 06:15:38 2024, atime=Wed Sep 11 06:15:31 2024, length=3227197, window=hide
                      Category:dropped
                      Size (bytes):1252
                      Entropy (8bit):4.6327218944167425
                      Encrypted:false
                      SSDEEP:24:8mNCtRIETdOEscaHcecQNCyAkfqdqAe+dZdjHudZdjhVUUVznqygm:8mstRbTdOTcmceckCRQx+dZdDudZdFWr
                      MD5:B74A051A4CB1B0208AD16C54D90DF33F
                      SHA1:29D3735BF8176A1274A31676E6DE97D9E95BB9E8
                      SHA-256:6D9EB4BDFF77F0B2B47163C110D943AE12FFA1370230EF7CFC69C4D1F0370FB1
                      SHA-512:719FC7FC54B7AE764BB02AA7223EB7410E6EFD58F0F6C24CC5F4D9A38CCC74286CB911EC5053DA98DE26B04431A04B433E6BDA9C87CFD41A205BA3C8E9809AE2
                      Malicious:false
                      Preview:L..................F.... .....Xg....P.Yg......Pc....=>1..........................P.O. .:i.....+00.../C:\.....................1.....+Y.9..PROGRA~2.........O.I+Y.9....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....d.1.....+Y.9..OPENMO~1..L......+Y.9+Y.9....~.....................q...O.p.e.n. .M.o.v.e.m.e.n.t.....T.1.....+Y.9..OMGUI~1.>......+Y.9+Y.9...........................y0.O.M. .G.U.I.....f.2.=>1.+Y.9 .unins000.exe..J......+Y.9+Y.9..........................F...u.n.i.n.s.0.0.0...e.x.e.......g...............-.......f.............9n.....C:\Program Files (x86)\Open Movement\OM GUI\unins000.exe..G.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.O.p.e.n. .M.o.v.e.m.e.n.t.\.O.M. .G.U.I.\.u.n.i.n.s.0.0.0...e.x.e.+.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.O.p.e.n. .M.o.v.e.m.e.n.t.\.O.M. .G.U.I.........*................@Z|...K.J.........`.......X.......376483...........hT..CrF.f4... ...F...../
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8629
                      Entropy (8bit):4.321054307696951
                      Encrypted:false
                      SSDEEP:192:FilEaRaIaNpFREakaZayAEakaZa6paktUbnXrPGUceB8jacvqp48jadvzc89aZa5:YlEaRaIaNpFREakaZaTEakaZa6pBtUvu
                      MD5:5C98605D245F865758B32AEF66DC051D
                      SHA1:D1B385392AD4349876EFA2D118B6BA0D0A39BC2A
                      SHA-256:E005307639CC3641B1E47EE59C66D3B2B1C9B6F9D47709654A2DBD4F6427B340
                      SHA-512:B2ABCC8F00449F15C0AA013A3D6B7114751F4C214D2B0E02D553325E98BF65E8B1E9E64297CBC3DD38319601C1AF466F179EDC1399F9959B307A65154C71C67A
                      Malicious:false
                      Preview:.#if _DYNAMIC_XMLSERIALIZER_COMPILATION..[assembly:System.Security.AllowPartiallyTrustedCallers()]..[assembly:System.Security.SecurityTransparent()]..#endif..[assembly:System.Reflection.AssemblyVersionAttribute("2.0.0.0")]..namespace Microsoft.Xml.Serialization.GeneratedAssembly {.... public class XmlSerializationWriterStringCollection : System.Xml.Serialization.XmlSerializationWriter {.... public void Write1_ArrayOfString(object o) {.. WriteStartDocument();.. if (o == null) {.. WriteNullTagLiteral(@"ArrayOfString", @"");.. return;.. }.. TopLevelElement();.. {.. global::System.Collections.Specialized.StringCollection a = (global::System.Collections.Specialized.StringCollection)((global::System.Collections.Specialized.StringCollection)o);.. if ((object)(a) == null) {.. WriteNullTagLiteral(@"ArrayOfString", @"");.. }..
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (424), with no line terminators
                      Category:dropped
                      Size (bytes):427
                      Entropy (8bit):5.503562225276064
                      Encrypted:false
                      SSDEEP:12:p3rknoT7UNvvz5THViHUrHc9ow16PrHVA:Vgn8Yzl1iKW1cr1A
                      MD5:0CAB2B4BE90417B68FC219C24EF990CE
                      SHA1:470508F4BCE4DF72816A5612BFB850887D1F9841
                      SHA-256:EBCDC1327CD415B3817559A2B52A830A092A4E64EFAE9C2C696DCC7E2AF61B4F
                      SHA-512:2E8AB3D2F27A238DFC648B83CD2EA397715DFEE3F922FBE3A0D2FE2820060733823BFC95902124C68B19715D3CABFEF7352298F79114953D68FE93A651D4FD81
                      Malicious:false
                      Preview:./t:library /utf8output /R:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll" /R:"C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll" /R:"C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.dll" /out:"C:\Users\user\AppData\Local\Temp\6yss2uyv.dll" /debug- /optimize+ /nostdlib /D:_DYNAMIC_XMLSERIALIZER_COMPILATION "C:\Users\user\AppData\Local\Temp\6yss2uyv.0.cs"
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):6656
                      Entropy (8bit):4.3815626165900925
                      Encrypted:false
                      SSDEEP:96:znCPBUXHU8HZyqmTljdAc+0idfLT+Xw7YhamgyaPN2I50dPS9KiqI2wW9K:iGk8HcT3i0kLaw7YAmfa1ZCUp
                      MD5:86375BF0D6EB5474F9B3A9F83F80F857
                      SHA1:8F526AF776FE48CE37C423DE1D93691D4B4DB2EC
                      SHA-256:57C26E715A43E24AEFC099F9719C48012C300518372FA4E9052E56BB9F0F0EC9
                      SHA-512:2C314BD02C87921AA2C4E7BFFDFFB88CA38ADAC34B3E1A53CF728E44840115B3203E0D90EF3CC529E840B1721F6866D57DD101210A5043256127691799A99701
                      Malicious:false
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.f...........!................~1... ...@....@.. ....................................@.................................$1..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`1......H.......$$...............................................................0..|........(.....-..r...pr...p(....*.(.....t......-..r...pr...p(....*.r...pr...p..(......+..r...pr...p..o....(......X...o....2..(....*.*..(....*...0.............(....o....&.(....o.....@S....(....o.....{....@6....(....o.....{....@ ....(....:.....-.s......t......(....o....,..(....o....8.....(....o.....(....o....&...(.....8.....(....o.....3Z.(....o.....{....39.(....o.....{....3&.(....,...o....&+...(....o..
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (525), with CRLF line terminators
                      Category:modified
                      Size (bytes):732
                      Entropy (8bit):5.589237205740964
                      Encrypted:false
                      SSDEEP:12:vbqwSqAs/nzR3rknoT7UNvvz5THViHUrHc9ow16PrHV1Kai3SGzKIMBj6I5BFR5y:TqdqAenzdgn8Yzl1iKW1cr11Kai3SGzT
                      MD5:7C2B90BF109D8B45B24B6D8B2802C0C1
                      SHA1:26B42945F6763192BF3FD244497A00AE7694D0E4
                      SHA-256:A82B16A644B761C968B0613CAB4D7CBBB302A9B534B44C1E9E2BBF968140D826
                      SHA-512:EFB0EB9601336ED7E6FCD812C9E4BA4B87D642A0D3B29F48BA2A41FBF886C70E57B3588C5412A53310142A957DDB6DF8EE4FAC7F2438B15F98E6AB85808D5610
                      Malicious:false
                      Preview:.C:\Program Files (x86)\Open Movement\OM GUI> "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /t:library /utf8output /R:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll" /R:"C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll" /R:"C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.dll" /out:"C:\Users\user\AppData\Local\Temp\6yss2uyv.dll" /debug- /optimize+ /nostdlib /D:_DYNAMIC_XMLSERIALIZER_COMPILATION "C:\Users\user\AppData\Local\Temp\6yss2uyv.0.cs"......Microsoft (R) Visual C# 2005 Compiler version 8.00.50727.9149..for Microsoft (R) Windows (R) 2005 Framework version 2.0.50727..Copyright (C) Microsoft Corporation 2001-2005. All rights reserved.....
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      File Type:MSVC .res
                      Category:dropped
                      Size (bytes):652
                      Entropy (8bit):3.1401704935013934
                      Encrypted:false
                      SSDEEP:12:DXt4Ii3nYAHia5YA49aUGiqMZAiN52ryw+ak7YnqqLfPN5Rlq5z:+RI+ycuZhNI+akSLfPNdqt
                      MD5:6FC6FBDEDC4ABC8FC9D2C9721FB8B628
                      SHA1:1012C3BC6EA3FFBA94B7BCF0A8696D0A9B92DBCB
                      SHA-256:07D0F11B1B91A72750C5B2CAC0B66023E1E3195AE93C0CF5A64E38E387E6277A
                      SHA-512:1F0BD8DC46A14504B245BACD2F22F43F4FB822E183094622DBC316F3234A92A7C7DEAD3106143EB783123C90B162A5E2F65421B985A33CA36F86B55417CE259B
                      Malicious:false
                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....2...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...6.y.s.s.2.u.y.v...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...6.y.s.s.2.u.y.v...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...2...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...2...0...0...0...
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      File Type:MSVC .res
                      Category:dropped
                      Size (bytes):652
                      Entropy (8bit):3.14623682322256
                      Encrypted:false
                      SSDEEP:12:DXt4Ii3nYAHia5YA49aUGiqMZAiN52ryyak7YnqqQPN5Rlq5z:+RI+ycuZhNaakSQPNdqt
                      MD5:C9CC3C62D2C50347D8CFFF59E426E193
                      SHA1:7FE9AD4FE344557163FE5AB7F4C07673E94C931E
                      SHA-256:653207577F06683A5D6C12E9B59D08070B830D9BBDB98CAB2F2FC6DF277F7554
                      SHA-512:41850A81E68B04C64568E454988E3ECF20D7EA766CD702BABF6A4A8FEA733B635C5948C867200D799035978ECB0DEC9402371FB491297BCF8F1F5025CC2CFE8A
                      Malicious:false
                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....2...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...l.j.4.v.3.o.t.x...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...l.j.4.v.3.o.t.x...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...2...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...2...0...0...0...
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols, created Wed Sep 11 07:16:46 2024, 1st section name ".debug$S"
                      Category:dropped
                      Size (bytes):1196
                      Entropy (8bit):3.6647528391090125
                      Encrypted:false
                      SSDEEP:24:HUJ9YerW1L45dd1HhTUnhKLI+ycuZhNI+akSLfPNdq9td:VeruL4bzmnhKL1ulI+a3L9U9H
                      MD5:A09B9A8EE8CE8A7DD1616BA8A88E0549
                      SHA1:B85854719C2BF0816E07374F4DFCD39EBBB66EB6
                      SHA-256:1C7B3A1FC1D802AFB6F47CCE1C0D15826A41B1C9CC99B1E7774ED2DC781E2707
                      SHA-512:4DC6EC72178C54781C3E6518179098ECCBF0D774B80F562ACEEEF76C2680C148844D499D0AD138F5B700DD7C839DDE4553940064B8C8AD9090934669623F4BF8
                      Malicious:false
                      Preview:L....C.f.............debug$S............................@..B.rsrc$01........X...T...............@..@.rsrc$02........P...................@..@........0....c:\Users\user\AppData\Local\Temp\CSC431A.tmp...............o....J.....r...(......d...5.......C:\Users\user\AppData\Local\Temp\RES431B.tmp.+...................'.Microsoft (R) CVTRES...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....2...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...6.y.s.s.2.u.y.v...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...6.y.s.s.2.u.y.v...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...2...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x406, 9 symbols, created Wed Sep 11 07:16:07 2024, 1st section name ".debug$S"
                      Category:dropped
                      Size (bytes):1196
                      Entropy (8bit):3.675317133679297
                      Encrypted:false
                      SSDEEP:24:HbJ9YerW1Zad1HvUnhKLI+ycuZhNaakSQPNdq9td:0eruwzsnhKL1ulaa3IU9H
                      MD5:6F46E49920D6CC16DEB99CF85D3C5CF2
                      SHA1:E614BA64FC963E23F1F17C31638A9EC6809BD5B1
                      SHA-256:D307AC4EEC2A7972BF36D7EE12D257D96092995AA406CF23948D50B5AC30BEC6
                      SHA-512:90D63AB28CFC156641A25FEBB47F340DC2797D48AF44BAA912C5C8C58ED95BEB806D86DA259699621F84F88B7FCB678D6DFA2E2505D7D8B3E6DEAF3E04269934
                      Malicious:false
                      Preview:L....C.f.............debug$S............................@..B.rsrc$01........X...T...............@..@.rsrc$02........P...................@..@........0....c:\Users\user\AppData\Local\Temp\CSCA999.tmp.................<b...G...Y.&.......d...5.......C:\Users\user\AppData\Local\Temp\RESA99A.tmp.+...................'.Microsoft (R) CVTRES...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....2...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...l.j.4.v.3.o.t.x...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...l.j.4.v.3.o.t.x...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...2...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):4.026670007889822
                      Encrypted:false
                      SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                      MD5:0EE914C6F0BB93996C75941E1AD629C6
                      SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                      SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                      SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):13312
                      Entropy (8bit):5.745960477552938
                      Encrypted:false
                      SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                      MD5:A813D18268AFFD4763DDE940246DC7E5
                      SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                      SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                      SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.215994423157539
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                      MD5:4FF75F505FDDCC6A9AE62216446205D9
                      SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                      SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                      SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):23312
                      Entropy (8bit):4.596242908851566
                      Encrypted:false
                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\AX3-GUI-45.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3203072
                      Entropy (8bit):6.302566626610392
                      Encrypted:false
                      SSDEEP:49152:mdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjK333yD:nHDYsqiPRhINnq95FoHVBK333K
                      MD5:48C6508A6FD96E62F8796701A0200C8F
                      SHA1:833063ABFD008C67C79083AEEC9EACED8434ADB7
                      SHA-256:E50218793C873317287BB8FC52099F1C474DB16ECCB3F21741C36AC2FF275132
                      SHA-512:68252C1F34599BF74FEB1EBE885B08F3A9B88335ED1BE09FF74324B5E95B184170275014B9F53E2DC0FD9866BD4B65E53B3E43C4D242C40B2F2166EEBFA99859
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,.........`V,......`,...@...........................1...........@......@....................-.......-..9............................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc................"-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):29472
                      Entropy (8bit):7.042110181107409
                      Encrypted:false
                      SSDEEP:768:BD7FEAbd+EDsIOmF+OiR9rikW/F+M9OAriXiRQU:M07sIOYRiPWkWNl9WXil
                      MD5:077CB4461A2767383B317EB0C50F5F13
                      SHA1:584E64F1D162398B7F377CE55A6B5740379C4282
                      SHA-256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64
                      SHA-512:B1FCB0265697561EF497E6A60FCEE99DC5EA0CF02B4010DA9F5ED93BCE88BDFEA6BFE823A017487B8059158464EA29636AAD8E5F9DD1E8B8A1B6EAAAB670E547
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(....................4.. ?...@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.720366600008286
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\AX3-GUI-45.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3203072
                      Entropy (8bit):6.302566626610392
                      Encrypted:false
                      SSDEEP:49152:mdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjK333yD:nHDYsqiPRhINnq95FoHVBK333K
                      MD5:48C6508A6FD96E62F8796701A0200C8F
                      SHA1:833063ABFD008C67C79083AEEC9EACED8434ADB7
                      SHA-256:E50218793C873317287BB8FC52099F1C474DB16ECCB3F21741C36AC2FF275132
                      SHA-512:68252C1F34599BF74FEB1EBE885B08F3A9B88335ED1BE09FF74324B5E95B184170275014B9F53E2DC0FD9866BD4B65E53B3E43C4D242C40B2F2166EEBFA99859
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,.........`V,......`,...@...........................1...........@......@....................-.......-..9............................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc................"-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):29472
                      Entropy (8bit):7.042110181107409
                      Encrypted:false
                      SSDEEP:768:BD7FEAbd+EDsIOmF+OiR9rikW/F+M9OAriXiRQU:M07sIOYRiPWkWNl9WXil
                      MD5:077CB4461A2767383B317EB0C50F5F13
                      SHA1:584E64F1D162398B7F377CE55A6B5740379C4282
                      SHA-256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64
                      SHA-512:B1FCB0265697561EF497E6A60FCEE99DC5EA0CF02B4010DA9F5ED93BCE88BDFEA6BFE823A017487B8059158464EA29636AAD8E5F9DD1E8B8A1B6EAAAB670E547
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(....................4.. ?...@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.720366600008286
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\AX3-GUI-45.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3203072
                      Entropy (8bit):6.302566626610392
                      Encrypted:false
                      SSDEEP:49152:mdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTQTEjK333yD:nHDYsqiPRhINnq95FoHVBK333K
                      MD5:48C6508A6FD96E62F8796701A0200C8F
                      SHA1:833063ABFD008C67C79083AEEC9EACED8434ADB7
                      SHA-256:E50218793C873317287BB8FC52099F1C474DB16ECCB3F21741C36AC2FF275132
                      SHA-512:68252C1F34599BF74FEB1EBE885B08F3A9B88335ED1BE09FF74324B5E95B184170275014B9F53E2DC0FD9866BD4B65E53B3E43C4D242C40B2F2166EEBFA99859
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...oGXb.................B,.........`V,......`,...@...........................1...........@......@....................-.......-..9............................................................-.......................-.......-......................text.....,.......,................. ..`.itext...(...0,..*....,............. ..`.data........`,......F,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-...... -.............@..@.rsrc................"-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):704512
                      Entropy (8bit):6.498037567890168
                      Encrypted:false
                      SSDEEP:12288:ZRObekMtkfohrPUs37uzHnA6zgpKq35eERXprNrHIR3+j1vGgZpDExyc:jObekYkfohrP337uzHnA6cgqpeEFHR9A
                      MD5:67C5A4F36E1C91A3B85E440EDD7AD026
                      SHA1:E49EA0E558ED682498CC61B3070E4C402FBF0912
                      SHA-256:99C299D6565AB53D9AF66E0146737DC0ECFBC52ECF4740825B552DB0CC4210C6
                      SHA-512:40522D4645ECE0DB9888EA40D1A11356AA5EFC191184A0B97CB54A6C243532B1FC306E9095BBFA1F5DC02C8E52B709650230D1383532136E56CAEA3DC19A973E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 4%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f..........pr............@..............................................@...............................%..................................................................................................................CODE.....d.......f.................. ..`DATA.................j..............@...BSS..................|...................idata...%.......&...|..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8629
                      Entropy (8bit):4.321054307696951
                      Encrypted:false
                      SSDEEP:192:FilEaRaIaNpFREakaZayAEakaZa6paktUbnXrPGUceB8jacvqp48jadvzc89aZa5:YlEaRaIaNpFREakaZaTEakaZa6pBtUvu
                      MD5:5C98605D245F865758B32AEF66DC051D
                      SHA1:D1B385392AD4349876EFA2D118B6BA0D0A39BC2A
                      SHA-256:E005307639CC3641B1E47EE59C66D3B2B1C9B6F9D47709654A2DBD4F6427B340
                      SHA-512:B2ABCC8F00449F15C0AA013A3D6B7114751F4C214D2B0E02D553325E98BF65E8B1E9E64297CBC3DD38319601C1AF466F179EDC1399F9959B307A65154C71C67A
                      Malicious:false
                      Preview:.#if _DYNAMIC_XMLSERIALIZER_COMPILATION..[assembly:System.Security.AllowPartiallyTrustedCallers()]..[assembly:System.Security.SecurityTransparent()]..#endif..[assembly:System.Reflection.AssemblyVersionAttribute("2.0.0.0")]..namespace Microsoft.Xml.Serialization.GeneratedAssembly {.... public class XmlSerializationWriterStringCollection : System.Xml.Serialization.XmlSerializationWriter {.... public void Write1_ArrayOfString(object o) {.. WriteStartDocument();.. if (o == null) {.. WriteNullTagLiteral(@"ArrayOfString", @"");.. return;.. }.. TopLevelElement();.. {.. global::System.Collections.Specialized.StringCollection a = (global::System.Collections.Specialized.StringCollection)((global::System.Collections.Specialized.StringCollection)o);.. if ((object)(a) == null) {.. WriteNullTagLiteral(@"ArrayOfString", @"");.. }..
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (424), with no line terminators
                      Category:dropped
                      Size (bytes):427
                      Entropy (8bit):5.5378613057295825
                      Encrypted:false
                      SSDEEP:12:p3rknoT7UNvvz5THVDaKsrHc9ow16PrHVDaKJ:Vgn8Yzl1DyW1cr1DJ
                      MD5:AFE89C6C6817F1FF40C976D871E04717
                      SHA1:97481F2537593E2F1DF84ED7A393342FD7DDE4A5
                      SHA-256:F5DFCF969100910AF1DCC9CBB451F03D847AD8D0E0379BDBFAB7152820932701
                      SHA-512:674E1683E455369B28AF281A7478C165B182DDACF86A88DBC73DCAF23F2E99570AC978508B23D0B8A7B9CBB6B2F64998FFEC4687836CAF0FE2009115CCB39CAC
                      Malicious:true
                      Preview:./t:library /utf8output /R:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll" /R:"C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll" /R:"C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.dll" /out:"C:\Users\user\AppData\Local\Temp\lj4v3otx.dll" /debug- /optimize+ /nostdlib /D:_DYNAMIC_XMLSERIALIZER_COMPILATION "C:\Users\user\AppData\Local\Temp\lj4v3otx.0.cs"
                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):6656
                      Entropy (8bit):4.379707746838247
                      Encrypted:false
                      SSDEEP:96:mnCPBUXHU8HZyqmTljdAc+0idfLQ+Xw7Yham7yaPN2I50dPS9KiqI2bWsK:JGk8HcT3i0kLrw7YAmua1ZCUh
                      MD5:1D0D8A7F38F1C24554801DB963D0C75E
                      SHA1:F34EE82BBD54E74462FD4A72539E69BABD6A4D94
                      SHA-256:9117356E664A8D9D0D61C572D22138B6C30B52F25453E7BECCF27652D6A0C150
                      SHA-512:448660E7335814E89FB23C222D7AB4DA8962939A8B51C95BB690B3EAF70F2268BED1BB5B49DCD709506326599C7B67DFF1989F6A0BE66F50248444F34A3A995F
                      Malicious:false
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.f...........!................~1... ...@....@.. ....................................@.................................$1..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`1......H.......$$...............................................................0..|........(.....-..r...pr...p(....*.(.....t......-..r...pr...p(....*.r...pr...p..(......+..r...pr...p..o....(......X...o....2..(....*.*..(....*...0.............(....o....&.(....o.....@S....(....o.....{....@6....(....o.....{....@ ....(....:.....-.s......t......(....o....,..(....o....8.....(....o.....(....o....&...(.....8.....(....o.....3Z.(....o.....{....39.(....o.....{....3&.(....,...o....&+...(....o..
                      Process:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (525), with CRLF line terminators
                      Category:modified
                      Size (bytes):732
                      Entropy (8bit):5.606955890770966
                      Encrypted:false
                      SSDEEP:12:vbqwSqAs/nzR3rknoT7UNvvz5THVDaKsrHc9ow16PrHVDaKMKai3SGzKIMBj6I5G:TqdqAenzdgn8Yzl1DyW1cr1DMKai3SGX
                      MD5:1415767DAE82ACE6A8757F1FCC9CCC99
                      SHA1:54DDA987846883F34EC05C32814E02B326BDBFE6
                      SHA-256:14CAA972F172CCFCB2E9830D78B7366F21FFF27BB3ADB04FF2D250C93D0AE01C
                      SHA-512:93385877455B46D9C3929CC3FFA71E1459C7FE1FD302755F0D5C937223695B7A0A2E87394F3EE325DD12CE9DBE1B24CCD67F63D80D02EC8E897F0B9A719B9A48
                      Malicious:false
                      Preview:.C:\Program Files (x86)\Open Movement\OM GUI> "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /t:library /utf8output /R:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorlib.dll" /R:"C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll" /R:"C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.dll" /out:"C:\Users\user\AppData\Local\Temp\lj4v3otx.dll" /debug- /optimize+ /nostdlib /D:_DYNAMIC_XMLSERIALIZER_COMPILATION "C:\Users\user\AppData\Local\Temp\lj4v3otx.0.cs"......Microsoft (R) Visual C# 2005 Compiler version 8.00.50727.9149..for Microsoft (R) Windows (R) 2005 Framework version 2.0.50727..Copyright (C) Microsoft Corporation 2001-2005. All rights reserved.....
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:modified
                      Size (bytes):4174
                      Entropy (8bit):3.6684530638546686
                      Encrypted:false
                      SSDEEP:96:ZiXRC8653Q6GBYRQ63rgU97sIgJ7sI7j9Ha:l96a
                      MD5:E66B4361C8F7AF9767DB1865607FCB92
                      SHA1:DA3BB0BDA848A82453ADAAE0B0714A4B9E8DAD70
                      SHA-256:D21F5BB78D6EB6EF69B8DAAD9CCBB327562E2A006AD8467FFBD5683C7BFFE43B
                      SHA-512:A5C0941FB017E04D1A77B8CC848931E98720D22322B5647271D1AABB9337EFF08117B7C3EEFA6CD741D4B3FA205BCCB5BB22F02DBFF90F00736581CC621F3E91
                      Malicious:false
                      Preview:..I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .0.9./.1.1./.2.0.2.4. .0.3.:.1.5.:.4.5.....I.N.F.O.:. . . .P.r.o.d.u.c.t. .V.e.r.s.i.o.n. .2...1...0...0.......I.N.F.O.:. . . .V.e.r.s.i.o.n.:. .6...0...6.0.0.0. .....I.N.F.O.:. . . .P.l.a.t.f.o.r.m. .I.D.:. .2. .(.N.T.).....I.N.F.O.:. . . .S.e.r.v.i.c.e. .P.a.c.k.:. .0...0.....I.N.F.O.:. . . .S.u.i.t.e.:. .0.x.0.1.0.0.,. .P.r.o.d.u.c.t. .T.y.p.e.:. .1.....I.N.F.O.:. . . .A.r.c.h.i.t.e.c.t.u.r.e.:. .A.M.D.6.4.......I.N.F.O.:. . . .I.n.t.e.r.a.c.t.i.v.e. .W.i.n.d.o.w.s. .S.t.a.t.i.o.n.....I.N.F.O.:. . . .C.o.m.m.a.n.d. .L.i.n.e.:. .'.".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.X.3.-.D.r.i.v.e.r.\.D.P.I.n.s.t.6.4...e.x.e.". ./.F. ./.S.A. ./.S.E. ./.S.W.'.....I.N.F.O.:. . . .D.P.I.n.s.t. .i.s. .n.o.t. .m.u.l.t.i.-.l.i.n.g.u.a.l.......I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .C.u.r.r.e.n.t. .w.o.r.k.i.n.g. .
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Program Files\AX3-Driver\dpinst64.exe
                      File Type:Generic INItialization configuration [BeginLog]
                      Category:dropped
                      Size (bytes):2495830
                      Entropy (8bit):5.219308505321447
                      Encrypted:false
                      SSDEEP:12288:O+5cge9m9jVuWs22GZRvV3V6hcGZ0s2mC:sGZRqcGZA
                      MD5:17B3DBAE174C4E67345BCC217D8FDC76
                      SHA1:D01DB505D00D90168F390430D16A3DD1175EE410
                      SHA-256:6209DD377187F875DBCEA45A667AE62CF9B7FD0C147391A39B1CB164C33B1ABE
                      SHA-512:7AF9FDC5E492878331538F1F97C45857BE275EAD6EAD24C84583C7BA072422D0C3520C41622C2EDF91FB3579E24CDE963D180684995AAB00F4AA861B6C1EFF44
                      Malicious:false
                      Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6348
                      Entropy (8bit):7.054306729661913
                      Encrypted:false
                      SSDEEP:192:9TAEOwPKDyowJL/8Qpkqs1INID+ebCfMFJ:FSwyYJLu11VbCUJ
                      MD5:8BE6BB8DC016993546D42E7DE1B9B050
                      SHA1:B0BCB2A49C2C94044835868516C7C74DAD3F0344
                      SHA-256:52C1051AC76AFE162DA3D764BF4C44E25D6D565D070BAADF7E638A563C37B04E
                      SHA-512:47FCBA277BBE3E21DB144AD54A6315750E475E7264366D7AA89EAF24BB99C72BD066EE0C7838BA4DE8780761AA2B9BF8C64D4B764C84E68BC44FFED5E6F5741C
                      Malicious:false
                      Preview:0.....*.H..........0......1.0...+......0.....+.....7......0...0...+.....7.....P.d-&k.H.4^.[.....100313001938Z0...+.....7.....0...0....R6.5.A.A.B.4.5.E.E.E.B.0.C.8.3.8.8.D.D.E.C.4.C.9.C.E.6.9.8.3.B.B.4.E.2.1.9.6.7.F...1..s0D..+.....7...1604...F.i.l.e......."m.c.h.p._.m.s.d._.c.d.c...i.n.f...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........e..^..8.....i..N!..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0d..+.....7...1V0T...O.S.A.t.t.r.......>2.:.5...0.0.,.2.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1.......0...0.....+.....7......0.....O.S.........2.0.0.0.,.X.P.X.8.6.,.X.P.X.6.4.,.S.e.r.v.e.r.2.0.0.3.X.8.6.,.S.e.r.v.e.r.2.0.0.3.X.6.4.,.V.i.s.t.a.X.8.6.,.V.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,.7.X.8.6.,.7.X.6.4.,.S.e.r.v.e.r.2.0.0.8.R.2.X.6.4...0P..+.....7....B0@...H.W.I.D.2.......,u.s.b.\.v.i.d._.0.4.d.8.&.p.i.d._.0.0.0.a...0\..+.....7....N0L...H.W.I.D.1.......8u.s.b.\.v
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:Windows setup INFormation
                      Category:dropped
                      Size (bytes):3468
                      Entropy (8bit):5.026026054397683
                      Encrypted:false
                      SSDEEP:48:IfDVHdohChj9ISWF4h33bAcyIi03O4h33VAcyHUb6RZSi02CZ4NfFnf19T:ADN+0gSDhHFy/0xhH/yO6XSitNfB19T
                      MD5:CCC987FA45B80FCD65BAB524EB913371
                      SHA1:65AAB45EEEB0C8388DDEC4C9CE6983BB4E21967F
                      SHA-256:F55FAFACB061FF437B7B616989027993A2F8EB7D9E641F4BC3B8FBDB75912C41
                      SHA-512:E196455FB122DB0ACC249250527A343E35E35B0613D94C9113F967D5967F3BAC07B9DCF7625BC1B0D24F7B85ACA2196295A083D6BC75D65875B6D70C3D6393BF
                      Malicious:false
                      Preview:..; Microchip Composite Device MSD+CDC..; This driver is required only by the CDC part of a composite device. ..; The MSD part does not require any driver...;..;..; Copyright (c) 2000 Microsoft Corporation..; Copyright (C) 2007 Microchip Technology Inc.....[Version] ..Signature="$Windows NT$" ..Class=Ports..ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318} ..Provider=%MFGNAME% ..LayoutFile=layout.inf..CatalogFile=mchp_MSD_CDC.cat..DriverVer=03/12/2010,5.1.2600.2....[Manufacturer] ..%MFGNAME%=DeviceList, NTamd64....[DestinationDirs] ..DefaultDestDir=12 ......;------------------------------------------------------------------------------..; Windows 2000/XP/Vista/7-32bit Sections..;------------------------------------------------------------------------------....[DriverInstall.nt] ..include=mdmcpq.inf..CopyFiles=DriverCopyFiles.nt..AddReg=DriverInstall.nt.AddReg ....[DriverCopyFiles.nt]..usbser.sys,,,0x20....[DriverInstall.nt.AddReg] ..HKR,,DevLoader,,*ntkern ..HKR,,NTMPDriver,,%DRIVERFIL
                      Process:C:\Windows\System32\drvinst.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):74101
                      Entropy (8bit):5.389756393367153
                      Encrypted:false
                      SSDEEP:1536:9btHoTB7cIxsw9pmDNHSJrR459D0w/smToijZQB4XKdJEBbWwSYcoMwVU5KaOsNN:94
                      MD5:7D34B22169DC3D570DC34B37099FFF85
                      SHA1:F5AE75F3B62A94329B7562FE6AB4BA88E3DD6E75
                      SHA-256:6EA071CE62716BEB13CD8DF5A52201350E7FB92B94CA7B04E0A1588A04757F27
                      SHA-512:3F023FBCD639FF72450200CBBB79F954D185857C02ACB4B4AFD1B9990083F7707ECFCD68A036F67855563D4E2D8F24A3AE8B5B7F18C04CC87794A4E09C035224
                      Malicious:false
                      Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.9038059369412474
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 98.45%
                      • Inno Setup installer (109748/4) 1.08%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      File name:AX3-GUI-45.exe
                      File size:6'029'717 bytes
                      MD5:ae4414edd46c7769589c35beeee7d0de
                      SHA1:e0885269d15b87afb2b3b8e570c7c06fc28db7eb
                      SHA256:00de5f7503d19911ff05e808f91cd24b6a1ac2394048fd83e7061d531cd66b11
                      SHA512:215eb60c81fb8e9fa26911fde1d6eb234627260d8cf9de69ce492ed6e5f8a44b2798acd8195c5fb5b4ec54e0ee3840e1439a55fc8e1e8f68a8681b6366291bcb
                      SSDEEP:98304:ikLp6NF9h6jlYWrPEVFNXFEUUnUowrE3vh30ZsEqPfjnRSUYTVBfqYYGW:tEijlpEhVLUMrEfhEZsPjnRlYTVhYGW
                      TLSH:4956123FB268613FC5AE1B3105B392509A7B7E52B81B8C2E17F0344DCF765601E3A696
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:cc97331129330e00
                      Entrypoint:0x4b5eec
                      Entrypoint Section:.itext
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6258476F [Thu Apr 14 16:10:23 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:1
                      File Version Major:6
                      File Version Minor:1
                      Subsystem Version Major:6
                      Subsystem Version Minor:1
                      Import Hash:e569e6f445d32ba23766ad67d1e3787f
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFA4h
                      push ebx
                      push esi
                      push edi
                      xor eax, eax
                      mov dword ptr [ebp-3Ch], eax
                      mov dword ptr [ebp-40h], eax
                      mov dword ptr [ebp-5Ch], eax
                      mov dword ptr [ebp-30h], eax
                      mov dword ptr [ebp-38h], eax
                      mov dword ptr [ebp-34h], eax
                      mov dword ptr [ebp-2Ch], eax
                      mov dword ptr [ebp-28h], eax
                      mov dword ptr [ebp-14h], eax
                      mov eax, 004B14B8h
                      call 00007FEAD0E19615h
                      xor eax, eax
                      push ebp
                      push 004B65E2h
                      push dword ptr fs:[eax]
                      mov dword ptr fs:[eax], esp
                      xor edx, edx
                      push ebp
                      push 004B659Eh
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      mov eax, dword ptr [004BE634h]
                      call 00007FEAD0EBC107h
                      call 00007FEAD0EBBC5Ah
                      lea edx, dword ptr [ebp-14h]
                      xor eax, eax
                      call 00007FEAD0E2F0B4h
                      mov edx, dword ptr [ebp-14h]
                      mov eax, 004C1D84h
                      call 00007FEAD0E14207h
                      push 00000002h
                      push 00000000h
                      push 00000001h
                      mov ecx, dword ptr [004C1D84h]
                      mov dl, 01h
                      mov eax, dword ptr [004238ECh]
                      call 00007FEAD0E30237h
                      mov dword ptr [004C1D88h], eax
                      xor edx, edx
                      push ebp
                      push 004B654Ah
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      call 00007FEAD0EBC18Fh
                      mov dword ptr [004C1D90h], eax
                      mov eax, dword ptr [004C1D90h]
                      cmp dword ptr [eax+0Ch], 01h
                      jne 00007FEAD0EC23AAh
                      mov eax, dword ptr [004C1D90h]
                      mov edx, 00000028h
                      call 00007FEAD0E30B2Ch
                      mov edx, dword ptr [004C1D90h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1a0ac.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xc70000x1a0ac0x1a2005874f8d3cdfe29832b62cc8daacb1b4eFalse0.19075209330143542data3.210472332173836IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc75580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.476985559566787
                      RT_ICON0xc7e000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.296908315565032
                      RT_ICON0xc8ca80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.19508738781294285
                      RT_ICON0xcced00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.1331923577428132
                      RT_ICON0xdd6f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishUnited States0.46283783783783783
                      RT_ICON0xdd8200x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4046242774566474
                      RT_ICON0xddd880x368Device independent bitmap graphic, 16 x 32 x 24, image size 768EnglishUnited States0.5665137614678899
                      RT_STRING0xde0f00x360data0.34375
                      RT_STRING0xde4500x260data0.3256578947368421
                      RT_STRING0xde6b00x45cdata0.4068100358422939
                      RT_STRING0xdeb0c0x40cdata0.3754826254826255
                      RT_STRING0xdef180x2d4data0.39226519337016574
                      RT_STRING0xdf1ec0xb8data0.6467391304347826
                      RT_STRING0xdf2a40x9cdata0.6410256410256411
                      RT_STRING0xdf3400x374data0.4230769230769231
                      RT_STRING0xdf6b40x398data0.3358695652173913
                      RT_STRING0xdfa4c0x368data0.3795871559633027
                      RT_STRING0xdfdb40x2a4data0.4275147928994083
                      RT_RCDATA0xe00580x10data1.5
                      RT_RCDATA0xe00680x2c4data0.6384180790960452
                      RT_RCDATA0xe032c0x2cdata1.2045454545454546
                      RT_GROUP_ICON0xe03580x68dataEnglishUnited States0.7596153846153846
                      RT_VERSION0xe03c00x584dataEnglishUnited States0.25920679886685555
                      RT_MANIFEST0xe09440x765XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39091389329107235
                      DLLImport
                      kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                      comctl32.dllInitCommonControls
                      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                      netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                      advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                      NameOrdinalAddress
                      TMethodImplementationIntercept30x4541a8
                      __dbk_fcall_wrapper20x40d0a0
                      dbkFCallWrapperAddr10x4be63c
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 11, 2024 09:16:09.441071987 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:09.441122055 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:09.441382885 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:09.464828968 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:09.464868069 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:09.929363012 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:09.929442883 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:09.933008909 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:09.933018923 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:09.933470011 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:09.973927021 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:10.019408941 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:10.274333000 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:10.274447918 CEST44349710185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:10.274507999 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:10.276155949 CEST49710443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:48.778985023 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:48.779082060 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:48.779201031 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:48.799818993 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:48.799856901 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.281727076 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.281930923 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:49.283492088 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:49.283545017 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.284063101 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.325598001 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:49.333540916 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:49.375447989 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.435369968 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.435656071 CEST44349716185.199.111.133192.168.2.17
                      Sep 11, 2024 09:16:49.435730934 CEST49716443192.168.2.17185.199.111.133
                      Sep 11, 2024 09:16:49.436368942 CEST49716443192.168.2.17185.199.111.133
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 11, 2024 09:16:09.419996023 CEST5601153192.168.2.171.1.1.1
                      Sep 11, 2024 09:16:09.431025028 CEST53560111.1.1.1192.168.2.17
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 11, 2024 09:16:09.419996023 CEST192.168.2.171.1.1.10x642bStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 11, 2024 09:16:09.431025028 CEST1.1.1.1192.168.2.170x642bNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                      Sep 11, 2024 09:16:09.431025028 CEST1.1.1.1192.168.2.170x642bNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                      Sep 11, 2024 09:16:09.431025028 CEST1.1.1.1192.168.2.170x642bNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                      Sep 11, 2024 09:16:09.431025028 CEST1.1.1.1192.168.2.170x642bNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                      • raw.githubusercontent.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.1749710185.199.111.1334432088C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      TimestampBytes transferredDirectionData
                      2024-09-11 07:16:09 UTC137OUTGET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1
                      Host: raw.githubusercontent.com
                      Connection: Keep-Alive
                      2024-09-11 07:16:10 UTC902INHTTP/1.1 200 OK
                      Connection: close
                      Content-Length: 533
                      Cache-Control: max-age=300
                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                      Content-Type: text/plain; charset=utf-8
                      ETag: "8f51619e3b2b10325b8bc736cd1b8a2c9f35bd2561ddf38a0142af3742c99742"
                      Strict-Transport-Security: max-age=31536000
                      X-Content-Type-Options: nosniff
                      X-Frame-Options: deny
                      X-XSS-Protection: 1; mode=block
                      X-GitHub-Request-Id: 36BE:38E07E:213BD1F:24D67A5:66E143B9
                      Accept-Ranges: bytes
                      Date: Wed, 11 Sep 2024 07:16:10 GMT
                      Via: 1.1 varnish
                      X-Served-By: cache-ewr-kewr1740077-EWR
                      X-Cache: MISS
                      X-Cache-Hits: 0
                      X-Timer: S1726038970.026281,VS0,VE201
                      Vary: Authorization,Accept-Encoding,Origin
                      Access-Control-Allow-Origin: *
                      Cross-Origin-Resource-Policy: cross-origin
                      X-Fastly-Request-ID: 1d97b0f12f21964ee349fb3bdffe8a41d03411a8
                      Expires: Wed, 11 Sep 2024 07:21:10 GMT
                      Source-Age: 0
                      2024-09-11 07:16:10 UTC533INData Raw: 3b 55 50 44 41 54 45 0d 0a 3b 20 68 74 74 70 73 3a 2f 2f 6f 70 65 6e 6d 6f 76 65 6d 65 6e 74 2e 67 6f 6f 67 6c 65 63 6f 64 65 2e 63 6f 6d 2f 73 76 6e 2f 64 6f 77 6e 6c 6f 61 64 73 2f 41 58 33 2f 6f 6d 67 75 69 2e 69 6e 69 0d 0a 3b 20 68 74 74 70 73 3a 2f 2f 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 64 69 67 69 74 61 6c 69 6e 74 65 72 61 63 74 69 6f 6e 2f 6f 70 65 6e 6d 6f 76 65 6d 65 6e 74 2f 6d 61 73 74 65 72 2f 44 6f 77 6e 6c 6f 61 64 73 2f 41 58 33 2f 6f 6d 67 75 69 2e 69 6e 69 0d 0a 0d 0a 5b 69 6e 73 74 61 6c 6c 5d 0d 0a 76 65 72 73 69 6f 6e 3d 31 2e 30 2e 30 2e 32 38 0d 0a 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 64 69 67 69 74 61 6c 69 6e
                      Data Ascii: ;UPDATE; https://openmovement.googlecode.com/svn/downloads/AX3/omgui.ini; https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini[install]version=1.0.0.28;url=https://raw.githubusercontent.com/digitalin


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.1749716185.199.111.1334433580C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      TimestampBytes transferredDirectionData
                      2024-09-11 07:16:49 UTC137OUTGET /digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini HTTP/1.1
                      Host: raw.githubusercontent.com
                      Connection: Keep-Alive
                      2024-09-11 07:16:49 UTC900INHTTP/1.1 200 OK
                      Connection: close
                      Content-Length: 533
                      Cache-Control: max-age=300
                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                      Content-Type: text/plain; charset=utf-8
                      ETag: "8f51619e3b2b10325b8bc736cd1b8a2c9f35bd2561ddf38a0142af3742c99742"
                      Strict-Transport-Security: max-age=31536000
                      X-Content-Type-Options: nosniff
                      X-Frame-Options: deny
                      X-XSS-Protection: 1; mode=block
                      X-GitHub-Request-Id: 36BE:38E07E:213BD1F:24D67A5:66E143B9
                      Accept-Ranges: bytes
                      Date: Wed, 11 Sep 2024 07:16:49 GMT
                      Via: 1.1 varnish
                      X-Served-By: cache-ewr-kewr1740074-EWR
                      X-Cache: HIT
                      X-Cache-Hits: 1
                      X-Timer: S1726039009.390470,VS0,VE1
                      Vary: Authorization,Accept-Encoding,Origin
                      Access-Control-Allow-Origin: *
                      Cross-Origin-Resource-Policy: cross-origin
                      X-Fastly-Request-ID: 3941e781b251e34b734092baf2e77a43f220adaf
                      Expires: Wed, 11 Sep 2024 07:21:49 GMT
                      Source-Age: 39
                      2024-09-11 07:16:49 UTC533INData Raw: 3b 55 50 44 41 54 45 0d 0a 3b 20 68 74 74 70 73 3a 2f 2f 6f 70 65 6e 6d 6f 76 65 6d 65 6e 74 2e 67 6f 6f 67 6c 65 63 6f 64 65 2e 63 6f 6d 2f 73 76 6e 2f 64 6f 77 6e 6c 6f 61 64 73 2f 41 58 33 2f 6f 6d 67 75 69 2e 69 6e 69 0d 0a 3b 20 68 74 74 70 73 3a 2f 2f 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 64 69 67 69 74 61 6c 69 6e 74 65 72 61 63 74 69 6f 6e 2f 6f 70 65 6e 6d 6f 76 65 6d 65 6e 74 2f 6d 61 73 74 65 72 2f 44 6f 77 6e 6c 6f 61 64 73 2f 41 58 33 2f 6f 6d 67 75 69 2e 69 6e 69 0d 0a 0d 0a 5b 69 6e 73 74 61 6c 6c 5d 0d 0a 76 65 72 73 69 6f 6e 3d 31 2e 30 2e 30 2e 32 38 0d 0a 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 64 69 67 69 74 61 6c 69 6e
                      Data Ascii: ;UPDATE; https://openmovement.googlecode.com/svn/downloads/AX3/omgui.ini; https://raw.githubusercontent.com/digitalinteraction/openmovement/master/Downloads/AX3/omgui.ini[install]version=1.0.0.28;url=https://raw.githubusercontent.com/digitalin


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:03:15:31
                      Start date:11/09/2024
                      Path:C:\Users\user\Desktop\AX3-GUI-45.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AX3-GUI-45.exe"
                      Imagebase:0x400000
                      File size:6'029'717 bytes
                      MD5 hash:AE4414EDD46C7769589C35BEEEE7D0DE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:03:15:32
                      Start date:11/09/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-OCGFL.tmp\AX3-GUI-45.tmp" /SL5="$60364,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe"
                      Imagebase:0x400000
                      File size:3'203'072 bytes
                      MD5 hash:48C6508A6FD96E62F8796701A0200C8F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:03:15:41
                      Start date:11/09/2024
                      Path:C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe"
                      Imagebase:0x400000
                      File size:930'090 bytes
                      MD5 hash:0ABD9CF2D191036D778F6F1FBE25FAE1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:5
                      Start time:03:15:42
                      Start date:11/09/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-QAI77.tmp\setup-ax3-driver.tmp" /SL5="$20314,681477,54272,C:\Program Files (x86)\Open Movement\OM GUI\setup-ax3-driver.exe"
                      Imagebase:0x400000
                      File size:704'512 bytes
                      MD5 hash:67C5A4F36E1C91A3B85E440EDD7AD026
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 4%, ReversingLabs
                      Reputation:moderate
                      Has exited:true

                      Target ID:7
                      Start time:03:15:45
                      Start date:11/09/2024
                      Path:C:\Program Files\AX3-Driver\dpinst64.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\AX3-Driver\DPInst64.exe" /F /SA /SE /SW
                      Imagebase:0x7ff6ad950000
                      File size:1'050'104 bytes
                      MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:9
                      Start time:03:15:47
                      Start date:11/09/2024
                      Path:C:\Windows\System32\drvinst.exe
                      Wow64 process (32bit):false
                      Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a893eec2-cde1-b844-a268-dd04a77ebb2a}\mchp_msd_cdc.inf" "9" "4987fa53f" "000000000000014C" "WinSta0\Default" "000000000000011C" "208" "c:\program files\ax3-driver"
                      Imagebase:0x7ff702d10000
                      File size:337'920 bytes
                      MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:15
                      Start time:03:15:51
                      Start date:11/09/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6c760311-7d3e-5f44-bbdb-3640e2127551} Global\{b1383f99-4876-844f-9d31-fe5ec27fdc7b} C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_msd_cdc.inf C:\Windows\System32\DriverStore\Temp\{d703d72a-d621-3e4f-8659-93124b367091}\mchp_MSD_CDC.cat
                      Imagebase:0x7ff7dc2c0000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:16
                      Start time:03:16:05
                      Start date:11/09/2024
                      Path:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe"
                      Imagebase:0xb20000
                      File size:1'641'984 bytes
                      MD5 hash:12FEEE099449453BA386F8FBA6C72090
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:17
                      Start time:03:16:07
                      Start date:11/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lj4v3otx.cmdline"
                      Imagebase:0x400000
                      File size:80'296 bytes
                      MD5 hash:2B9482EB5D3AF71029277E18F6C656C0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:18
                      Start time:03:16:07
                      Start date:11/09/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff772470000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:19
                      Start time:03:16:07
                      Start date:11/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA99A.tmp" "c:\Users\user\AppData\Local\Temp\CSCA999.tmp"
                      Imagebase:0x400000
                      File size:35'296 bytes
                      MD5 hash:E118330B4629B12368D91B9DF6488BE0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:23
                      Start time:03:16:37
                      Start date:11/09/2024
                      Path:C:\Users\user\Desktop\AX3-GUI-45.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AX3-GUI-45.exe"
                      Imagebase:0x400000
                      File size:6'029'717 bytes
                      MD5 hash:AE4414EDD46C7769589C35BEEEE7D0DE
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:24
                      Start time:03:16:37
                      Start date:11/09/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-BHTIU.tmp\AX3-GUI-45.tmp" /SL5="$20130,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe"
                      Imagebase:0x400000
                      File size:3'203'072 bytes
                      MD5 hash:48C6508A6FD96E62F8796701A0200C8F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:31
                      Start time:03:16:38
                      Start date:11/09/2024
                      Path:C:\Users\user\Desktop\AX3-GUI-45.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130
                      Imagebase:0x400000
                      File size:6'029'717 bytes
                      MD5 hash:AE4414EDD46C7769589C35BEEEE7D0DE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:32
                      Start time:03:16:38
                      Start date:11/09/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-JA730.tmp\AX3-GUI-45.tmp" /SL5="$6035A,5170833,869888,C:\Users\user\Desktop\AX3-GUI-45.exe" /SPAWNWND=$502A0 /NOTIFYWND=$20130
                      Imagebase:0x400000
                      File size:3'203'072 bytes
                      MD5 hash:48C6508A6FD96E62F8796701A0200C8F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:37
                      Start time:03:16:46
                      Start date:11/09/2024
                      Path:C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe"
                      Imagebase:0xfc0000
                      File size:1'641'984 bytes
                      MD5 hash:12FEEE099449453BA386F8FBA6C72090
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:38
                      Start time:03:16:46
                      Start date:11/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\6yss2uyv.cmdline"
                      Imagebase:0x400000
                      File size:80'296 bytes
                      MD5 hash:2B9482EB5D3AF71029277E18F6C656C0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:39
                      Start time:03:16:46
                      Start date:11/09/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff772470000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:40
                      Start time:03:16:46
                      Start date:11/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES431B.tmp" "c:\Users\user\AppData\Local\Temp\CSC431A.tmp"
                      Imagebase:0x400000
                      File size:35'296 bytes
                      MD5 hash:E118330B4629B12368D91B9DF6488BE0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:14.1%
                        Dynamic/Decrypted Code Coverage:34.7%
                        Signature Coverage:15.6%
                        Total number of Nodes:556
                        Total number of Limit Nodes:22
                        execution_graph 37998 6d001f80 37999 6d0052b0 26 API calls 37998->37999 38000 6d001fc8 37999->38000 38001 6d0052b0 26 API calls 38000->38001 38002 6d001fcf 38001->38002 38003 6d0010a0 50 API calls 38002->38003 38004 6d001fe7 SetupDiGetClassDevsW 38003->38004 38005 6d002009 SetupDiEnumDeviceInfo 38004->38005 38006 6d00240c SetupDiDestroyDeviceInfoList 38005->38006 38007 6d00202c 38005->38007 38009 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 38006->38009 38008 6d002032 CM_Get_Parent CM_Get_Device_IDW 38007->38008 38010 6d014d10 __cftoe 43 API calls 38008->38010 38011 6d00242d 38009->38011 38012 6d00208e __cftof 38010->38012 38013 6d0023ea SetupDiEnumDeviceInfo 38012->38013 38014 6d0020bc CM_Get_Device_IDW 38012->38014 38019 6d00a070 __cftof 78 API calls 38012->38019 38020 6d0055a0 27 API calls 38012->38020 38021 6d005db0 27 API calls 38012->38021 38022 6d002431 38012->38022 38025 6d0018a0 92 API calls 6 library calls 38012->38025 38013->38006 38013->38008 38015 6d014d10 __cftoe 43 API calls 38014->38015 38016 6d0020f7 CM_Get_Parent CM_Get_Device_IDW 38015->38016 38017 6d014d10 __cftoe 43 API calls 38016->38017 38017->38012 38019->38012 38020->38012 38021->38012 38023 6d01523d 26 API calls 38022->38023 38024 6d002436 38023->38024 38025->38012 38026 11aa09a 38027 11aa0cf recv 38026->38027 38028 11aa107 38026->38028 38029 11aa0dd 38027->38029 38028->38027 38030 6b35436 38033 6b3546b WSAIoctl 38030->38033 38032 6b354b9 38033->38032 38034 6b33836 38036 6b3385c CreateDirectoryW 38034->38036 38037 6b33883 38036->38037 38041 6b3343a 38042 6b33472 RegOpenKeyExW 38041->38042 38044 6b334c8 38042->38044 37479 6b36abe 37482 6b36af3 K32EnumProcessModules 37479->37482 37481 6b36b22 37482->37481 37491 6d00a910 37492 6d00a922 37491->37492 37495 6d00a92f __cftof 37492->37495 37553 6d016f15 42 API calls __cftof 37492->37553 37494 6d00a94c 37495->37494 37496 6d00a9ae CreateMutexW CreateMutexW 37495->37496 37506 6d00e8d4 37496->37506 37502 6d00aaab 37503 6d00aa7e CreateThread 37503->37502 37505 6d00aa99 MessageBoxA 37503->37505 37770 6d004000 6 API calls 37503->37770 37504 6d00aa4c 37504->37502 37504->37503 37505->37502 37508 6d00e8d9 ___std_exception_copy 37506->37508 37507 6d00a9df 37515 6d006780 37507->37515 37508->37507 37510 6d00e8f5 37508->37510 37554 6d0179f5 7 API calls 2 library calls 37508->37554 37511 6d00f073 37510->37511 37555 6d00fe27 RaiseException 37510->37555 37556 6d00fe27 RaiseException 37511->37556 37513 6d00f090 37516 6d00e8d4 8 API calls 37515->37516 37517 6d00678a 37516->37517 37518 6d004170 37517->37518 37557 6d006710 37518->37557 37523 6d0041d9 37525 6d006780 8 API calls 37523->37525 37532 6d0041ef 37525->37532 37526 6d004273 37573 6d0066b0 37526->37573 37530 6d0066b0 8 API calls 37542 6d0042a0 37530->37542 37532->37526 37601 6d0080b0 8 API calls ___scrt_fastfail 37532->37601 37602 6d0080f0 109 API calls 37532->37602 37603 6d004820 27 API calls 37532->37603 37535 6d0047be 37576 6d005c50 37535->37576 37536 6d0080b0 8 API calls 37539 6d00462a 37536->37539 37538 6d004407 37544 6d0044a8 37538->37544 37606 6d006a90 27 API calls 37538->37606 37539->37535 37539->37536 37550 6d0080f0 109 API calls 37539->37550 37609 6d004820 27 API calls 37539->37609 37542->37538 37552 6d006a90 27 API calls 37542->37552 37604 6d0080b0 8 API calls ___scrt_fastfail 37542->37604 37605 6d0080f0 109 API calls 37542->37605 37543 6d005c50 109 API calls 37543->37544 37544->37539 37544->37543 37607 6d0080b0 8 API calls ___scrt_fastfail 37544->37607 37608 6d0080f0 109 API calls 37544->37608 37546 6d0047e0 37584 6d0056c0 37546->37584 37549 6d0047f8 37549->37504 37550->37539 37552->37542 37553->37495 37554->37508 37555->37511 37556->37513 37558 6d00e8d4 8 API calls 37557->37558 37559 6d0041b4 37558->37559 37560 6d0033c0 37559->37560 37561 6d0056c0 109 API calls 37560->37561 37562 6d003406 37561->37562 37610 6d006760 37562->37610 37567 6d00a070 __cftof 78 API calls 37568 6d00344a 37567->37568 37643 6d003af0 37568->37643 37570 6d003ac1 37646 6d00e6c3 37570->37646 37572 6d003adb 37572->37523 37588 6d00a070 37572->37588 37574 6d00e8d4 8 API calls 37573->37574 37575 6d004286 37574->37575 37575->37530 37577 6d005c83 37576->37577 37582 6d005cc8 37576->37582 37578 6d005c87 37577->37578 37577->37582 37707 6d006660 109 API calls 37578->37707 37579 6d005d86 37579->37546 37581 6d005c96 37581->37546 37582->37579 37708 6d003c20 37582->37708 37585 6d0056da 37584->37585 37587 6d0056fe 37584->37587 37586 6d003c20 109 API calls 37585->37586 37585->37587 37586->37585 37587->37549 37589 6d00a091 37588->37589 37590 6d00a0a2 37588->37590 37591 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37589->37591 37592 6d00a0c6 37590->37592 37742 6d009fe0 76 API calls 2 library calls 37590->37742 37593 6d00a09e 37591->37593 37600 6d00a0f0 37592->37600 37738 6d00a010 37592->37738 37593->37523 37595 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37598 6d00a115 37595->37598 37596 6d00a0b9 37743 6d016ce4 66 API calls 3 library calls 37596->37743 37598->37523 37600->37595 37601->37532 37602->37532 37603->37532 37604->37542 37605->37542 37606->37538 37607->37544 37608->37544 37609->37539 37611 6d00e8d4 8 API calls 37610->37611 37612 6d00341f 37611->37612 37613 6d001ae0 37612->37613 37653 6d0052b0 37613->37653 37618 6d001b66 37620 6d00a070 __cftof 78 API calls 37618->37620 37619 6d001b7c 37621 6d001b92 SetupDiClassGuidsFromNameW 37619->37621 37627 6d001b72 37620->37627 37621->37618 37622 6d001bb6 37621->37622 37625 6d001be0 SetupDiGetClassDevsW 37622->37625 37622->37627 37623 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37624 6d001f58 37623->37624 37624->37567 37626 6d001bf8 SetupDiEnumDeviceInfo 37625->37626 37625->37627 37628 6d001f00 SetupDiDestroyDeviceInfoList 37626->37628 37629 6d001c17 37626->37629 37627->37623 37628->37625 37628->37627 37630 6d001c20 CM_Get_Device_IDW 37629->37630 37661 6d014d10 37630->37661 37632 6d001ee2 SetupDiEnumDeviceInfo 37632->37628 37632->37630 37633 6d001ca7 SetupDiOpenDevRegKey 37634 6d001c61 __cftof ___scrt_fastfail 37633->37634 37634->37632 37634->37633 37637 6d00a070 __cftof 78 API calls 37634->37637 37638 6d001f6e 37634->37638 37641 6d005db0 27 API calls 37634->37641 37664 6d014cf6 43 API calls __fassign 37634->37664 37665 6d0018a0 92 API calls 6 library calls 37634->37665 37666 6d0055a0 27 API calls 37634->37666 37637->37634 37667 6d01523d 37638->37667 37641->37634 37644 6d0052b0 26 API calls 37643->37644 37645 6d003af8 37644->37645 37645->37570 37647 6d00e6cc 37646->37647 37648 6d00e6ce IsProcessorFeaturePresent 37646->37648 37647->37572 37650 6d00e715 37648->37650 37706 6d00e6d9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 37650->37706 37652 6d00e7f8 37652->37572 37656 6d0052ea 37653->37656 37657 6d001b1f 37653->37657 37656->37657 37672 6d005c00 26 API calls 37656->37672 37673 6d0069f0 26 API calls 37656->37673 37658 6d0010a0 37657->37658 37674 6d001020 37658->37674 37703 6d014c29 43 API calls 2 library calls 37661->37703 37663 6d014d2b 37663->37634 37664->37634 37665->37634 37666->37634 37704 6d0151b2 26 API calls 3 library calls 37667->37704 37669 6d01524c 37705 6d01525a 11 API calls _abort 37669->37705 37671 6d015259 37672->37656 37673->37656 37675 6d00103a ___scrt_initialize_default_local_stdio_options 37674->37675 37678 6d01490b 37675->37678 37681 6d012d47 37678->37681 37680 6d001044 SetupDiClassGuidsFromNameW 37680->37618 37680->37619 37682 6d012d52 37681->37682 37684 6d012d67 37681->37684 37697 6d016db6 20 API calls _free 37682->37697 37683 6d012da9 37701 6d016db6 20 API calls _free 37683->37701 37684->37683 37686 6d012d75 37684->37686 37699 6d012a4f 50 API calls 4 library calls 37686->37699 37688 6d012d57 37698 6d01522d 26 API calls __fassign 37688->37698 37690 6d012da1 37702 6d01522d 26 API calls __fassign 37690->37702 37692 6d012d8d 37695 6d012db9 37692->37695 37700 6d016db6 20 API calls _free 37692->37700 37693 6d012d62 37693->37680 37695->37680 37697->37688 37698->37693 37699->37692 37700->37690 37701->37690 37702->37695 37703->37663 37704->37669 37705->37671 37706->37652 37707->37581 37717 6d003c2e 37708->37717 37709 6d01523d 26 API calls 37710 6d003e77 37709->37710 37711 6d003eb7 GetWindowLongW 37710->37711 37712 6d003ea9 SetWindowLongW 37710->37712 37713 6d003ec2 37711->37713 37712->37713 37714 6d003ec6 DefWindowProcW 37713->37714 37715 6d003ee9 37713->37715 37718 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37714->37718 37719 6d003f87 37715->37719 37720 6d003ef7 37715->37720 37716 6d003e53 37716->37582 37717->37709 37717->37716 37722 6d003ee3 37718->37722 37721 6d003f8f 37719->37721 37734 6d003fb3 37719->37734 37723 6d003f70 37720->37723 37724 6d003ef9 37720->37724 37725 6d003f97 DefWindowProcW 37721->37725 37726 6d003faa 37721->37726 37722->37582 37729 6d003f77 UnregisterDeviceNotification 37723->37729 37730 6d003f7e KiUserCallbackDispatcher 37723->37730 37727 6d003f13 RegisterDeviceNotificationW 37724->37727 37728 6d003eff 37724->37728 37725->37726 37733 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37726->37733 37732 6d003f52 37727->37732 37728->37725 37731 6d003f07 PostQuitMessage 37728->37731 37729->37730 37730->37726 37731->37726 37732->37726 37735 6d003f5c MessageBoxA 37732->37735 37736 6d003ff3 37733->37736 37734->37726 37737 6d004170 100 API calls 37734->37737 37735->37726 37736->37582 37737->37726 37739 6d00a025 ___scrt_initialize_default_local_stdio_options 37738->37739 37744 6d0148e7 37739->37744 37742->37596 37743->37592 37747 6d012bcb 37744->37747 37748 6d012bf3 37747->37748 37749 6d012c0b 37747->37749 37764 6d016db6 20 API calls _free 37748->37764 37749->37748 37750 6d012c13 37749->37750 37766 6d01234c 38 API calls 2 library calls 37750->37766 37753 6d012bf8 37765 6d01522d 26 API calls __fassign 37753->37765 37754 6d012c23 37767 6d013093 20 API calls 2 library calls 37754->37767 37756 6d012c03 37758 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37756->37758 37760 6d00a033 37758->37760 37759 6d012c9b 37768 6d01357d 50 API calls 3 library calls 37759->37768 37760->37600 37763 6d012ca6 37769 6d0130c8 20 API calls _free 37763->37769 37764->37753 37765->37756 37766->37754 37767->37759 37768->37763 37769->37756 37771 6d0040d0 ShowWindow UpdateWindow SetTimer 37770->37771 37772 6d0040b5 MessageBoxA 37770->37772 37773 6d0040f9 MessageBoxA 37771->37773 37774 6d00410b GetMessageW 37771->37774 37773->37774 37775 6d004150 KillTimer 37774->37775 37776 6d004122 37774->37776 37777 6d00414d 37776->37777 37778 6d00412d TranslateMessage DispatchMessageW GetMessageW 37776->37778 37777->37775 37778->37776 37778->37777 38045 11ab78e 38046 11ab7ba LoadLibraryShim 38045->38046 38048 11ab7e8 38046->38048 37779 6b314a6 37780 6b314d2 DispatchMessageW 37779->37780 37781 6b314fb 37779->37781 37782 6b314e7 37780->37782 37781->37780 37783 6b367a6 37786 6b367db WSAConnect 37783->37786 37785 6b367fa 37786->37785 37787 6b36ba6 37788 6b36bdb K32GetModuleInformation 37787->37788 37790 6b36c12 37788->37790 38049 11abd82 38050 11abda8 GetClassInfoW 38049->38050 38052 11abdd9 38050->38052 37791 1820c98 37792 1820cab 37791->37792 37793 1820cc5 37792->37793 37796 1820cd8 37792->37796 37800 1820ce8 37792->37800 37797 1820ce3 37796->37797 37798 1820d32 37796->37798 37797->37798 37804 1821520 37797->37804 37798->37793 37801 1820cf6 37800->37801 37802 1820d32 37801->37802 37803 1821520 SetErrorMode 37801->37803 37802->37793 37803->37802 37805 182153a 37804->37805 37806 182154e 37804->37806 37809 1821570 37805->37809 37813 1821560 37805->37813 37806->37798 37810 1821581 37809->37810 37817 11aa5a2 37810->37817 37811 1821629 37811->37806 37814 1821581 37813->37814 37816 11aa5a2 SetErrorMode 37814->37816 37815 1821629 37815->37806 37816->37815 37818 11aa5ce SetErrorMode 37817->37818 37820 11aa5f7 37817->37820 37819 11aa5e3 37818->37819 37819->37811 37820->37818 38053 6b3112e 38054 6b31163 PostMessageW 38053->38054 38056 6b31197 38053->38056 38055 6b31178 38054->38055 38056->38054 37821 6b33a96 37824 6b33acb GetExitCodeProcess 37821->37824 37823 6b33af4 37824->37823 38057 6b32b16 38058 6b32b3c DrawTextExW 38057->38058 38060 6b32b6f 38058->38060 38061 850b3f8 38064 850b444 38061->38064 38065 850b464 38064->38065 38066 850b41c 38064->38066 38069 11aa23a 38065->38069 38073 11aa1f4 38065->38073 38070 11aa263 38069->38070 38077 6d00aac0 38070->38077 38071 11aa26b 38071->38066 38074 11aa210 38073->38074 38075 11aa26b 38073->38075 38076 6d00aac0 114 API calls 38074->38076 38075->38066 38076->38075 38078 6d00a070 __cftof 78 API calls 38077->38078 38079 6d00aaf2 38078->38079 38080 6d00aafe 38079->38080 38082 6d00a070 __cftof 78 API calls 38079->38082 38089 6d00abd2 ___std_exception_copy 38079->38089 38080->38071 38081 6d00ac3f CloseHandle CloseHandle 38083 6d00a070 __cftof 78 API calls 38081->38083 38084 6d00ab40 38082->38084 38085 6d00ac61 38083->38085 38086 6d00ab87 38084->38086 38087 6d00ab60 PostMessageW 38084->38087 38085->38071 38088 6d00a070 __cftof 78 API calls 38086->38088 38090 6d00a070 __cftof 78 API calls 38087->38090 38093 6d00ab93 38088->38093 38089->38081 38091 6d00a070 __cftof 78 API calls 38089->38091 38092 6d00ab77 WaitForSingleObject 38090->38092 38094 6d00ac1b OmCancelDownload 38091->38094 38092->38086 38092->38087 38095 6d005c50 109 API calls 38093->38095 38094->38089 38095->38089 37825 6b3129a 37826 6b312d2 PeekMessageW 37825->37826 37827 6b31306 37825->37827 37828 6b312e7 37826->37828 37827->37826 38096 6b33e1a 38097 6b33e4f RegQueryValueExW 38096->38097 38099 6b33ea3 38097->38099 37829 11ab136 37830 11ab168 SetWindowLongW 37829->37830 37832 11ab193 37829->37832 37831 11ab17d 37830->37831 37832->37830 37833 11aa636 37834 11aa66e CreateFileW 37833->37834 37836 11aa6bd 37834->37836 38100 6b3581e 38101 6b35853 WSAEventSelect 38100->38101 38103 6b3588a 38101->38103 38104 6b35902 38106 6b35937 RasConnectionNotificationW 38104->38106 38107 6b3596a 38106->38107 38108 11ab2a2 EnumThreadWindows 38109 11ab2f4 38108->38109 37837 6d002440 37865 6d005b10 37837->37865 37841 6d0024af 37905 6d0010c0 37841->37905 37843 6d0024ff 37844 6d0010c0 14 API calls 37843->37844 37845 6d002518 37844->37845 37846 6d002994 37845->37846 37861 6d002656 ___scrt_fastfail 37845->37861 37847 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 37846->37847 37848 6d0029ba 37847->37848 37849 6d014d10 __cftoe 43 API calls 37850 6d0026ae VariantClear 37849->37850 37851 6d0026d8 ___scrt_fastfail 37850->37851 37852 6d014d10 __cftoe 43 API calls 37851->37852 37853 6d00270c CreateFileW 37852->37853 37854 6d002732 DeviceIoControl CloseHandle 37853->37854 37855 6d00272e 37853->37855 37856 6d002780 VariantClear 37854->37856 37855->37856 37857 6d00a070 __cftof 78 API calls 37856->37857 37857->37861 37861->37845 37861->37849 37862 6d0029c0 37861->37862 37912 6d005db0 27 API calls 2 library calls 37861->37912 37913 6d0072b0 8 API calls 37861->37913 37914 6d007300 27 API calls 37861->37914 37863 6d01523d 26 API calls 37862->37863 37864 6d0029c5 37863->37864 37866 6d00248c 37865->37866 37869 6d005b23 37865->37869 37872 6d001610 37866->37872 37867 6d005b10 26 API calls 37867->37869 37868 6d005b8b 37870 6d01523d 26 API calls 37868->37870 37869->37866 37869->37867 37869->37868 37871 6d005b90 37870->37871 37873 6d001642 CoInitializeEx 37872->37873 37900 6d001839 37872->37900 37874 6d0016a2 CoInitializeSecurity 37873->37874 37875 6d001672 37873->37875 37876 6d0016ce CoCreateInstance 37874->37876 37877 6d0016be 37874->37877 37875->37874 37878 6d00167e 37875->37878 37880 6d001711 37876->37880 37881 6d0016e7 37876->37881 37879 6d00a070 __cftof 78 API calls 37877->37879 37884 6d00a070 __cftof 78 API calls 37878->37884 37885 6d0016cb 37879->37885 37883 6d00e8d4 8 API calls 37880->37883 37882 6d00a070 __cftof 78 API calls 37881->37882 37886 6d0016f4 CoUninitialize 37882->37886 37887 6d001718 37883->37887 37888 6d00168b 37884->37888 37885->37876 37886->37841 37889 6d00174e 37887->37889 37890 6d00172b SysAllocString 37887->37890 37888->37841 37891 6d001764 InterlockedDecrement 37889->37891 37892 6d001854 _com_issue_error 37889->37892 37890->37889 37890->37892 37898 6d00179d 37891->37898 37894 6d005c50 109 API calls 37892->37894 37897 6d001885 37894->37897 37895 6d001811 CoSetProxyBlanket 37895->37900 37901 6d00182c 37895->37901 37896 6d0017d9 37899 6d00a070 __cftof 78 API calls 37896->37899 37897->37841 37898->37895 37898->37896 37902 6d0017e6 CoUninitialize 37899->37902 37900->37841 37903 6d00a070 __cftof 78 API calls 37901->37903 37902->37841 37903->37900 37906 6d00e8d4 8 API calls 37905->37906 37907 6d0010ee 37906->37907 37909 6d001117 _com_issue_error 37907->37909 37915 6d00e230 10 API calls 4 library calls 37907->37915 37910 6d00115a InterlockedDecrement 37909->37910 37911 6d00112a 37909->37911 37910->37911 37911->37843 37912->37861 37913->37861 37914->37861 37915->37909 37916 6b364f2 37917 6b3652d getaddrinfo 37916->37917 37919 6b3659f 37917->37919 38110 6b34a72 38111 6b34aaa MapViewOfFile 38110->38111 38113 6b34af9 38111->38113 38114 6b33b72 38115 6b33b98 DeleteFileW 38114->38115 38117 6b33bb4 38115->38117 38122 11aafd2 38123 11aaffe OleInitialize 38122->38123 38124 11ab034 38122->38124 38125 11ab00c 38123->38125 38124->38123 37924 6b30afe 37925 6b30b24 SetWindowTextW 37924->37925 37927 6b30b4a 37925->37927 38126 6d0029d0 38141 6d005a80 38126->38141 38129 6d002db1 38132 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 38129->38132 38130 6d002a96 38131 6d002aa0 SetupDiGetDeviceInterfaceDetailW 38130->38131 38148 6d005210 27 API calls ___scrt_fastfail 38131->38148 38134 6d002dcb 38132->38134 38135 6d002af7 SetupDiGetDeviceInterfaceDetailW 38136 6d002d3b 38135->38136 38137 6d002dcf 38136->38137 38139 6d002d6b SetupDiEnumDeviceInterfaces 38136->38139 38138 6d01523d 26 API calls 38137->38138 38140 6d002dd4 38138->38140 38139->38129 38139->38131 38142 6d002a17 SetupDiGetClassDevsW SetupDiEnumDeviceInterfaces 38141->38142 38144 6d005a93 38141->38144 38142->38129 38142->38130 38143 6d005a80 26 API calls 38143->38144 38144->38142 38144->38143 38145 6d005afb 38144->38145 38146 6d01523d 26 API calls 38145->38146 38147 6d005b00 38146->38147 38148->38135 38149 11aa2ca 38150 11aa308 DuplicateHandle 38149->38150 38151 11aa340 38149->38151 38152 11aa316 38150->38152 38151->38150 37928 6b343e2 37929 6b3441a WSASocketW 37928->37929 37931 6b34456 37929->37931 37932 11aa74e 37933 11aa77a CloseHandle 37932->37933 37934 11aa7b9 37932->37934 37935 11aa784 37933->37935 37934->37933 37936 6b344e6 37937 6b34556 37936->37937 37938 6b3451e setsockopt 37936->37938 37937->37938 37939 6b3452c 37938->37939 37940 6b350ee 37942 6b35123 GetProcessTimes 37940->37942 37943 6b35155 37942->37943 37944 6b369ee 37945 6b36a1d AdjustTokenPrivileges 37944->37945 37947 6b36a3f 37945->37947 37948 6b34dee 37949 6b34e26 CreateMutexW 37948->37949 37951 6b34e69 37949->37951 38153 6b3556e 38154 6b355be CertGetCertificateChain 38153->38154 38155 6b355c6 38154->38155 37952 11aab7a 37954 11aabaf ReadFile 37952->37954 37955 11aabe1 37954->37955 38156 11aa7fa 38158 11aa82f GetFileType 38156->38158 38159 11aa85c 38158->38159 38160 6d002de0 38161 6d0052b0 26 API calls 38160->38161 38162 6d002e1b ___scrt_fastfail 38161->38162 38163 6d002e2e FindFirstVolumeW 38162->38163 38165 6d002e51 ___scrt_fastfail 38163->38165 38164 6d014cf6 43 API calls __fassign 38164->38165 38165->38164 38166 6d00a070 __cftof 78 API calls 38165->38166 38171 6d003152 38165->38171 38167 6d00310f FindNextVolumeW 38166->38167 38167->38165 38168 6d00312d FindVolumeClose 38167->38168 38169 6d00e6c3 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 38168->38169 38170 6d00314e 38169->38170 38176 6d00e7fa 5 API calls ___report_securityfailure 38171->38176 38173 6d003157 38174 6d01523d 26 API calls 38173->38174 38175 6d00315c 38174->38175 38176->38173 37956 6b366d2 37959 6b36707 GetAdaptersAddresses 37956->37959 37958 6b36740 37959->37958 37960 6b35bd2 37962 6b35c07 RegNotifyChangeKeyValue 37960->37962 37963 6b35c44 37962->37963 37964 6b378d6 37967 6b3790b CertVerifyCertificateChainPolicy 37964->37967 37966 6b3793a 37967->37966 37968 6b33cd6 37969 6b33d02 GetSystemInfo 37968->37969 37970 6b33d38 37968->37970 37971 6b33d10 37969->37971 37970->37969 38181 6b30656 38182 6b306a6 RasEnumConnectionsW 38181->38182 38183 6b306b4 38182->38183 38184 6b3625a 38186 6b36266 GetNetworkParams 38184->38186 38187 6b362bf 38186->38187 38188 6b3535a 38189 6b3538f ioctlsocket 38188->38189 38191 6b353bb 38189->38191 37976 6b30fde 37977 6b31041 37976->37977 37978 6b3100d KiUserCallbackDispatcher 37976->37978 37977->37978 37979 6b31022 37978->37979 37980 6b348c2 37981 6b348fa ConvertStringSecurityDescriptorToSecurityDescriptorW 37980->37981 37983 6b3493b 37981->37983 37984 11aa46e 37985 11aa4be CreateActCtxA 37984->37985 37986 11aa4cc 37985->37986 37987 6b36cc6 37988 6b36d16 K32GetModuleBaseNameW 37987->37988 37989 6b36d1e 37988->37989 37990 6b339c6 37992 6b339fb shutdown 37990->37992 37993 6b33a24 37992->37993 38192 6b30c4a 38193 6b30caa 38192->38193 38194 6b30c7f SetTimer 38192->38194 38193->38194 38195 6b30c94 38194->38195 37994 6b359ce 37996 6b35a06 RegOpenCurrentUser 37994->37996 37997 6b35a39 37996->37997

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 84 18218b0-18218c9 85 18218cb-18218ce 84->85 86 18218cf-1822233 84->86 1756 1822235 call 18298a0 86->1756 1757 1822235 call 18305e0 86->1757 1758 1822235 call 1830606 86->1758 1759 1822235 call 182989e 86->1759 293 182223a-18222ab 1760 18222ad call 18305e0 293->1760 1761 18222ad call 1830606 293->1761 1762 18222ad call 182a087 293->1762 1763 18222ad call 182a098 293->1763 302 18222b2-1823f58 704 1823f5f-1828f0a 302->704 1613 1828f14-1828f37 704->1613 1614 1828f42-18296c6 1613->1614 1721 18296cd-18296cf 1614->1721 1722 18296d6-1829887 1721->1722 1756->293 1757->293 1758->293 1759->293 1760->302 1761->302 1762->302 1763->302
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tjj$Tjj$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk
                        • API String ID: 0-1285754964
                        • Opcode ID: 02d5b324d24dc72bdfb2e4cb92aa5416173c222b4c150977ca4a9d7921e2b34e
                        • Instruction ID: 3f67542d83d1b0ee424be4acdc7be0d1725d51c0561dd2f1bb8b7e9b84db38a4
                        • Opcode Fuzzy Hash: 02d5b324d24dc72bdfb2e4cb92aa5416173c222b4c150977ca4a9d7921e2b34e
                        • Instruction Fuzzy Hash: E0F33934A01614CFDB25DB34C898A9AB7B2FF89308F5144ADD51AAB3A1CF35AD85CF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1764 1821900-1822233 3430 1822235 call 18298a0 1764->3430 3431 1822235 call 18305e0 1764->3431 3432 1822235 call 1830606 1764->3432 3433 1822235 call 182989e 1764->3433 1967 182223a-18222ab 3434 18222ad call 18305e0 1967->3434 3435 18222ad call 1830606 1967->3435 3436 18222ad call 182a087 1967->3436 3437 18222ad call 182a098 1967->3437 1976 18222b2-1823f58 2378 1823f5f-1828f0a 1976->2378 3287 1828f14-1828f37 2378->3287 3288 1828f42-18296c6 3287->3288 3395 18296cd-18296cf 3288->3395 3396 18296d6-1829887 3395->3396 3430->1967 3431->1967 3432->1967 3433->1967 3434->1976 3435->1976 3436->1976 3437->1976
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tjj$Tjj$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk
                        • API String ID: 0-1285754964
                        • Opcode ID: a497e79a74f3796cf8ab9f636082a2f5418b6ee6bfe5bfa552b519770a8a22d2
                        • Instruction ID: d0ade029b6bd56d8abebe222baea77223ea37c4e2ceeda4dac5443ac0960b021
                        • Opcode Fuzzy Hash: a497e79a74f3796cf8ab9f636082a2f5418b6ee6bfe5bfa552b519770a8a22d2
                        • Instruction Fuzzy Hash: 02F33934A01614CFDB25DB34C898A9AB7B2FF89308F5144ADD51AAB3A1CF35AD85CF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3438 182a320-182a8b6 3539 182a8b8-182a8be 3438->3539 3540 182a8ce-182a9de 3438->3540 3541 182a8c2-182a8cc 3539->3541 3542 182a8c0 3539->3542 3555 182a9e0-182a9e6 3540->3555 3556 182a9f6-182c831 3540->3556 3541->3540 3542->3540 3557 182a9ea-182a9f4 3555->3557 3558 182a9e8 3555->3558 3882 182c838-182c857 3556->3882 3557->3556 3558->3556
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: )$,$,$1$1$7$7$7$7$8$8$:$:$:$A$L$L$P$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$V$k
                        • API String ID: 0-279571417
                        • Opcode ID: f135fb0112830f8e48d3a4bd5e64d7554d0c50d5c158c60078f8e86144b4f72b
                        • Instruction ID: cdefffcc051dd049ab1a841ac50802652b7b1cfd53802e59cc54e09829052ee1
                        • Opcode Fuzzy Hash: f135fb0112830f8e48d3a4bd5e64d7554d0c50d5c158c60078f8e86144b4f72b
                        • Instruction Fuzzy Hash: 27330434A01614CFDB29DB34C854BAAB7F2AF89304F5144ACD55AAB3A1CF36AD81DF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3885 182a310-182a8b6 3986 182a8b8-182a8be 3885->3986 3987 182a8ce-182a9de 3885->3987 3988 182a8c2-182a8cc 3986->3988 3989 182a8c0 3986->3989 4002 182a9e0-182a9e6 3987->4002 4003 182a9f6-182c831 3987->4003 3988->3987 3989->3987 4004 182a9ea-182a9f4 4002->4004 4005 182a9e8 4002->4005 4329 182c838-182c857 4003->4329 4004->4003 4005->4003
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: )$,$,$1$1$7$7$7$7$8$8$:$:$:$A$L$L$P$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$Tqxk$V$k
                        • API String ID: 0-279571417
                        • Opcode ID: 40a9f2bcad45cbcc5ae9ac75553fe023fe77d8016fefa9f5e727601b5d3e781c
                        • Instruction ID: 21dfb61abdfa8067f38aa58d0461b4b20791cdb7ca01aec7cbd99aa03b865da0
                        • Opcode Fuzzy Hash: 40a9f2bcad45cbcc5ae9ac75553fe023fe77d8016fefa9f5e727601b5d3e781c
                        • Instruction Fuzzy Hash: 72330334A01614CFDB29DB34C854BAAB7F2AF89304F5144ACD55AAB3A1CF36AD81DF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4342 6d001610-6d00163c 4343 6d001840-6d001853 4342->4343 4344 6d001642-6d001670 CoInitializeEx 4342->4344 4345 6d0016a2-6d0016bc CoInitializeSecurity 4344->4345 4346 6d001672-6d001675 4344->4346 4348 6d0016ce-6d0016e5 CoCreateInstance 4345->4348 4349 6d0016be-6d0016c6 call 6d00a070 4345->4349 4346->4345 4347 6d001677-6d00167c 4346->4347 4347->4345 4350 6d00167e-6d0016a1 call 6d00a070 4347->4350 4352 6d001711-6d001729 call 6d00e8d4 4348->4352 4353 6d0016e7-6d001710 call 6d00a070 CoUninitialize 4348->4353 4357 6d0016cb 4349->4357 4361 6d001750 4352->4361 4362 6d00172b-6d001748 SysAllocString 4352->4362 4357->4348 4365 6d001752-6d00175e 4361->4365 4363 6d001854-6d001859 call 6d00e210 4362->4363 4364 6d00174e 4362->4364 4368 6d00185e-6d001898 call 6d00e210 call 6d005c50 call 6d00e904 4363->4368 4364->4365 4367 6d001764-6d00179b InterlockedDecrement 4365->4367 4365->4368 4373 6d0017d2-6d0017d7 4367->4373 4374 6d00179d-6d0017a1 4367->4374 4375 6d001811-6d00182a CoSetProxyBlanket 4373->4375 4376 6d0017d9-6d001810 call 6d00a070 CoUninitialize 4373->4376 4378 6d0017b0-6d0017b5 4374->4378 4379 6d0017a3-6d0017aa 4374->4379 4384 6d00183c 4375->4384 4385 6d00182c-6d001839 call 6d00a070 4375->4385 4380 6d0017c7-6d0017cf call 6d00e904 4378->4380 4381 6d0017b7-6d0017c0 call 6d00e6d4 4378->4381 4379->4378 4380->4373 4381->4380 4384->4343 4385->4384
                        APIs
                        • CoInitializeEx.OLE32(00000000,00000000,73BCE995,?,?,?,?,00000000,6D0263D7,000000FF,?,6D0024AF,?,73BCE995,00000000,?), ref: 6D001668
                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,00000000,6D0263D7,000000FF), ref: 6D0016B4
                        • CoCreateInstance.OLE32(6D0273D4,00000000,00000001,6D027304,00000000,?,?,?,?,00000000,6D0263D7,000000FF,?,6D0024AF,?,73BCE995), ref: 6D0016DD
                        • CoUninitialize.OLE32(00000000,?,00000000), ref: 6D0016F7
                        • SysAllocString.OLEAUT32(ROOT\CIMV2), ref: 6D00173E
                        • InterlockedDecrement.KERNEL32(00000008), ref: 6D001793
                        • SysFreeString.OLEAUT32 ref: 6D0017A4
                        • CoUninitialize.OLE32 ref: 6D0017F7
                        • CoSetProxyBlanket.COMBASE(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 6D001822
                        • _com_issue_error.COMSUPP ref: 6D001859
                        • _com_issue_error.COMSUPP ref: 6D001863
                        Strings
                        • ERROR: Could not connect to WMI ROOT\CIMV2: 0x%08x, xrefs: 6D0017DA
                        • NOTE: Initialize security result: 0x%08x, xrefs: 6D0016BF
                        • ERROR: Failed to initialize COM library: 0x%08x, xrefs: 6D00167F
                        • WARNING: Could not set proxy blanket: 0x%08x, xrefs: 6D00182D
                        • ERROR: Failed to create IWbemLocator object: 0x%08x, xrefs: 6D0016E8
                        • ROOT\CIMV2, xrefs: 6D00172B
                        • `-u, xrefs: 6D0017A4
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: InitializeStringUninitialize_com_issue_error$AllocBlanketCreateDecrementFreeInstanceInterlockedProxySecurity
                        • String ID: ERROR: Could not connect to WMI ROOT\CIMV2: 0x%08x$ERROR: Failed to create IWbemLocator object: 0x%08x$ERROR: Failed to initialize COM library: 0x%08x$NOTE: Initialize security result: 0x%08x$ROOT\CIMV2$WARNING: Could not set proxy blanket: 0x%08x$`-u
                        • API String ID: 1624489225-2628047805
                        • Opcode ID: 3643aada33a2a247efba592a26f1764fbbfc317d836b27fa923470c305e50b2e
                        • Instruction ID: 51159f6e82380bf99ce80ac3585f7739cf05d0c65a193374086bd2342781d6b1
                        • Opcode Fuzzy Hash: 3643aada33a2a247efba592a26f1764fbbfc317d836b27fa923470c305e50b2e
                        • Instruction Fuzzy Hash: F871D571A49705BFFB208F54DC45F6AB7B8EF01B18F204659FA18EB2C0D7B2A5048796

                        Control-flow Graph

                        Strings
                        • WQL, xrefs: 6D002501
                        • [USBSTOR->DEVICEID->DEVICENUMBER] %s -> %s -> %u, xrefs: 6D00279E
                        • DeviceID, xrefs: 6D0026CF
                        • PNPDeviceID, xrefs: 6D002671
                        • SELECT PNPDeviceID, DeviceID FROM Win32_DiskDrive WHERE InterfaceType='USB', xrefs: 6D0024EF
                        • `-u, xrefs: 6D002555
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID: DeviceID$PNPDeviceID$SELECT PNPDeviceID, DeviceID FROM Win32_DiskDrive WHERE InterfaceType='USB'$WQL$[USBSTOR->DEVICEID->DEVICENUMBER] %s -> %s -> %u$`-u
                        • API String ID: 2538663250-1704204250
                        • Opcode ID: 8931b1ebebc5b94bbf955311c7c0e7b93977a4f539a2dad4966ab6c905ae3857
                        • Instruction ID: 39f58081239178752c712cb77ea7223ba3d33f0e991c1cb984f8ef3c5e586a72
                        • Opcode Fuzzy Hash: 8931b1ebebc5b94bbf955311c7c0e7b93977a4f539a2dad4966ab6c905ae3857
                        • Instruction Fuzzy Hash: CDC15071A05219AFFB20DF64CC89BADB7B9EF48714F2041D9E519A7290D770AA84CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4535 6d003c20-6d003c2c 4536 6d003c5d-6d003c81 4535->4536 4537 6d003c2e-6d003c3b 4535->4537 4540 6d003cb2-6d003cd6 4536->4540 4541 6d003c83-6d003c90 4536->4541 4538 6d003c53-6d003c5a call 6d00e904 4537->4538 4539 6d003c3d-6d003c4b 4537->4539 4538->4536 4544 6d003c51 4539->4544 4545 6d003e72-6d003ea7 call 6d01523d 4539->4545 4542 6d003d04-6d003d22 4540->4542 4543 6d003cd8-6d003ce2 4540->4543 4547 6d003c92-6d003ca0 4541->4547 4548 6d003ca8-6d003caf call 6d00e904 4541->4548 4551 6d003d50-6d003d68 4542->4551 4552 6d003d24-6d003d2e 4542->4552 4549 6d003ce4-6d003cf2 4543->4549 4550 6d003cfa-6d003d01 call 6d00e904 4543->4550 4544->4538 4572 6d003eb7-6d003ec0 GetWindowLongW 4545->4572 4573 6d003ea9-6d003eb5 SetWindowLongW 4545->4573 4547->4545 4555 6d003ca6 4547->4555 4548->4540 4549->4545 4557 6d003cf8 4549->4557 4550->4542 4562 6d003d96-6d003dae 4551->4562 4563 6d003d6a-6d003d74 4551->4563 4559 6d003d30-6d003d3e 4552->4559 4560 6d003d46-6d003d4d call 6d00e904 4552->4560 4555->4548 4557->4550 4559->4545 4570 6d003d44 4559->4570 4560->4551 4568 6d003db0-6d003dba 4562->4568 4569 6d003ddc-6d003df4 4562->4569 4565 6d003d76-6d003d84 4563->4565 4566 6d003d8c-6d003d93 call 6d00e904 4563->4566 4565->4545 4575 6d003d8a 4565->4575 4566->4562 4577 6d003dd2-6d003dd9 call 6d00e904 4568->4577 4578 6d003dbc-6d003dca 4568->4578 4579 6d003df6-6d003e00 4569->4579 4580 6d003e1e-6d003e36 4569->4580 4570->4560 4574 6d003ec2-6d003ec4 4572->4574 4573->4574 4582 6d003ec6-6d003ede DefWindowProcW call 6d00e6c3 4574->4582 4583 6d003ee9-6d003ef1 4574->4583 4575->4566 4577->4569 4578->4545 4587 6d003dd0 4578->4587 4589 6d003e02-6d003e10 4579->4589 4590 6d003e14-6d003e1b call 6d00e904 4579->4590 4585 6d003e38-6d003e41 4580->4585 4586 6d003e5f-6d003e71 4580->4586 4602 6d003ee3-6d003ee6 4582->4602 4593 6d003f87-6d003f8d 4583->4593 4594 6d003ef7 4583->4594 4595 6d003e43-6d003e51 4585->4595 4596 6d003e55-6d003e5c call 6d00e904 4585->4596 4587->4577 4589->4545 4598 6d003e12 4589->4598 4590->4580 4599 6d003fb3-6d003fb6 4593->4599 4600 6d003f8f-6d003f95 4593->4600 4603 6d003f70-6d003f75 4594->4603 4604 6d003ef9-6d003efd 4594->4604 4595->4545 4605 6d003e53 4595->4605 4596->4586 4598->4590 4609 6d003fe3-6d003ff6 call 6d00e6c3 4599->4609 4610 6d003fb8-6d003fbd 4599->4610 4607 6d003f97-6d003fa8 DefWindowProcW 4600->4607 4608 6d003faa-6d003fb1 4600->4608 4614 6d003f77-6d003f78 UnregisterDeviceNotification 4603->4614 4615 6d003f7e-6d003f85 KiUserCallbackDispatcher 4603->4615 4611 6d003f13-6d003f50 RegisterDeviceNotificationW 4604->4611 4612 6d003eff-6d003f01 4604->4612 4605->4596 4607->4609 4608->4609 4610->4609 4617 6d003fbf-6d003fc4 4610->4617 4619 6d003f52 4611->4619 4620 6d003f54-6d003f56 4611->4620 4612->4607 4618 6d003f07-6d003f0e PostQuitMessage 4612->4618 4614->4615 4616 6d003fde 4615->4616 4616->4609 4622 6d003fd0-6d003fd9 call 6d004170 4617->4622 4623 6d003fc6-6d003fce 4617->4623 4618->4616 4619->4620 4620->4616 4624 6d003f5c-6d003f6e MessageBoxA 4620->4624 4622->4616 4623->4609 4624->4616
                        APIs
                        • SetWindowLongW.USER32(?,000000EB,00000008), ref: 6D003EAF
                        • GetWindowLongW.USER32(?,000000EB), ref: 6D003EBA
                        • DefWindowProcW.USER32(?,?,?,?,?,00000008,00000000), ref: 6D003ECF
                        • PostQuitMessage.USER32(?), ref: 6D003F08
                        • RegisterDeviceNotificationW.USER32 ref: 6D003F47
                        • MessageBoxA.USER32(00000000,Error registering device finder device interface,Error,00000000), ref: 6D003F68
                        • UnregisterDeviceNotification.USER32(?), ref: 6D003F78
                        • KiUserCallbackDispatcher.NTDLL(?,?,00000008,00000000), ref: 6D003F7F
                        • DefWindowProcW.USER32(?,?,?,?,?,00000008,00000000), ref: 6D003FA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Window$DeviceLongMessageNotificationProc$CallbackDispatcherPostQuitRegisterUnregisterUser
                        • String ID: $Error$Error registering device finder device interface
                        • API String ID: 3722141207-1522381284
                        • Opcode ID: f69d658b9215d2b629e8e6524a98ab1e4f290472154d914c2c2988ffb8096f3f
                        • Instruction ID: 07acd52a5308a31a068296bb637c5b667d9885afbde35c7dbe91d7ada9a10b52
                        • Opcode Fuzzy Hash: f69d658b9215d2b629e8e6524a98ab1e4f290472154d914c2c2988ffb8096f3f
                        • Instruction Fuzzy Hash: F4A1D471604740AFF72A8B28CC98F2BB6F5AF4D314F544A1CE296CBAE1C775E4848B51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4734 85045c8-8504625 4739 8505054-85050b1 4734->4739 4740 850462b-8504668 4734->4740 4757 85050ee-85050f5 4739->4757 4751 8504695-85046a0 4740->4751 4754 85046a2-8504722 4751->4754 4755 850466a-8504673 4751->4755 4769 8504728-850472b 4754->4769 4770 85048fe-8504931 4754->4770 4758 8504680-8504692 4755->4758 4759 8504675-8504679 4755->4759 4758->4751 4759->4758 4771 8504731-850474a 4769->4771 4772 85050b3-85050e9 4769->4772 4770->4772 4784 8504937-8504950 4770->4784 4776 8504750-8504763 4771->4776 4777 85048f4-85048f8 4771->4777 4772->4757 4776->4777 4783 8504769-850477c 4776->4783 4777->4769 4777->4770 4783->4777 4790 8504782-8504795 4783->4790 4784->4772 4785 8504956-8504969 4784->4785 4785->4772 4786 850496f-8504980 4785->4786 4786->4772 4789 8504986-85049a1 4786->4789 4795 8504a40-8504a4a 4789->4795 4796 85049a7-85049bc 4789->4796 4793 8504797-85047aa 4790->4793 4794 85047cb-85047e0 4790->4794 4793->4794 4803 85047ac-85047c6 4793->4803 4794->4772 4808 85047e6-85047f0 4794->4808 4797 8504a79-8504a94 4795->4797 4798 8504a4c-8504a59 4795->4798 4796->4772 4806 85049c2-85049ed 4796->4806 4797->4772 4809 8504a9a-8504ad8 4797->4809 4798->4772 4800 8504a5f-8504a65 4798->4800 4804 8504a70-8504a72 4800->4804 4805 8504a67-8504a6e 4800->4805 4803->4777 4804->4797 4810 8504a74-8504a77 4804->4810 4805->4797 4806->4795 4814 85049ef-85049f8 4806->4814 4808->4772 4811 85047f6-850480d 4808->4811 4809->4772 4832 8504ade-8504b1f 4809->4832 4810->4797 4810->4798 4811->4777 4819 8504813-8504817 4811->4819 4817 8504a38-8504a3e 4814->4817 4818 85049fa-8504a03 4814->4818 4817->4795 4817->4814 4818->4772 4821 8504a09-8504a10 4818->4821 4819->4772 4820 850481d-8504839 4819->4820 4827 850483b-850483d 4820->4827 4828 850483f-8504843 4820->4828 4821->4772 4823 8504a16-8504a2e 4821->4823 4823->4817 4830 850485d-8504873 4827->4830 4828->4772 4831 8504849-850485b 4828->4831 4836 8504875-8504888 4830->4836 4837 850488a-850489d 4830->4837 4831->4830 4832->4772 4847 8504b25-8504b66 4832->4847 4836->4777 4837->4777 4841 850489f-85048b2 4837->4841 4844 85048b4-85048ba 4841->4844 4845 85048bc-85048cf 4841->4845 4844->4777 4849 85048d1-85048d7 4845->4849 4850 85048d9-85048ec 4845->4850 4847->4772 4857 8504b6c-8504baf 4847->4857 4849->4777 4850->4777 4854 85048ee 4850->4854 4854->4777 4857->4772 4863 8504bb5-8504bf9 4857->4863 4863->4772 4868 8504bff-8504c46 4863->4868 4868->4772 4873 8504c4c-8504c93 4868->4873 4873->4772 4878 8504c99-8504ce9 4873->4878 4884 8504ceb-8504cf9 4878->4884 4885 8504cff-8504d03 4878->4885 4884->4885 4886 8504d09-8504d7e 4885->4886 4887 8504d8b-8504eac 4885->4887 4906 8504d86 4886->4906 4917 8504ed6-8504edd 4887->4917 4918 8504eae-8504ed4 4887->4918 4906->4757 4919 8504f07-8504f0e 4917->4919 4920 8504edf-8504f05 4917->4920 4918->4917 4921 8504f10-8504f5f 4919->4921 4922 8504f61-8504f76 4919->4922 4920->4919 4921->4922 4924 8504f78-8504f8a 4922->4924 4925 8504f8c-8504f97 4922->4925 4927 8504f9a-8504fae 4924->4927 4925->4927 4933 8504fb4-8504fbb 4927->4933 4934 850503a-850504f 4927->4934 4935 8505020-8505035 4933->4935 4936 8504fbd-8504fda 4933->4936 4934->4757 4935->4757 4942 8504ffb-850501b 4936->4942 4943 8504fdc-8504ff9 4936->4943 4942->4757 4943->4935 4943->4942
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: :@Qk$:@Qk$:@Qk$:@Qk$:@Qk$>oVk$>oVk$h^wk
                        • API String ID: 0-1197224653
                        • Opcode ID: f0dab3807181f979394bcec7376db260d838ae22ca3622fe6db50d054bd2c816
                        • Instruction ID: 79aa89e23e3496f4fd7bf9556f13b88f8a72f4d6e54ee536b74eaf21874bc605
                        • Opcode Fuzzy Hash: f0dab3807181f979394bcec7376db260d838ae22ca3622fe6db50d054bd2c816
                        • Instruction Fuzzy Hash: A8625C34B002148FEB14DB28C9A5B6EB7E6BF88309F2084ADD509AB791DB359C45CF95
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: :@Qk$:@Qk$:@Qk$>oVk$>oVk$h^wk
                        • API String ID: 0-3549128206
                        • Opcode ID: fa9456c3b51838521bf9aec69b942992c39d950d5607dbcd81526f9d42ad2338
                        • Instruction ID: 5d384d4f958fa1e8ccf0a41af35f6fc712ca69e1662201f1e50348cb3ec7c89f
                        • Opcode Fuzzy Hash: fa9456c3b51838521bf9aec69b942992c39d950d5607dbcd81526f9d42ad2338
                        • Instruction Fuzzy Hash: 57025B74B00214CFEB14DF68C9A4BADB7E6BF88308F1084A9D509AB791DB35AC45CF95
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: :@Qk
                        • API String ID: 0-3079184092
                        • Opcode ID: aba5bc930912ea60df82fb3e3dbd1fb38f546ee22014785ae5ebb6a940838075
                        • Instruction ID: 28494f542f6c0c2e408ed2121862bebdbd990d76e9339da897fe5d1e2a808838
                        • Opcode Fuzzy Hash: aba5bc930912ea60df82fb3e3dbd1fb38f546ee22014785ae5ebb6a940838075
                        • Instruction Fuzzy Hash: 49421A30A00215CFDB25DF24C894BEEBBB2BF89305F1088ADD54AA7295DB35AD95CF41
                        APIs
                        • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 06B36A37
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: AdjustPrivilegesToken
                        • String ID:
                        • API String ID: 2874748243-0
                        • Opcode ID: ec7e675de5a562b725d0b8977866bc528c9166f5bb7c9a8c565151e902e790b9
                        • Instruction ID: 7973a06982dd01a14a717a55742cdba65ef92f7893d236dea48d334373395a32
                        • Opcode Fuzzy Hash: ec7e675de5a562b725d0b8977866bc528c9166f5bb7c9a8c565151e902e790b9
                        • Instruction Fuzzy Hash: 8221B2B5509780AFDB228F25DC44B52BFF4EF06310F0885DAE9858F563E271D918DB62
                        APIs
                        • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 06B36A37
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: AdjustPrivilegesToken
                        • String ID:
                        • API String ID: 2874748243-0
                        • Opcode ID: 360330b46024bb85be65508e4c89d30a8c07f6e39fb50d2f224d254e0dca0e88
                        • Instruction ID: 427184eae7d4fc6e2fe916dce4849b94a8f631b2842683c5219bff074c542cb7
                        • Opcode Fuzzy Hash: 360330b46024bb85be65508e4c89d30a8c07f6e39fb50d2f224d254e0dca0e88
                        • Instruction Fuzzy Hash: BE118275600254AFDB60CF55D885B56FBE4FF04320F08C4AADD458B662E735E418DFA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: recv
                        • String ID:
                        • API String ID: 1507349165-0
                        • Opcode ID: fbdbb4f68114f192835b12dbdc059fa507c63f74f16003a51c89e19b74029770
                        • Instruction ID: 95b1f344d2a44fa775e8e7021789253c71510ed6ae5c5b08588dad99fd3894bf
                        • Opcode Fuzzy Hash: fbdbb4f68114f192835b12dbdc059fa507c63f74f16003a51c89e19b74029770
                        • Instruction Fuzzy Hash: D4019A365002409FDB20CF55E985B66FFE4EF04224F08C8AADE498B652D375A418CBA2
                        APIs
                        • GetSystemInfo.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33D08
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: InfoSystem
                        • String ID:
                        • API String ID: 31276548-0
                        • Opcode ID: 0a72a0f693456afb20302bf9d6995987cc2badf8bfa67e9e1d3d353b9292a9ce
                        • Instruction ID: d6c5dc960f5cf5f2dda96e36e509a2bf0abd359eb0ff840b135138749f6a2f25
                        • Opcode Fuzzy Hash: 0a72a0f693456afb20302bf9d6995987cc2badf8bfa67e9e1d3d353b9292a9ce
                        • Instruction Fuzzy Hash: 6E01ADB1A002849FEB50CF15D885766FBE4EF44224F18C8EADD088F342D379A408CAA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b591f9d713ff9caac5fc441555c15f2c638f382aaa6a0456c3d18f4ad7765b88
                        • Instruction ID: 39e4499f4d0ca34bfcc747deaed96501bb5d14cf1dd8cfb9896ba88e3e509931
                        • Opcode Fuzzy Hash: b591f9d713ff9caac5fc441555c15f2c638f382aaa6a0456c3d18f4ad7765b88
                        • Instruction Fuzzy Hash: 9FF20B74A00629CFDB64DF24C998BADB7B2BF88305F1481E9D409AB3A1DB359D81CF41
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b385e993fd2f7dd772e5255f5d47a02eacf0479447de5af12416126c936f845b
                        • Instruction ID: 681296ce8d123b92dd5fa06bdbf61df67e37447ee76db1c4c3ed159ac7be5d61
                        • Opcode Fuzzy Hash: b385e993fd2f7dd772e5255f5d47a02eacf0479447de5af12416126c936f845b
                        • Instruction Fuzzy Hash: 98B2C774A01229CFDB65CF68D888B99BBF1BF48304F1485E9E449AB355DB34AE85CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5eea2d61ae4e98bf49084c1fa126696631e75e4f7891a03a1a36be7c44a39947
                        • Instruction ID: 99407b37117d1afdf09b3fdd83b99205ab3f3a93937dffb3a13d4c5c83135eb0
                        • Opcode Fuzzy Hash: 5eea2d61ae4e98bf49084c1fa126696631e75e4f7891a03a1a36be7c44a39947
                        • Instruction Fuzzy Hash: 0042D874A00629CFDB64DF28C998B99B7F2BF49305F1481E9D409AB3A1DB749E85CF40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6d001ae0-6d001b64 call 6d0052b0 call 6d0010a0 SetupDiClassGuidsFromNameW 5 6d001b66-6d001b77 call 6d00a070 0->5 6 6d001b7c-6d001bb4 call 6d00e912 SetupDiClassGuidsFromNameW 0->6 11 6d001f40-6d001f5b call 6d00e6c3 5->11 6->5 12 6d001bb6-6d001bc7 6->12 14 6d001f35-6d001f3e call 6d00e6d4 12->14 15 6d001bcd-6d001bdb 12->15 14->11 18 6d001be0-6d001bf2 SetupDiGetClassDevsW 15->18 20 6d001bf8-6d001c11 SetupDiEnumDeviceInfo 18->20 21 6d001f5c-6d001f6c call 6d00e6d4 18->21 22 6d001f00-6d001f29 SetupDiDestroyDeviceInfoList 20->22 23 6d001c17 20->23 21->11 22->18 25 6d001f2f 22->25 26 6d001c20-6d001c6a CM_Get_Device_IDW call 6d014d10 23->26 25->14 30 6d001c70-6d001c75 26->30 30->30 31 6d001c77-6d001c8f call 6d014930 30->31 34 6d001ee2-6d001efa SetupDiEnumDeviceInfo 31->34 35 6d001c95-6d001cc2 call 6d00fea0 SetupDiOpenDevRegKey 31->35 34->22 34->26 38 6d001d32-6d001d61 call 6d00fea0 35->38 39 6d001cc4-6d001d02 35->39 43 6d001d64-6d001d69 38->43 39->38 44 6d001d04-6d001d0b 39->44 43->43 45 6d001d6b-6d001d8e call 6d005db0 call 6d0018a0 43->45 44->38 46 6d001d0d-6d001d2f call 6d014cf6 44->46 53 6d001d90 45->53 54 6d001d92-6d001d9a 45->54 46->38 53->54 55 6d001da0-6d001dab 54->55 55->55 56 6d001dad-6d001db6 55->56 57 6d001de7-6d001e25 call 6d00a070 56->57 58 6d001db8-6d001dc7 56->58 66 6d001e28-6d001e2d 57->66 60 6d001dc9-6d001dd7 58->60 61 6d001ddd-6d001de4 call 6d00e904 58->61 60->61 63 6d001f6e-6d001f73 call 6d01523d 60->63 61->57 66->66 69 6d001e2f-6d001e65 call 6d005db0 call 6d0055a0 66->69 74 6d001e68-6d001e6d 69->74 74->74 75 6d001e6f-6d001e90 call 6d005db0 74->75 78 6d001ec1-6d001edb 75->78 79 6d001e92-6d001ea1 75->79 78->34 80 6d001ea3-6d001eb1 79->80 81 6d001eb7-6d001ebe call 6d00e904 79->81 80->63 80->81 81->78
                        APIs
                        • SetupDiClassGuidsFromNameW.SETUPAPI(Ports,00000000,00000000,?,?,73BCE995,?,00000000,00000000), ref: 6D001B5A
                        • SetupDiClassGuidsFromNameW.SETUPAPI(Ports,00000000,00000000,00000000,?,?,73BCE995,?,00000000,00000000), ref: 6D001BB0
                        • SetupDiGetClassDevsW.SETUPAPI(00000000,00000000,00000000,00000002), ref: 6D001BE7
                        • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,?), ref: 6D001C0D
                        • CM_Get_Device_IDW.SETUPAPI(?,?,00000100,00000000,?,?,73BCE995,?,00000000,00000000), ref: 6D001C3C
                        • __cftoe.LIBCMT ref: 6D001C5C
                        • SetupDiOpenDevRegKey.SETUPAPI(00000000,0000001C,00000001,00000000,00000001,00000001), ref: 6D001CBA
                        Strings
                        • ERROR: Unable to initialize for usbstor-deviceNumber mapping., xrefs: 6D0024B3
                        • [PHYSICALVOLUME->VOLUMENAME] Using #%d %s -> %s, xrefs: 6D002F80
                        • >u, xrefs: 6D001CFA
                        • ERROR: Problem finding physical volumes., xrefs: 6D003549
                        • ERROR: Problem finding volume names., xrefs: 6D00357D
                        • ERROR: Problem finding drives., xrefs: 6D003501
                        • ERROR: Query for Win32_DiskDrive has failed: 0x%08x, xrefs: 6D002603
                        • DeviceID, xrefs: 6D0026CF
                        • Ports, xrefs: 6D001B55, 6D001BAB
                        • \\.\, xrefs: 6D001D18
                        • ERROR: SetupDiClassGuidsFromName() failed., xrefs: 6D001B66
                        • [USB->PORT] %s -> %s, xrefs: 6D001DF5
                        • &ven_ax3&, xrefs: 6D002C69
                        • PortName, xrefs: 6D001CF4
                        • [USBSTOR->DEVICEID->DEVICENUMBER] %s -> %s -> %u, xrefs: 6D00279E
                        • PNPDeviceID, xrefs: 6D002671
                        • USB\VID_%04X&PID_%04X, xrefs: 6D001B2A, 6D0036B1
                        • `-u, xrefs: 6D002555
                        • [DEVICE->PHYSICALVOLUME] %u [%s] -> %s, xrefs: 6D002C1B
                        • SERIAL: numeric [%s], xrefs: 6D0038BB
                        • ERROR: Unable to get usbstor-deviceNumber mapping., xrefs: 6D0024DA
                        • ERROR: Problem finding ports., xrefs: 6D00343E
                        • SERIAL: =%u %u 0x%08x, xrefs: 6D00392B
                        • [PHYSICALVOLUME->VOLUMENAME] <none> -> %s, xrefs: 6D002FF3
                        • [USB->USBSTOR] %s -> %s, xrefs: 6D00223B
                        • #removablemedia#, xrefs: 6D002C81
                        • SERIAL: [%s], xrefs: 6D0037C3
                        • [PHYSICALVOLUME->VOLUMENAME] Other #%d %s -> %s, xrefs: 6D002FA5
                        • ERROR: Problem finding drive mapping., xrefs: 6D0034B6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Setup$Class$FromGuidsName$DeviceDevice_DevsEnumGet_InfoOpen__cftoe
                        • String ID: #removablemedia#$&ven_ax3&$DeviceID$ERROR: Problem finding drive mapping.$ERROR: Problem finding drives.$ERROR: Problem finding physical volumes.$ERROR: Problem finding ports.$ERROR: Problem finding volume names.$ERROR: Query for Win32_DiskDrive has failed: 0x%08x$ERROR: SetupDiClassGuidsFromName() failed.$ERROR: Unable to get usbstor-deviceNumber mapping.$ERROR: Unable to initialize for usbstor-deviceNumber mapping.$PNPDeviceID$PortName$Ports$SERIAL: =%u %u 0x%08x$SERIAL: [%s]$SERIAL: numeric [%s]$USB\VID_%04X&PID_%04X$[DEVICE->PHYSICALVOLUME] %u [%s] -> %s$[PHYSICALVOLUME->VOLUMENAME] <none> -> %s$[PHYSICALVOLUME->VOLUMENAME] Other #%d %s -> %s$[PHYSICALVOLUME->VOLUMENAME] Using #%d %s -> %s$[USB->PORT] %s -> %s$[USB->USBSTOR] %s -> %s$[USBSTOR->DEVICEID->DEVICENUMBER] %s -> %s -> %u$\\.\$`-u$>u
                        • API String ID: 527218248-3974024502
                        • Opcode ID: 703999b1780d61d6187129862d34a7150d052d2b77451f111d147b64c36359c0
                        • Instruction ID: 5dbd6939a26ac42ca1efc9e9eabf4a137a538952f9788151bb1488dc14b3eadc
                        • Opcode Fuzzy Hash: 703999b1780d61d6187129862d34a7150d052d2b77451f111d147b64c36359c0
                        • Instruction Fuzzy Hash: 4DC19F71D04618ABFB24DB24CC54BFFB7B9AB49309F4041D9E909E7281EB719A84CF61

                        Control-flow Graph

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 6D00401E
                        • LoadIconW.USER32(00000000,00007F00), ref: 6D00403F
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6D004056
                        • RegisterClassExW.USER32(00000030), ref: 6D004077
                        • GetModuleHandleW.KERNEL32(00000000,?), ref: 6D004083
                        • CreateWindowExW.USER32(00040200,6D02D2A8,DeviceFinder,00CF0000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6D0040A4
                        • MessageBoxA.USER32(00000000,Error creating device finder window,Error,00000000), ref: 6D0040C0
                        • ShowWindow.USER32(00000000,00000000), ref: 6D0040D1
                        • UpdateWindow.USER32(00000000), ref: 6D0040D8
                        • SetTimer.USER32(00000000,00000001,000001F4,00000000), ref: 6D0040EF
                        • MessageBoxA.USER32(00000000,Error creating device finder timer,Error,00000000), ref: 6D004105
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6D00411C
                        • TranslateMessage.USER32(?), ref: 6D004131
                        • DispatchMessageW.USER32(?), ref: 6D004137
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6D004147
                        • KillTimer.USER32(00000000,00000001), ref: 6D004153
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Message$Window$HandleLoadModuleTimer$ClassCreateCursorDispatchIconKillRegisterShowTranslateUpdate
                        • String ID: #$0$DeviceFinder$Error$Error creating device finder timer$Error creating device finder window
                        • API String ID: 2990370508-3368772340
                        • Opcode ID: 921f5d384bd3bc2ccdc4ad3971c760ac363508a6057212649e3510af852d30c1
                        • Instruction ID: d1efec5471664e554fbb2d8e4ed36e62698d6a257d0ec5b206976094f25a8daa
                        • Opcode Fuzzy Hash: 921f5d384bd3bc2ccdc4ad3971c760ac363508a6057212649e3510af852d30c1
                        • Instruction Fuzzy Hash: A8413FB1D42309BBEB109FA4CC4AFDE7BB8AF59715F200115F618A71C1D7B498058BA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4396 6d001f80-6d002026 call 6d0052b0 * 2 call 6d0010a0 SetupDiGetClassDevsW SetupDiEnumDeviceInfo 4404 6d00240c-6d002428 SetupDiDestroyDeviceInfoList call 6d00e6c3 4396->4404 4405 6d00202c 4396->4405 4409 6d00242d-6d002430 4404->4409 4406 6d002032-6d002089 CM_Get_Parent CM_Get_Device_IDW call 6d014d10 4405->4406 4410 6d00208e-6d002094 4406->4410 4411 6d002097-6d00209c 4410->4411 4411->4411 4412 6d00209e-6d0020b6 call 6d014930 4411->4412 4415 6d0023ea-6d002406 SetupDiEnumDeviceInfo 4412->4415 4416 6d0020bc-6d00215f CM_Get_Device_IDW call 6d014d10 CM_Get_Parent CM_Get_Device_IDW call 6d014d10 4412->4416 4415->4404 4415->4406 4421 6d002160-6d002165 4416->4421 4421->4421 4422 6d002167-6d0021ad call 6d014930 4421->4422 4425 6d0021b0-6d0021b5 4422->4425 4425->4425 4426 6d0021b7-6d0021e4 call 6d005db0 call 6d0018a0 4425->4426 4432 6d0021e6-6d0021f1 4426->4432 4432->4432 4433 6d0021f3-6d00226e call 6d00a070 4432->4433 4437 6d002270-6d002275 4433->4437 4437->4437 4438 6d002277-6d0022ad call 6d005db0 call 6d0055a0 4437->4438 4443 6d0022b0-6d0022b5 4438->4443 4443->4443 4444 6d0022b7-6d00232d call 6d005db0 4443->4444 4448 6d002330-6d002335 4444->4448 4448->4448 4449 6d002337-6d00236d call 6d005db0 call 6d0055a0 4448->4449 4454 6d002370-6d002375 4449->4454 4454->4454 4455 6d002377-6d002398 call 6d005db0 4454->4455 4458 6d0023c9-6d0023e3 4455->4458 4459 6d00239a-6d0023a9 4455->4459 4458->4415 4460 6d0023ab-6d0023b9 4459->4460 4461 6d0023bf-6d0023c6 call 6d00e904 4459->4461 4460->4461 4462 6d002431-6d002436 call 6d01523d 4460->4462 4461->4458
                        APIs
                        • SetupDiGetClassDevsW.SETUPAPI(6D027290,00000000,00000000,00000012), ref: 6D001FF5
                        • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,?), ref: 6D00201E
                        • CM_Get_Parent.SETUPAPI(?,?,00000000,?,73BCE995,00000000,?,00000000), ref: 6D00204B
                        • CM_Get_Device_IDW.SETUPAPI(00000000,?,00000100,00000000,?,73BCE995,00000000,?,00000000), ref: 6D00206D
                        • __cftoe.LIBCMT ref: 6D002089
                        • CM_Get_Device_IDW.SETUPAPI(?,?,00000100,00000000,?,?,?,?,?,?,?,?,?,73BCE995,00000000,?), ref: 6D0020D6
                        • __cftoe.LIBCMT ref: 6D0020F2
                        • CM_Get_Parent.SETUPAPI(00000000,00000000,00000000), ref: 6D002113
                        • CM_Get_Device_IDW.SETUPAPI(00000000,?,00000100,00000000), ref: 6D002135
                        • __cftoe.LIBCMT ref: 6D002151
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Get_$Device___cftoe$ParentSetup$ClassDeviceDevsEnumInfo
                        • String ID: USB\VID_%04X&PID_%04X$[USB->USBSTOR] %s -> %s
                        • API String ID: 2323714233-1325786813
                        • Opcode ID: ac764c1660a90eb4b5fe09272f2f18dfdec5b030baf5f9815b236d0a99d4fb65
                        • Instruction ID: f71916b12ee8c6455445bb2dce2aadfed685a746fef57371754bdf6bc8658e58
                        • Opcode Fuzzy Hash: ac764c1660a90eb4b5fe09272f2f18dfdec5b030baf5f9815b236d0a99d4fb65
                        • Instruction Fuzzy Hash: 1DC1D4B1905218AEFB25DF64CD44BEE77BEAF85304F5042D9E509A7281DB326B84CF60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4627 6d00aac0-6d00aafc call 6d00a070 4630 6d00ab15-6d00ab27 4627->4630 4631 6d00aafe-6d00ab14 4627->4631 4632 6d00abf0-6d00abf8 4630->4632 4633 6d00ab2d-6d00ab4b call 6d00a070 4630->4633 4634 6d00abfa 4632->4634 4635 6d00ac3f-6d00ac77 CloseHandle * 2 call 6d00a070 4632->4635 4643 6d00ab87-6d00ab9b call 6d00a070 4633->4643 4644 6d00ab4d-6d00ab59 4633->4644 4638 6d00ac00-6d00ac05 4634->4638 4641 6d00ac07-6d00ac0b 4638->4641 4642 6d00ac38-6d00ac3d 4638->4642 4647 6d00ac28-6d00ac31 call 6d014d30 4641->4647 4648 6d00ac0d-6d00ac25 call 6d00a070 OmCancelDownload 4641->4648 4642->4635 4642->4638 4654 6d00abaa-6d00abaf 4643->4654 4655 6d00ab9d-6d00aba3 4643->4655 4645 6d00ab60-6d00ab72 PostMessageW call 6d00a070 4644->4645 4653 6d00ab77-6d00ab85 WaitForSingleObject 4645->4653 4647->4642 4648->4647 4653->4643 4653->4645 4658 6d00abb1-6d00abb7 4654->4658 4659 6d00abbe-6d00abed call 6d005c50 call 6d00e904 * 2 4654->4659 4655->4654 4658->4659 4659->4632
                        APIs
                        • PostMessageW.USER32(00000000,00000010,00000000,00000000), ref: 6D00AB69
                        • WaitForSingleObject.KERNEL32(0000058C,000000FF), ref: 6D00AB7F
                        • OmCancelDownload.LIBOMAPI(00000000,00000003,OmCancelDownload(%d)...,00000000), ref: 6D00AC1D
                        • CloseHandle.KERNEL32 ref: 6D00AC4B
                        • CloseHandle.KERNEL32 ref: 6D00AC53
                        Strings
                        • THREAD: Waiting for DeviceFinder to close..., xrefs: 6D00AB6B
                        • THREAD: DeviceFinder closed., xrefs: 6D00AB87
                        • OmCancelDownload(%d)..., xrefs: 6D00AC0F
                        • THREAD: Stopping DeviceFinder..., xrefs: 6D00AB2D
                        • OmShutdown() done., xrefs: 6D00AC55
                        • OmShutdown() started., xrefs: 6D00AAE6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: CloseHandle$CancelDownloadMessageObjectPostSingleWait
                        • String ID: OmCancelDownload(%d)...$OmShutdown() done.$OmShutdown() started.$THREAD: DeviceFinder closed.$THREAD: Stopping DeviceFinder...$THREAD: Waiting for DeviceFinder to close...
                        • API String ID: 3577780043-1578849761
                        • Opcode ID: a536bc1c71dd68522557b2ed45ac1fe69acffe50b52c4051f7266c5bc2a686f3
                        • Instruction ID: 130e5cd266d1d21ea38b8ec3badaf4f6cbe92f00ca487fa15f9c4dace3f72aae
                        • Opcode Fuzzy Hash: a536bc1c71dd68522557b2ed45ac1fe69acffe50b52c4051f7266c5bc2a686f3
                        • Instruction Fuzzy Hash: 4F41DD71A04705BFFB209F24CC04F2AB7F4EF05729F214619EA59A7292D772A904CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4668 6d002de0-6d002e48 call 6d0052b0 call 6d00fea0 FindFirstVolumeW 4673 6d002e51-6d002e56 4668->4673 4674 6d002e60-6d002e69 4673->4674 4675 6d002e70-6d002e79 4674->4675 4675->4675 4676 6d002e7b-6d002e87 4675->4676 4677 6d0030e1-6d003127 call 6d014cf6 call 6d00a070 FindNextVolumeW 4676->4677 4678 6d002e8d-6d002e95 4676->4678 4677->4674 4688 6d00312d-6d003151 FindVolumeClose call 6d00e6c3 4677->4688 4678->4677 4679 6d002e9b-6d002ea3 4678->4679 4679->4677 4681 6d002ea9-6d002eb1 4679->4681 4681->4677 4683 6d002eb7-6d002ec7 4681->4683 4683->4677 4685 6d002ecd-6d002f0c call 6d014cf6 call 6d00fea0 4683->4685 4685->4677 4694 6d003152-6d00315f call 6d00e7fa call 6d01523d 4685->4694
                        APIs
                        • FindFirstVolumeW.KERNEL32(?,00000104,00000000,00000000,00000000), ref: 6D002E3D
                        • __fassign.LIBCMT ref: 6D002EE0
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: FindFirstVolume__fassign
                        • String ID: ?$[PHYSICALVOLUME->VOLUMENAME volume-name non-matched, skipped] %s$\$\$\
                        • API String ID: 1573405772-2812856083
                        • Opcode ID: 738ffd3dca4d2d401bc01310993784fce9eae5db4c66c6dcd2fbf546c1f7fc29
                        • Instruction ID: f37070e2eed2c0eaf8e4aed280131213ea8f3fec933ce0238ab630e80221f1fa
                        • Opcode Fuzzy Hash: 738ffd3dca4d2d401bc01310993784fce9eae5db4c66c6dcd2fbf546c1f7fc29
                        • Instruction Fuzzy Hash: A141A675D04218ABFB259B60DC85FEE73BCFB0C314F4045A9EB19D7181E77467888A91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4699 6d00a910-6d00a927 call 6d01712c 4702 6d00a939 4699->4702 4703 6d00a929-6d00a937 call 6d016f15 4699->4703 4705 6d00a943-6d00a94a 4702->4705 4703->4705 4707 6d00a956-6d00a95c 4705->4707 4708 6d00a94c-6d00a955 4705->4708 4709 6d00aab2-6d00aab9 4707->4709 4710 6d00a962-6d00a968 4707->4710 4710->4709 4711 6d00a96e-6d00a97b 4710->4711 4712 6d00a98c-6d00a993 4711->4712 4713 6d00a97d-6d00a987 call 6d016e91 4711->4713 4714 6d00a995 4712->4714 4715 6d00a9ae-6d00aa51 CreateMutexW * 2 call 6d00e8d4 call 6d006780 call 6d004170 4712->4715 4713->4712 4717 6d00a9a0-6d00a9ac 4714->4717 4725 6d00aa60-6d00aa65 4715->4725 4726 6d00aa53-6d00aa55 4715->4726 4717->4715 4717->4717 4727 6d00aa74-6d00aa7c 4725->4727 4728 6d00aa67-6d00aa6d 4725->4728 4731 6d00aa59 4726->4731 4729 6d00aaab-6d00aab1 4727->4729 4730 6d00aa7e-6d00aa97 CreateThread 4727->4730 4728->4727 4730->4729 4733 6d00aa99-6d00aaa5 MessageBoxA 4730->4733 4731->4725 4733->4729
                        APIs
                        • CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 6D00A9BA
                        • CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 6D00A9C7
                        • CreateThread.KERNEL32(00000000,00000000,6D004000,00000000,00000000,00000000), ref: 6D00AA8C
                        • MessageBoxA.USER32(00000000,Error creating device finder thread,Error,00000000), ref: 6D00AAA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Create$Mutex$MessageThread
                        • String ID: Error$Error creating device finder thread$OMDEBUG
                        • API String ID: 451566311-2746158925
                        • Opcode ID: 7f0057c4335c2fe9af06d4f5f1909bac4118e91b35b177b7a26115c19c3f966b
                        • Instruction ID: e0f291f1903db62c5c5e007844b5d8cb4500724df77a2c2fb76b5ab2905d38b4
                        • Opcode Fuzzy Hash: 7f0057c4335c2fe9af06d4f5f1909bac4118e91b35b177b7a26115c19c3f966b
                        • Instruction Fuzzy Hash: 2E4169B0605301ABFB30CF65C819B577BF4AB06318F214A5DE48A8B6C1E7B5E548CBD1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4951 6d0018a0-6d001905 4952 6d001971 4951->4952 4953 6d001907-6d001921 call 6d0262e0 4951->4953 4954 6d001974 4952->4954 4953->4952 4960 6d001923-6d00192e 4953->4960 4956 6d001976-6d001986 4954->4956 4958 6d001988-6d001995 4956->4958 4959 6d0019eb 4956->4959 4962 6d0019a1-6d0019a3 4958->4962 4963 6d001997-6d001999 4958->4963 4961 6d0019ee-6d0019fe 4959->4961 4964 6d001930-6d001932 4960->4964 4965 6d00194c-6d00194e 4960->4965 4966 6d001a00-6d001a0c 4961->4966 4967 6d001a1e 4961->4967 4962->4961 4963->4959 4968 6d00199b-6d00199f 4963->4968 4969 6d001950-6d001952 4964->4969 4970 6d001934-6d00193a 4964->4970 4971 6d001955-6d001957 4965->4971 4974 6d001a1a-6d001a1c 4966->4974 4975 6d001a0e 4966->4975 4976 6d001a21-6d001a23 4967->4976 4968->4962 4968->4963 4969->4971 4970->4969 4977 6d00193c-6d001942 4970->4977 4972 6d0019a5-6d0019a8 4971->4972 4973 6d001959-6d00196f call 6d0262e0 4971->4973 4972->4954 4982 6d0019aa-6d0019ac 4972->4982 4973->4952 4973->4960 4974->4976 4979 6d001a10-6d001a12 4975->4979 4980 6d001a92-6d001a97 4976->4980 4981 6d001a25-6d001a27 4976->4981 4977->4969 4983 6d001944-6d00194a 4977->4983 4979->4967 4986 6d001a14-6d001a18 4979->4986 4985 6d001a9b-6d001ad1 call 6d00e6c3 4980->4985 4981->4980 4987 6d001a29-6d001a5d call 6d005db0 4981->4987 4988 6d001ad2 call 6d006210 4982->4988 4989 6d0019b2-6d0019e9 call 6d011640 4982->4989 4983->4965 4983->4969 4986->4974 4986->4979 4999 6d001a87-6d001a90 4987->4999 5000 6d001a5f-6d001a6b 4987->5000 4995 6d001ad7-6d001b32 call 6d01523d call 6d0052b0 call 6d0010a0 4988->4995 4989->4956 5010 6d001b37-6d001b64 SetupDiClassGuidsFromNameW 4995->5010 4999->4985 5002 6d001a7d-6d001a84 call 6d00e904 5000->5002 5003 6d001a6d-6d001a7b 5000->5003 5002->4999 5003->4995 5003->5002 5011 6d001b66-6d001b77 call 6d00a070 5010->5011 5012 6d001b7c-6d001b8d call 6d00e912 5010->5012 5017 6d001f40-6d001f5b call 6d00e6c3 5011->5017 5016 6d001b92-6d001bb4 SetupDiClassGuidsFromNameW 5012->5016 5016->5011 5018 6d001bb6-6d001bc7 5016->5018 5020 6d001f35-6d001f3e call 6d00e6d4 5018->5020 5021 6d001bcd-6d001bdb 5018->5021 5020->5017 5024 6d001be0-6d001bf2 SetupDiGetClassDevsW 5021->5024 5026 6d001bf8-6d001c11 SetupDiEnumDeviceInfo 5024->5026 5027 6d001f5c-6d001f6c call 6d00e6d4 5024->5027 5028 6d001f00-6d001f29 SetupDiDestroyDeviceInfoList 5026->5028 5029 6d001c17 5026->5029 5027->5017 5028->5024 5031 6d001f2f 5028->5031 5032 6d001c20-6d001c6a CM_Get_Device_IDW call 6d014d10 5029->5032 5031->5020 5036 6d001c70-6d001c75 5032->5036 5036->5036 5037 6d001c77-6d001c8f call 6d014930 5036->5037 5040 6d001ee2-6d001efa SetupDiEnumDeviceInfo 5037->5040 5041 6d001c95-6d001cc2 call 6d00fea0 SetupDiOpenDevRegKey 5037->5041 5040->5028 5040->5032 5044 6d001d32-6d001d61 call 6d00fea0 5041->5044 5045 6d001cc4-6d001d02 5041->5045 5049 6d001d64-6d001d69 5044->5049 5045->5044 5050 6d001d04-6d001d0b 5045->5050 5049->5049 5051 6d001d6b-6d001d8e call 6d005db0 call 6d0018a0 5049->5051 5050->5044 5052 6d001d0d-6d001d2f call 6d014cf6 5050->5052 5059 6d001d90 5051->5059 5060 6d001d92-6d001d9a 5051->5060 5052->5044 5059->5060 5061 6d001da0-6d001dab 5060->5061 5061->5061 5062 6d001dad-6d001db6 5061->5062 5063 6d001de7-6d001e25 call 6d00a070 5062->5063 5064 6d001db8-6d001dc7 5062->5064 5072 6d001e28-6d001e2d 5063->5072 5066 6d001dc9-6d001dd7 5064->5066 5067 6d001ddd-6d001de4 call 6d00e904 5064->5067 5066->5067 5069 6d001f6e-6d001f73 call 6d01523d 5066->5069 5067->5063 5072->5072 5075 6d001e2f-6d001e65 call 6d005db0 call 6d0055a0 5072->5075 5080 6d001e68-6d001e6d 5075->5080 5080->5080 5081 6d001e6f-6d001e90 call 6d005db0 5080->5081 5084 6d001ec1-6d001edb 5081->5084 5085 6d001e92-6d001ea1 5081->5085 5084->5040 5086 6d001ea3-6d001eb1 5085->5086 5087 6d001eb7-6d001ebe call 6d00e904 5085->5087 5086->5069 5086->5087 5087->5084
                        APIs
                        • SetupDiClassGuidsFromNameW.SETUPAPI(Ports,00000000,00000000,?,?,73BCE995,?,00000000,00000000), ref: 6D001B5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ClassFromGuidsNameSetup
                        • String ID: &MI_$ERROR: SetupDiClassGuidsFromName() failed.$Ports$USB\VID_%04X&PID_%04X
                        • API String ID: 3184447455-3218696524
                        • Opcode ID: 30635b7981fbe584b9680fe33688f5a628f46a5be4576a25dcecada262d9790c
                        • Instruction ID: 1def910eda0fadaa237b5a69e26ced33e0409bfda0a5cc950e3aa022adb6493b
                        • Opcode Fuzzy Hash: 30635b7981fbe584b9680fe33688f5a628f46a5be4576a25dcecada262d9790c
                        • Instruction Fuzzy Hash: CEA13331A08505AFFB15CF68CC80BBEBBB5EF45314F5482A9E815EB286D770D941CB92
                        APIs
                        • SetupDiGetClassDevsW.SETUPAPI(6D0272A0,00000000,00000000,00000012), ref: 6D002A3E
                        • SetupDiEnumDeviceInterfaces.SETUPAPI(00000000,00000000,6D0272A0,00000000,0000001C), ref: 6D002A88
                        • SetupDiGetDeviceInterfaceDetailW.SETUPAPI(00000000,0000001C,00000000,00000000,?,?), ref: 6D002ADF
                        • SetupDiGetDeviceInterfaceDetailW.SETUPAPI(00000000,0000001C,?,?,00000000,0000001C), ref: 6D002B28
                        • SetupDiEnumDeviceInterfaces.SETUPAPI(00000000,00000000,6D0272A0,00000001,0000001C), ref: 6D002DA3
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Setup$Device$DetailEnumInterfaceInterfaces$ClassDevs
                        • String ID:
                        • API String ID: 34584884-0
                        • Opcode ID: 7861b35809ab641ce70fb70e30cd5afa4ad1abecf5d79fc3cb2997995bfda477
                        • Instruction ID: b143ef348a563f06b194e97166a8c877f51493b97e7e5fbc14668ae15c05275b
                        • Opcode Fuzzy Hash: 7861b35809ab641ce70fb70e30cd5afa4ad1abecf5d79fc3cb2997995bfda477
                        • Instruction Fuzzy Hash: 0B5153B1D01219AFEB20CF14CD84BAEB7B8FF89714F10429AF618A7281DB705A84CF55
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$\$5]j^$}]j^
                        • API String ID: 0-4248719467
                        • Opcode ID: a34cc346b1930d3da794e2e4f62856f05d9525ac24edd971eea6710c88f37fa2
                        • Instruction ID: f9604f6aca99bbc16aa0782c35c4baf13b6a49d73b905916aae6b487fb3fda51
                        • Opcode Fuzzy Hash: a34cc346b1930d3da794e2e4f62856f05d9525ac24edd971eea6710c88f37fa2
                        • Instruction Fuzzy Hash: 9FD1B130700220EBDB1ADF74D885A2E77A6BF84308F158668E906DB795DF78DC46CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$\$5]j^$}]j^
                        • API String ID: 0-4248719467
                        • Opcode ID: 0832367211b4aaef4b52b627e846bb4b411a0f72235bb57ccbe61e37f5f9998b
                        • Instruction ID: 29c9338ad02694db80b88f873c460da4f333c29055befe06856c326339318dc5
                        • Opcode Fuzzy Hash: 0832367211b4aaef4b52b627e846bb4b411a0f72235bb57ccbe61e37f5f9998b
                        • Instruction Fuzzy Hash: 3A51E030B043619FC70ADB74D4542AEBBB2BF86214B0586BAD405DB392CF789C55CBE6
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$Tqxk$Tqxk
                        • API String ID: 0-1964008773
                        • Opcode ID: 7450abad47435704bd92963998deb73998a6d3898df09acd19366927af8bc261
                        • Instruction ID: c55e90e778fd0c43605e90779706dc0ff383bc2441ee6c6601e556ac5aa4b168
                        • Opcode Fuzzy Hash: 7450abad47435704bd92963998deb73998a6d3898df09acd19366927af8bc261
                        • Instruction Fuzzy Hash: 5DB11C347002148FD759AB38C458BAE77A7AFCA308F65847DD44A9B3A5CF35AC06CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$Tqxk$Tqxk
                        • API String ID: 0-1964008773
                        • Opcode ID: 6a93a078ac2ce837c297d0c86f9e9f57d9b018e33dc57b3d4a8c0ed37d227a4e
                        • Instruction ID: 1827dbcb691767aad6d5006f0b30ac4981d8847b655c0d25fa7184d9de607d07
                        • Opcode Fuzzy Hash: 6a93a078ac2ce837c297d0c86f9e9f57d9b018e33dc57b3d4a8c0ed37d227a4e
                        • Instruction Fuzzy Hash: 73B13C347002148FD759AB34C458BAE77A7AFCA308F55847DD44A9B3A6CF39AC02CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$5Zj^$EZj^
                        • API String ID: 0-2843524477
                        • Opcode ID: a062b40237e8c50fd74ea1a38b0c44cdaf0ce717ebe7c4181a82e530f6fb23fa
                        • Instruction ID: e257e434cb803b0caada3fd95ddbbefc6295462ca0349701466e4d273d6b25db
                        • Opcode Fuzzy Hash: a062b40237e8c50fd74ea1a38b0c44cdaf0ce717ebe7c4181a82e530f6fb23fa
                        • Instruction Fuzzy Hash: F631AEB17003108FC7269B79D85096FB7EAAF892147144A7EE546CB792DF35EC068B60
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$5Zj^$EZj^
                        • API String ID: 0-2843524477
                        • Opcode ID: 06a3b6d4910dd0b52cf55550493274b42bdae85af6ebb3a51d512415cd7a97b4
                        • Instruction ID: 8d530b3f4985dd5a73f5282c4371f3fe8f2da1c0b81100bfd59b929132e69ad2
                        • Opcode Fuzzy Hash: 06a3b6d4910dd0b52cf55550493274b42bdae85af6ebb3a51d512415cd7a97b4
                        • Instruction Fuzzy Hash: 8F217C717103118F87269B7AD89096FB7EBAFC92043144A7EE54AC7752DF35EC068BA0
                        APIs
                        • CreateDirectoryW.KERNEL32(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B3387B
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CreateDirectory
                        • String ID: xxkT
                        • API String ID: 4241100979-1059211526
                        • Opcode ID: ba06d9dee29a0bf9ec01aedcf23702d0cf9dc004454b970387494e471588ad57
                        • Instruction ID: c093ae27b22c5800fbdeb6686321a9b9931dd6c0a87feaf28821524da1afbc4b
                        • Opcode Fuzzy Hash: ba06d9dee29a0bf9ec01aedcf23702d0cf9dc004454b970387494e471588ad57
                        • Instruction Fuzzy Hash: CB312F7164E3C09FD7138B259C55A56BFF4EF07210B0A84DBD985CF2A3D6289849CB72
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$Tqxk
                        • API String ID: 0-207793271
                        • Opcode ID: 771773fd7a9529b57776f999e06dc0133a3c911a467b3420375435df7ab7f845
                        • Instruction ID: 407f293af86156e8f3dd912ee16ed5779e5c190eaf6d1491bcda5ff1b4dc55c5
                        • Opcode Fuzzy Hash: 771773fd7a9529b57776f999e06dc0133a3c911a467b3420375435df7ab7f845
                        • Instruction Fuzzy Hash: 2EB1E534700600CFCB29EB38C49896D77A2BF8624A76548BDD506DB7A1DF36AC06CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: TGwk$TGwk
                        • API String ID: 0-519439241
                        • Opcode ID: e82a60471633de3bf660066791558ec192f894095f5c637ce9afafe756a8d715
                        • Instruction ID: fd365a065da0609cdf87a832bc9b3163fb4b14d2f46f3d7dfde627f4d449042d
                        • Opcode Fuzzy Hash: e82a60471633de3bf660066791558ec192f894095f5c637ce9afafe756a8d715
                        • Instruction Fuzzy Hash: 10813B343002108BE719AB39C46877E76E7AFC9646F244069E906CF7E5DF7ADC068B42
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: \$h^wk
                        • API String ID: 0-3697371996
                        • Opcode ID: c018f39a7151b1c35fad4275f9a6cceb35889122351c843a89f50345e09eddc8
                        • Instruction ID: 1144e4b1fd8e808aae160dc46fe20d2556412492d76409892606fc0dadf8758b
                        • Opcode Fuzzy Hash: c018f39a7151b1c35fad4275f9a6cceb35889122351c843a89f50345e09eddc8
                        • Instruction Fuzzy Hash: 21615E307002158FDB18DB78C558AAEB7E2BF88319B24846DD806DB7A0EF799C45CB81
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: \$h^wk
                        • API String ID: 0-3697371996
                        • Opcode ID: 84b53c7a7f7b1d0418f8db613c8ac4856d74c3216c10107d88c6781da361096d
                        • Instruction ID: 13283c9ab1422498104dcfa7c0e52ad1ee9eb3762f78398ea2380f516bfd1834
                        • Opcode Fuzzy Hash: 84b53c7a7f7b1d0418f8db613c8ac4856d74c3216c10107d88c6781da361096d
                        • Instruction Fuzzy Hash: 3A614D307002058FDB18DB78C558AAEB7E2BF8830AB15846DD806DB7A0DF799C45CF81
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: 5Rj^$=Vj^
                        • API String ID: 0-1801664145
                        • Opcode ID: f05ab5f73f2620d3c07250172a9fcd6ac5caff2b79f397cd140b463896f13d3a
                        • Instruction ID: a8ad455b04098fc67d182870dc7956c282ac1fbbea27aa17c8cdd7f4a77cfe02
                        • Opcode Fuzzy Hash: f05ab5f73f2620d3c07250172a9fcd6ac5caff2b79f397cd140b463896f13d3a
                        • Instruction Fuzzy Hash: 47219AB0310A008BE318E775D8A1A7F73ABAFC41147958A2DD10ACB7D4CF78AC0683A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: 5Rj^$=Vj^
                        • API String ID: 0-1801664145
                        • Opcode ID: ef76717bfcc2a933b0a76f9c66e9c8589ef221f6ff0aa5051132880cc898a0cf
                        • Instruction ID: b01c0d693142e3c9704b820f777bed155efc80cb4378d7786137d59063cf30d8
                        • Opcode Fuzzy Hash: ef76717bfcc2a933b0a76f9c66e9c8589ef221f6ff0aa5051132880cc898a0cf
                        • Instruction Fuzzy Hash: 71215BB4310A008BE318F775D8A1A7F729BAFC4514795CA2CD20A9B7D4DF79ED0683A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: TGwk
                        • API String ID: 0-2866842445
                        • Opcode ID: 997137a711bd693ffeab11491ebcd66c298d9a0e165ed7fcb92d20d227c01474
                        • Instruction ID: d2b6af7fa51a036d7da401adf9c5e145c7bb6fd855853cfb8ff16dbc1d6eb4fa
                        • Opcode Fuzzy Hash: 997137a711bd693ffeab11491ebcd66c298d9a0e165ed7fcb92d20d227c01474
                        • Instruction Fuzzy Hash: 5E326C35A00618DFCF159FA4C958ADDBBB2FF89304F0584A9E209AB271DF31AA55DF40
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: :@Qk
                        • API String ID: 0-3079184092
                        • Opcode ID: b61435ec342b128d506a30121a0e089ee958576dd28725078721c99a34f9dfdd
                        • Instruction ID: 53d1b852a78cf80038d813f15750e9b9c3de4069eb90c34442ce86d318acaee1
                        • Opcode Fuzzy Hash: b61435ec342b128d506a30121a0e089ee958576dd28725078721c99a34f9dfdd
                        • Instruction Fuzzy Hash: 0B223834A00215CFDB25DB24C894BADB7B2FF88304F1088ADD54AA7255DF35AE99DF50
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B334B9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: e4ea0558ea5125e34be42a29f890b7432eb68865d8f0442ce3672a6389147ba0
                        • Instruction ID: edfc3a48a59d65319899803db334a901522e13535576be2887a5ee50c1822eb0
                        • Opcode Fuzzy Hash: e4ea0558ea5125e34be42a29f890b7432eb68865d8f0442ce3672a6389147ba0
                        • Instruction Fuzzy Hash: 12415E715093C06FE7138B618C55F96BFB8EF07214F0944DBE9818B1A3D265A908CB72
                        APIs
                        • getaddrinfo.WS2_32(?,00000E24), ref: 06B36597
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: getaddrinfo
                        • String ID:
                        • API String ID: 300660673-0
                        • Opcode ID: 0dce5d7458ff2999794ede989a36611a8bd797fee1a6b63d86fa05bbf14c66d0
                        • Instruction ID: b26b943b5bbb16c734fd2b6680be30cf451f729f77ab496ade2dc016ed4dd300
                        • Opcode Fuzzy Hash: 0dce5d7458ff2999794ede989a36611a8bd797fee1a6b63d86fa05bbf14c66d0
                        • Instruction Fuzzy Hash: 3231B4B15043446FE722DB60CC85FA7BFECEF05314F04489AEA449B192D775A909CB71
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B35B3D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: fcee7d1c2a96be3d6626f12d3f38f6b693cc6d2288fa5b8d9315a8b0755bd99c
                        • Instruction ID: 6727bbae055ae09e4a9b999c67b683501cf265607c628cfb04804b8157d5af79
                        • Opcode Fuzzy Hash: fcee7d1c2a96be3d6626f12d3f38f6b693cc6d2288fa5b8d9315a8b0755bd99c
                        • Instruction Fuzzy Hash: DB31B2B2504344AFE7228F60CC44FA7BBACEF45314F04889AE985DB152D374A509CBB1
                        APIs
                        • WSASocketW.WS2_32(?,?,?,?,?), ref: 06B3444E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Socket
                        • String ID:
                        • API String ID: 38366605-0
                        • Opcode ID: 17ef74f6d4bc308a1bbdec054afa6580195bb5d9ebe80dddfee60e53f2ffac7e
                        • Instruction ID: 64b9083f60577efc7791f198e75d9b4e41e4bf1ae982bd504ced9f3c9c4dd6ff
                        • Opcode Fuzzy Hash: 17ef74f6d4bc308a1bbdec054afa6580195bb5d9ebe80dddfee60e53f2ffac7e
                        • Instruction Fuzzy Hash: 2A31807150D3C06FD7238B61DC54B56BFF4EF07214F0988DBE9848B5A3D265A808CB62
                        APIs
                        • CertGetCertificateChain.CRYPT32(?,00000E24,?,?), ref: 06B355BE
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChain
                        • String ID:
                        • API String ID: 3019455780-0
                        • Opcode ID: 0101b523d78ab8427d7271587c7d7e28e5c3be30af09e93ffb61a2a2e23cf8ea
                        • Instruction ID: baec5bf1a10317e01d2e713b1325979636cf664296a7d44fb94bb4d813a1025d
                        • Opcode Fuzzy Hash: 0101b523d78ab8427d7271587c7d7e28e5c3be30af09e93ffb61a2a2e23cf8ea
                        • Instruction Fuzzy Hash: 89318D7550D3C45FD3138B258C61BA6BFB4EF47614F0E84CBD8848F2A3D6246919CBA2
                        APIs
                        • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 011AA6B5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: c9c72694e1ff49900f61bf89798fdbe86a3acbc567216686aae7306aa9f97152
                        • Instruction ID: de94b0f2884692d6150f71ad279b6cf74984ae875ccc2110568320dc2f6ba4e5
                        • Opcode Fuzzy Hash: c9c72694e1ff49900f61bf89798fdbe86a3acbc567216686aae7306aa9f97152
                        • Instruction Fuzzy Hash: 8A317C75508380AFE722CF65DC85B56BFF8EF05314F0884AEE9858B652D375E908CB61
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B35D32
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 380a0a5390a5ed92e211033d88e005ab30e5acbe95d25596434fea003bb3bcfa
                        • Instruction ID: 6f3fe61fd1e55af243d88b98f20987352d59827ffdc06d032c243f5fb9f50d05
                        • Opcode Fuzzy Hash: 380a0a5390a5ed92e211033d88e005ab30e5acbe95d25596434fea003bb3bcfa
                        • Instruction Fuzzy Hash: 6E31A2B25057806FE7228B61DC45FA6BFB8EF06314F08849AE9849B253D274A909CB71
                        APIs
                        • GetNetworkParams.IPHLPAPI(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B362B0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: NetworkParams
                        • String ID:
                        • API String ID: 2134775280-0
                        • Opcode ID: 4eb53994a4c43891a5ba8882a50ea827af4d45a185e2e9cbe183dd23441f079e
                        • Instruction ID: 2eca5f3b17a081943fecf6d6106d53a9ad8dad92934e88c539a8fd670d87db9a
                        • Opcode Fuzzy Hash: 4eb53994a4c43891a5ba8882a50ea827af4d45a185e2e9cbe183dd23441f079e
                        • Instruction Fuzzy Hash: 69314C7150D3C46FD7138B259D54B52BFB8EF47214F0A84DBE9849F1A3D268A90CCB62
                        APIs
                        • WSAIoctl.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B354B1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Ioctl
                        • String ID:
                        • API String ID: 3041054344-0
                        • Opcode ID: 50f91fa8afe3efc91754f4aebbc2714dda2b4a083e13fbe84cd29d69fd23e233
                        • Instruction ID: 9b80b6d8d7398a66a4c1ebc3cbb1a6a15f1fcc1d6385fe6853beb2a1dc360221
                        • Opcode Fuzzy Hash: 50f91fa8afe3efc91754f4aebbc2714dda2b4a083e13fbe84cd29d69fd23e233
                        • Instruction Fuzzy Hash: 0F31A4B2505780AFDB22CF11DC84F92BFF8EF06314F08849AE9848B162D335E919CB61
                        APIs
                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 06B34933
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DescriptorSecurity$ConvertString
                        • String ID:
                        • API String ID: 3907675253-0
                        • Opcode ID: 7ddf962f910607646ec506650554261eac32a7c1f8d41249b881b322caf4dad2
                        • Instruction ID: 7926853a84d215aaf27858417362944e2e715caa9ead178dbda57095879d8a91
                        • Opcode Fuzzy Hash: 7ddf962f910607646ec506650554261eac32a7c1f8d41249b881b322caf4dad2
                        • Instruction Fuzzy Hash: 2231C1B25043446FEB21CF64DC45FA7BBECEF05210F0888AAE944DB152D374E908CB61
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: $xk
                        • API String ID: 0-845860396
                        • Opcode ID: 1cbdf71de1e8c994793f3f9efdf4ba021d23542471ffacc84b52209a53b3bf1e
                        • Instruction ID: 652a6eaf38c77ecd28a25d654a30a43cd561cc1f9f15b3059dc1c5f65f1b06fa
                        • Opcode Fuzzy Hash: 1cbdf71de1e8c994793f3f9efdf4ba021d23542471ffacc84b52209a53b3bf1e
                        • Instruction Fuzzy Hash: 1AC19C707006118FEB269B38C959A6EB7F2AFC8344F14443CE606CB7A5DF789946CB51
                        APIs
                        • K32EnumProcessModules.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36B1A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: EnumModulesProcess
                        • String ID:
                        • API String ID: 1082081703-0
                        • Opcode ID: cf6a7d1c6e1ce9e9332b5f0d6c86f701bd16d8f5d669eda5c49714e2269c006b
                        • Instruction ID: 8e6209c31afc5abd634310cb4c2ad61a58217139438981e2c9d6e90c1119b318
                        • Opcode Fuzzy Hash: cf6a7d1c6e1ce9e9332b5f0d6c86f701bd16d8f5d669eda5c49714e2269c006b
                        • Instruction Fuzzy Hash: 0521D5B25093846FEB128B20DC55B96BFE8EF06314F0884DAE9849F153D274A508CB61
                        APIs
                        • CreateMutexW.KERNEL32(?,?), ref: 06B34E61
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CreateMutex
                        • String ID:
                        • API String ID: 1964310414-0
                        • Opcode ID: f1d1325760b59e291685121a3b06acb4c15b072f048dad44421f210022f5085a
                        • Instruction ID: c3200e755824c78db0af3888a8c8e3f1ebc6813bdbe3dbf7ee59d203198563ae
                        • Opcode Fuzzy Hash: f1d1325760b59e291685121a3b06acb4c15b072f048dad44421f210022f5085a
                        • Instruction Fuzzy Hash: CE3150B1509380AFE721CF65CC85B56FFF8EF05214F0884AAE9848B292D375E908CB61
                        APIs
                        • getaddrinfo.WS2_32(?,00000E24), ref: 06B36597
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: getaddrinfo
                        • String ID:
                        • API String ID: 300660673-0
                        • Opcode ID: e97ef1b39373950542f0570edc47e54587741e230eba41d1315cbf40f98bd93b
                        • Instruction ID: f6cfd0037544fee979a765f2ee80eb9ccdb9576db952001faca5f9693a636791
                        • Opcode Fuzzy Hash: e97ef1b39373950542f0570edc47e54587741e230eba41d1315cbf40f98bd93b
                        • Instruction Fuzzy Hash: 9F21A6B2500204BFEB21DB50CC85FA6F7ECEF04714F14885AEA459A685D774A5498BB1
                        APIs
                        • RegNotifyChangeKeyValue.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B35C3C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ChangeNotifyValue
                        • String ID:
                        • API String ID: 3933585183-0
                        • Opcode ID: 5b049dc0668832779f61211a05376f38276b232678a0ff6a196e2b16bfba8ab6
                        • Instruction ID: b2d8accf7b60243f5efadebac7d7c381cb72d3779f3ee31756276655fd4db699
                        • Opcode Fuzzy Hash: 5b049dc0668832779f61211a05376f38276b232678a0ff6a196e2b16bfba8ab6
                        • Instruction Fuzzy Hash: 0C31C3B24053846FEB22CB50DC44F96BFACEF46314F08889AE9849B152D274A509CBB1
                        APIs
                        • RegOpenCurrentUser.KERNELBASE(?,00000E24), ref: 06B35A31
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CurrentOpenUser
                        • String ID:
                        • API String ID: 1571386571-0
                        • Opcode ID: 7b03e81a6b6a0ce466231f1ea11b5f3a157d0974004dc3e695b277821ae6e4d1
                        • Instruction ID: e958b98acebf97054682749edd56db2c687950c8a308966a58daf3d729fff13c
                        • Opcode Fuzzy Hash: 7b03e81a6b6a0ce466231f1ea11b5f3a157d0974004dc3e695b277821ae6e4d1
                        • Instruction Fuzzy Hash: 5421A2B54092806FE7128B609C85FA6BFB8EF06314F0984DAE9449B153D274A909CB71
                        APIs
                        • K32GetModuleInformation.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36C0A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: InformationModule
                        • String ID:
                        • API String ID: 3425974696-0
                        • Opcode ID: 32735287b9d19b1d80ffce8de3ddcd78f51fb25aadae260623b1fabf4fbca4c1
                        • Instruction ID: 6d40052191effed6029dce7ab3b1be80bd4be6afb870199117bf42f61752e04a
                        • Opcode Fuzzy Hash: 32735287b9d19b1d80ffce8de3ddcd78f51fb25aadae260623b1fabf4fbca4c1
                        • Instruction Fuzzy Hash: 6E21A3B15053846FEB22CB51DC45FA6BFACEF46220F08849AE944DB192D274E908CB71
                        APIs
                        • K32GetModuleBaseNameW.KERNEL32(?,00000E24,?,?), ref: 06B36D16
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: BaseModuleName
                        • String ID:
                        • API String ID: 595626670-0
                        • Opcode ID: 86d364a1ebc53184e3419e29887920aba0b742d03a712121da5a85e214da3197
                        • Instruction ID: c565a41b126817130587a2c1421862236ea7b088bb8c50c189a663f807a67e68
                        • Opcode Fuzzy Hash: 86d364a1ebc53184e3419e29887920aba0b742d03a712121da5a85e214da3197
                        • Instruction Fuzzy Hash: 1D21AD715093C06FD3128B61CC55B66BFB8EF87214F0984DBD8849B6A3D624A919CBB2
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33E94
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: b40a49a83f4f2a44520af8f45c0d9790952bb8728b6079505a3425a1bfee18cc
                        • Instruction ID: daa5603bf075fe6a530d6f1293901890a501ce76db3c74bc9ca1fda13aed83da
                        • Opcode Fuzzy Hash: b40a49a83f4f2a44520af8f45c0d9790952bb8728b6079505a3425a1bfee18cc
                        • Instruction Fuzzy Hash: 88217CB2604384AFE721CF11DC84FA7BBF8EF45610F08859AE9459B292D364E908CB71
                        APIs
                        • ioctlsocket.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B353B3
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ioctlsocket
                        • String ID:
                        • API String ID: 3577187118-0
                        • Opcode ID: 9f0666ce0ebf648b2ba5f0ce5783c9eb759e36bf1800dfb311e0c9a713d2ac2e
                        • Instruction ID: 094c8b706ce06c597b92fecc712d6c575ce8a8e231b35e5f4ee66d993269c6aa
                        • Opcode Fuzzy Hash: 9f0666ce0ebf648b2ba5f0ce5783c9eb759e36bf1800dfb311e0c9a713d2ac2e
                        • Instruction Fuzzy Hash: 732176725093C46FDB22CF21DC95B96BFB8EF46314F0884DAE9859F153D2749508C761
                        APIs
                        • WSAEventSelect.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B35882
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: EventSelect
                        • String ID:
                        • API String ID: 31538577-0
                        • Opcode ID: 302e8cf992701b081c406fc5e9bf46e2ee7fc5a90477dbf4b1fef9b7581ebbda
                        • Instruction ID: 9327c2dd41f2ad183479cd4964d7a21ef3297ad90eba07653b7f41a5c9da5c51
                        • Opcode Fuzzy Hash: 302e8cf992701b081c406fc5e9bf46e2ee7fc5a90477dbf4b1fef9b7581ebbda
                        • Instruction Fuzzy Hash: F22197B15093846FD712CB61CC85F96BFBCEF46214F0884DBE9849B152D274A508CBB1
                        APIs
                        • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 011AA4BE
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: a30e751ad462deed1e99583b21d04263fe6b7a1a5cf91ef4c125e07ed0a6cc8f
                        • Instruction ID: a3c2e5d39eca0bfb3b2f58dc444f1afbdce309d5de119a12f49ff83cfc99d9cc
                        • Opcode Fuzzy Hash: a30e751ad462deed1e99583b21d04263fe6b7a1a5cf91ef4c125e07ed0a6cc8f
                        • Instruction Fuzzy Hash: 5321C2754093C06FD3138B259C51B62BFB8EF87610F0A41DBE884DB693D225A919CBB2
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B35B3D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 3a8c003841ecc64f15471c40f241ef9fd92abdf95e2bef857f1de1faad697bce
                        • Instruction ID: b626f1e536a77160c51a2d915ce485f686f22c662b23a5017a9aca9a9a15ed5d
                        • Opcode Fuzzy Hash: 3a8c003841ecc64f15471c40f241ef9fd92abdf95e2bef857f1de1faad697bce
                        • Instruction Fuzzy Hash: E62183B2600204AEEB21DF55DC45FABF7ECEF08224F14886AE945DB641E774E5088BB1
                        APIs
                        • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B37932
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChainPolicyVerify
                        • String ID:
                        • API String ID: 3930008701-0
                        • Opcode ID: 74d5b964b10a96f49c76428c488b48b5f31d51c0dc468eb657d201f40920fa53
                        • Instruction ID: 7a29edb9ae24e66f334570a9d5634fabf211bc34223b7851ab067fad2a55c684
                        • Opcode Fuzzy Hash: 74d5b964b10a96f49c76428c488b48b5f31d51c0dc468eb657d201f40920fa53
                        • Instruction Fuzzy Hash: 5021B2B15042806FEB118F61DC45FA6BFB8EF06214F08859EE9849B152C274A408CB61
                        APIs
                        • RasEnumConnectionsW.RASAPI32(?,00000E24,?,?), ref: 06B306A6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ConnectionsEnum
                        • String ID:
                        • API String ID: 3832085198-0
                        • Opcode ID: cb8dd4aacdc3f9fc0a0f66d050636b4e041113b7df9e88a0e4c593f231c6dcd5
                        • Instruction ID: 17c4104679bbda181e15957767b44346e6954e6f4bbf1b88e7d5e8f8dfc5cb92
                        • Opcode Fuzzy Hash: cb8dd4aacdc3f9fc0a0f66d050636b4e041113b7df9e88a0e4c593f231c6dcd5
                        • Instruction Fuzzy Hash: C821A7754093806FD3138B25CC51B62BFB4EF87724F0A45DFE8448B693D2256919CBB2
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 06B33F86
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: 1c81b91c6be636d519157665b238f2e28def76bffd1100162813e19fcd5a6c69
                        • Instruction ID: 37b2907e472138813216b25547b53239724b03b9b0ed4d9948f6ca2ae1fe174f
                        • Opcode Fuzzy Hash: 1c81b91c6be636d519157665b238f2e28def76bffd1100162813e19fcd5a6c69
                        • Instruction Fuzzy Hash: F521F5755093C06FC3138B258C51B62BFB8EF87614F0985CFE8848B693D2256919CBB2
                        APIs
                        • GetProcessTimes.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B3514D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ProcessTimes
                        • String ID:
                        • API String ID: 1995159646-0
                        • Opcode ID: 54a06e8f64d838f4d0b171a55de5673d0f680ccac5987644c71c7eb942eb2ad7
                        • Instruction ID: 4b0174ef096f9914f04cb0f5df91babb663978a479c990b84faff6c0d64f3c47
                        • Opcode Fuzzy Hash: 54a06e8f64d838f4d0b171a55de5673d0f680ccac5987644c71c7eb942eb2ad7
                        • Instruction Fuzzy Hash: 0221C1B2505380AFDB228F51DC45FA7BFF8EF45214F0888AAE9859B152D374A408CBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: FileView
                        • String ID:
                        • API String ID: 3314676101-0
                        • Opcode ID: 7d5ba5b3e8cd06ad8598fe80c265732dc329f97d1be476d7b14840d1212287b6
                        • Instruction ID: ac748f2bf5097e709d8d0a250770d0ce1dd0b4c03fa57cfdc7b19d85c04935ff
                        • Opcode Fuzzy Hash: 7d5ba5b3e8cd06ad8598fe80c265732dc329f97d1be476d7b14840d1212287b6
                        • Instruction Fuzzy Hash: 17219FB1504284AFE722CF55DC44F96FFF8EF09314F04849EE9849B692D375A508CBA1
                        APIs
                        • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 011AA6B5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 41352dd2fc34f49346f12e528ffbfc3b62518b359e9d3151894046df418b2fde
                        • Instruction ID: 86a34d7f51933780baa95f9a6d7ba55762f7dacaf3260e13fddea42879216d3d
                        • Opcode Fuzzy Hash: 41352dd2fc34f49346f12e528ffbfc3b62518b359e9d3151894046df418b2fde
                        • Instruction Fuzzy Hash: 3C21AE75600240AFEB21CF65DC85B66FBE8EF08324F04846DEA498B752E775E408CF62
                        APIs
                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 06B34933
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DescriptorSecurity$ConvertString
                        • String ID:
                        • API String ID: 3907675253-0
                        • Opcode ID: 560692080983f52bc88cf867575a9f06749d2011ba17f4a1971cd92f93a4db75
                        • Instruction ID: 57063dfd0de63b379c6682129f5f4af3d5c9d609d9a9020e017b9c06eeb4f602
                        • Opcode Fuzzy Hash: 560692080983f52bc88cf867575a9f06749d2011ba17f4a1971cd92f93a4db75
                        • Instruction Fuzzy Hash: 6821D4B2600204AFEB20DF65DD45FAAFBECEF04214F04896AE945DB642D774E508CBB1
                        APIs
                        • GetExitCodeProcess.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33AEC
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CodeExitProcess
                        • String ID:
                        • API String ID: 3861947596-0
                        • Opcode ID: 37f3fa498db173f08425b377c67fe11a258e66ba409bceecac5ccf2459d4f56d
                        • Instruction ID: ef37e3142945de1aa5bdd3c9654def4586e940aca2f0520a8a1a2a73c2ef50db
                        • Opcode Fuzzy Hash: 37f3fa498db173f08425b377c67fe11a258e66ba409bceecac5ccf2459d4f56d
                        • Instruction Fuzzy Hash: 1D21D4B15093846FEB118B51DC85F97BFF8EF46324F0884EAE944DF292D274A509CB61
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B34848
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: e49ba2bb5b41be5ca41a620937af89144c95d8c88f0ce9e1a6ff5f78d7863b97
                        • Instruction ID: 197129153fa9330e44008ad4fe2972018c7fb27afe283560ccb97425511d4c50
                        • Opcode Fuzzy Hash: e49ba2bb5b41be5ca41a620937af89144c95d8c88f0ce9e1a6ff5f78d7863b97
                        • Instruction Fuzzy Hash: 842181B2504384AFE721CB51DD84F67BFF8EF45210F08859AE9459B692D364E508CBA1
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06B32B67
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: 418907f14078bd02adf3164efb8b496f015a01a218a6dc99e19aa158bf18a016
                        • Instruction ID: 714c02a6b2f25c0a7066a15bd22f8d78d8c190d0ca8b526ce4224404dd6df081
                        • Opcode Fuzzy Hash: 418907f14078bd02adf3164efb8b496f015a01a218a6dc99e19aa158bf18a016
                        • Instruction Fuzzy Hash: 152171B55097809FDB22CF25DC45B52BFF4EF06314F0988DAE9858F553D271A508CB61
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B334B9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 41f0fbf61725742c734b501cd3bc1af6c64aa41423eb4f355657ad48f59d47b6
                        • Instruction ID: cd5cbb91589a36a315e889096d8ac7e6abd0efc44578745f5ebb21d2e4dbd966
                        • Opcode Fuzzy Hash: 41f0fbf61725742c734b501cd3bc1af6c64aa41423eb4f355657ad48f59d47b6
                        • Instruction Fuzzy Hash: 3921F0B2600244AEE721DB51CC85FABF7ECEF08224F08885AED45DB641D775E5088BB1
                        APIs
                        • ReadFile.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 011AABD9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: cc773aa21669645d37c22f495d36af35ec2dec89da4f9b688e1db4eed5c144e7
                        • Instruction ID: 742e33ba797390f427674ba92ceef0e42efc109ffc6cf1c02c9ae4b9edc6b798
                        • Opcode Fuzzy Hash: cc773aa21669645d37c22f495d36af35ec2dec89da4f9b688e1db4eed5c144e7
                        • Instruction Fuzzy Hash: 2221D1B2504344AFEB228F51DC44FA7BFACEF45324F04889AF9449B152C374A908CBB1
                        APIs
                        • GetFileType.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 011AA84D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: c6cc883ecbe4d1129e6229987fecd8866a9bec86f7d02993f2bb6eb1d830e24e
                        • Instruction ID: 3af080d0432d518338267244e4d90a2785cd675ec16f1b90c6826844f88f8db9
                        • Opcode Fuzzy Hash: c6cc883ecbe4d1129e6229987fecd8866a9bec86f7d02993f2bb6eb1d830e24e
                        • Instruction Fuzzy Hash: 8F21D8B54083806FE7128B11DC44BA2BFA8EF46314F0880DBE9849B193C364A909CB71
                        APIs
                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 06B35D32
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: a0d6dbd60c0e647a81138b2e9172a221acf180e9ae8d78d586b69020a3c2b16d
                        • Instruction ID: 6090115b3ea998c2e3fe973334e2e6478169405b3b8d081119e30f6abb4af826
                        • Opcode Fuzzy Hash: a0d6dbd60c0e647a81138b2e9172a221acf180e9ae8d78d586b69020a3c2b16d
                        • Instruction Fuzzy Hash: 6921C3B2640204AFEB209F55DC49FAAFBECEF04314F14885AED45DB651D774E5088BB1
                        APIs
                        • GetAdaptersAddresses.IPHLPAPI(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36731
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: AdaptersAddresses
                        • String ID:
                        • API String ID: 2506852604-0
                        • Opcode ID: 06a664e7b8d6679732bac091ca090a3fb2cdc6d199c0e1d4350f8665dec76d32
                        • Instruction ID: 164d1c516f8eab704e7cfac470622c7014b1e4f2731e8a01c3b014c73759e313
                        • Opcode Fuzzy Hash: 06a664e7b8d6679732bac091ca090a3fb2cdc6d199c0e1d4350f8665dec76d32
                        • Instruction Fuzzy Hash: B621A1B1509384AFD7228B11DC84F96BFB8EF06314F0884DBE9849B193D365A508CB72
                        APIs
                        • WSAIoctl.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B354B1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Ioctl
                        • String ID:
                        • API String ID: 3041054344-0
                        • Opcode ID: 45245ad249ab7d21d16d61258a2ce17b3abc2548c9b94fc971cf152cf37120c3
                        • Instruction ID: b5ab969a6d0c92d7e4768c6fce6ddd97f6472369acefc1734a6a148bff767fcc
                        • Opcode Fuzzy Hash: 45245ad249ab7d21d16d61258a2ce17b3abc2548c9b94fc971cf152cf37120c3
                        • Instruction Fuzzy Hash: 1F21ACB2600204AFEB20CF51DC84FA6B7E8EF08224F0488AAED458B655D774E418CBA1
                        APIs
                        • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B37A1A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChainPolicyVerify
                        • String ID:
                        • API String ID: 3930008701-0
                        • Opcode ID: 1b98a8430fef8a487a8dc1b5bc6f7fdf4b4b3d5700816ac04a493ba84ffd3517
                        • Instruction ID: 19f10e3a12e955957bbb4e61be2258a3167c07a5b3fae0971c379987ba2c122d
                        • Opcode Fuzzy Hash: 1b98a8430fef8a487a8dc1b5bc6f7fdf4b4b3d5700816ac04a493ba84ffd3517
                        • Instruction Fuzzy Hash: 9C2192B1509384AFD721CB51DC84FA6FFB8EF45324F0885ABE9849B152D375A508CB71
                        APIs
                        • CreateMutexW.KERNEL32(?,?), ref: 06B34E61
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CreateMutex
                        • String ID:
                        • API String ID: 1964310414-0
                        • Opcode ID: 80fa783516c46d432e51b6eff77dce445a9508ddf2ad7b9906584e71aad21aab
                        • Instruction ID: abb02b70781729a856b89c78e97d19d6a617a2a6a471622964453d7b98b609fe
                        • Opcode Fuzzy Hash: 80fa783516c46d432e51b6eff77dce445a9508ddf2ad7b9906584e71aad21aab
                        • Instruction Fuzzy Hash: 94217FB16003509FE720DF65C885BA6FBE8EF04614F0484A9E9448B741D775E508CBA1
                        APIs
                        • RasConnectionNotificationW.RASAPI32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B3595B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ConnectionNotification
                        • String ID:
                        • API String ID: 1402429939-0
                        • Opcode ID: 84d9cf700afa349ac2d5b4a8c940075725308f6af454730f9116d831f2c15041
                        • Instruction ID: 5f394d66c75b3f26510ca95281ff9ea219c23ecc06dc4edc5e476c5c7cc6244e
                        • Opcode Fuzzy Hash: 84d9cf700afa349ac2d5b4a8c940075725308f6af454730f9116d831f2c15041
                        • Instruction Fuzzy Hash: A821D7B15093846FD7228B11DC45FA6FFB8EF46324F0984DBE9849B193D274A508CBB1
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33E94
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: d19128d67a2880521bb255a3448b0010466402bedb883d15d6e55ad8138848e3
                        • Instruction ID: 67ba1c272aaec050c90aa60f7f226577c027bcb7936bcd3039a3d24050a47153
                        • Opcode Fuzzy Hash: d19128d67a2880521bb255a3448b0010466402bedb883d15d6e55ad8138848e3
                        • Instruction Fuzzy Hash: 4921C0B2A00354AFE720CF15CC84FA7B7ECEF04610F08849AED458B691D774E808CAB1
                        APIs
                        • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 06B367F2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Connect
                        • String ID:
                        • API String ID: 3144859779-0
                        • Opcode ID: 52745421d8fd7a25615d7a8c09f1120643d4bf59a9b028790ab0a7dc82553b95
                        • Instruction ID: 35bd95e83c30ea1a409afb5fdf08692c052a8bbb98b274dee29b882093dbe427
                        • Opcode Fuzzy Hash: 52745421d8fd7a25615d7a8c09f1120643d4bf59a9b028790ab0a7dc82553b95
                        • Instruction Fuzzy Hash: C8219275509380AFDB22CF61DC84A52BFF4EF0A310F0984DED9858B563D275A819DB61
                        APIs
                        • PeekMessageW.USER32(?,?,?,?,?), ref: 06B312D8
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: MessagePeek
                        • String ID:
                        • API String ID: 2222842502-0
                        • Opcode ID: 1bf5777caafcffba0770cdfdcaa1a92a0a7205669c249f29956229abd5d335af
                        • Instruction ID: a0559b255bdf02e42da27a2c9b9e37316bfcab0923c1b2d13e60f41c3553c1da
                        • Opcode Fuzzy Hash: 1bf5777caafcffba0770cdfdcaa1a92a0a7205669c249f29956229abd5d335af
                        • Instruction Fuzzy Hash: E721A172509380AFDB228F25DC44A62FFF8EF07310F0885DAED858B563D275A918DB61
                        APIs
                        • GetNetworkParams.IPHLPAPI(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B362B0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: NetworkParams
                        • String ID:
                        • API String ID: 2134775280-0
                        • Opcode ID: 438fe2b0bea7379e312f85f0db97eee638de79b34c412a18bddfe53d6cc1b982
                        • Instruction ID: 0012c822ca607be6d87a5d83b0e11b6b6cd3d6c2ff6dff15b8fe3581b369fb4f
                        • Opcode Fuzzy Hash: 438fe2b0bea7379e312f85f0db97eee638de79b34c412a18bddfe53d6cc1b982
                        • Instruction Fuzzy Hash: 9721A5715093846FD7128B11DC44F96FFB8EF46224F0885DBE9449B193D374A908CB72
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: FileView
                        • String ID:
                        • API String ID: 3314676101-0
                        • Opcode ID: 23c2ab5eb1dc2dca790e609f1ce3628377290c6aa79682ec2fa6f290212446cb
                        • Instruction ID: b358951d11604bd649c8dd08197a8aab15610d1a6c46ebfb96ce78aa04d0e69d
                        • Opcode Fuzzy Hash: 23c2ab5eb1dc2dca790e609f1ce3628377290c6aa79682ec2fa6f290212446cb
                        • Instruction Fuzzy Hash: DD21A1B1604204AFE721DF55DC45F96FBE8EF08324F04849DEA458B641D775E508CFA1
                        APIs
                        • K32GetModuleInformation.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36C0A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: InformationModule
                        • String ID:
                        • API String ID: 3425974696-0
                        • Opcode ID: 28ecaba0dd2b1910f8e2d016bf41b9a46fdb7bb86a4a9ee5fa8d8fc1b39a9a32
                        • Instruction ID: ce332e89ba895a684e7147e38b7e553e9687dcea1ae81dc5a70085b9be2afebd
                        • Opcode Fuzzy Hash: 28ecaba0dd2b1910f8e2d016bf41b9a46fdb7bb86a4a9ee5fa8d8fc1b39a9a32
                        • Instruction Fuzzy Hash: 2711B1B1600204AFEB20CF55DD85FA6B7ECEF04224F0484AAED05DB691E774E408CAB1
                        APIs
                        • shutdown.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33A1C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: shutdown
                        • String ID:
                        • API String ID: 2510479042-0
                        • Opcode ID: a1602278b72d0126a4120e56d7e51f3f07fc153ca8f50790701522c0d23f1079
                        • Instruction ID: e69c07035f2bf4a59ff9fc19944d74155de897c01ee425488dabd98efe295bc0
                        • Opcode Fuzzy Hash: a1602278b72d0126a4120e56d7e51f3f07fc153ca8f50790701522c0d23f1079
                        • Instruction Fuzzy Hash: 7011D3B1504284AFEB11CB51DC85F97BBECEF45724F0484AAE9449B292D374A908CBB1
                        APIs
                        • WSASocketW.WS2_32(?,?,?,?,?), ref: 06B3444E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Socket
                        • String ID:
                        • API String ID: 38366605-0
                        • Opcode ID: 47a17db60d92de95ece10977fbd7de79d57fc7018980dbe298de2b8ee3e26f8a
                        • Instruction ID: e64dcc2186d496694be187a5c9acb9a2d57e7325baef8775cf156516f4a9e274
                        • Opcode Fuzzy Hash: 47a17db60d92de95ece10977fbd7de79d57fc7018980dbe298de2b8ee3e26f8a
                        • Instruction Fuzzy Hash: 8321A471500240AFE721DF55DD45F56FBE4EF04314F1488ADE9458B751D775A408CBA1
                        APIs
                        • RegOpenCurrentUser.KERNELBASE(?,00000E24), ref: 06B35A31
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CurrentOpenUser
                        • String ID:
                        • API String ID: 1571386571-0
                        • Opcode ID: 6f2f8f0ef62d322a8f13e1e7ee25408b7927b7dbc2e4ecc65733d15b3ccb7259
                        • Instruction ID: d18f6c302643cff8bbd8c39036e218a4572f5f9181e66d752de7dbd4649a6fa2
                        • Opcode Fuzzy Hash: 6f2f8f0ef62d322a8f13e1e7ee25408b7927b7dbc2e4ecc65733d15b3ccb7259
                        • Instruction Fuzzy Hash: 8611CBB2500204AFE720DF55DD85FAAF7DCEF04314F14846AED04DB641D774A5088BB1
                        APIs
                        • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 011AB7D9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: LibraryLoadShim
                        • String ID:
                        • API String ID: 1475914169-0
                        • Opcode ID: b8eb3ec904c9e4bb99323f6dbeb65939765f77ab6b89b6c7b98e929c9580bc5d
                        • Instruction ID: 84d1bd56188bdbdd8e4857ef38ca4788ee00aadbc5b4709cd7baf9b9b80acf23
                        • Opcode Fuzzy Hash: b8eb3ec904c9e4bb99323f6dbeb65939765f77ab6b89b6c7b98e929c9580bc5d
                        • Instruction Fuzzy Hash: 602196755087805FD722CA15DC45B62BFF8EF46614F08848AED84CB293D3659504CB71
                        APIs
                        • RegNotifyChangeKeyValue.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B35C3C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ChangeNotifyValue
                        • String ID:
                        • API String ID: 3933585183-0
                        • Opcode ID: 1526fb421ffbc678f4516bd792e51989a8d8e4d5d54d90c13ba5420c63569192
                        • Instruction ID: 4acd86dfe0ec379486fc7ba058754b8aba87ae91ab605fe2f79c609a7b3e5a14
                        • Opcode Fuzzy Hash: 1526fb421ffbc678f4516bd792e51989a8d8e4d5d54d90c13ba5420c63569192
                        • Instruction Fuzzy Hash: 531193B2500208AFEB21DF51DD85F9AF7ECEF04328F14886AEA459B651D774E508CBB1
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B34848
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: 93260949486cb59694db1d2e7d85de13dd042bbf773422b83a7bf96a4af6c69c
                        • Instruction ID: d9befed8587fda81b451aeaaf64dff7bccf8bcd549001434cc0f5ba890a128f2
                        • Opcode Fuzzy Hash: 93260949486cb59694db1d2e7d85de13dd042bbf773422b83a7bf96a4af6c69c
                        • Instruction Fuzzy Hash: 9B11B1B2600244AFEB60CF51CC85FA6FBECEF04624F04849AE9459B651D774E408CBB1
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B31384
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 4706bb5a6de8b8c84b13b3c21fc0828651ea66cefa30b901baa162c838205be6
                        • Instruction ID: 436606c07ee37bead6fbab4fe4e0a96771aa491c50d6c358e2de564e3f2c7f32
                        • Opcode Fuzzy Hash: 4706bb5a6de8b8c84b13b3c21fc0828651ea66cefa30b901baa162c838205be6
                        • Instruction Fuzzy Hash: 2421E47550D3C0AFC7138B25DC95A52BFB4EF47224F0984DBDD858F2A3D264A908CB62
                        APIs
                        • GetProcessTimes.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B3514D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ProcessTimes
                        • String ID:
                        • API String ID: 1995159646-0
                        • Opcode ID: 51bdd86419e81fd6680a8ebf988c7e5b3bb65620f001b68857ece4a324961c95
                        • Instruction ID: 15ba94f17bcd98920a37e5e2722f6e73822fb8f3456a369dc8b70e4051b6ba25
                        • Opcode Fuzzy Hash: 51bdd86419e81fd6680a8ebf988c7e5b3bb65620f001b68857ece4a324961c95
                        • Instruction Fuzzy Hash: 4911B6B2600604AFEB21CF55DC85FA6F7E8EF04324F14846AE9459B651D774E408CFB1
                        APIs
                        • SetWindowTextW.USER32(?,?), ref: 06B30B3B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID:
                        • API String ID: 530164218-0
                        • Opcode ID: 3efbc61e4ae50cb931207469d38c37da19f63b4f03d7a3b7e47626ca4a21fb70
                        • Instruction ID: f00d7de45b4564a17e70eebdde1c6f3f7368f7ce7884a69ce668b603bad6cf2a
                        • Opcode Fuzzy Hash: 3efbc61e4ae50cb931207469d38c37da19f63b4f03d7a3b7e47626ca4a21fb70
                        • Instruction Fuzzy Hash: 8F21A2B55093809FD7128B25DC85A52FFB8EF02614F0D84EFDD858F263D2659809CB62
                        APIs
                        • K32EnumProcessModules.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36B1A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: EnumModulesProcess
                        • String ID:
                        • API String ID: 1082081703-0
                        • Opcode ID: da6a196976caf1c65cfebb68bb42982593bdf144c9329fb92e5bf9dbfa0ba401
                        • Instruction ID: 7ab93b7f4e086736ad00eee1dfc70efdebe541848258e3c506509dbf4e3658d1
                        • Opcode Fuzzy Hash: da6a196976caf1c65cfebb68bb42982593bdf144c9329fb92e5bf9dbfa0ba401
                        • Instruction Fuzzy Hash: D311E6B2600204AFEB209F55DD86BA6F7E8EF04324F14846AE9458F641E774E4088FB1
                        APIs
                        • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B37932
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChainPolicyVerify
                        • String ID:
                        • API String ID: 3930008701-0
                        • Opcode ID: 0dd74c6515f8a9a83d0d1a1d88d7e318faa0191939d9b0349300247ee0671068
                        • Instruction ID: 02ef908103a66f58d03fc0536ea533d3063ae696bd88f9b91ddf7e1210c09e34
                        • Opcode Fuzzy Hash: 0dd74c6515f8a9a83d0d1a1d88d7e318faa0191939d9b0349300247ee0671068
                        • Instruction Fuzzy Hash: 6811E2B2600244AFEB209F61DC85FA6F7E8EF04224F1485AAED458A651D774E408CBB5
                        APIs
                        • WSAEventSelect.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B35882
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: EventSelect
                        • String ID:
                        • API String ID: 31538577-0
                        • Opcode ID: 23efc1f917f9d173542dce71d898b5ec9e9589ad2d1828358dd7a399d6ee7622
                        • Instruction ID: c411c40d012121426bea771004a922d54b524e2c9a764feed9023317caa2133b
                        • Opcode Fuzzy Hash: 23efc1f917f9d173542dce71d898b5ec9e9589ad2d1828358dd7a399d6ee7622
                        • Instruction Fuzzy Hash: 251194B2500204AFEB21DF51DC85F9AF7ECEF44324F1484AAE9459B645D774E5088BB1
                        APIs
                        • EnumThreadWindows.USER32(?,00000E24,?,?), ref: 011AB2ED
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: EnumThreadWindows
                        • String ID:
                        • API String ID: 2941952884-0
                        • Opcode ID: b331dd43373f73d82b7f8b307a269ca093dbf204ca16a50cc3d5ba82d9e07211
                        • Instruction ID: 900e58b8513a724fd8bb8d7e4a7a30dc811ea421a3567fcc1d196ae309bc387c
                        • Opcode Fuzzy Hash: b331dd43373f73d82b7f8b307a269ca093dbf204ca16a50cc3d5ba82d9e07211
                        • Instruction Fuzzy Hash: F111E271544780BFD311CB16DC41F72BFB8EF86B24F09859AEC485BA42D234B919CBA2
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011AA30E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: eeeee36f53d94cfb8c84f2c1db6caf0d4def8aa30f9f4a3bb521bd43c04637f8
                        • Instruction ID: 24384585ba7bcb7d4059b18f13839a56c07e50ea05cefe9c896171bc66d30501
                        • Opcode Fuzzy Hash: eeeee36f53d94cfb8c84f2c1db6caf0d4def8aa30f9f4a3bb521bd43c04637f8
                        • Instruction Fuzzy Hash: D611AF75409380AFDB228F55DC44A62FFF8EF4A210F08889AED858B163C275A418DB61
                        APIs
                        • setsockopt.WS2_32(?,?,?,?,?), ref: 06B34524
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: setsockopt
                        • String ID:
                        • API String ID: 3981526788-0
                        • Opcode ID: 7dbc9f7eb52ed47a555d4d75784ff06d338e870f4e3654f44530144f649dd14b
                        • Instruction ID: 298401e9dbd8baf5e16da4f7f23c5744feb24ec09535f19b4f59abbd861154e1
                        • Opcode Fuzzy Hash: 7dbc9f7eb52ed47a555d4d75784ff06d338e870f4e3654f44530144f649dd14b
                        • Instruction Fuzzy Hash: F7218C714093C0AFDB228F65DC45A66FFF4EF46210F0988DAE9898F163C235A459CB62
                        APIs
                        • GetExitCodeProcess.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33AEC
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CodeExitProcess
                        • String ID:
                        • API String ID: 3861947596-0
                        • Opcode ID: ba39326e3c97f3ec33402d35c06b78466fc1b8cfb918d0b8d3609a283d8e3367
                        • Instruction ID: 03b6161055b07b28723b402e5dc2ec68228b82e6024b6bc9f6bd3fc1d092b31a
                        • Opcode Fuzzy Hash: ba39326e3c97f3ec33402d35c06b78466fc1b8cfb918d0b8d3609a283d8e3367
                        • Instruction Fuzzy Hash: E411E3B1604244AFEB109B15DC85BABBBDCEF04224F1484AAED04DF281D774E508CAB1
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 06B31169
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 1bc2a43e9a5525bc807e1d1af7b4ecf616be801523f1106e6c030c96fea3ddeb
                        • Instruction ID: 1e87037db2261d77b955c8afe12ab189eb849e5cd9fa3654be2e1658cd20aff6
                        • Opcode Fuzzy Hash: 1bc2a43e9a5525bc807e1d1af7b4ecf616be801523f1106e6c030c96fea3ddeb
                        • Instruction Fuzzy Hash: 6C1106715097C0AFCB228F25CC84B52FFB4EF06210F0884DFED858B563C225A518CB62
                        APIs
                        • ReadFile.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 011AABD9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: dc8dfc18a53bb0287127c25f94cf8c8492b01cb945c982a5ae153bb847e2afa5
                        • Instruction ID: a0b42df9c78719e15341b932d0093f6a8ff03f30e1b4e14ae0649ec8ce20c411
                        • Opcode Fuzzy Hash: dc8dfc18a53bb0287127c25f94cf8c8492b01cb945c982a5ae153bb847e2afa5
                        • Instruction Fuzzy Hash: 1E112772500204AFEB21CF51DD85F96FBE8EF04324F04885AE9459B642C774E448CFB2
                        APIs
                        • GetClassInfoW.USER32(?,?,?), ref: 011ABDCA
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: ClassInfo
                        • String ID:
                        • API String ID: 3534257612-0
                        • Opcode ID: 238f163474c26d6abad664874c1e5d867b6853dda2be4714f2621ab09d1f4491
                        • Instruction ID: c859624ad7599c042c4e042448e251b823c9042f7c42006f87f1546cdf3c602e
                        • Opcode Fuzzy Hash: 238f163474c26d6abad664874c1e5d867b6853dda2be4714f2621ab09d1f4491
                        • Instruction Fuzzy Hash: DB1181755093809FD721CF29DC85B56FFE8EF06210F08849AE945CB262D364E908CB62
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B3142D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 5d54fb073e6935ebdf85801154a8f08826dd42b4aa3e050dd1646f0f62983684
                        • Instruction ID: 141a9f55d20fe32a81e7512b09378533392774ca311750da433471c9810fe5ff
                        • Opcode Fuzzy Hash: 5d54fb073e6935ebdf85801154a8f08826dd42b4aa3e050dd1646f0f62983684
                        • Instruction Fuzzy Hash: 0A11AF75509780AFDB228B25DC84A52BFB4EF06224F0984DFED858B563C265A918CB62
                        APIs
                        • DeleteFileW.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33BAC
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: b4938d91a1b96632b342482032124f785cc123b52e5f094b9109e17a5890d7a7
                        • Instruction ID: 6d0f6b2a37b1f0d97628bf4e43f864b64b3c83fbcb2c07118fe291e496a1cd25
                        • Opcode Fuzzy Hash: b4938d91a1b96632b342482032124f785cc123b52e5f094b9109e17a5890d7a7
                        • Instruction Fuzzy Hash: 8E1186716097805FD712CF25DC95B52BFE8DF46210F0884EAED45CF252D275E808CB61
                        APIs
                        • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B37A1A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChainPolicyVerify
                        • String ID:
                        • API String ID: 3930008701-0
                        • Opcode ID: 85ef6eaf8f15a01a72b8661b7c715e4772eb6ee4dccbf9465da230d566140241
                        • Instruction ID: f29e71afe4980085d8d4324022e6bea8d96c124320c9b407716adf364263591e
                        • Opcode Fuzzy Hash: 85ef6eaf8f15a01a72b8661b7c715e4772eb6ee4dccbf9465da230d566140241
                        • Instruction Fuzzy Hash: 4311C4B1600204AFEB20DF51DD85FA6F7E8EF44724F1484AAED449A641D774E508CFB5
                        APIs
                        • DispatchMessageW.USER32(?), ref: 06B314D8
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DispatchMessage
                        • String ID:
                        • API String ID: 2061451462-0
                        • Opcode ID: b6dcbe895baf005f785819fb665958fa88c726b59c3bc761c7e11e64f77774e8
                        • Instruction ID: d9fd4cdb6d3a638ecab58d3eca55fdfd5773bc0c7971aa6dff59edf7cdfc5a3f
                        • Opcode Fuzzy Hash: b6dcbe895baf005f785819fb665958fa88c726b59c3bc761c7e11e64f77774e8
                        • Instruction Fuzzy Hash: 9E1181B54093C0AFDB138B25DC84B61BFB4EF47624F0984DEDD858F263D2655908CB62
                        APIs
                        • ioctlsocket.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B353B3
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ioctlsocket
                        • String ID:
                        • API String ID: 3577187118-0
                        • Opcode ID: 2f62d82c294e61d5d1136f3b79ab3a96eb346e13fa9b769a46b58aa2d1c1fa8a
                        • Instruction ID: 5a51024ad562cb623f6c05c53647f295d006e05583025ffa477a4727d40d4eb6
                        • Opcode Fuzzy Hash: 2f62d82c294e61d5d1136f3b79ab3a96eb346e13fa9b769a46b58aa2d1c1fa8a
                        • Instruction Fuzzy Hash: 6A11C6B2600204AFEB30DF55DC85FA6F7E8EF44324F1484AAEE459B641D7B4A508CBB1
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33DAB
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 69034f5c27d1e44ae310e3e90a2aef4da8ed254db78d34e5dbeda27448f2b13f
                        • Instruction ID: 89cc071aa09b2638de7a08156727132f70ba53a38d6ee2cde7707d4dcc5629bc
                        • Opcode Fuzzy Hash: 69034f5c27d1e44ae310e3e90a2aef4da8ed254db78d34e5dbeda27448f2b13f
                        • Instruction Fuzzy Hash: 0C11E2755087809FD7128F25DC85B52BFF4EF06220F0980DBDD458F2A3D279A808DB62
                        APIs
                        • shutdown.WS2_32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B33A1C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: shutdown
                        • String ID:
                        • API String ID: 2510479042-0
                        • Opcode ID: 09eafafb56cda330919c9bc069620b9e282a28e90444c00f6f39940a6b1a666f
                        • Instruction ID: 142f7c682de4357e6b5b6e724571601aa96b84d62815a00b4fe1a9ba0ae2bf5d
                        • Opcode Fuzzy Hash: 09eafafb56cda330919c9bc069620b9e282a28e90444c00f6f39940a6b1a666f
                        • Instruction Fuzzy Hash: F211C2B1600244AFEB10DF51DD85BAAB7DCEF44324F1484AAED489B241D778A5088FB1
                        APIs
                        • GetSystemInfo.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33D08
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: InfoSystem
                        • String ID:
                        • API String ID: 31276548-0
                        • Opcode ID: a8d78cc6e2ffdbbb9081ee07ba590ef1d112a1b8a4d5b26b9c4a1d59a083c7b7
                        • Instruction ID: 4f8e8d14158f3d881955e46a974cb5064e7a4c280e5ebd478f59063b742c8138
                        • Opcode Fuzzy Hash: a8d78cc6e2ffdbbb9081ee07ba590ef1d112a1b8a4d5b26b9c4a1d59a083c7b7
                        • Instruction Fuzzy Hash: 73118E714093C0AFDB128F25DC85A52BFF4EF02220F0988EBDD848F163D239A908CB61
                        APIs
                        • GetAdaptersAddresses.IPHLPAPI(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B36731
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: AdaptersAddresses
                        • String ID:
                        • API String ID: 2506852604-0
                        • Opcode ID: 29e7108cc41cef1e5c9420696defe257252320bc3e8968afb4b4a4b7ae7a9fa9
                        • Instruction ID: 32112f3257a9301196af9a96a9f855803a10cb1faae2eafb82cdd4426cb17b2e
                        • Opcode Fuzzy Hash: 29e7108cc41cef1e5c9420696defe257252320bc3e8968afb4b4a4b7ae7a9fa9
                        • Instruction Fuzzy Hash: 5511ACB2600204EFEB219F51DD85FA6FBE8EF04724F04849AEE455A691D374E508CBB2
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: recv
                        • String ID:
                        • API String ID: 1507349165-0
                        • Opcode ID: e04d03f3eae5949a58e64930b56ad63797a64b40e6199408b025082cf8bd4e06
                        • Instruction ID: 8d58dde1477ef4a70ef18aa720a78afed1e4348eb478b91e1b3bd244193ae7ee
                        • Opcode Fuzzy Hash: e04d03f3eae5949a58e64930b56ad63797a64b40e6199408b025082cf8bd4e06
                        • Instruction Fuzzy Hash: AC11BF75509380AFCB22CF55DC44F52FFF4EF46224F08889AED848B153C275A418CB62
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 9102b9f5655d9fb3be6d60e9ea39f2708c09399c3eb60ff7a426dafbfa92f105
                        • Instruction ID: 280a050c493cc87b321f19a6890dfa2b8d118f7365e2b94afa6adb4e6288974a
                        • Opcode Fuzzy Hash: 9102b9f5655d9fb3be6d60e9ea39f2708c09399c3eb60ff7a426dafbfa92f105
                        • Instruction Fuzzy Hash: 83116D714493C0AFDB128B15DC89B52BFB4EF46224F0888DAED858F293D275A509CB62
                        APIs
                        • RasConnectionNotificationW.RASAPI32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B3595B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ConnectionNotification
                        • String ID:
                        • API String ID: 1402429939-0
                        • Opcode ID: 64be0e479ff4f2f119c48044b945cd34579703711088230cd1bdad16763b3dc8
                        • Instruction ID: b6e93e0b26d611f788cf72001ad99cdb853ba6827676d8733d3513b7b7c55b20
                        • Opcode Fuzzy Hash: 64be0e479ff4f2f119c48044b945cd34579703711088230cd1bdad16763b3dc8
                        • Instruction Fuzzy Hash: 9011C2B2600244AFEB208F11DC85FA6F7A8EF04224F04859AEE485A642C374A5088AB2
                        APIs
                        • GetNetworkParams.IPHLPAPI(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 06B362B0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: NetworkParams
                        • String ID:
                        • API String ID: 2134775280-0
                        • Opcode ID: d03599e2f8cccd800fa7e0fcf1abeb6e1e9d4bc6671c7658a30ac19f516974b1
                        • Instruction ID: edd5b6836d0a90871c3914754a51afe0b111ab9a55e371edb9b653f4867d52c8
                        • Opcode Fuzzy Hash: d03599e2f8cccd800fa7e0fcf1abeb6e1e9d4bc6671c7658a30ac19f516974b1
                        • Instruction Fuzzy Hash: D701C4B1600244AFEB209F55DD85BA6F7D8EF44628F14849AED049B781D7B8E5088EB2
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B31013
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: b59cf8e87e839276725173bf5fe822b3ff957cfd78e276b551f4c2bb0446349c
                        • Instruction ID: 88ace5458fbe7281ef9f4e4c7c9bba34886fcb3f393e7d166252a1d456e909a1
                        • Opcode Fuzzy Hash: b59cf8e87e839276725173bf5fe822b3ff957cfd78e276b551f4c2bb0446349c
                        • Instruction Fuzzy Hash: A111E3715043809FD7118F15DC85A52FFE4EF02320F0880DEED458B263C235A918CB62
                        APIs
                        • GetFileType.KERNEL32(?,00000E24,50A98413,00000000,00000000,00000000,00000000), ref: 011AA84D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 8bb156d959a8e94ca97eb5a367ea9bd5b6027f8064654420a9d33adaf60a9d24
                        • Instruction ID: b9d3aa1706683c389bbe6a80d81cd8f9813cd0dfb99a0ca3d8f0af04588b03f3
                        • Opcode Fuzzy Hash: 8bb156d959a8e94ca97eb5a367ea9bd5b6027f8064654420a9d33adaf60a9d24
                        • Instruction Fuzzy Hash: 5A01C076500204AEE7259B15EC85BA6FBD8DF44624F14C0AAED049B782C778A509CAA2
                        APIs
                        • CreateDirectoryW.KERNEL32(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B3387B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CreateDirectory
                        • String ID:
                        • API String ID: 4241100979-0
                        • Opcode ID: 9d9c2bbee3a29a3b6016f6cef7a5a6471135ab632322f21a9b75f42f9e26aaa6
                        • Instruction ID: 41c01a76d856200526b3fe2f79db921022bddbd35918273e17db836897f7c3f9
                        • Opcode Fuzzy Hash: 9d9c2bbee3a29a3b6016f6cef7a5a6471135ab632322f21a9b75f42f9e26aaa6
                        • Instruction Fuzzy Hash: 0B1152B1B002819FEB50CF19D885B56FBD8EF04224F08C4AADD49CB742E778D444CBA1
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06B32B67
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: dac66663e39565b8547cb57a3ac74260d2444496f523c0ccf7d7e80a19e5eef7
                        • Instruction ID: 546af0ff1f87e4cc6cc850b371844faeb80395d0a4452d51c461d7050761d892
                        • Opcode Fuzzy Hash: dac66663e39565b8547cb57a3ac74260d2444496f523c0ccf7d7e80a19e5eef7
                        • Instruction Fuzzy Hash: 8A1170B1A002449FEB60CF55D985B62FBE8EF04620F0888AADD498F752E375E504CFB1
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Timer
                        • String ID:
                        • API String ID: 2870079774-0
                        • Opcode ID: e0c443d5b213f8630aa64d89bc75dd5f37f07ae9f985946466990d88d8beafc9
                        • Instruction ID: b5c6c0b5d381a10c15efa425b1dca8fd25e42361f77ebd5499e511b0c85811ec
                        • Opcode Fuzzy Hash: e0c443d5b213f8630aa64d89bc75dd5f37f07ae9f985946466990d88d8beafc9
                        • Instruction Fuzzy Hash: A711A071508380AFCB228F15DC44E62FFF4EF46220F08849EED854B663C275A918DB62
                        APIs
                        • GetClassInfoW.USER32(?,?,?), ref: 011ABDCA
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: ClassInfo
                        • String ID:
                        • API String ID: 3534257612-0
                        • Opcode ID: 6c412251d6ba962717601d8f693b6bf2a45478e1ae7460ef929fafbc9a6c53a3
                        • Instruction ID: f9f99bc605ba65bdb810149de3c77800c882f16e1bbcb1bffdb8ef112818c5a7
                        • Opcode Fuzzy Hash: 6c412251d6ba962717601d8f693b6bf2a45478e1ae7460ef929fafbc9a6c53a3
                        • Instruction Fuzzy Hash: 6F0188756042408FD714CF29D885B66FFE4EF05614F48C069DD458B751D775E408CBA7
                        APIs
                        • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 06B367F2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Connect
                        • String ID:
                        • API String ID: 3144859779-0
                        • Opcode ID: b77b61fd698f721fb113f68a9c91d6443231133cdf6761d6eb1505cf7b157633
                        • Instruction ID: 2c3730fc2d8e2db498952a57d6c05e3c3e2443fce0ba194e1128710a917d0aa5
                        • Opcode Fuzzy Hash: b77b61fd698f721fb113f68a9c91d6443231133cdf6761d6eb1505cf7b157633
                        • Instruction Fuzzy Hash: A3117071A00244EFDB20CF55D884B52FBE4EF08314F0888AADD458B652E335E418CFA1
                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 011AB16E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: 7db7cb8becaed27d236191cf241bab9d1127f275fdedae63c211ad26abc82638
                        • Instruction ID: c3bd25c1a9e4863dbe8730b802b2890f213efe87af419095c5e324920ad8cb7a
                        • Opcode Fuzzy Hash: 7db7cb8becaed27d236191cf241bab9d1127f275fdedae63c211ad26abc82638
                        • Instruction Fuzzy Hash: A41170754087849FC7228F55DC89B52FFF4EF46220F08849AED458B262C375A518CB62
                        APIs
                        • K32GetModuleBaseNameW.KERNEL32(?,00000E24,?,?), ref: 06B36D16
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: BaseModuleName
                        • String ID:
                        • API String ID: 595626670-0
                        • Opcode ID: 206ced4847b69d1187bb29a6a88b2d9483567e5639591f7ea7699b8289e801cb
                        • Instruction ID: e969cc55bc43ceecb03adb1ab04bb480e06745d9e9eca20ce55016f35ca2ae04
                        • Opcode Fuzzy Hash: 206ced4847b69d1187bb29a6a88b2d9483567e5639591f7ea7699b8289e801cb
                        • Instruction Fuzzy Hash: 5F017175900200ABD310DF16DC86B66FBE8FF88B24F14856AED089BB41D635B915CAE5
                        APIs
                        • DeleteFileW.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33BAC
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: a377548fc8f5809e815d485af2bd6ff17679dfd639ec9ab856bbd436de363d03
                        • Instruction ID: 410e29485df1327de07d77ac816d8ffbad55655333444cb1c20fab75b485a89c
                        • Opcode Fuzzy Hash: a377548fc8f5809e815d485af2bd6ff17679dfd639ec9ab856bbd436de363d03
                        • Instruction Fuzzy Hash: FD0175B1B046809FDB50CF29D885756FBD8EF04224F18C4AADD09CF741E775E404CAA1
                        APIs
                        • CertGetCertificateChain.CRYPT32(?,00000E24,?,?), ref: 06B355BE
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CertCertificateChain
                        • String ID:
                        • API String ID: 3019455780-0
                        • Opcode ID: dbadb525efc03f8bbb477f96c0b34d5b5f7b9103a889f30f50031be7cfd9f43b
                        • Instruction ID: cc65f02b820c7a51b3b6999713a3ebf4bff294e8e9517cbce8dd1643686ba2a0
                        • Opcode Fuzzy Hash: dbadb525efc03f8bbb477f96c0b34d5b5f7b9103a889f30f50031be7cfd9f43b
                        • Instruction Fuzzy Hash: 41017175900200ABD310DF16DC86B66FBE8FF88B24F14856AED089BB41D735B915CBE5
                        APIs
                        • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 011AB7D9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: LibraryLoadShim
                        • String ID:
                        • API String ID: 1475914169-0
                        • Opcode ID: ef88d555ede3ca50994b6b8e9412e88312436d0e0f08a018b35358c5db9854c1
                        • Instruction ID: 88431387af25b3fb8e94ca6299ea908fea3670578199ba8f2d733522c98fe5ea
                        • Opcode Fuzzy Hash: ef88d555ede3ca50994b6b8e9412e88312436d0e0f08a018b35358c5db9854c1
                        • Instruction Fuzzy Hash: 270180766046809FEB20CF59D885B62FFE8EF04620F4C8499DD498B792D374E408CA66
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011AA30E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 4d64b3c5d9baeed31910f4499bb4e764677f13d3bc16ea264c615fb2f2f1ec9c
                        • Instruction ID: 892012a8d683e4eef03e54ed90c9b2897ed4db45af4cdfb93697d3b700e8fc48
                        • Opcode Fuzzy Hash: 4d64b3c5d9baeed31910f4499bb4e764677f13d3bc16ea264c615fb2f2f1ec9c
                        • Instruction Fuzzy Hash: 34018B36504240DFDB218F55E884B66FFE0EF08220F0888AADE494B652D375E018CF62
                        APIs
                        • SetWindowTextW.USER32(?,?), ref: 06B30B3B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID:
                        • API String ID: 530164218-0
                        • Opcode ID: 4dc271e802b8a687b5341134e1fb1b1890635fc39ecbb9b6177e65ab537535f2
                        • Instruction ID: cb0b8011996c383e305b9694b057bf0e7c7bc7478bd239b586a3a631827ad792
                        • Opcode Fuzzy Hash: 4dc271e802b8a687b5341134e1fb1b1890635fc39ecbb9b6177e65ab537535f2
                        • Instruction Fuzzy Hash: C7018875B00244DFD7509F15D885762FBE8EF04624F08C0EADD458F751D775E408CAA2
                        APIs
                        • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 011AA4BE
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 00c0fc90b2c8aab09b7b31df90c015e8b2da03ea8485dc1a2d4265999f3a8673
                        • Instruction ID: 854872a3ed220a9ba3b384031e26a6730e6ddba13718aedfe9e0ef47d0aeaf6a
                        • Opcode Fuzzy Hash: 00c0fc90b2c8aab09b7b31df90c015e8b2da03ea8485dc1a2d4265999f3a8673
                        • Instruction Fuzzy Hash: 6801A275500200ABD210DF16CC82B26FBE8FF88A20F148159EC085BB41D335F915CAE6
                        APIs
                        • EnumThreadWindows.USER32(?,00000E24,?,?), ref: 011AB2ED
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: EnumThreadWindows
                        • String ID:
                        • API String ID: 2941952884-0
                        • Opcode ID: b8530c45dd31336b93f2ede1111f0756ab2ec4619428ed5478fbb340b652b708
                        • Instruction ID: 2c88ede0ffec9c6f6eb63050e3cc4ab9c5e0022ec196cf0f518c5d433ce56ca6
                        • Opcode Fuzzy Hash: b8530c45dd31336b93f2ede1111f0756ab2ec4619428ed5478fbb340b652b708
                        • Instruction Fuzzy Hash: BF01A275500200ABD210DF16CC82B26FBE8FF88B20F14815AEC085BB41D331F925CBE6
                        APIs
                        • PeekMessageW.USER32(?,?,?,?,?), ref: 06B312D8
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: MessagePeek
                        • String ID:
                        • API String ID: 2222842502-0
                        • Opcode ID: 2f4221b3f418e495849ec50eb9665b7cae3a569e8ce7b6bcd7feeca086061e86
                        • Instruction ID: 559719a2280cd09122f18b8354c8b282b432458c246042161b391f0a9492d044
                        • Opcode Fuzzy Hash: 2f4221b3f418e495849ec50eb9665b7cae3a569e8ce7b6bcd7feeca086061e86
                        • Instruction Fuzzy Hash: 0801B572600640DFDB608F59DD85B65FBE8EF05220F08C4AEDD464A751D375E418DFA2
                        APIs
                        • setsockopt.WS2_32(?,?,?,?,?), ref: 06B34524
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: setsockopt
                        • String ID:
                        • API String ID: 3981526788-0
                        • Opcode ID: ef2a012c4dc5b5c7f22e0c2a8f8d310a4d703ac5993c40de8d717ac1f9b907a2
                        • Instruction ID: bbd26e12c92a58076926fc7fafcefb3150d719e22d22ca0cdb74a1c5362e59fe
                        • Opcode Fuzzy Hash: ef2a012c4dc5b5c7f22e0c2a8f8d310a4d703ac5993c40de8d717ac1f9b907a2
                        • Instruction Fuzzy Hash: 9A015E72A00240DFDB60CF55D985B66FBE4EF04724F18C8AADE494B652D375E418CFA2
                        APIs
                        • RasEnumConnectionsW.RASAPI32(?,00000E24,?,?), ref: 06B306A6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: ConnectionsEnum
                        • String ID:
                        • API String ID: 3832085198-0
                        • Opcode ID: ec2bdaabf3e645aeb5ef721384054d80eea0d380349147ae694aea185b5340df
                        • Instruction ID: 6cf1f025380c0b634253625ec23ce4c383774e02b89c3bf803ae7846f5ae917d
                        • Opcode Fuzzy Hash: ec2bdaabf3e645aeb5ef721384054d80eea0d380349147ae694aea185b5340df
                        • Instruction Fuzzy Hash: C301A275500200ABD210DF16CC82B26FBE8FF88B20F14815AED085BB41D331F925CAE6
                        APIs
                        • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 06B33F86
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: 292e4e15ad069b9348e05e4dc24ddcf402936de8e6d655c42cf68bb2d7d04601
                        • Instruction ID: 948ee8bf726c7b1a577ee54d6cb9035caee0703055fb1bc888b4fc6fcd54be09
                        • Opcode Fuzzy Hash: 292e4e15ad069b9348e05e4dc24ddcf402936de8e6d655c42cf68bb2d7d04601
                        • Instruction Fuzzy Hash: 8301A275500200ABD210DF16CC82B26FBE8FF88B20F14815AEC085BB81D371F925CAE6
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B3142D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 975664c4568d1ae297e6db3b86bf0ebb1a54d148a44e450e4294030e046bed55
                        • Instruction ID: 072ac5d9198aacae8a1f931df7c8be189d198ce81bc9460a0448244e05eb6777
                        • Opcode Fuzzy Hash: 975664c4568d1ae297e6db3b86bf0ebb1a54d148a44e450e4294030e046bed55
                        • Instruction Fuzzy Hash: CF018476600640DFDB608F59D885B65FBE4EF04224F08C4AEDD494B752D375E458CFA2
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 06B31169
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 3be5fde534e100c918d3436d1d576efa673e8d2d45234c16a55276d050f1ac20
                        • Instruction ID: 2ef6f133f117214a0c5245583b8a603ddd57449eb60b26e155d8da14a3907485
                        • Opcode Fuzzy Hash: 3be5fde534e100c918d3436d1d576efa673e8d2d45234c16a55276d050f1ac20
                        • Instruction Fuzzy Hash: 8C01D476A00640DFEB208F19D885BA6FBE4EF14224F08C4AEDD494B752C375E418CFA2
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B31013
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 2d83c97092e4735d03247a3e07317cb2812d7d5c9b704556d5965a2c2883272b
                        • Instruction ID: 3c7416f49bf25e70c8c135a1472fcda864be197a26ba366dab5cfcda3c772fec
                        • Opcode Fuzzy Hash: 2d83c97092e4735d03247a3e07317cb2812d7d5c9b704556d5965a2c2883272b
                        • Instruction Fuzzy Hash: DC01A2756002848FDB608F59D885751FBE8EF04224F08C0AADD494B752C679E558CFA2
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B33DAB
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: cc88841c187a880ddc143624b2378a4f89c0a562518fdd7528d957bf5e96ba15
                        • Instruction ID: 2ef6b51bbb1766419cf423128dbf31f6b55cea59e01453019385f049ca564d06
                        • Opcode Fuzzy Hash: cc88841c187a880ddc143624b2378a4f89c0a562518fdd7528d957bf5e96ba15
                        • Instruction Fuzzy Hash: 8701D675700684CFDB608F16E985752FFE4EF04224F08C0AADD464B752C779E418CEA2
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 1fbc09aa9a7c5d91e8ad00a2498acb6ce455f6008e1f0606e93cfdbd60b1785b
                        • Instruction ID: db0d6d70710c47db224d584fe6a814ecbb8e3ec32ad829f8e67fe3965515ba97
                        • Opcode Fuzzy Hash: 1fbc09aa9a7c5d91e8ad00a2498acb6ce455f6008e1f0606e93cfdbd60b1785b
                        • Instruction Fuzzy Hash: 2D01AD75905284DFDB10CF19D989766FFE4EF04224F48C4AADD488F342D379A448CEA2
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 06B31384
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 737e1f68e8b5d64ea847fb91da49669e0e5a6ff17e7d25f09795423a6b7f0a4e
                        • Instruction ID: 3a43cd28f062880e8ce0c75a49019fa1aec5d2182a2b05c684553dd23e451e67
                        • Opcode Fuzzy Hash: 737e1f68e8b5d64ea847fb91da49669e0e5a6ff17e7d25f09795423a6b7f0a4e
                        • Instruction Fuzzy Hash: E801D1B5700240DFDB608F19E885762FBE8EF04224F08C0AADD498BB52D674E458CEA2
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: Timer
                        • String ID:
                        • API String ID: 2870079774-0
                        • Opcode ID: ebde6e5c33f0cd44384ece046e6e85fbb7ba827d2792d0bd5953ad24f98eec70
                        • Instruction ID: 8b4d2cdfaf17862b2863986931a37bcc64e0f720592b3dbeaade311ea253196b
                        • Opcode Fuzzy Hash: ebde6e5c33f0cd44384ece046e6e85fbb7ba827d2792d0bd5953ad24f98eec70
                        • Instruction Fuzzy Hash: 15018B76A00240DFEB609F55D885B61FBE0EF08324F08C49ADE490B762C376A458DFB2
                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 011AB16E
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: 770f70c173c3585fc5c84196e1bae8ae3a92cbf687dacff33070479dc7d74c17
                        • Instruction ID: 305500dfa18da276529ece1d545a62d533ac80a979f838947f1270351f68e3e9
                        • Opcode Fuzzy Hash: 770f70c173c3585fc5c84196e1bae8ae3a92cbf687dacff33070479dc7d74c17
                        • Instruction Fuzzy Hash: 1E01AD36904684DFDB208F05E885B52FFE0EF04324F08C4AADD494B752C375A418CEA2
                        APIs
                        • SetErrorMode.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 011AA5D4
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 01d3708d36c901e874671523edf2f94a2ca1860b146adb7d5f84ce94979c5e33
                        • Instruction ID: b395d2d13a209e04e256a545dded3615c15f70578f469a55ddd7330bf84e1baa
                        • Opcode Fuzzy Hash: 01d3708d36c901e874671523edf2f94a2ca1860b146adb7d5f84ce94979c5e33
                        • Instruction Fuzzy Hash: 7AF0AF79500284DFDB208F1AE885765FFE4EF04224F48C0AADD494B752D379E548CEA6
                        APIs
                        • DispatchMessageW.USER32(?), ref: 06B314D8
                        Memory Dump Source
                        • Source File: 00000010.00000002.1717682748.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6b30000_OmGui.jbxd
                        Similarity
                        • API ID: DispatchMessage
                        • String ID:
                        • API String ID: 2061451462-0
                        • Opcode ID: 54794be30f743c7addb531ae5d60a2aa421493e9db3993ad5bdfcca10dcf6c37
                        • Instruction ID: da63d84a02298e7b9b1077949ecce4f05ac3aa3416aea58340e0efb1d4383490
                        • Opcode Fuzzy Hash: 54794be30f743c7addb531ae5d60a2aa421493e9db3993ad5bdfcca10dcf6c37
                        • Instruction Fuzzy Hash: 28F0C875A00244DFEB60CF49D885761FBE8EF05225F08C4DADD494B752D379E508CEA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk
                        • API String ID: 0-228462240
                        • Opcode ID: 129f15b46acbadbd921bd223fceba0d3488389c9847dfd175eaab9843fe0b91f
                        • Instruction ID: 7a7bab34d9238eed0b701fc75b4dfd503fedfe646133a250820eb50fa7d75b7e
                        • Opcode Fuzzy Hash: 129f15b46acbadbd921bd223fceba0d3488389c9847dfd175eaab9843fe0b91f
                        • Instruction Fuzzy Hash: 0261E734A005049FDB44DF68C494AADB7F2BF89315F2584B9E80AEB792DB31AC46CF51
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70ad5bfb1285f63245962c9235b55953ffaf78dc79fc4b723a8e161bb9cbe16a
                        • Instruction ID: 5b889ffadac3e429a4718d9c1af0269d5abe4f047e0c38e0b1ea165f8b0cb046
                        • Opcode Fuzzy Hash: 70ad5bfb1285f63245962c9235b55953ffaf78dc79fc4b723a8e161bb9cbe16a
                        • Instruction Fuzzy Hash: 95E22231A05228DFCB269F60C948ADCBBB6FF45304F4684E8D18967265DB319FA8DF41
                        APIs
                        • CloseHandle.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 011AA780
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 2d0540933d29fee589ac83ee027c3f02ec30a6be563ead07faa2a55423da544a
                        • Instruction ID: f59f27911c93d63208a4b1387d5d695f710bef6acded3251e7f6b580d818617c
                        • Opcode Fuzzy Hash: 2d0540933d29fee589ac83ee027c3f02ec30a6be563ead07faa2a55423da544a
                        • Instruction Fuzzy Hash: 0421F2B55097C09FCB038B25DC95692BFB4EF07220F0984DBDD858F2A3D2755909CB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: uAj^
                        • API String ID: 0-3033221290
                        • Opcode ID: 144b16894a0d4bb486afe7a59209cb94c27aff043c23272b385dc60342249d33
                        • Instruction ID: 54c1692d074f8e9a792d043bb2abade021c2970c4dabded4b3a3f702dc9bcdb0
                        • Opcode Fuzzy Hash: 144b16894a0d4bb486afe7a59209cb94c27aff043c23272b385dc60342249d33
                        • Instruction Fuzzy Hash: DB2127743043009FC325A768E45469ABFEBAFC5214310856DE04EC7B95CF74EC05C791
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 799de8e82c6f7a3fc44d5d6ce20c44d68c12516f6c3e8165817e65d661e58c34
                        • Instruction ID: 137875a01d16086ffb6e1c1593de0365b6194ace2b5576276bcf1bb08d705beb
                        • Opcode Fuzzy Hash: 799de8e82c6f7a3fc44d5d6ce20c44d68c12516f6c3e8165817e65d661e58c34
                        • Instruction Fuzzy Hash: 6DD23331A05228DFCB269F60C948ADCBBB6FF45304F4684E8D18967265DB319FA8DF41
                        APIs
                        • CloseHandle.KERNEL32(?,50A98413,00000000,?,?,?,?,?,?,?,?,6C103C78), ref: 011AA780
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705551615.00000000011AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11aa000_OmGui.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 1c3cc6161b704ea0f90a4d832e0e26e3f606a5b163c0b5591055d09e0cd1f39e
                        • Instruction ID: 1509965888af2101e77e8c14d32847c5987b5403965477f88a88412ec93ce995
                        • Opcode Fuzzy Hash: 1c3cc6161b704ea0f90a4d832e0e26e3f606a5b163c0b5591055d09e0cd1f39e
                        • Instruction Fuzzy Hash: D501DF756006408FDB148F69E885766FFE4EF00224F08C4ABDD0A8B742D77AE408CEA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8586bd47e897e740771e863d3f652654004e7be79320c260a599e1dd5148fce7
                        • Instruction ID: 66f86db9cb12e4d4913ccf1f3870556b5dbfd30b9b41714e2978277f0c070c08
                        • Opcode Fuzzy Hash: 8586bd47e897e740771e863d3f652654004e7be79320c260a599e1dd5148fce7
                        • Instruction Fuzzy Hash: 16226A35901608DFCF159FA4C948ADDBBB2FF49304F0584E9E209AB272DB32AA55DF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2deb0fee619b83ec8014b31ce634ed2b98784369abf81785442cec21ee1ec49e
                        • Instruction ID: 959c0e2698883c26b9dfc86294b788ce01a997e5e6f633b9a9e2bac3e74cdbfb
                        • Opcode Fuzzy Hash: 2deb0fee619b83ec8014b31ce634ed2b98784369abf81785442cec21ee1ec49e
                        • Instruction Fuzzy Hash: 92D1BC347002119FDB48EB78C4647ADBAE3FFC9308F518628D11A9B795DF759C098B92
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b6843dc647057132247938679185c3f05420f950de9704776e08eda2653c835
                        • Instruction ID: 74fe74b4df287b895d18e61bd35dba6d784f482aa63825aaea4c4d916b5c120a
                        • Opcode Fuzzy Hash: 4b6843dc647057132247938679185c3f05420f950de9704776e08eda2653c835
                        • Instruction Fuzzy Hash: 91D1BC347002119FDB48EB78C4647ADB6E3FFC9308F518628D11A9B795DF759C098B92
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a302b234cfe6c7888ca9dd552908bee847d4379fe1d3c7e2e6c9752b8f5d155c
                        • Instruction ID: 3e52c6df4a95a71f0d5cf18412cae190ad0fbd88de1bd70eb9d570c877e2dde8
                        • Opcode Fuzzy Hash: a302b234cfe6c7888ca9dd552908bee847d4379fe1d3c7e2e6c9752b8f5d155c
                        • Instruction Fuzzy Hash: 3AE1B0347002048FCB19EB74C4987EE77E2AF89308F2485B9D50A9B3A2DF75AC45CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5ee412652d6a14e178679df34ff8a57b87d41a0a40250952d3d83af033370c42
                        • Instruction ID: b3a902d78572cf3a258116a4893c197b201bc961adf0d52f1248e28e548bfd68
                        • Opcode Fuzzy Hash: 5ee412652d6a14e178679df34ff8a57b87d41a0a40250952d3d83af033370c42
                        • Instruction Fuzzy Hash: CDD180747002048FCB09EB74C598BED73E2AF89308F2485B8D50A9B7A5DF75AD45CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e238a460c05b6d48bfefc1b2a90ca8f859e8dcc5ae1933819a560dbf198f8c7
                        • Instruction ID: ed7ae3dfa526a49cdb8b23b3fbb21ca9e4c77c7d858d2fe616e619b25714c54f
                        • Opcode Fuzzy Hash: 9e238a460c05b6d48bfefc1b2a90ca8f859e8dcc5ae1933819a560dbf198f8c7
                        • Instruction Fuzzy Hash: 77B15F71A00219DFDF259F25C948B9EBBB2FF48300F5244E8DA896B295CB359E55CF80
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1ef3cf3492f40a096c6f871adb7a00e16661f90b32dff55fcb9c0eed49cde14b
                        • Instruction ID: 5bf498c59899b6b2ef090dd598f47d7256a3a75b25274baedcd5e3ee7f739b14
                        • Opcode Fuzzy Hash: 1ef3cf3492f40a096c6f871adb7a00e16661f90b32dff55fcb9c0eed49cde14b
                        • Instruction Fuzzy Hash: EAB1FA74A00619CFDB64DF24C998BADB7B2BF88305F1480E9D409AB791DB359D81CF51
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 33b83a4b8af87be021e5d4f3161da9b6435cdaac2fcc1df1cb84ae31177f8507
                        • Instruction ID: 536053bde247dd41c9ef4ceb87592203be7aee7818369a45b03d6489389d05cf
                        • Opcode Fuzzy Hash: 33b83a4b8af87be021e5d4f3161da9b6435cdaac2fcc1df1cb84ae31177f8507
                        • Instruction Fuzzy Hash: 3A411531B05361CFCB229A7C8014795BBD5BF46255F0A85FAE0088F392DB759C86CBD2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a2ada6e9f20a5f3d992d39562d316ba4029835b7956650de92a7b7b93244805
                        • Instruction ID: 4143d31f2745bafb88516062ba5b8805caa57389fbabfa6ef94661fc8347fa08
                        • Opcode Fuzzy Hash: 2a2ada6e9f20a5f3d992d39562d316ba4029835b7956650de92a7b7b93244805
                        • Instruction Fuzzy Hash: 3251F838B001048FDB49EB74C558AAD73E2AF89314F2541E8E906AB3A1CF76AD45CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 224cfe7f4757cd8572e1b1b558bf367641bbfe901cdfbeafa0f40f10ee8f2026
                        • Instruction ID: 71a158fdd8e4301fb958de8641518778b8d4af6bd1c8d0cdb1fd8dc76a9f8ff8
                        • Opcode Fuzzy Hash: 224cfe7f4757cd8572e1b1b558bf367641bbfe901cdfbeafa0f40f10ee8f2026
                        • Instruction Fuzzy Hash: E1516B747017008FD7299A38C45476AB3EABF8825AF25482DC46A87396DF76BC46CB50
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a11d1e33b584e4a8fec9948cd24d1e7c662d2526e96cc57b05c328b76efb05c3
                        • Instruction ID: 1ccd48a2a96aba886d8dba79568f2c6995a051a21ccba80a2ef12cde40fb706e
                        • Opcode Fuzzy Hash: a11d1e33b584e4a8fec9948cd24d1e7c662d2526e96cc57b05c328b76efb05c3
                        • Instruction Fuzzy Hash: C9510974E00229EFDB15CF98D584AADBBB6BF44304F548519E911E7351CB34AE82CF90
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d8dd6fa6ab9e91d43fd361e52206afc09ef99680ff7e33f34898006e598e992
                        • Instruction ID: 0e07c44b0f67c97f690512bf615b55801ba0a07a3882a84e785f1f675c3e19bf
                        • Opcode Fuzzy Hash: 2d8dd6fa6ab9e91d43fd361e52206afc09ef99680ff7e33f34898006e598e992
                        • Instruction Fuzzy Hash: 2951F474A00715CFC724DF69C488AAAB7F2BF89304B2449BDD41ADBB61CB31AD45CB61
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a24a681e4cf69ac9b329795e3afca5d2da5c203dc8448869a6713e489b72136e
                        • Instruction ID: 0837da7177baa1ffa4e28f68effc9ce43e6cd986218f8a414bdbb0cb9bb56093
                        • Opcode Fuzzy Hash: a24a681e4cf69ac9b329795e3afca5d2da5c203dc8448869a6713e489b72136e
                        • Instruction Fuzzy Hash: 1341635540E7C29FD7038BB189A57803F309F47205F2E89EBC5C4CE9A3D629485AD763
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9d11444bbef449b19b16527ec43a7901d61eabb909ff66b6e5573353d2b7e8b0
                        • Instruction ID: 71dbf62317ced7108646be4a8b8c0e18f6cf2616e749470d5871068afd2950d1
                        • Opcode Fuzzy Hash: 9d11444bbef449b19b16527ec43a7901d61eabb909ff66b6e5573353d2b7e8b0
                        • Instruction Fuzzy Hash: 5B413870E012188FCF05EFB8D5585AEBBF2EF89208B6144A9D005AB352DF399D15CB95
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f87fc9c4eb89219d7a69c5102728e6a1ffc98cce68c4740e546dc3b5fde7d7a4
                        • Instruction ID: eee91316e07897c05e22731f080c7527cafb881dd1f418148fcc568331a0978d
                        • Opcode Fuzzy Hash: f87fc9c4eb89219d7a69c5102728e6a1ffc98cce68c4740e546dc3b5fde7d7a4
                        • Instruction Fuzzy Hash: 683149746093918FD313EB38E8446D8BFB1EF81314F4585AAD048CF267DB759849C752
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 714b4a04bd70f7e71416e06cd40ebe8b67e139ffd21a13eb1b8ab065f79ab5ba
                        • Instruction ID: 70c559a5e7a274f9414e432ba55822605c142fe9de6dde77ed4d99bbbc7a158c
                        • Opcode Fuzzy Hash: 714b4a04bd70f7e71416e06cd40ebe8b67e139ffd21a13eb1b8ab065f79ab5ba
                        • Instruction Fuzzy Hash: 2C412470F012188FCB05EFB8D6985AEB7F2FF89208B614469D005AB351DF39AD16CB95
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0865821c1a736ba0b656e24c397b75de2fd637eb46f656bd26020177fa0f7d6d
                        • Instruction ID: 87ae6a3041ff8e31c59badcd063b12f9519b3ff25ce60914dc3391697dfb9d32
                        • Opcode Fuzzy Hash: 0865821c1a736ba0b656e24c397b75de2fd637eb46f656bd26020177fa0f7d6d
                        • Instruction Fuzzy Hash: 43319A30701201DFDB19DB34D4547AEB7B2BF8A30AF21456DD8059B396DB39AC42CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 952f60e71bf64ae1c1f3316353f54fc8824b7b8cd78fcd7133c4d4dad462f6a4
                        • Instruction ID: bd879a408932ca174fc35205d0841a3626f02ae917462b509fafc9cef63d3a01
                        • Opcode Fuzzy Hash: 952f60e71bf64ae1c1f3316353f54fc8824b7b8cd78fcd7133c4d4dad462f6a4
                        • Instruction Fuzzy Hash: D3311E343007109FC745AB38C8585AF77E7AFCA255B1509B9E40ACB361EE36AC06CB92
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 35228414be49df31903d933fb6b6581ec81729ed4c1e94f90a523deb361853e7
                        • Instruction ID: 4841193aacaf64ce0d860a1adef88fcf1918273b7de1c36d6d3c271d3b9bce3f
                        • Opcode Fuzzy Hash: 35228414be49df31903d933fb6b6581ec81729ed4c1e94f90a523deb361853e7
                        • Instruction Fuzzy Hash: 4C3158307002019BDB18DB34D455BAEB3A2BF8970AF20442CD9199B395DF75AC42CB94
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 254d91efd5eb7814d087988955e168b8c5761ca8fe7b841fa8ceab35adaebba2
                        • Instruction ID: 91a1c1015701aa507b3fdbf9aded34fdf08f8442783df093e04f6fdac578b163
                        • Opcode Fuzzy Hash: 254d91efd5eb7814d087988955e168b8c5761ca8fe7b841fa8ceab35adaebba2
                        • Instruction Fuzzy Hash: 88312534304625CBE62B9A24D54453E73B7FBC5305B704619DD42CB785EB38EE86CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 92888ce55a7c8ca108fa2fbbd822088896e85a5d6ffe8210d60c4e4201a57503
                        • Instruction ID: 517a4105b0b6c8b8e0dae8980ce345336a51ec9eb1b713d491014d53eff853f8
                        • Opcode Fuzzy Hash: 92888ce55a7c8ca108fa2fbbd822088896e85a5d6ffe8210d60c4e4201a57503
                        • Instruction Fuzzy Hash: 9D2103303012609BE7168B38801035D73AAEF89218B2D80FEE940DB392DF7ADC0387D6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d0955ba2dd8876844568749711fbd20f9bb15422cc2d571178528a2eb59dc0b
                        • Instruction ID: 15292121afc5b91603412e7a28d78c71bfad4c5d18c35eb1c79454fbb9ad9497
                        • Opcode Fuzzy Hash: 6d0955ba2dd8876844568749711fbd20f9bb15422cc2d571178528a2eb59dc0b
                        • Instruction Fuzzy Hash: E7312C31A01604DFDB05CFA8C584AE9BBB6FF49315F148869E805EB392D771A946CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 384136259131f375f3ea9389e16cd5395db7b63f8e9a0510db9e5ba3e7f57f69
                        • Instruction ID: 1245b9302f7bab596bdd17c32966aafb3b74eb49a092fe68bee53790fb003dc2
                        • Opcode Fuzzy Hash: 384136259131f375f3ea9389e16cd5395db7b63f8e9a0510db9e5ba3e7f57f69
                        • Instruction Fuzzy Hash: E6210C343006109FC745EB38D858AAF73E7AFC9355B150979E40ACB360EE36AC06CB86
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 90cc884daf4d8dbc9ad003b537f10943ae2a3c8f7f198668b0f2be4409eb29e2
                        • Instruction ID: 7c74b08f912c49da2933568bac644cdae8bc461b436d189d20c9303b3a940c4f
                        • Opcode Fuzzy Hash: 90cc884daf4d8dbc9ad003b537f10943ae2a3c8f7f198668b0f2be4409eb29e2
                        • Instruction Fuzzy Hash: D2311E34A00219CFDB15DFA8E499A9DBBB1FF48314F10C05AE912AB3A5CB34D984CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: da2308d2ee44d30d8901007d6bde665cba2e9970b943bb41ae7d06e00df55fbf
                        • Instruction ID: db4fe2b6b1aab2aa4ea568c758186d60387be4d9822b12349b14e319f0e49ecb
                        • Opcode Fuzzy Hash: da2308d2ee44d30d8901007d6bde665cba2e9970b943bb41ae7d06e00df55fbf
                        • Instruction Fuzzy Hash: 7C2168763042628FFB27962CE8057753BBADB83325F14402AD688C7682DF3CAD86C751
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5bc313eea3767d00e8208c5127bfd2554e984fd9470892bbe67c11b1f2cba6bf
                        • Instruction ID: 6f10ae7a1cb8e3e0667266ba326cb5d5b293774dab2855ccab6aca00d3e3abb7
                        • Opcode Fuzzy Hash: 5bc313eea3767d00e8208c5127bfd2554e984fd9470892bbe67c11b1f2cba6bf
                        • Instruction Fuzzy Hash: 3E212634A002059FCB15EF78D6499EEB7F2BF89205F2544B8D809AB361DB369D42CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab771b1cea40da6f64cb172574e67279a2e2f3a23bb0fc11f41c521c38d040dd
                        • Instruction ID: 9f90c6808b7ae6199b4be014f6348c47f97a890bd8b07c57e171fc4e7b9493e1
                        • Opcode Fuzzy Hash: ab771b1cea40da6f64cb172574e67279a2e2f3a23bb0fc11f41c521c38d040dd
                        • Instruction Fuzzy Hash: 7E21C2303012558FDB09DF74C8906D93762AFC6314F1980BDD80A9F396CE7A6C46CBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1065fcdcfcf3311c437f19826f37c8f28f27ce314acde9f946cd0c3d608188f8
                        • Instruction ID: 46bf3e857aebdfd053e314d4eff28eeae2e5da2c562f7f79cd7ff25afad62b8d
                        • Opcode Fuzzy Hash: 1065fcdcfcf3311c437f19826f37c8f28f27ce314acde9f946cd0c3d608188f8
                        • Instruction Fuzzy Hash: 7A21DE30B003409FE325CB38C445B6B77EABB89305F15846DE42A9B282CF36BC05CBA4
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0c937e3d3fd674a2212f4cea9f4a93b00b7e8bc3e085b09786b93ed89691e59e
                        • Instruction ID: f4c90626c4698ec4b0192639dda59923a6b1dd994c797378c287359cb94fc112
                        • Opcode Fuzzy Hash: 0c937e3d3fd674a2212f4cea9f4a93b00b7e8bc3e085b09786b93ed89691e59e
                        • Instruction Fuzzy Hash: CF211934A002059FCB15EB78D5499EEB7F6BF89205F2504B8D809AB361DB369D02CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8e2ef67bfd29879f8bd3c266e23f6df5cfc91078604c648eca0fe375df1e25dc
                        • Instruction ID: cfadba30615950b376ba9d14b7fea865a8a9cec43e2d9f8902119f09b6717bb2
                        • Opcode Fuzzy Hash: 8e2ef67bfd29879f8bd3c266e23f6df5cfc91078604c648eca0fe375df1e25dc
                        • Instruction Fuzzy Hash: 4E1191357001209BE7249A38951175EB2DAEBC821CF2980BDEA05E7391EF7DEC0287D5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d225d7a994a7a745e97f02513d39ed194b6d0eec7063eb7c703ec6a591f96cc
                        • Instruction ID: 14d4a6059db40bf1ea78e6af3b4e0fd1ed52be97c9cc2c41ccb47b7d2e27ee3e
                        • Opcode Fuzzy Hash: 2d225d7a994a7a745e97f02513d39ed194b6d0eec7063eb7c703ec6a591f96cc
                        • Instruction Fuzzy Hash: 57216D3290064EAFCB029FA4CC45EEE7FB4FF89304F0540A9E558A7262D7319529CBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b1d953594603f60305ca0a38d099f37d9db644abc5d1fbb373a20497bb6ae115
                        • Instruction ID: f199376bd6270251fdf920708b5da040b507b547a8dfcf4ae1b0f23c2ca8e94d
                        • Opcode Fuzzy Hash: b1d953594603f60305ca0a38d099f37d9db644abc5d1fbb373a20497bb6ae115
                        • Instruction Fuzzy Hash: 7311AF343012548BDB18EF7588906A97352AFC6318F5980BCD80A9F386CF76A806CBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f898025f51fa81650f3f46fced3fb914982be6d9f2af092745ee63c1ae849e4
                        • Instruction ID: f1d65be5316e8f03790ea1d6fe58e10b9590929a0895afceba2f5a084004fb67
                        • Opcode Fuzzy Hash: 9f898025f51fa81650f3f46fced3fb914982be6d9f2af092745ee63c1ae849e4
                        • Instruction Fuzzy Hash: 9111F030D042A8AFDB228B6AD8047DEFFF59F49714F00441ED142E6A92DBB05989CBD1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3640e9bea16ae1ea25393d9e86cb2ab11b3fcf8e9e56d7182f62d6134d5964c5
                        • Instruction ID: bbab9784554c9adfa4a950ec5fba03c9313d896a89219e337efc4d08281c4467
                        • Opcode Fuzzy Hash: 3640e9bea16ae1ea25393d9e86cb2ab11b3fcf8e9e56d7182f62d6134d5964c5
                        • Instruction Fuzzy Hash: 0B11E4302042519BD712CF3DC480959BBF6FF8632431085AAE594CBB66DB31EC86CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0388db0803a4b79b64e766ce978f2097a4db4708171632afc5ee5802f6bf7a1f
                        • Instruction ID: 1d0d73fc2a71fad92d8a2d39fd230705c038d7d19daf9be0c5043edb155bacb1
                        • Opcode Fuzzy Hash: 0388db0803a4b79b64e766ce978f2097a4db4708171632afc5ee5802f6bf7a1f
                        • Instruction Fuzzy Hash: 3C11B6715097C09FD7128F25DC84B62BFB4EF47714F08849AEC458B693C339A904CBA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 95d0dc4a0c87e35d76e5c8456b49ab05fe438d904e7f9f977a5bde121f50591d
                        • Instruction ID: fed14e2d8e02bbf6fbc81691682e8d90b9b24989e11f269fc4c1f2d0e0ff9a98
                        • Opcode Fuzzy Hash: 95d0dc4a0c87e35d76e5c8456b49ab05fe438d904e7f9f977a5bde121f50591d
                        • Instruction Fuzzy Hash: CA217C3510D3C18FC7078B64C950B55BFB1AB87308F2985DED4888B6A3C73A9916DB52
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3b23520e87a0d797081ff4b3918a0bf84c8a0da16b63e0ff3133065ba8103a5f
                        • Instruction ID: abf9b26950621f13c7aa78ea31a6da2c7772a4d55c53995d187402db93efbb07
                        • Opcode Fuzzy Hash: 3b23520e87a0d797081ff4b3918a0bf84c8a0da16b63e0ff3133065ba8103a5f
                        • Instruction Fuzzy Hash: 77110670505244CFEB11DF78D99E3AA3FF5EB56308F50019AC045DB6A2CB382D8ACB92
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a18af38e49ec5632b9a64a3cad7d99063e7f128ceeb8bc956b15c62d39a75aa1
                        • Instruction ID: a0319942c651eaa48306b031687f27c19c1e1cb75c821827a7931d037eeceb4d
                        • Opcode Fuzzy Hash: a18af38e49ec5632b9a64a3cad7d99063e7f128ceeb8bc956b15c62d39a75aa1
                        • Instruction Fuzzy Hash: 4D216A74A01108AFDB15CFA8D195AEEBFB9AF48310F244028E505E7391DB34AE80CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 85e5098997bf8733efab7f831685562879cbdf658f6f136182acd9d2c2ded802
                        • Instruction ID: fe0c8f754793a85da4b8733b4c469d599c2debe7974616f80d4e2b9a1caed222
                        • Opcode Fuzzy Hash: 85e5098997bf8733efab7f831685562879cbdf658f6f136182acd9d2c2ded802
                        • Instruction Fuzzy Hash: D611A2312082849FD715CB54C584B19BBD5ABC8708F28CA9CE9499B753CB7BE913CA81
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7c425e31edef19a7d6ed39b14ade5ca4f208ad0680270a01a98d2728f1469bc0
                        • Instruction ID: 2b328dcf8944ad3b764fcbd65922b90a57cfa726e83a17d895a51a0fe0817e12
                        • Opcode Fuzzy Hash: 7c425e31edef19a7d6ed39b14ade5ca4f208ad0680270a01a98d2728f1469bc0
                        • Instruction Fuzzy Hash: F9116D3290060EAFCF01EF94DC44EFE7BB9FF88304F054069E558A2260D731A625CBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 306618edef0dc86f9398ba429f6867ac0d0cd5c3dc086638f9950b13d0eb01c9
                        • Instruction ID: a388df30bb3eef03a252d191756583a6a84647fc3bdf8293be23586a7c8dc6da
                        • Opcode Fuzzy Hash: 306618edef0dc86f9398ba429f6867ac0d0cd5c3dc086638f9950b13d0eb01c9
                        • Instruction Fuzzy Hash: 7801D6303052009FD7119738D858A697BEAFFC6211F2941BAE805CF7A2CB71DC45CB61
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7988c441a0d7a779795d2cbf977446ff5d84916aff5075621351f786a710a7c3
                        • Instruction ID: 4f48a39e7e0c0ca5272b768cc242eec8858f7b3fb11a4b55743b56d57df575d9
                        • Opcode Fuzzy Hash: 7988c441a0d7a779795d2cbf977446ff5d84916aff5075621351f786a710a7c3
                        • Instruction Fuzzy Hash: 8101D4B5B00214AFD718AA79D8549EB77FAEFC9314B1400BEE809DBB51CE30AC0587B1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ad04a3b98b30aaa5cc9e0426441520702f25fabef9f256d47dec4078a726c1b7
                        • Instruction ID: dee5cbac0800be287cc05a254f4e7d0d237c41abab52f151202a46511114cf0c
                        • Opcode Fuzzy Hash: ad04a3b98b30aaa5cc9e0426441520702f25fabef9f256d47dec4078a726c1b7
                        • Instruction Fuzzy Hash: 9611523120A3808FD7169B34D9986567BB1AF83219F1A44FED889CF293CA759C46C751
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 37f5c7e617ff6b4e738f1010a3957ccae283eeb2c02fb5c265e2539be97963bb
                        • Instruction ID: 9b52c52c876b112b70a46cc3d6f8c451dc2b0ecadba3561bddd82e8f98b10322
                        • Opcode Fuzzy Hash: 37f5c7e617ff6b4e738f1010a3957ccae283eeb2c02fb5c265e2539be97963bb
                        • Instruction Fuzzy Hash: 55113975200700CFC315AB34E458A9A77E6EFCA316F1905BDE44A8B761CF7AAC46CB81
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001834000.00000040.00000020.00020000.00000000.sdmp, Offset: 01834000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1834000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 074f310b963af2c0b37ed4e5db9a1028c30e701e820b1af9787ec11e25a00fb7
                        • Instruction ID: 276ce269ed119d75600ce48f64f8de1bbd1fa6953e17e6db92a908b8a24d0262
                        • Opcode Fuzzy Hash: 074f310b963af2c0b37ed4e5db9a1028c30e701e820b1af9787ec11e25a00fb7
                        • Instruction Fuzzy Hash: F501D4B24093846FC301CB15AC44C53FFF8DF86520B08C5AFEC888B642D265A918CBA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b817e708c022c8da7f10d7518a42a83e8e4031e7bbe91d5a88654ed12a6f5aab
                        • Instruction ID: e85b7a95dda8704941c67ecc91881cd4de2f0e3532ff75ea4313909b20c04fb4
                        • Opcode Fuzzy Hash: b817e708c022c8da7f10d7518a42a83e8e4031e7bbe91d5a88654ed12a6f5aab
                        • Instruction Fuzzy Hash: 1101B172A08684DFD711DB19D980762FBD4EB44728F0C846AFD098BB82C37D9544CAE2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6f04388d795b6eeec27305eb892aa47205bc32382844dbb5b1bfbf81476d380
                        • Instruction ID: 09567b19095e2ae15a24f13b2281f2b5946db4f8fd82c617aac8e5a5a7f6ebb7
                        • Opcode Fuzzy Hash: b6f04388d795b6eeec27305eb892aa47205bc32382844dbb5b1bfbf81476d380
                        • Instruction Fuzzy Hash: E2014C353003949FD3219B78D444BDA7B979BC4314B04CA29D106C7B54DF78EE4687D1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ee4693f2665d2e1600bc4991c561c5b470cb74d1d788b515e2d8f6dde2d351bb
                        • Instruction ID: d0014251146aea858668b6efd76d40d1db8fd97fbc51bf9f36c0aca7d3c30a31
                        • Opcode Fuzzy Hash: ee4693f2665d2e1600bc4991c561c5b470cb74d1d788b515e2d8f6dde2d351bb
                        • Instruction Fuzzy Hash: E601F9B63001124BF726956DDC45B61BB6EDBD6364F080035E248C7783DE2CDD41C361
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c892ec2fa83ebd0b98ee2751787bc445f565b9105e1efaae581921d2b8e1573a
                        • Instruction ID: f8c8388b54a1ad2d8614c2ce1c6ff4c653544547139c21bcc1ba68a5fa6d380c
                        • Opcode Fuzzy Hash: c892ec2fa83ebd0b98ee2751787bc445f565b9105e1efaae581921d2b8e1573a
                        • Instruction Fuzzy Hash: ED01F2706043808FD702AB70E8486987FB1EF82358F8489EDC048CF266EBB99D49C712
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2b4bd30a8e837c085b00abba001011f58f924dd4db11e8370d90dc63a599c59b
                        • Instruction ID: 38bdb3c5b67ca29c159f276408b2225ba72a608779f48a2041e0a8888ee92aa4
                        • Opcode Fuzzy Hash: 2b4bd30a8e837c085b00abba001011f58f924dd4db11e8370d90dc63a599c59b
                        • Instruction Fuzzy Hash: 1101D675700210DFD645EB38E05882D77A6EFD922932940BEE409CB3A1DE79DC02CB92
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bd34ba0cb828e89b4e90779b0ceb32a68c3fe73674144a4944c8573c8c1cedc2
                        • Instruction ID: c7b61d51d5fc4fe11333c14f36bf54a7575fc4fb2e82f4eddc1fe108f4fa96b8
                        • Opcode Fuzzy Hash: bd34ba0cb828e89b4e90779b0ceb32a68c3fe73674144a4944c8573c8c1cedc2
                        • Instruction Fuzzy Hash: 7201DBB65093805FD711CF15EC40862FFF8EF86620709C49FE84987652D635A908CB71
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4d0b6c3e9189effc407a45dc8cb7ebcc4d91e53961757660b2f380dddb561386
                        • Instruction ID: 35e510d92cfde3aa694825da17da21bbe7ff7c0b3554f9de82c6911014e1d98d
                        • Opcode Fuzzy Hash: 4d0b6c3e9189effc407a45dc8cb7ebcc4d91e53961757660b2f380dddb561386
                        • Instruction Fuzzy Hash: D1111874A00119EFEB11CF94D695AEDBBB5BF48304F244018E501E7791CB35AE85CF90
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0cc7f0d82cc41d19d421e8fde4a3ecd093809cd17f08e55ef4c5551748525398
                        • Instruction ID: 0444d9e679e44fd3df0bba3004597b1293607cdcb9643952dba3234669698e4a
                        • Opcode Fuzzy Hash: 0cc7f0d82cc41d19d421e8fde4a3ecd093809cd17f08e55ef4c5551748525398
                        • Instruction Fuzzy Hash: AC014875E006088FCB55DF79D4405EEBFF4AB8D220B10807AD508E7710E6308984CBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5475d2121675245ed6ee3641ab918c5a1af0cda1f5a043fb9ecd6653d28edfd7
                        • Instruction ID: 25fe98b7130bb066d85bbf5df402f07e575b9feb6123bc3d8ef8b7dd419df36a
                        • Opcode Fuzzy Hash: 5475d2121675245ed6ee3641ab918c5a1af0cda1f5a043fb9ecd6653d28edfd7
                        • Instruction Fuzzy Hash: 2EF028316093809FD312DE38E4008AA7BE4EF5266130045BED585CB692DB75FC47CB95
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2666daae8b44f9f5833579fab676cef7c0403134871918123103ad3dbc10130f
                        • Instruction ID: 60dbc85f3a8bda33114513baf8ea0d1297159ac16f5a9b05f8599ef85185b301
                        • Opcode Fuzzy Hash: 2666daae8b44f9f5833579fab676cef7c0403134871918123103ad3dbc10130f
                        • Instruction Fuzzy Hash: 7E018635300210DFD658EB78E05881D73E6EFC5259315057DD50ADB7A0DF399C42CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fe64f089f72bd88fcff0be7c79b702f5e62059026eadd2276357c027f5fdd50d
                        • Instruction ID: c06b98cc4fbd883a7a3c8b8a1d37311ef94fc93cd0b62a814f99291ca8e4a965
                        • Opcode Fuzzy Hash: fe64f089f72bd88fcff0be7c79b702f5e62059026eadd2276357c027f5fdd50d
                        • Instruction Fuzzy Hash: 7401E935300600CFC314AB34E458A9A73E6EFC931AF1505BCD84A9B761CF76AC46CB81
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6612bfb9be82ee0d67f6858b6fe41fbb706456a84e01a1a8ab5fc5c8b41b7cfc
                        • Instruction ID: c111f2255bc8975aef03bbe1f453180ca398d4063b93fdf132372c2ce5b9f209
                        • Opcode Fuzzy Hash: 6612bfb9be82ee0d67f6858b6fe41fbb706456a84e01a1a8ab5fc5c8b41b7cfc
                        • Instruction Fuzzy Hash: 5E014735200605AFCB224F50E950C69BFF3FFC621530844A9E15A87AB2DB319868DF51
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 737bb298f3d7fa5904619fc4afcbcedd836b9f5a2bf1b6e4d5d75cf0ab11b453
                        • Instruction ID: 0122708abddb605b40d79d74ff9604c6d1f4b3868493e98bc3e91e48b5042c64
                        • Opcode Fuzzy Hash: 737bb298f3d7fa5904619fc4afcbcedd836b9f5a2bf1b6e4d5d75cf0ab11b453
                        • Instruction Fuzzy Hash: 07F028B62082914FF727D56CD819B603F35CB93370F0900BAD188CB293DE289D86C362
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0c15fa21d25e8cee28d56bbc6206cea5194e32915a406bdfd1872a3d41610888
                        • Instruction ID: 1dcc4cb28472ce50c8c1d360cb2e23e43e7053f964e41d9c2d6b9417acf878a8
                        • Opcode Fuzzy Hash: 0c15fa21d25e8cee28d56bbc6206cea5194e32915a406bdfd1872a3d41610888
                        • Instruction Fuzzy Hash: A7016D313022008BC724DF34D59866673A6EFC521AF15447DD84A8F386CF71AC42CB50
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aef3526e4ed22ff6bcffebfd31ab5048afeca44e6cf5fe4ff5a6f4b8ee4af910
                        • Instruction ID: fed46a7c7f0fc0585cfe52a7dca155c6044d6906b538c9f6a19770c218847c2b
                        • Opcode Fuzzy Hash: aef3526e4ed22ff6bcffebfd31ab5048afeca44e6cf5fe4ff5a6f4b8ee4af910
                        • Instruction Fuzzy Hash: 53F0B4323047A05FE7354A6EA488A5BFBFDDBD9324F08053AE30AC2191CE649A85C390
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f67e5a908e3a0c6f92b39ded0e0a416f2c70e9dbe9100258aa7a65fd108f13e4
                        • Instruction ID: 9c83ca887aeb2ae1a068f65beae246a45acce08f36f0c5d256785305c81e8a71
                        • Opcode Fuzzy Hash: f67e5a908e3a0c6f92b39ded0e0a416f2c70e9dbe9100258aa7a65fd108f13e4
                        • Instruction Fuzzy Hash: 83F0CD307002008F93249A3AD894A6BA7E7BBC9214764853EE40ACB794CE32DC0AC7A1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c56c6ba912a20488bb3e020ee5294c327a338ba8fb86acd220758f47f1cf5a3e
                        • Instruction ID: 448ad6cb63a2e539c5d25fe808f5484e5c3e7c823db529f9970d3b03616aa505
                        • Opcode Fuzzy Hash: c56c6ba912a20488bb3e020ee5294c327a338ba8fb86acd220758f47f1cf5a3e
                        • Instruction Fuzzy Hash: EAF0283120B340AFC3119734D80166D7B66AF9631571040BDD944CB2D2DB79BC43CBA9
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 82ed606333aaced90488cecb2e9ab0750cd6e3547f8f6978a815968ecd0ca46e
                        • Instruction ID: b67ee0ce1a3c72ca77edc996a2cf0f3010f37c1d770e5ab6686f978de3718fc4
                        • Opcode Fuzzy Hash: 82ed606333aaced90488cecb2e9ab0750cd6e3547f8f6978a815968ecd0ca46e
                        • Instruction Fuzzy Hash: E1016DB0600219DBEB10EFA8D99A79A3AF5E758348F500128C406EB295DB792A49CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5c91608609710a82ecd136ac0e3652ea90c79f62392a8bffeb6182737731e78a
                        • Instruction ID: 8db245055808cef4d355deffaa6fada65655e7e95dd04686ac37ddc83741594d
                        • Opcode Fuzzy Hash: 5c91608609710a82ecd136ac0e3652ea90c79f62392a8bffeb6182737731e78a
                        • Instruction Fuzzy Hash: A0F0E2717002008B8324AA3ED894A5BB3EBFFC9124364853DE40ACB744CF32EC0987B1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dac146f636b823f62d3cef213f1fa7598a2ab27ebfb871f8bb06ab3c70c9a020
                        • Instruction ID: 1cab28b6ee75643d5ebfb3d0e2a79082b7dcbe064024e2687fe5818469aea6bf
                        • Opcode Fuzzy Hash: dac146f636b823f62d3cef213f1fa7598a2ab27ebfb871f8bb06ab3c70c9a020
                        • Instruction Fuzzy Hash: 94F02236200205EF8B254B85D904C6ABFE7FFC532530488A9E10A87AB0DB31E868EF11
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5523381951d453852f39ca9a4bcc9e21c9cdb597c4df60bb5c70455fd51f0f3d
                        • Instruction ID: 1c1a4d7466683e19644cf160ba4f9eca45777ad62a2b0776d7fb728d2cb0c3ac
                        • Opcode Fuzzy Hash: 5523381951d453852f39ca9a4bcc9e21c9cdb597c4df60bb5c70455fd51f0f3d
                        • Instruction Fuzzy Hash: FFF0C8B62003109FC324DB55E5449D6BBEEEFC9311711845EE58A47BA4DF30AC8ACBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 750d1df738350599e81964d8657dddf161ec9b667d8f6ac25663aec24525d618
                        • Instruction ID: 765a8ffe1e67c27bffe55bf5db65c39fb9deb5306381a38f75b4ad5435cb2b38
                        • Opcode Fuzzy Hash: 750d1df738350599e81964d8657dddf161ec9b667d8f6ac25663aec24525d618
                        • Instruction Fuzzy Hash: 16F027263007905BD7310A1E6488557FFFEAFD9320B08042EE606C3251CE608E85C2A1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001834000.00000040.00000020.00020000.00000000.sdmp, Offset: 01834000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1834000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 44801783da8722ba901f7b27b4f7818e776660077147e9bbbef5750f24a1e9c5
                        • Instruction ID: 4895b69da3758aac7cb3f61cc902d34b2d376f8bd63e781df70b420c90b99367
                        • Opcode Fuzzy Hash: 44801783da8722ba901f7b27b4f7818e776660077147e9bbbef5750f24a1e9c5
                        • Instruction Fuzzy Hash: B0F082B29452046B9200DF05ED41867F7ECDF84521B04C52EEC088B701E275A9188EE2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02b115c5f36c86af77a8386ca1bfc37321c5eac76c35a00818a0f2f89df8db78
                        • Instruction ID: b8524ba1603e330e37038315761afe19c2fe346e5328514020c9c5d1c16b1905
                        • Opcode Fuzzy Hash: 02b115c5f36c86af77a8386ca1bfc37321c5eac76c35a00818a0f2f89df8db78
                        • Instruction Fuzzy Hash: 33F082327093845FC3169B7A949445ABBEAEFCB21076600BEE44DCB662CE315C06C755
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bde747835a9b23514017e5338254f289e82522293b458f0a57461118daec58a3
                        • Instruction ID: 71a78554df18c908d21c71a85e76620a1c90d65a5dc3c786bd9edaff12a31900
                        • Opcode Fuzzy Hash: bde747835a9b23514017e5338254f289e82522293b458f0a57461118daec58a3
                        • Instruction Fuzzy Hash: F1018035A01128DFDB21CF58E888B98B7B1AB48315F518096E919AB251C734AEC4CF44
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ad64b56ef0c6a22e91f36a05a343200ed22f5deadafee584d1451888d9ef85cc
                        • Instruction ID: 3693fe2b65386c5699c3d78db3daefa817d738eb59fd08802e33c6973f7edcbb
                        • Opcode Fuzzy Hash: ad64b56ef0c6a22e91f36a05a343200ed22f5deadafee584d1451888d9ef85cc
                        • Instruction Fuzzy Hash: 1CF01231306201ABD7249635E901A6E7366EF98755B10413DDA05972C1EFB9FC43CBD8
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1cd296bf4a53f314982fcb7c58504bd35a227a34d9467cdfb69861c0bc7e5325
                        • Instruction ID: e67dc357d589569879c326364dfa733c89176aed73b8fe9c921364ec1e299501
                        • Opcode Fuzzy Hash: 1cd296bf4a53f314982fcb7c58504bd35a227a34d9467cdfb69861c0bc7e5325
                        • Instruction Fuzzy Hash: 84F01D35108644DFC316CF44D540B15FBE2EB89718F28C6ADE9490BB56C737E913DA81
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d17583d32fce7d6e2a769fff2c64d72cf2cf91014021a6fbce8bd558cef1491
                        • Instruction ID: 521bbd028cca3c03b718d7e373b72d4e28b4303291f132aa12389ccab8cb4e68
                        • Opcode Fuzzy Hash: 2d17583d32fce7d6e2a769fff2c64d72cf2cf91014021a6fbce8bd558cef1491
                        • Instruction Fuzzy Hash: 95F0A7314097809FE3229779D5463E27FE16F43264F0945DED0C94F8A2CA796889CB53
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4a53cfb62e292d31a31efb2e8909420f7529d0a1835ea969a632ea22b283bfb6
                        • Instruction ID: 1a03f158a52490e0c1dd4c771ccc6aea1dbe9a5559c3daac5fd46f25670e6cdb
                        • Opcode Fuzzy Hash: 4a53cfb62e292d31a31efb2e8909420f7529d0a1835ea969a632ea22b283bfb6
                        • Instruction Fuzzy Hash: 68E086353142109FC7455B7DE0149EA77E9EFCA23172600FBE409CB721DEB84C4687A1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8cd5ac4994edd2af4b97627a7886b5d35bf295e4f3e0819ac31be608568bb353
                        • Instruction ID: a598c1c63a36f5ceccea11cba1d954897debef918a6de754e0fb2566035e2b6a
                        • Opcode Fuzzy Hash: 8cd5ac4994edd2af4b97627a7886b5d35bf295e4f3e0819ac31be608568bb353
                        • Instruction Fuzzy Hash: 9CF0A7793006109BC324DB55E548ADBB7EADFCC315740842CE55E47B94CF70AC46CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bcb3d7ada11c84ebef6c9d34cf1f2201b0d7577996880fddb43d5c8c7c24fa1d
                        • Instruction ID: be6cf9795d3d9a3e3e1053302091b412ae304eaebe365f9495996a04004c4556
                        • Opcode Fuzzy Hash: bcb3d7ada11c84ebef6c9d34cf1f2201b0d7577996880fddb43d5c8c7c24fa1d
                        • Instruction Fuzzy Hash: F5E0E532759BC01FE726562DA4142A93F668BC3222F0900BAD089875E3C8144C8ACB66
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dd67237c22ac71d2609734f8c3751d93c0449cd25e9d30561ec9f0bdfc2049eb
                        • Instruction ID: 71aed2aea67a7779cf7a381c98a803afa89de5f2d28887843abc8b4939ae3cd8
                        • Opcode Fuzzy Hash: dd67237c22ac71d2609734f8c3751d93c0449cd25e9d30561ec9f0bdfc2049eb
                        • Instruction Fuzzy Hash: 5EE0DFB210D3D0AFE7030224A8A40803FA4CF93128B4B00EFE0818B1A3DD950D85C3E6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e83cbf77134faffcaa3762d7ba8996f94f7c1c0627e8acdc5bcfda239a2a0f8c
                        • Instruction ID: b9fae3fd417efff86bfa2afdd4fa95d2a25613bc5ee64756af2b2c449859ed3e
                        • Opcode Fuzzy Hash: e83cbf77134faffcaa3762d7ba8996f94f7c1c0627e8acdc5bcfda239a2a0f8c
                        • Instruction Fuzzy Hash: A4E022366042805BD737862CE8187E93FD28FC6311F0D80BEE0898B2A2C9640C46CB50
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3921fe54238bd5927339741e1b21d077baf762dc45aee3ad40da09866cdcf9b8
                        • Instruction ID: ea6fcd5d154931534a0ca8ce4cd818061d522177178c3a2b97cdcfc142cc8093
                        • Opcode Fuzzy Hash: 3921fe54238bd5927339741e1b21d077baf762dc45aee3ad40da09866cdcf9b8
                        • Instruction Fuzzy Hash: EEE09A323002009B8324AA2EA48886BF7EAEBCA2207A4403DE40EC3351CE319C028790
                        Memory Dump Source
                        • Source File: 00000010.00000002.1708069871.0000000001830000.00000040.00000020.00020000.00000000.sdmp, Offset: 01830000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1830000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2aa85209abaf8d76af80e0dd9dc12382caeec31e114e7bb5a3f55621fd334914
                        • Instruction ID: 132191c1776b5647e37c881d5cb409261c5ac6b00fe14f3ecc3e07cd36a4084b
                        • Opcode Fuzzy Hash: 2aa85209abaf8d76af80e0dd9dc12382caeec31e114e7bb5a3f55621fd334914
                        • Instruction Fuzzy Hash: 92E092B6A046004B9650CF0AFC81452F7D8EF84630708C47FDC0D8BB01D639B518CEA5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 57bdf6a28fcb2182729b8cbc3d4bba365fb8c15bcf2446a4ffa340617650e4af
                        • Instruction ID: af8a6c5473c8a7b81dd6ac67750eece94fcef2037d008e1a280e1e5ec90b3467
                        • Opcode Fuzzy Hash: 57bdf6a28fcb2182729b8cbc3d4bba365fb8c15bcf2446a4ffa340617650e4af
                        • Instruction Fuzzy Hash: FBE08C362403449FC301ABB4E4158D67BE9FB86271B2280F3E104CB221DABC9C86C7F1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ff3c474214a1b3cdbb746ee6959061b1f0f3dc7dfcf94c2396fefbf1a0122950
                        • Instruction ID: 78b4f7413387a56d7647c9781a4dbcab13fd3c0ae8e682e2198900ceae21fd2a
                        • Opcode Fuzzy Hash: ff3c474214a1b3cdbb746ee6959061b1f0f3dc7dfcf94c2396fefbf1a0122950
                        • Instruction Fuzzy Hash: BAE08CA231D2D42BCB171229582469E7F9A4BD7260B0A00EBE184CB292CD990C0AC3B7
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a264b9f27f6c67e117575a77dfb48d42efac242cfc9ac8828406bf01d07dd6df
                        • Instruction ID: 95a1e1ba70332d83bdc5ef75dc881441fd1218744fc208c4308bf0dbeb5b437d
                        • Opcode Fuzzy Hash: a264b9f27f6c67e117575a77dfb48d42efac242cfc9ac8828406bf01d07dd6df
                        • Instruction Fuzzy Hash: EBF0F8B1C0420A8FEB50DFA884856EFBFF6AB45300F25492AC004F7541D67402468F91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 82c5469f5a5222ae99f0a9893f22771fc4024133d9a49453c2d4cb2795861459
                        • Instruction ID: 6fd3bd2d57dbbfe3967b20a28ce659a13ede1199d4b6c9cf2d26f327ef9b543b
                        • Opcode Fuzzy Hash: 82c5469f5a5222ae99f0a9893f22771fc4024133d9a49453c2d4cb2795861459
                        • Instruction Fuzzy Hash: 09E0C2366006398BF72156E9F4043F67FDCEB0A376F044127E90AC3680DAADEA81C794
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 865397e04145a6cd2f4fa03e33396b029acbae95d820c64bfbfeb41e9876f42c
                        • Instruction ID: c8a1f86f20400834434a55a2df8fd551540a5cdbf2e34b5582933bb1f4062de7
                        • Opcode Fuzzy Hash: 865397e04145a6cd2f4fa03e33396b029acbae95d820c64bfbfeb41e9876f42c
                        • Instruction Fuzzy Hash: 18E07D3234150103C735955EE4083FD379ADBC9332F08003DE00C832A3CE74580AC341
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ffd14da50f96991fdea0b59de0f6e3e06764260600c4db71d6a4e42ea27bf81d
                        • Instruction ID: 93db9486b26fb206f791e6ede259d4076c8b5f413459da2ec5d536c50c39a862
                        • Opcode Fuzzy Hash: ffd14da50f96991fdea0b59de0f6e3e06764260600c4db71d6a4e42ea27bf81d
                        • Instruction Fuzzy Hash: 89E0D830704B588BD326C669C454BD3B7D5AF89314F04806DE44ACF752CBB2BD41C780
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7de900667c4778c5fc4f74ddafe9b25c335f88654b97a37396b84903bdf1acee
                        • Instruction ID: 3211ad6cc8a8dee785ab00f847113c25c722d796f1168326acfbfa15ecd72d9f
                        • Opcode Fuzzy Hash: 7de900667c4778c5fc4f74ddafe9b25c335f88654b97a37396b84903bdf1acee
                        • Instruction Fuzzy Hash: 44E0D871604B94CFD727C628D4147E277D56F95319F01016EE446DF662C7A11880C340
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 277ca1b17a3ab1736f000b18f9faf743f92ab0c1f7f4c3c9b3ecfe17505c3cdb
                        • Instruction ID: 1e13bf16ed27fd81fcdc14e019bbc9ae450975b7e1a6dfae3a8ceac6c959fea0
                        • Opcode Fuzzy Hash: 277ca1b17a3ab1736f000b18f9faf743f92ab0c1f7f4c3c9b3ecfe17505c3cdb
                        • Instruction Fuzzy Hash: 25E08636209299AFCF075F50D8118DD7F36AF4621074541A7F9818A263C73A8D65EBF1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e95cef9b7a5ba661ae021e297a7c3fb0ac40d13557a11211030732236df595e
                        • Instruction ID: fdd3decdb6e658f51dce66960d189f38e804cef67f0be34cba250d2fb48375d4
                        • Opcode Fuzzy Hash: 9e95cef9b7a5ba661ae021e297a7c3fb0ac40d13557a11211030732236df595e
                        • Instruction Fuzzy Hash: BEE0C23234050107C738954EE8087FE739AEBC8332F080039E10D832A2CE3458458685
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8960313566a2d3ad4090b5ff76c3dbc3439ed0e23a841203d0f524c6802fa7e9
                        • Instruction ID: b5bae22a4c8efdcfac910398705f99f728a79dd9ae36f21a7e8279659809db0e
                        • Opcode Fuzzy Hash: 8960313566a2d3ad4090b5ff76c3dbc3439ed0e23a841203d0f524c6802fa7e9
                        • Instruction Fuzzy Hash: 2FE0C23634061143C338954EE80C7EA72DADBC5322F08403AA00D87691DE245845CB84
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 25e93fec0663c8037367726f32d98e3493212b25433deb3dbbf30f4063f9cb80
                        • Instruction ID: b40f8fc79ed24ba953fa956eed6d17ed4360525b4c0c45381aefdb48d2439dd8
                        • Opcode Fuzzy Hash: 25e93fec0663c8037367726f32d98e3493212b25433deb3dbbf30f4063f9cb80
                        • Instruction Fuzzy Hash: 26E0C23235090107D738950EE8187EE729BDBC5332F08403DA14E83691CD245C458B99
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 64df709e6e1be016819011584cb242f85293fecef76eda8f7c477aab37537782
                        • Instruction ID: c06870801ee0856d666ee1a734d8be3860ef278f811c9a15fab02d943e1ffb0f
                        • Opcode Fuzzy Hash: 64df709e6e1be016819011584cb242f85293fecef76eda8f7c477aab37537782
                        • Instruction Fuzzy Hash: 2CE09AB4D0030E9FDB50DFB9C8866AFBEF9FB48650F508929D505E6241E67442418FE1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 44693badd0e0c8456ba5afb03970d69f169ea293d7b7f7e03a75f87c9a0d7249
                        • Instruction ID: f1306292b6e313c2c6fa3ffe72dc171b4ecead64933f6872d6f2ca780bd777f6
                        • Opcode Fuzzy Hash: 44693badd0e0c8456ba5afb03970d69f169ea293d7b7f7e03a75f87c9a0d7249
                        • Instruction Fuzzy Hash: 7CD05E313100104FC708A63DD00896E77DEDFCD62572540BAE50DC7321DE619C054791
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 89214096567939ac1e69f4b4629d6bac40638f7b5fb9472ea8c67bd69d39ea2c
                        • Instruction ID: ec338d0239bf10b659e7df2402806923cf9550c6d517c7a2aed7941ff81ea54e
                        • Opcode Fuzzy Hash: 89214096567939ac1e69f4b4629d6bac40638f7b5fb9472ea8c67bd69d39ea2c
                        • Instruction Fuzzy Hash: 99F0C935A01228CFDB61CF58E488B9CB7B0EB54315F508095E0099B161C7749FC4CF44
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a43b49a44fbd610ad5f3295280000507e9b716f0c4141855f89c658cbf6899bb
                        • Instruction ID: ce69f1dcaaf2eae835c76ecc9b73a3835290e2769fc030fbc0e6b3fb0fe27c96
                        • Opcode Fuzzy Hash: a43b49a44fbd610ad5f3295280000507e9b716f0c4141855f89c658cbf6899bb
                        • Instruction Fuzzy Hash: 19D02B32711528CF4120D65C94014D5B7D9FF4A6E232401BBEA02CB304DF34DC018FE2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1a17d6a654ff40bd3396206ccf6ee2cad5177ceb81ab0c5d0dd4073e04e0bf21
                        • Instruction ID: 6680b953357848937ebaaec973b9d4a1ce9e7be5342e8072f8221601056150f7
                        • Opcode Fuzzy Hash: 1a17d6a654ff40bd3396206ccf6ee2cad5177ceb81ab0c5d0dd4073e04e0bf21
                        • Instruction Fuzzy Hash: 39D05E72B482206F97049AEC6444AEB7FEEDBC8328F20857FE44CC7A80DA750C4447A6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4477fc77b48c900d2acc8c19744e7a3ef137e630f9d63d9f547ca1ba64a0c6fe
                        • Instruction ID: c4efb3b05bf7ddce851a5bb698465226d3946ddb6c5bee2eb1f76f30cccb6ae9
                        • Opcode Fuzzy Hash: 4477fc77b48c900d2acc8c19744e7a3ef137e630f9d63d9f547ca1ba64a0c6fe
                        • Instruction Fuzzy Hash: CDE02B71605950EFE7019B28F298BE43770D782314F104466E004DB751CF7C0C8B87C0
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9c31afe33fa5d75ee7dfaf55288ab72947777952f765a1ddb98939301db04d6e
                        • Instruction ID: 22a9dc18248d8e35ea716f8abdcb1904552aac8b7350ed2c1fbf8e7fa37f9094
                        • Opcode Fuzzy Hash: 9c31afe33fa5d75ee7dfaf55288ab72947777952f765a1ddb98939301db04d6e
                        • Instruction Fuzzy Hash: 9ED0A93630D2601AD202451DBC05AAAAE02A7CA330F484636F2008B2E0CA214845A2A2
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7af248b22a2411526d5f0c44c8685c477a603f447285625c91cf09b3cc92eb91
                        • Instruction ID: 42b828e13896413a5a616a226e1900baf67e8d58b6f46f15ece54ef9958c0457
                        • Opcode Fuzzy Hash: 7af248b22a2411526d5f0c44c8685c477a603f447285625c91cf09b3cc92eb91
                        • Instruction Fuzzy Hash: D2D0A7225DC7640FC707529524204EC37A5594317131501FBD00ACB153CE890945C386
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a7d9aaa6b0bfa5e49118e3c0621272d06ede4344355641ce3e51e2c0fb43f5a6
                        • Instruction ID: 1c27a0a9aeb8f4ac51fb63393344d4704572870de17ddf5feff4e5523ac873b9
                        • Opcode Fuzzy Hash: a7d9aaa6b0bfa5e49118e3c0621272d06ede4344355641ce3e51e2c0fb43f5a6
                        • Instruction Fuzzy Hash: D6C01263318028134409215E64249AFA1CE8BD55A1A05443BD215D7740DD554C0783FA
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e41c9741065b83d24e829369c2c9a0d8490cc431fd91706b04b0820f21fd7414
                        • Instruction ID: aa9ab56a192960f8c46ef0a33170adf83acf1086437c8a1e34880070e8516707
                        • Opcode Fuzzy Hash: e41c9741065b83d24e829369c2c9a0d8490cc431fd91706b04b0820f21fd7414
                        • Instruction Fuzzy Hash: 00D05E311583848FC3024764A8149903BE89B5A324B1500E6E404CF273C6A96C41C711
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2dbd083b0bbd33e0c9025ca5eb7b55d5e52bd9131528f0e8d59f6e44a95a283e
                        • Instruction ID: a13eb5b59e1a7f05ac47eefda4bb548f40a237fc6f0d591f7283ac44442d6001
                        • Opcode Fuzzy Hash: 2dbd083b0bbd33e0c9025ca5eb7b55d5e52bd9131528f0e8d59f6e44a95a283e
                        • Instruction Fuzzy Hash: ECD0C77A20011D7B8F167E84D801CDE7B5AEF89651B404025FE0516310CB76DD71ABF5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 481daa0842a4f830e950ff4f0188c949cc79bf451a85ffec8406f8c28ed8927f
                        • Instruction ID: e9a3e9e290024893f70cb707e8b85d15feec682aa00b34934ad181e0e20c66cc
                        • Opcode Fuzzy Hash: 481daa0842a4f830e950ff4f0188c949cc79bf451a85ffec8406f8c28ed8927f
                        • Instruction Fuzzy Hash: 6AD0A73260192CDB81208A5CE4004D4B764FF496A231401ABEA91CB314C730CC008BC1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 212f1ab558835b51d4010b14ae5c8b270f15407e4c52c69bc72aef3f35578938
                        • Instruction ID: 630fbbbff99073475dcf13e59a18ff14693edade3193e2f2163e471e2214cf54
                        • Opcode Fuzzy Hash: 212f1ab558835b51d4010b14ae5c8b270f15407e4c52c69bc72aef3f35578938
                        • Instruction Fuzzy Hash: 73D0C9317001149BC600EFB8E4499AA77DAFB89266B1180B6E609CB314DF75AC0187E5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705472034.00000000011A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011A2000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11a2000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6efa109f440718c9115aecd6a1dc179a71a979ba16c7375bc7865aea68aed63e
                        • Instruction ID: ff259008a1bbc2ccf2023f66576162db7b688229a142584ac9b74b75315ff09f
                        • Opcode Fuzzy Hash: 6efa109f440718c9115aecd6a1dc179a71a979ba16c7375bc7865aea68aed63e
                        • Instruction Fuzzy Hash: 57D02E393007804FE31A8A0CC1A4F843FE4AB40708F9A00F9A8048B773C328D880C200
                        Memory Dump Source
                        • Source File: 00000010.00000002.1705472034.00000000011A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011A2000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_11a2000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f31f2f4feac618116a5399577d3ff07956a3665fad62215cb356e7187e458ac6
                        • Instruction ID: 8bc8fbe2868d6a9df1d6fa685f102857f2014cdc45234ac6ab1c4beb102743a5
                        • Opcode Fuzzy Hash: f31f2f4feac618116a5399577d3ff07956a3665fad62215cb356e7187e458ac6
                        • Instruction Fuzzy Hash: D5D05E382042814BEB19DA0CC294F993BD4AF45714F1644E8AC008B762C7B8D8C4CA00
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eebc3e77ed21b4c23b8f149619b430f73af52459a092d0baf203828358b95890
                        • Instruction ID: 76c940f06ae7ad8275698d27673849bf1ca5326b33a1c5295b048f73ad28be8c
                        • Opcode Fuzzy Hash: eebc3e77ed21b4c23b8f149619b430f73af52459a092d0baf203828358b95890
                        • Instruction Fuzzy Hash: E5D0C936B501048F8F14EBB8E5554ECB3A1EF8516971001B5D50697661EF369E18C751
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0b1cc2733c5cd12bcce24cf7b26bafcfcdc4a4681f943b8b694134efb0630ba0
                        • Instruction ID: 8141b7b7c94f5755636722f30c3ef1ec01e770b11145c32b8d7e2c263ae7ff8b
                        • Opcode Fuzzy Hash: 0b1cc2733c5cd12bcce24cf7b26bafcfcdc4a4681f943b8b694134efb0630ba0
                        • Instruction Fuzzy Hash: D0B0127236453813091A319D34308FE738E898797524106EBE50DD7382CE861D1143DE
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: df6fb4d35aba9cacf1485046252290131bc6e5935a3e1c82664caa7ceba55067
                        • Instruction ID: e2abd976221a70d00430b4ce9e4e6abf801aa0d7bcccad21153ca56e95e276a9
                        • Opcode Fuzzy Hash: df6fb4d35aba9cacf1485046252290131bc6e5935a3e1c82664caa7ceba55067
                        • Instruction Fuzzy Hash: EFC0123010A382CFC30B47B494208083F30AEC32003CA08DAE4A0CF6F3CA2A8806DBA5
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2dee6e9d3a29b74cfc64ecb3760393f7bbb7d0779e925abcbef7313923022205
                        • Instruction ID: 1062477c4c047b850d63dc8d5e956075348864f74b296c1d09c3b55912a18e0d
                        • Opcode Fuzzy Hash: 2dee6e9d3a29b74cfc64ecb3760393f7bbb7d0779e925abcbef7313923022205
                        • Instruction Fuzzy Hash: B0C048312042088BC204AA58E848EA273E9AB98715F1140B9A9098BB72CA72BC50CA99
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,HIBERNATE=,000007D0,?,00000002), ref: 6D00C0D5
                        • OmCommand.LIBOMAPI(?,?,?,00000100,STOP=,000007D0,?,00000002), ref: 6D00C193
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: HIBERNATE %04u-%02u-%02u %02u:%02u:%02u$HIBERNATE -1$HIBERNATE 0$STOP %04u-%02u-%02u %02u:%02u:%02u$STOP -1$STOP 0$HIBERNATE=$STOP=
                        • API String ID: 1098371912-3089591338
                        • Opcode ID: 9d2ca6c222f0cdd0e05544573eee62d6a10d138ff32a6717bdf23e6c0734aa3e
                        • Instruction ID: d142deede38954d8bae1388bfdf088f7f21de8adf08f6fb74fc989c6dd496906
                        • Opcode Fuzzy Hash: 9d2ca6c222f0cdd0e05544573eee62d6a10d138ff32a6717bdf23e6c0734aa3e
                        • Instruction Fuzzy Hash: C841E4B2E1410C7BFB58C658DC81FFE73AC9B18304F40012AFA0AE7582E664DE558BE5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: b73559f475f6f78417488e036cd5871ef13850cfdd2b31b14ce4f9b029ef52f3
                        • Instruction ID: e36def1632f9e2510c41f5abd02e18240105868265d980f51a16c1167423e8b3
                        • Opcode Fuzzy Hash: b73559f475f6f78417488e036cd5871ef13850cfdd2b31b14ce4f9b029ef52f3
                        • Instruction Fuzzy Hash: 0CC26971E1A6298FEB25CE68CD407EAB3F5FB49304F5141EAD80DE7240E775AA818F41
                        APIs
                        • OmCommand.LIBOMAPI(?,ID,?,00000100,ID=,000007D0,?,0000000A), ref: 6D00CE47
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: ID$CWA$ERROR: Problem when identifying device %u (mismatched identity as %u) -- reconnect.$ID=
                        • API String ID: 1098371912-946307909
                        • Opcode ID: 58d4715c1d0c2dce4a7e47f995e5125780b314eb8fb38bb9d924dd7018d6d8de
                        • Instruction ID: 8195951b7c47b0ceebb06545e42c6a6fce0648fa474670f6f620013edff30ebe
                        • Opcode Fuzzy Hash: 58d4715c1d0c2dce4a7e47f995e5125780b314eb8fb38bb9d924dd7018d6d8de
                        • Instruction Fuzzy Hash: B841C431E481596BFB208B388C407FDB7F4AF4A314F0442D9E949A7281DB719AC2CBA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$Tqxk$Tqxk$d$n$t
                        • API String ID: 0-2259690248
                        • Opcode ID: 6faaee30a52fcb06693fcea3f5d8b74b001d2f26d72df2a2f87bf3f50959b83e
                        • Instruction ID: 678ab3f8ec28e32c94242d208fe1060158e3a95e9f1e16f1461cafa7662441c9
                        • Opcode Fuzzy Hash: 6faaee30a52fcb06693fcea3f5d8b74b001d2f26d72df2a2f87bf3f50959b83e
                        • Instruction Fuzzy Hash: EEB2F634601604DFDB65DB34C858BDAB7B2EF8A308F5184A8D15AAB3A1CF36AD45CF41
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1721318314.0000000008500000.00000040.00000800.00020000.00000000.sdmp, Offset: 08500000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8500000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tqxk$Tqxk$Tqxk$d$n$t
                        • API String ID: 0-2259690248
                        • Opcode ID: 5aeeeb004a89de0a7d6ed19a674ec8d3b1ded299b02eb853d692cc742fda3d52
                        • Instruction ID: 985921a0df3d1cb85272f2a57eea5ec3695beff658d551dbba35a78b9ed715c2
                        • Opcode Fuzzy Hash: 5aeeeb004a89de0a7d6ed19a674ec8d3b1ded299b02eb853d692cc742fda3d52
                        • Instruction Fuzzy Hash: 28B2F634601604DFDB65DB34C858BDAB7B2EF8A308F5184A8D15AAB3A1CF36AD45CF41
                        APIs
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,6D0295A0), ref: 6D01E573
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,6D03243C,000000FF,00000000,0000003F,00000000,?,?), ref: 6D01E5EB
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,6D032490,000000FF,?,0000003F,00000000,?), ref: 6D01E618
                        • _free.LIBCMT ref: 6D01E561
                          • Part of subcall function 6D01B556: HeapFree.KERNEL32(00000000,00000000,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950), ref: 6D01B56C
                          • Part of subcall function 6D01B556: GetLastError.KERNEL32(6D009950,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950,6D009950), ref: 6D01B57E
                        • _free.LIBCMT ref: 6D01E72D
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 1286116820-0
                        • Opcode ID: 654180a997f0ca7756a368de3fca6951391da003f999b44f19391a18cea3a11a
                        • Instruction ID: 1964594ee19c69cf8c0a3f725feaa5bec101c9bea296f5f81e87dedf3e219d32
                        • Opcode Fuzzy Hash: 654180a997f0ca7756a368de3fca6951391da003f999b44f19391a18cea3a11a
                        • Instruction Fuzzy Hash: E751B97590C216ABFB20DFF9CC80BAE77F8AF46354F52425DE564D7680E7309A448B90
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: __fread_nolock
                        • String ID:
                        • API String ID: 2638373210-0
                        • Opcode ID: d59e0eadf7bcef02b7589e463656bcb563b4ba071b72ff7839a05f6e6b9b8193
                        • Instruction ID: 1f43857a07810f0e7ddcd4277800534dc15528dede7acafb4927a4b9abbe8a35
                        • Opcode Fuzzy Hash: d59e0eadf7bcef02b7589e463656bcb563b4ba071b72ff7839a05f6e6b9b8193
                        • Instruction Fuzzy Hash: 9CE1A4B1A08B554FE324CB39C4907EBBBE2EBC9310F04892EE5EAC7244D7B4A545CB51
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 6D01515B
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D015165
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6D015172
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 5abb6dda0d3f9867af106d850c5b06e54f5467f699d7a871e3c7a0a60d4dcf1b
                        • Instruction ID: 4ef34dd3e3ae18acb8d0db1bb716691b2bdbe54e6bff17447a3aa2547b995382
                        • Opcode Fuzzy Hash: 5abb6dda0d3f9867af106d850c5b06e54f5467f699d7a871e3c7a0a60d4dcf1b
                        • Instruction Fuzzy Hash: 4231C474D05219ABDB21DF64DC88B9DBBB8BF08310F5046DAE51CA7250EB709B858F45
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,?,6D017DC1,00000000,6D02F7D8,0000000C,6D017F09,00000000,00000002,00000000), ref: 6D017E0C
                        • TerminateProcess.KERNEL32(00000000,?,6D017DC1,00000000,6D02F7D8,0000000C,6D017F09,00000000,00000002,00000000), ref: 6D017E13
                        • ExitProcess.KERNEL32 ref: 6D017E25
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: f3679b9f0916f8f464b0f8131a86c03b75adcc081b781e4925aeee79490b00ae
                        • Instruction ID: b4f2d356eef9e300c86b5e678acaa86e46b536a5fbfbe0d01944476a832e6e06
                        • Opcode Fuzzy Hash: f3679b9f0916f8f464b0f8131a86c03b75adcc081b781e4925aeee79490b00ae
                        • Instruction Fuzzy Hash: 1FE04631809149EBDF016F94CD0AB893BF9FFC5249B110414F9048B021DB35DC92CA90
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: .
                        • API String ID: 0-248832578
                        • Opcode ID: f00d573796032ed29f4975cf9ccc23015313782b7efa10d9acfab8c6f0bdc595
                        • Instruction ID: e95c8951bd27e43dcb03601751eb66321499e91e592a84aea68c80932dc853bd
                        • Opcode Fuzzy Hash: f00d573796032ed29f4975cf9ccc23015313782b7efa10d9acfab8c6f0bdc595
                        • Instruction Fuzzy Hash: EC31287190824AAFEB148EB9CC84FFE7BFDEB85314F1041ACF918C7291E63199448B50
                        APIs
                        • GetSystemTimeAsFileTime.KERNEL32(?,?), ref: 6D01D7CB
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Time$FileSystem
                        • String ID: GetSystemTimePreciseAsFileTime
                        • API String ID: 2086374402-595813830
                        • Opcode ID: 67561b3eed5c621de80df3398e50c94ec99e74a13e902a59f2502dd8715bc421
                        • Instruction ID: c2d053270ba6c685d65822be484970c2077740a2068c4dd964d72da4f75191a9
                        • Opcode Fuzzy Hash: 67561b3eed5c621de80df3398e50c94ec99e74a13e902a59f2502dd8715bc421
                        • Instruction Fuzzy Hash: 1BE0E531E8A12867A7109B949C05FBE7BA0DF99610B510658FD0967281DB205E0196E2
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D025426,?,?,00000008,?,?,6D0250C6,00000000), ref: 6D025658
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 7893bddd42ed422bd3ad01b2f3327b06cc769af92e4454ea3714e3506f3d2b5f
                        • Instruction ID: c9fbb90e5082cc4564dee9c140c7fcf719d56239ced115bc2d938780e3710d3a
                        • Opcode Fuzzy Hash: 7893bddd42ed422bd3ad01b2f3327b06cc769af92e4454ea3714e3506f3d2b5f
                        • Instruction Fuzzy Hash: 8DB189352216099FE705CF28C48AB797BE1FF05325F258658E8A9CF2A5C335E981CB44
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: d1efe47017a820cd5bcdb19ffcece396c453b0205a751768bec508ff4781c931
                        • Instruction ID: b23c4cc47f59e6cb1989745b20a91a8e6c419b2ab2cc741b83924891bed33c6e
                        • Opcode Fuzzy Hash: d1efe47017a820cd5bcdb19ffcece396c453b0205a751768bec508ff4781c931
                        • Instruction Fuzzy Hash: 88517560A1C70767FB2689E88D917BF7BE9BB0F308F40481DD982D72D1C312D90583A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: YYYY-MM-DD hh:mm:ss
                        • API String ID: 0-3616787860
                        • Opcode ID: be9cc87775f34832f66a5242072765df91f9af09abe43180d426a3d1dee88b41
                        • Instruction ID: f8666882fe2c31f076a3d9fc42d8ae6e6be46258183dbb0bb64462a88b1f3350
                        • Opcode Fuzzy Hash: be9cc87775f34832f66a5242072765df91f9af09abe43180d426a3d1dee88b41
                        • Instruction Fuzzy Hash: 7951D666B056404FD7198E2EC4A13C5BBD6CBB6250F48C09EE9998F783C2B59A0BC791
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: a75b2853a20f604349e17c0914914ab5e8ef9bcbff7dab40b243203cc8dc1c9a
                        • Instruction ID: 13b1c3b5570d373426a81b24a5da105a8fb7867930ec67f4c2747187049c08f9
                        • Opcode Fuzzy Hash: a75b2853a20f604349e17c0914914ab5e8ef9bcbff7dab40b243203cc8dc1c9a
                        • Instruction Fuzzy Hash: CBA02230A03302CFCF208F30820830C3AF8BA8B2C03228228E000CA080FB3080008B02
                        Memory Dump Source
                        • Source File: 00000010.00000002.1707982192.0000000001820000.00000040.00000800.00020000.00000000.sdmp, Offset: 01820000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_1820000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5073bb6ea2b0ed1b01b968e302ecea33a46bae21111e73903aea6490cccb6213
                        • Instruction ID: 4ebc4ed3c24924938fd8dc42b6df1e77a897e4d2c9bae8180eb1bdbc4d042243
                        • Opcode Fuzzy Hash: 5073bb6ea2b0ed1b01b968e302ecea33a46bae21111e73903aea6490cccb6213
                        • Instruction Fuzzy Hash: AC62B574A012289FDB65CF69D888B99BBF1BF48304F1485E9D849AB355DB34AEC0CF50
                        APIs
                        • ClearCommError.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 6D00A5B5
                        • SetupComm.KERNEL32(00000000,00001000,00001000,?,?,00000002), ref: 6D00A5C6
                        • PurgeComm.KERNEL32(00000000,0000000F,?,?,00000002), ref: 6D00A5EA
                        • ClearCommBreak.KERNEL32(00000000,?,?,00000002), ref: 6D00A60B
                        • GetCommState.KERNEL32(00000000,?,?,?,00000002), ref: 6D00A61D
                        • ClearCommError.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000002), ref: 6D00A64D
                        • GetCommState.KERNEL32(00000000,0000001C,?,?,?,?,?,00000002), ref: 6D00A658
                        • SetCommState.KERNEL32(00000000,0000001C,?,?,00000002), ref: 6D00A69E
                        • ClearCommError.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000002), ref: 6D00A6CE
                        • SetCommState.KERNEL32(00000000,0000001C,?,?,?,?,?,00000002), ref: 6D00A6D9
                        • SetCommTimeouts.KERNEL32(00000000,?,?,?,00000002), ref: 6D00A723
                        Strings
                        • WARNING: PurgeComm() failed., xrefs: 6D00A5F4
                        • ERROR: Problem opening input (%s: %d): %s, xrefs: 6D00A539
                        • WARNING: SetCommState() failed (clearing errors and retrying this): %s, xrefs: 6D00A6AF
                        • ERROR: Open failed: %s, xrefs: 6D00A758
                        • WARNING: SetCommTimeouts() failed: %s, xrefs: 6D00A72E
                        • WARNING: GetCommState() failed (clearing errors and retrying this): %s, xrefs: 6D00A62E
                        • WARNING: Retrying SetCommState() failed: %s, xrefs: 6D00A6E4
                        • WARNING: Retrying GetCommState() failed: %s, xrefs: 6D00A663
                        • ENOENT, xrefs: 6D00A514, 6D00A538
                        • NOTE: Retry %d to open: %s, xrefs: 6D00A4E3
                        • EACCES, xrefs: 6D00A520
                        • other: , xrefs: 6D00A528
                        • WARNING: Failed to get HANDLE from file: %s, xrefs: 6D00A57F
                        • WARNING: SetupComm() failed: %s, xrefs: 6D00A5D1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Comm$ClearState$Error$BreakPurgeSetupTimeouts
                        • String ID: EACCES$ENOENT$ERROR: Open failed: %s$ERROR: Problem opening input (%s: %d): %s$NOTE: Retry %d to open: %s$WARNING: Failed to get HANDLE from file: %s$WARNING: GetCommState() failed (clearing errors and retrying this): %s$WARNING: PurgeComm() failed.$WARNING: Retrying GetCommState() failed: %s$WARNING: Retrying SetCommState() failed: %s$WARNING: SetCommState() failed (clearing errors and retrying this): %s$WARNING: SetCommTimeouts() failed: %s$WARNING: SetupComm() failed: %s$other:
                        • API String ID: 1204597910-945267382
                        • Opcode ID: e4700a14a730e87f2393fe0d0909bbaa1bcfb2abccc6ddc9e8872bd25079421c
                        • Instruction ID: 09a57f93178dd77aaba0dbba76668d0339afe2d3e986657785f8fe2a9522f64f
                        • Opcode Fuzzy Hash: e4700a14a730e87f2393fe0d0909bbaa1bcfb2abccc6ddc9e8872bd25079421c
                        • Instruction Fuzzy Hash: 32718471D09209BBFB018FE48C44FEF77B8BF86319F214219E908B7181E77459458BA1
                        APIs
                          • Part of subcall function 6D0049E0: GetVolumeInformationA.KERNEL32(?,?,00000105,00000000,00000000,00000000,00000000,00000000), ref: 6D004A94
                        • GetVolumePathNamesForVolumeNameA.KERNEL32(?,00000000,00000000,00000000), ref: 6D004F0C
                        • GetVolumePathNamesForVolumeNameA.KERNEL32(?,00000000,-00000104,00000000), ref: 6D004F46
                        • OmCancelDownload.LIBOMAPI(?,?,6D02CD18,?,?,?,?,73BCE995), ref: 6D00518A
                        Strings
                        • DISK-SERIAL, xrefs: 6D004DE1, 6D004DEC
                        • WARNING: Ignoring removed device with invalid serial number %u, xrefs: 6D005156
                        • %s\AX3_%05u\, xrefs: 6D004EB3
                        • DEBUG: Device removed: #%u, xrefs: 6D005168
                        • C:\Mount, xrefs: 6D004E87
                        • %s\AX3_%07u\, xrefs: 6D004EC8
                        • ERROR: Problem detecting device path for device %d (mismatched volume at %s:%s%s%s) -- reconnect., xrefs: 6D004DFD
                        • VOLUME-LABEL, xrefs: 6D004DED, 6D004DF5
                        • DATA-FILE, xrefs: 6D004DCB, 6D004DE0
                        • 7a: Didn't set mount point... must run as an Administrator for re-mounting., xrefs: 6D005074
                        • %s\AX3_%010u\, xrefs: 6D004ECF
                        • DEBUG: callback for OM_DEVICE_REMOVED..., xrefs: 6D00519B
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Volume$NameNamesPath$CancelDownloadInformation
                        • String ID: DATA-FILE$ DISK-SERIAL$ VOLUME-LABEL$%s\AX3_%010u\$%s\AX3_%05u\$%s\AX3_%07u\$7a: Didn't set mount point... must run as an Administrator for re-mounting.$C:\Mount$DEBUG: Device removed: #%u$DEBUG: callback for OM_DEVICE_REMOVED...$ERROR: Problem detecting device path for device %d (mismatched volume at %s:%s%s%s) -- reconnect.$WARNING: Ignoring removed device with invalid serial number %u
                        • API String ID: 1437695475-3536749448
                        • Opcode ID: c8483bd0c4196d075a20363262cf685b7afd95f60ab9a199bb4392eecdf78172
                        • Instruction ID: b0321d91c46cc17d7cb5e9b416c77797e59ba36795f7692ca70bffc7008b5ce4
                        • Opcode Fuzzy Hash: c8483bd0c4196d075a20363262cf685b7afd95f60ab9a199bb4392eecdf78172
                        • Instruction Fuzzy Hash: 4CC1E471A05219BFFB10CB24CC55FFE77B8AF4A304F4441E9EA0897186E7719A85CBA1
                        APIs
                        • GetVolumeInformationA.KERNEL32(?,?,00000105,00000000,00000000,00000000,00000000,00000000), ref: 6D004A94
                        • __fread_nolock.LIBCMT ref: 6D004BC7
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: InformationVolume__fread_nolock
                        • String ID: (none)$- CWA FILE = %u%s$- DISK SERIAL: [0x%04x=%d 0x%04x=%d] %u // FSIO-SERIAL: [0x%04x=%d 0x%04x=%d] %u$- MISMATCH: Data file$- MISMATCH: Disk serial$- MISMATCH: Volume$- VOLUME NAME: %s = %u (last-7: %u)$- fail$A$CWA-DATA.CWA$D$M$VOLUME LABEL FOR: #%u %s$X
                        • API String ID: 3086070685-3505455261
                        • Opcode ID: 8aa9a72c0a6e538f9cfaba1eb12dfb0ebfa8178f883bdab1ff8d79f57bd5a765
                        • Instruction ID: 37f5f483801c9c377498fe96210444d83d7f898edc6758a4e38588ed1c59f9e4
                        • Opcode Fuzzy Hash: 8aa9a72c0a6e538f9cfaba1eb12dfb0ebfa8178f883bdab1ff8d79f57bd5a765
                        • Instruction Fuzzy Hash: BC917F70D042193FFB24CA648C99FFE77E59F95305F0041A9E548A71C2D6B5EA448BA8
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 6D020833
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020B47
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020B59
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020B6B
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020B7D
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020B8F
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BA1
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BB3
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BC5
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BD7
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BE9
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020BFB
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020C0D
                          • Part of subcall function 6D020B2A: _free.LIBCMT ref: 6D020C1F
                        • _free.LIBCMT ref: 6D020828
                          • Part of subcall function 6D01B556: HeapFree.KERNEL32(00000000,00000000,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950), ref: 6D01B56C
                          • Part of subcall function 6D01B556: GetLastError.KERNEL32(6D009950,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950,6D009950), ref: 6D01B57E
                        • _free.LIBCMT ref: 6D02084A
                        • _free.LIBCMT ref: 6D02085F
                        • _free.LIBCMT ref: 6D02086A
                        • _free.LIBCMT ref: 6D02088C
                        • _free.LIBCMT ref: 6D02089F
                        • _free.LIBCMT ref: 6D0208AD
                        • _free.LIBCMT ref: 6D0208B8
                        • _free.LIBCMT ref: 6D0208F0
                        • _free.LIBCMT ref: 6D0208F7
                        • _free.LIBCMT ref: 6D020914
                        • _free.LIBCMT ref: 6D02092C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 9b74c93956838852dd5cbe7f521d3bb4443e569943a76073a4eef92fc28bc5a9
                        • Instruction ID: 7b854771d33f651c13a2ad50a7a4d72ff8a8bc3034513c2115505c0dc7dfa117
                        • Opcode Fuzzy Hash: 9b74c93956838852dd5cbe7f521d3bb4443e569943a76073a4eef92fc28bc5a9
                        • Instruction Fuzzy Hash: 2E314D3160D3069FFB209B7AEC54B6BB3E8EF01355F114429E599D7260DB71E980CB64
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000003E8,d:\newcastle\projects\openmovement\software\om\omapi\src\omapi-download.c,000000F8,OmBeginDownloadingReference,?), ref: 6D00A184
                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 6D00A1E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ObjectSingleWait
                        • String ID: &om.downloadMutex$<unknown>$LOCK: #%d %.0s:%d %s() mutex_lock(%s) 0x%8x=%s @%d$LOCK: #%d %.0s:%d %s() mutex_lock(%s) called$LOCK: #%d %.0s:%d %s() mutex_lock(%s) complete$WAIT_ABANDONED$WAIT_FAILED$WAIT_TIMEOUT
                        • API String ID: 24740636-3534622342
                        • Opcode ID: 5c4cd8982e3783aa70622a48c9488fc27fb0f9a48c847e300db903e4c5ad614f
                        • Instruction ID: 1759c7d1c1168e848f88cdad5812cd8a78fcba5ca96d14947b04827a23ddfcbd
                        • Opcode Fuzzy Hash: 5c4cd8982e3783aa70622a48c9488fc27fb0f9a48c847e300db903e4c5ad614f
                        • Instruction Fuzzy Hash: 74117C31A45109BBFF114E55CC44FEF7A6DEF86364F244165FA0C9B1A1E6328E2097B2
                        APIs
                        • OmCommand.LIBOMAPI(?,FORMAT WC,?,00000100,COMMIT,00003A98,?,0000000A), ref: 6D00C316
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: CLEAR DATA$FORMAT QC$FORMAT WC$commit$&om.downloadMutex$COMMIT$OmQueryDownload$d:\newcastle\projects\openmovement\software\om\omapi\src\omapi-download.c
                        • API String ID: 1098371912-1599585143
                        • Opcode ID: b6aa10443bbb8dc724735c7b24551109ef056036072975f18839a3ee84861c4e
                        • Instruction ID: 834b18b30032497e520fb46721a834c7610a38df4a0a7702785ee0696f2522be
                        • Opcode Fuzzy Hash: b6aa10443bbb8dc724735c7b24551109ef056036072975f18839a3ee84861c4e
                        • Instruction Fuzzy Hash: D6311D31B08109A7F7148AA99850BBD73B4DFCB314F15426EF91DAB6C0EB709D8187E5
                        Strings
                        • d:\newcastle\projects\openmovement\software\om\omapi\src\omapi-download.c, xrefs: 6D009EB6, 6D009EEB
                        • &om.downloadMutex, xrefs: 6D009EBB, 6D009ED0
                        • OmWaitForDownload() started., xrefs: 6D009E58
                        • OmWaitForDownload() checking status..., xrefs: 6D009F40
                        • OmQueryDownload, xrefs: 6D009EAC, 6D009EE1
                        • OmWaitForDownload() waiting for download thread to terminate..., xrefs: 6D009F23
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID: &om.downloadMutex$OmQueryDownload$OmWaitForDownload() checking status...$OmWaitForDownload() started.$OmWaitForDownload() waiting for download thread to terminate...$d:\newcastle\projects\openmovement\software\om\omapi\src\omapi-download.c
                        • API String ID: 0-3166028405
                        • Opcode ID: cd4c5ce70c73c0d012c4528cc01d195947c45d87cd8d9a75f595c1333fc9b442
                        • Instruction ID: a9951c937110cbaf1cbbd64be609069262d96e7d4b2357f8def73371197931d3
                        • Opcode Fuzzy Hash: cd4c5ce70c73c0d012c4528cc01d195947c45d87cd8d9a75f595c1333fc9b442
                        • Instruction Fuzzy Hash: B131D835A05205BBF7108F65E840F7A77F89F85714F194159E92C9B290E731EE41C7E1
                        APIs
                        • OmCommand.LIBOMAPI(?,HIBERNATE,?,00000100,HIBERNATE=,000007D0,?,00000002), ref: 6D00BF6D
                        • OmDateTimeFromString.LIBOMAPI(?), ref: 6D00BF88
                        • OmCommand.LIBOMAPI(?,STOP,?,00000100,STOP=,000007D0,?,00000002), ref: 6D00BFB9
                        • OmDateTimeFromString.LIBOMAPI(?), ref: 6D00BFD4
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: CommandDateFromStringTime
                        • String ID: HIBERNATE$STOP$HIBERNATE=$STOP=
                        • API String ID: 1572727159-347550760
                        • Opcode ID: d979722e196a0971150d5b508c3ca037cda17cb2b42db2e2369726b05cc05135
                        • Instruction ID: 6f62a0f235c3ffda5323fc9ef16ebc24164481ea66209d441c36fbd13d1510d0
                        • Opcode Fuzzy Hash: d979722e196a0971150d5b508c3ca037cda17cb2b42db2e2369726b05cc05135
                        • Instruction Fuzzy Hash: 33215071E0421ABBFB108E669C41BF973A89F59714F1041A5FE48E7581EBB1EE808FD1
                        APIs
                          • Part of subcall function 6D018E13: CreateFileW.KERNEL32(00000000,00000000,?,6D019206,?,?,00000000,?,6D019206,00000000,0000000C), ref: 6D018E30
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D00B191), ref: 6D019271
                        • __dosmaperr.LIBCMT ref: 6D019278
                        • GetFileType.KERNEL32(00000000), ref: 6D019284
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D00B191), ref: 6D01928E
                        • __dosmaperr.LIBCMT ref: 6D019297
                        • CloseHandle.KERNEL32(00000000), ref: 6D0192B7
                        • CloseHandle.KERNEL32(?), ref: 6D019401
                        • GetLastError.KERNEL32 ref: 6D019433
                        • __dosmaperr.LIBCMT ref: 6D01943A
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID:
                        • API String ID: 4237864984-0
                        • Opcode ID: 0163b62ea12d1aab97bba0a9ecffcba9dc8cb2c6545eb9467c48debeec49daa6
                        • Instruction ID: 554b450ba63b0840b48203222dc28f8878e4afa9ddb0ddfe7e24cac5cdd7cc92
                        • Opcode Fuzzy Hash: 0163b62ea12d1aab97bba0a9ecffcba9dc8cb2c6545eb9467c48debeec49daa6
                        • Instruction Fuzzy Hash: 0EA12332E1C1558FEF19DFB8DC95BAE3BF1AB0B324F150159E8219B291DB308916CB91
                        APIs
                        • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,6D02329F,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 6D023072
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,6D02329F,00000000,00000000,?,00000001,?,?,?,?), ref: 6D0230F5
                        • __alloca_probe_16.LIBCMT ref: 6D02312D
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,6D02329F,?,6D02329F,00000000,00000000,?,00000001,?,?,?,?), ref: 6D023188
                        • __alloca_probe_16.LIBCMT ref: 6D0231D7
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,6D02329F,00000000,00000000,?,00000001,?,?,?,?), ref: 6D02319F
                          • Part of subcall function 6D01B961: HeapAlloc.KERNEL32(00000000,00000000,6D009950,?,6D01D394,00000000,?,00000000,00000000,000000FF,00000000,00000000), ref: 6D01B993
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,6D02329F,00000000,00000000,?,00000001,?,?,?,?), ref: 6D02321B
                        • __freea.LIBCMT ref: 6D023246
                        • __freea.LIBCMT ref: 6D023252
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                        • String ID:
                        • API String ID: 3256262068-0
                        • Opcode ID: 403596a1420583d4bc5c7d129d8a297c85779d3df267c9783f1627fca5506601
                        • Instruction ID: 7a9824cbefc42587193e834e4de0035a66470e188bc1d9b67e05784a1669e3f6
                        • Opcode Fuzzy Hash: 403596a1420583d4bc5c7d129d8a297c85779d3df267c9783f1627fca5506601
                        • Instruction Fuzzy Hash: DB91F171E062179AFF158EA4CC91BEE7BF5AF0E710F14452EEA10E7180D725D849CB60
                        APIs
                        • __fread_nolock.LIBCMT ref: 6D00B1D6
                        • OmReaderDataBlockSeek.LIBOMAPI(00000000,00000000), ref: 6D00B2D7
                        • OmReaderNextBlock.LIBOMAPI(00000000,00000000,00000000), ref: 6D00B2DD
                        • OmReaderTimestamp.LIBOMAPI(00000000,00000000,00000000), ref: 6D00B2F9
                        • OmReaderDataBlockSeek.LIBOMAPI(00000000,?), ref: 6D00B33C
                        • OmReaderNextBlock.LIBOMAPI(00000000,00000000,?), ref: 6D00B342
                        • OmReaderDataBlockSeek.LIBOMAPI(00000000,00000000), ref: 6D00B35A
                        • OmReaderTimestamp.LIBOMAPI(00000000,-00000001,00000000), ref: 6D00B370
                        • OmReaderDataBlockSeek.LIBOMAPI(00000000,00000000), ref: 6D00B381
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Reader$Block$DataSeek$NextTimestamp$__fread_nolock
                        • String ID:
                        • API String ID: 480906324-0
                        • Opcode ID: b5554cc93367395d2ba77993e7a18ac122de2a5e5c58376511d167d5ac8d4732
                        • Instruction ID: 635ac16c866900c39ce699600b786b35307ec8c4d383397623aa839132bacba0
                        • Opcode Fuzzy Hash: b5554cc93367395d2ba77993e7a18ac122de2a5e5c58376511d167d5ac8d4732
                        • Instruction Fuzzy Hash: 915135F29082156BFB108E689CC17BA7BD8EF01304F1841B9EE9D9F287E7B4814487B0
                        APIs
                        • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,6D00E18D), ref: 6D00A813
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: MutexRelease
                        • String ID: &om.portMutex$OmPortRelease$UNLOCK: #%d %.0s:%d %s() mutex_unlock(%s) called$UNLOCK: #%d %.0s:%d %s() mutex_unlock(%s) complete$UNLOCK: #%d %.0s:%d %s() mutex_unlock(%s) failed$d:\newcastle\projects\openmovement\software\om\omapi\src\omapi-internal.c
                        • API String ID: 1638419-1776799954
                        • Opcode ID: 76eee3323ecf4f4c4a1d25e45c0d928321244e59b3e9f4079d44646425a155ce
                        • Instruction ID: 49b7e409f5f198074c7c2757b58e0a7d83377a35fac3b05fb067d430f32510df
                        • Opcode Fuzzy Hash: 76eee3323ecf4f4c4a1d25e45c0d928321244e59b3e9f4079d44646425a155ce
                        • Instruction Fuzzy Hash: 2111E571B06A027BF6116A289C14F3B3AB89FC1618F254221F61CDB6D7D760DC0186F1
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,7FFFFFFF,6D00B193,?,?,?,6D02113F,00000001,00000001,6A000001), ref: 6D020F48
                        • __alloca_probe_16.LIBCMT ref: 6D020F80
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,6D02113F,00000001,00000001,6A000001,6D00B191,?,?), ref: 6D020FCE
                        • __alloca_probe_16.LIBCMT ref: 6D021065
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,6D00B191,6A000001,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 6D0210C8
                        • __freea.LIBCMT ref: 6D0210D5
                          • Part of subcall function 6D01B961: HeapAlloc.KERNEL32(00000000,00000000,6D009950,?,6D01D394,00000000,?,00000000,00000000,000000FF,00000000,00000000), ref: 6D01B993
                        • __freea.LIBCMT ref: 6D0210DE
                        • __freea.LIBCMT ref: 6D021103
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
                        • String ID:
                        • API String ID: 2597970681-0
                        • Opcode ID: 9fc5edba4efd1c5bae0a0b58da8f86e4d2f3a4bb23c37e79dfc29143e920b82c
                        • Instruction ID: 6bc7815f71299d7b1e57536824fd1da6e318663a3ba8f9a79714ca6c6eb08872
                        • Opcode Fuzzy Hash: 9fc5edba4efd1c5bae0a0b58da8f86e4d2f3a4bb23c37e79dfc29143e920b82c
                        • Instruction Fuzzy Hash: 3B511F72606247ABFB258EA6CC80FBF77AAEB45750F114629FD04D7180DBB2DC808661
                        APIs
                        • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,6D01A5AB,6D0204E4,00000000,00000000,00000000,00000000,00000000), ref: 6D019E78
                        • __fassign.LIBCMT ref: 6D019EF3
                        • __fassign.LIBCMT ref: 6D019F0E
                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 6D019F34
                        • WriteFile.KERNEL32(?,00000000,00000000,6D01A5AB,00000000,?,?,?,?,?,?,?,?,?,6D01A5AB,6D0204E4), ref: 6D019F53
                        • WriteFile.KERNEL32(?,6D0204E4,00000001,6D01A5AB,00000000,?,?,?,?,?,?,?,?,?,6D01A5AB,6D0204E4), ref: 6D019F8C
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 4fe319c7b05c7c16306edd11707d5952bb3a0cf9cf9ec3fef166d109fda9ca3e
                        • Instruction ID: 629e4ed9cd9c3486799507e11ada53f94eca824d65993d763e8fd3eb7f1add7c
                        • Opcode Fuzzy Hash: 4fe319c7b05c7c16306edd11707d5952bb3a0cf9cf9ec3fef166d109fda9ca3e
                        • Instruction Fuzzy Hash: 4B519F75A04249AFEB10CFE9D841BEEBBF8BF09310F14415AE565E7281E7709941CB61
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 6D00FCFB
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6D00FD03
                        • _ValidateLocalCookies.LIBCMT ref: 6D00FD91
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6D00FDBC
                        • _ValidateLocalCookies.LIBCMT ref: 6D00FE11
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 8e75d6d0c8e00e66cf80f65cb7d82a33bf4d807ab8483c532fa9dc607c45f26f
                        • Instruction ID: 2f3fdd93ffe34e7b76f2a22ea191a95e36c92e62dbbf52c3e2d1e88699fee796
                        • Opcode Fuzzy Hash: 8e75d6d0c8e00e66cf80f65cb7d82a33bf4d807ab8483c532fa9dc607c45f26f
                        • Instruction Fuzzy Hash: F941B534E08209ABEF00DF68CC44BAEBFFAAF45318F118156E9149B291D771DA11CBD5
                        APIs
                          • Part of subcall function 6D020C91: _free.LIBCMT ref: 6D020CBA
                        • _free.LIBCMT ref: 6D020D1B
                          • Part of subcall function 6D01B556: HeapFree.KERNEL32(00000000,00000000,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950), ref: 6D01B56C
                          • Part of subcall function 6D01B556: GetLastError.KERNEL32(6D009950,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950,6D009950), ref: 6D01B57E
                        • _free.LIBCMT ref: 6D020D26
                        • _free.LIBCMT ref: 6D020D31
                        • _free.LIBCMT ref: 6D020D85
                        • _free.LIBCMT ref: 6D020D90
                        • _free.LIBCMT ref: 6D020D9B
                        • _free.LIBCMT ref: 6D020DA6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 3f82e07238ead881142fa9c3aefd4cdb53c88ea02e52f086d5cfb788392a73d9
                        • Instruction ID: 4d69ecb361484d9e50d2c023520c7c598f906dd84cdafbeb589db7bff2db291b
                        • Opcode Fuzzy Hash: 3f82e07238ead881142fa9c3aefd4cdb53c88ea02e52f086d5cfb788392a73d9
                        • Instruction Fuzzy Hash: B81193B194DB08BAF630ABB1CC56FDB779C9F01704F420814BBD967290DBB4B5049754
                        APIs
                        • GetLastError.KERNEL32(00000001,?,6D0100AA,6D00ED30,6D00E946,?,6D00EB63,?,00000001,?,?,00000001,?,6D02F458,0000000C,6D00EC57), ref: 6D0101AF
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D0101BD
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D0101D6
                        • SetLastError.KERNEL32(00000000,6D00EB63,?,00000001,?,?,00000001,?,6D02F458,0000000C,6D00EC57,?,00000001,?), ref: 6D010228
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 4cbb5893fe33c2f580c8cb4787377b78f8357b3f1c124d77bcefe0aca4739a4c
                        • Instruction ID: 233420c8764ee98994128d2eb03514bd7a9b638c5f044c8b60f1eda8142551e8
                        • Opcode Fuzzy Hash: 4cbb5893fe33c2f580c8cb4787377b78f8357b3f1c124d77bcefe0aca4739a4c
                        • Instruction Fuzzy Hash: 7401473220D7139EBB2517F6ACC4B6F26B4EB0A3BA7320229F760531D4EF6548114551
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,6D017E21,00000000,?,6D017DC1,00000000,6D02F7D8,0000000C,6D017F09,00000000,00000002), ref: 6D017E90
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D017EA3
                        • FreeLibrary.KERNEL32(00000000,?,?,?,6D017E21,00000000,?,6D017DC1,00000000,6D02F7D8,0000000C,6D017F09,00000000,00000002), ref: 6D017EC6
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 1185a7d6cf3b81c3bb545b4ce5c9777fd493406b4eed6db3c8603187f2a66aed
                        • Instruction ID: c9a746f6a2a84906b171a56e4c123666f7d1acf74ad3c663edc3371b2a48951f
                        • Opcode Fuzzy Hash: 1185a7d6cf3b81c3bb545b4ce5c9777fd493406b4eed6db3c8603187f2a66aed
                        • Instruction Fuzzy Hash: C5F04F34D05119BBEF019F94CC0ABAE7FF8EF89311F1000A8F805A3290DB308D44CA91
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0a5a4d21b5ea7b1fc3c592967e81c6cd4396b17a67472348f98b83531f0e1bb
                        • Instruction ID: 7e72933d8dd6edf29be931687b5f148cebfdfd950e7ed6305c67067a74f3ea4d
                        • Opcode Fuzzy Hash: e0a5a4d21b5ea7b1fc3c592967e81c6cd4396b17a67472348f98b83531f0e1bb
                        • Instruction Fuzzy Hash: 9271BE75E08257ABEB11CFD4CC84BBEBBB5EF49328F214269E524572A0D770C945C7A0
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: fc6aa8195af976983d1b55f5b1ed0f3339111568da46439f49d8a4b4e43a10b6
                        • Instruction ID: 4b9c0be1382104e238e4c672ea8033c7fb3375e9676a329d02f42a51ab800160
                        • Opcode Fuzzy Hash: fc6aa8195af976983d1b55f5b1ed0f3339111568da46439f49d8a4b4e43a10b6
                        • Instruction Fuzzy Hash: F241C336A04200AFEB14CFB8CD84B5DB7F6EF89714B164668E615EB341E731EA01DB40
                        APIs
                        • MultiByteToWideChar.KERNEL32(6D00B191,00000000,6A000001,6D00B193,00000000,00000000,6D00B193,?,7FFFFFFF,6D00B191,00000001,6D00B193,6A000001,00000001,6D00B193,6D00B193), ref: 6D020DFE
                        • __alloca_probe_16.LIBCMT ref: 6D020E36
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 6D020E87
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6D020E99
                        • __freea.LIBCMT ref: 6D020EA2
                          • Part of subcall function 6D01B961: HeapAlloc.KERNEL32(00000000,00000000,6D009950,?,6D01D394,00000000,?,00000000,00000000,000000FF,00000000,00000000), ref: 6D01B993
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                        • String ID:
                        • API String ID: 1857427562-0
                        • Opcode ID: 6b1766ce8e90936c9a3ada8891f6e195e5d6898f5d47a44a2f1e582688afea19
                        • Instruction ID: 4b60a77b9f0ccacdf6fd472c12bcfc317cf6fb699e52585214eca79b6524e3b7
                        • Opcode Fuzzy Hash: 6b1766ce8e90936c9a3ada8891f6e195e5d6898f5d47a44a2f1e582688afea19
                        • Instruction Fuzzy Hash: 4B31FE32A0520AABEF148F66CC90FBE3BA9EB44360F014168FD14DB250E735C890CB90
                        APIs
                        • _free.LIBCMT ref: 6D020C40
                          • Part of subcall function 6D01B556: HeapFree.KERNEL32(00000000,00000000,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950), ref: 6D01B56C
                          • Part of subcall function 6D01B556: GetLastError.KERNEL32(6D009950,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950,6D009950), ref: 6D01B57E
                        • _free.LIBCMT ref: 6D020C52
                        • _free.LIBCMT ref: 6D020C64
                        • _free.LIBCMT ref: 6D020C76
                        • _free.LIBCMT ref: 6D020C88
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 0c2be40064ce0cf99f808a88a292fdd1f99333c9d5b5dd1d870a56aa1d8884a4
                        • Instruction ID: edbaf15b1581d5e4bfdaf607d1c8345ea46450b11ca6d08a98f7844f926a2b42
                        • Opcode Fuzzy Hash: 0c2be40064ce0cf99f808a88a292fdd1f99333c9d5b5dd1d870a56aa1d8884a4
                        • Instruction Fuzzy Hash: 50F04FB540D3465BEB30DB99E9C5F2B73E9AB063113620805F118D7740C730F9804AA9
                        APIs
                        • _free.LIBCMT ref: 6D01896C
                          • Part of subcall function 6D01B556: HeapFree.KERNEL32(00000000,00000000,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950), ref: 6D01B56C
                          • Part of subcall function 6D01B556: GetLastError.KERNEL32(6D009950,?,6D020CBF,6D009950,00000000,6D009950,00000000,?,6D020CE6,6D009950,00000007,6D009950,?,6D020987,6D009950,6D009950), ref: 6D01B57E
                        • _free.LIBCMT ref: 6D01897E
                        • _free.LIBCMT ref: 6D018991
                        • _free.LIBCMT ref: 6D0189A2
                        • _free.LIBCMT ref: 6D0189B3
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 3cbd4d9786637752ceca40ff340b9fdf7c679cc74e6dbad3d355a552affebb37
                        • Instruction ID: 7dc050887b1db5eec2a4821fcba886c90f463cd13a1ab3af002135ed87c4b951
                        • Opcode Fuzzy Hash: 3cbd4d9786637752ceca40ff340b9fdf7c679cc74e6dbad3d355a552affebb37
                        • Instruction Fuzzy Hash: E3F0B77980C6639B9F315F6AAC807583BB4E71B7253074506F520973A0C77507528FDA
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,RATE=,000007D0,?,0000000A), ref: 6D00CB31
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: RATE %u$RATE %u,%u$RATE=
                        • API String ID: 1098371912-922130091
                        • Opcode ID: 7097fbec40903604919b83214ffe4d9bce7302d01a427687b8d8ea0c83c12912
                        • Instruction ID: 02d92101335a89480a166435c26e3f0dbe4881091331ad5d84fe43ecadf44255
                        • Opcode Fuzzy Hash: 7097fbec40903604919b83214ffe4d9bce7302d01a427687b8d8ea0c83c12912
                        • Instruction Fuzzy Hash: D4512732E4810973FB14C97CCC407FE72A4EB87718F1442BAE91AD72D0DA658E8446B9
                        APIs
                        • _strpbrk.LIBCMT ref: 6D01ED9D
                        • _free.LIBCMT ref: 6D01EEBA
                          • Part of subcall function 6D01525A: IsProcessorFeaturePresent.KERNEL32(00000017,6D01522C,00000000,6D009950,?,?,?,6D009950,?,?,6D015239,00000000,00000000,00000000,00000000,00000000), ref: 6D01525C
                          • Part of subcall function 6D01525A: GetCurrentProcess.KERNEL32(C0000417,6D009950), ref: 6D01527E
                          • Part of subcall function 6D01525A: TerminateProcess.KERNEL32(00000000), ref: 6D015285
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                        • String ID: *?$.
                        • API String ID: 2812119850-3972193922
                        • Opcode ID: 7a2036c7dd5503ee6673448372b997ec4fdf1431a7a2d2b25c6861e2232aafca
                        • Instruction ID: 198db03956e3ed0ebc78933ce2cb74f79bbee1e80420fd68caec07dad81524ae
                        • Opcode Fuzzy Hash: 7a2036c7dd5503ee6673448372b997ec4fdf1431a7a2d2b25c6861e2232aafca
                        • Instruction Fuzzy Hash: CE515D76E0821AAFEB14CFE8CC80AADBBF5FF49314F258169D954E7740E7719A018B50
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe,00000104), ref: 6D017F54
                        • _free.LIBCMT ref: 6D01801F
                        • _free.LIBCMT ref: 6D018029
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Program Files (x86)\Open Movement\OM GUI\OmGui.exe
                        • API String ID: 2506810119-748945681
                        • Opcode ID: 6d2366273f8427eda2dae86711a95223bc41d8f48fdf278a2742063ddb7f28f8
                        • Instruction ID: 372fef33412cf8c7ffc8bd199629af122224e69422337f2c770d6532f48487b1
                        • Opcode Fuzzy Hash: 6d2366273f8427eda2dae86711a95223bc41d8f48fdf278a2742063ddb7f28f8
                        • Instruction Fuzzy Hash: AB313075E08259EFEB22CBD9DC84B9EBBF8EF86354B11405AE90497200D7708B408B91
                        APIs
                        • OmGetDevicePath.LIBOMAPI(?,?), ref: 6D009A10
                        • OmReaderOpen.LIBOMAPI(?), ref: 6D009A58
                        • OmReaderDataRange.LIBOMAPI(00000000,?,?,?,?,?), ref: 6D009A8F
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Reader$DataDeviceOpenPathRange
                        • String ID: CWA-DATA.CWA
                        • API String ID: 3733521012-341621345
                        • Opcode ID: 5084f89a8b257095fdaae72a9be3dbe628c3c9cd24afa465b86088cdb13c34b6
                        • Instruction ID: fdfcd9fb94c064e8eeffd815f65347e40a421634a3753e61032db5dc56668fdb
                        • Opcode Fuzzy Hash: 5084f89a8b257095fdaae72a9be3dbe628c3c9cd24afa465b86088cdb13c34b6
                        • Instruction Fuzzy Hash: DD31A275A08119AFEB11CF58DC40BDAB7F4EF4A304F1440A9E94897201E7729A41CFD1
                        APIs
                        • OmCommand.LIBOMAPI(?,TIME,?,00000100,$TIME=,000007D0,?,00000002), ref: 6D00D6E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: TIME$$TIME=
                        • API String ID: 1098371912-3115832756
                        • Opcode ID: 878b42cb9f980ea9edb41597cedb7701129e8adaec6ad88cd626cf85759021e1
                        • Instruction ID: ce3f8d66943c16777a7a55e9833a60947b19f66af7b609c9073b786cea634358
                        • Opcode Fuzzy Hash: 878b42cb9f980ea9edb41597cedb7701129e8adaec6ad88cd626cf85759021e1
                        • Instruction Fuzzy Hash: 2A118631E4411CA7FB10DF249C41BFD73A8DF59314F5142AAED49EB680EBB05A448BD1
                        APIs
                        • OmCommand.LIBOMAPI(?,LASTCHANGED,?,00000100,LASTCHANGED=,000007D0,?,00000002), ref: 6D00C7B9
                        • OmDateTimeFromString.LIBOMAPI(?), ref: 6D00C7E8
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: CommandDateFromStringTime
                        • String ID: LASTCHANGED$LASTCHANGED=
                        • API String ID: 1572727159-3681739171
                        • Opcode ID: 997e47e9b1b88e3f52f282039d840dc3013b46da0dc194bee2f85b2be068deba
                        • Instruction ID: eaf7731a9a001e2f86a99466e1db27be569827b04af394151c74b56b5d7023f1
                        • Opcode Fuzzy Hash: 997e47e9b1b88e3f52f282039d840dc3013b46da0dc194bee2f85b2be068deba
                        • Instruction Fuzzy Hash: 9201B931E4411D67FB10CB249C81BFD73A89F19314F414299A948E7180EB7099848FD1
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID:
                        • API String ID: 1036877536-0
                        • Opcode ID: 0874cdba27bdbc3456da5b1db72648c5459b124b3ef85f4c435538710fc9093b
                        • Instruction ID: 5838a87feaa5790515308bfa0b2c5285007463a7229116f464c5f6fd560589df
                        • Opcode Fuzzy Hash: 0874cdba27bdbc3456da5b1db72648c5459b124b3ef85f4c435538710fc9093b
                        • Instruction Fuzzy Hash: 1AA1217294C3869FF7128EA8CC917AEFBE5EF46354F184179E9859B281C338C941C798
                        APIs
                        • GetVolumePathNamesForVolumeNameW.KERNEL32(0000005C,00000000,00000106,00000105,6D02CD18,00000000,73BCE995,0000005C,00000000), ref: 6D00327E
                        • GetLastError.KERNEL32 ref: 6D003291
                        • GetVolumePathNamesForVolumeNameW.KERNEL32(?,00000000,00000106,00000105), ref: 6D0032D0
                        • __fassign.LIBCMT ref: 6D003324
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Volume$NameNamesPath$ErrorLast__fassign
                        • String ID:
                        • API String ID: 1348221759-0
                        • Opcode ID: ed5baf70840466d885b73fd9b3de489d42470ae6ce1fc0aa892d0d3f52bdd3b6
                        • Instruction ID: 855bd16987ff96ede099320e3be6ae79a0affe58d4dac1b44e9c9b7659dcff58
                        • Opcode Fuzzy Hash: ed5baf70840466d885b73fd9b3de489d42470ae6ce1fc0aa892d0d3f52bdd3b6
                        • Instruction Fuzzy Hash: 5561F6B1D04204ABFB14CF68DC85BAEB7B5EF49304F14812DE902A7291EB75A944CB91
                        APIs
                        • GetFileType.KERNEL32(00000000,00000000,00000000,00000000), ref: 6D015C87
                          • Part of subcall function 6D015FFA: __dosmaperr.LIBCMT ref: 6D01603D
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D015B90), ref: 6D015DB2
                        • __dosmaperr.LIBCMT ref: 6D015DB9
                        • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 6D015DF6
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: __dosmaperr$ErrorFileLastNamedPeekPipeType
                        • String ID:
                        • API String ID: 3955570002-0
                        • Opcode ID: 6851c45b58e88c1f089de04660ee80e7f7407ffac1fbd545b6cc73c6c70a886d
                        • Instruction ID: 426b994110eedd12ad051849ae431ddaddb35062898f39431892c596cc45419a
                        • Opcode Fuzzy Hash: 6851c45b58e88c1f089de04660ee80e7f7407ffac1fbd545b6cc73c6c70a886d
                        • Instruction Fuzzy Hash: 3D518A76D08609AFEB14CFE4CC49BBEB7F9FF49314B148929E566DB290E73098418B50
                        APIs
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: fcfa41b6afce55a7fc1301e8c4abdee8aa17481de78ade4deed0539d8d7e5d1b
                        • Instruction ID: c372a9b40e98d3e0ef84e0093e41a107e047440676683256f12e5642e023fa42
                        • Opcode Fuzzy Hash: fcfa41b6afce55a7fc1301e8c4abdee8aa17481de78ade4deed0539d8d7e5d1b
                        • Instruction Fuzzy Hash: 84411B71E0E3216BFB115BFA8C507AF3AE8FF47334F524215F61897290EB74854146A1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3646f348b9c619346c2bf73034b7024156fc2f529361f2943913368412e2daf5
                        • Instruction ID: f244104924e86b5e57de89da2c7e766d4477f35e3e003959f89dc63b71db18f4
                        • Opcode Fuzzy Hash: 3646f348b9c619346c2bf73034b7024156fc2f529361f2943913368412e2daf5
                        • Instruction Fuzzy Hash: 1B412B75E48304EFF7159FB8CC40BAA7BF8EBC9714F21862AE241DB280E7B195018780
                        APIs
                        • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,00000000,00000000,000000FF,?,?,00000000), ref: 6D015E48
                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 6D015E5C
                        • GetLastError.KERNEL32 ref: 6D015EA4
                        • __dosmaperr.LIBCMT ref: 6D015EAB
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Time$System$ErrorFileLastLocalSpecific__dosmaperr
                        • String ID:
                        • API String ID: 593088924-0
                        • Opcode ID: 9e205418b60b33eaa33a462d6d351f46faeb375a545dbc1d3e052c55c2a5e61a
                        • Instruction ID: 8b1d5de485ea72080a4bcfec5f3bf52e0eb0ad1cab6395826ada8fa3b45f848d
                        • Opcode Fuzzy Hash: 9e205418b60b33eaa33a462d6d351f46faeb375a545dbc1d3e052c55c2a5e61a
                        • Instruction Fuzzy Hash: EE21F976D08109ABEB04DAE4CD48BEE77FCBF09321F504266E615DB180DB34DA458BA1
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 6D010473
                          • Part of subcall function 6D0103C0: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 6D0103EF
                          • Part of subcall function 6D0103C0: ___AdjustPointer.LIBCMT ref: 6D01040A
                        • _UnwindNestedFrames.LIBCMT ref: 6D010488
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 6D010499
                        • CallCatchBlock.LIBVCRUNTIME ref: 6D0104C1
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: eb23b95905831b5fffec0f6dfd6375fbc78d73342de290a76073ff75c816097a
                        • Instruction ID: eb2d60eed38110f3ea77ea8faa3a9633492a520276c53d28c2e776959a94d3eb
                        • Opcode Fuzzy Hash: eb23b95905831b5fffec0f6dfd6375fbc78d73342de290a76073ff75c816097a
                        • Instruction Fuzzy Hash: 2601DB72108149BBEF115E96DC40EEB7B6DEF89758F054418FA5866120C732E8719BA1
                        APIs
                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,?,?,?,6D01D438,?,?,6D009950,?,?,6D01D533,00000000,AreFileApisANSI), ref: 6D01D4C3
                        • GetLastError.KERNEL32(?,00000000,00000800,?,?,?,?,6D01D438,?,?,6D009950,?,?,6D01D533,00000000,AreFileApisANSI), ref: 6D01D4CF
                        • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,00000000,00000800,?,?,?,?,6D01D438,?,?,6D009950), ref: 6D01D4DD
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: d01486af3d140afb4074108e45afb4dea346ba95033cfe294c3124c42a9be5b0
                        • Instruction ID: 82ca5e7e5b8ea33fa0bf5c33cd0c0b725ea54fff43d145aaee0d74dc554f6025
                        • Opcode Fuzzy Hash: d01486af3d140afb4074108e45afb4dea346ba95033cfe294c3124c42a9be5b0
                        • Instruction Fuzzy Hash: FC01D43665A233ABEB214BBC8C49B5B77B8BFC67657614620FD05D7240D724E800C6F0
                        APIs
                        • OmCommand.LIBOMAPI(?,RATE,?,00000100,RATE=,000007D0,?,0000000A), ref: 6D00C875
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: RATE$RATE=
                        • API String ID: 1098371912-3280130573
                        • Opcode ID: 85b2f5db3c0df8668d0d7b728321a0fbd493c86de0708c39a509894b7339615a
                        • Instruction ID: 83ae2ad6eeb51bf85d0d791c727d853086ae3d8557b4ab518f23c9f1efc9f534
                        • Opcode Fuzzy Hash: 85b2f5db3c0df8668d0d7b728321a0fbd493c86de0708c39a509894b7339615a
                        • Instruction Fuzzy Hash: A841B671F052196BFB10CB69DC90BEDB3E5DF49360F1142A5E94DE7284EB709E808BA0
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,?,000007D0,?,00000002), ref: 6D00C714
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: ANNOTATE%02d=$ANNOTATE%02d=
                        • API String ID: 1098371912-3061302589
                        • Opcode ID: d48e4c639ae6966879cb8d146f08dbee6113729ac49f16b48726e00602b7448c
                        • Instruction ID: b30809c0188b6c48d6edc972d35b2f832d5f9f830928bb4e31b564539aa3aed9
                        • Opcode Fuzzy Hash: d48e4c639ae6966879cb8d146f08dbee6113729ac49f16b48726e00602b7448c
                        • Instruction Fuzzy Hash: E131D731E44219ABFB24CE64DD80BEEB3F8EF49314F5042ADE949E7180DB715A45CBA0
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,?,000007D0,?,00000002,?,ANNOTATE%02d=,00000000,?,ANNOTATE%02d,00000000), ref: 6D00C575
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: ANNOTATE%02d$ANNOTATE%02d=
                        • API String ID: 1098371912-1841606361
                        • Opcode ID: 007f310c1eb193c1325adc26bf1dc69e570e3c2eca17420c0bec188d5250514f
                        • Instruction ID: 5db7f0387c3c5133f0375f5eb1fd259b2c9f1993ed24f565a98441bd6fb065d6
                        • Opcode Fuzzy Hash: 007f310c1eb193c1325adc26bf1dc69e570e3c2eca17420c0bec188d5250514f
                        • Instruction Fuzzy Hash: 2031B571E00218ABFB20CE65DC84BEDB7F8EF89315F5041AAD90DE7291DB309A448B90
                        APIs
                        • OmCommand.LIBOMAPI(?,SAMPLE 1,?,00000100,$BATT=,000007D0,?,0000000A), ref: 6D00D1D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: SAMPLE 1$$BATT=
                        • API String ID: 1098371912-3527989080
                        • Opcode ID: bf68575cebe3775af4c17662a2546cd90cbd2ac48ce8365db827cdc37acbe26c
                        • Instruction ID: a81d8268521286905b2a39d048d8ce73987228bc2b37a0ae5bcca5e6427df50d
                        • Opcode Fuzzy Hash: bf68575cebe3775af4c17662a2546cd90cbd2ac48ce8365db827cdc37acbe26c
                        • Instruction Fuzzy Hash: 5D310B32E4822CA6FF2086659D517FDB2A4DF56350F1142B6ED08F75C0EA25CE908BE1
                        APIs
                        • OmCommand.LIBOMAPI(?,SAMPLE 5,?,00000100,$ACCEL=,000007D0,?,0000000A), ref: 6D00D614
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: SAMPLE 5$$ACCEL=
                        • API String ID: 1098371912-1166773783
                        • Opcode ID: 8f4dd47bfe226a859d9823a91e988bc934d5f9d72066f9596d46a1a067f88977
                        • Instruction ID: d3ee070197df1eac122b651a0091754faa39d8de582f222b41f0874c74579ef6
                        • Opcode Fuzzy Hash: 8f4dd47bfe226a859d9823a91e988bc934d5f9d72066f9596d46a1a067f88977
                        • Instruction Fuzzy Hash: 7C21CF71E04209ABFB11CF65DC41BE9B3F4AF5A314F0102E9E90CA7190EB719AA0CF91
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,$TIME=,000007D0,?,00000002,?,TIME %04u-%02u-%02u %02u:%02u:%02u,?,?,?,?,?,73BCE995), ref: 6D00D7DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: TIME %04u-%02u-%02u %02u:%02u:%02u$$TIME=
                        • API String ID: 1098371912-604382393
                        • Opcode ID: 7ac687c544e2f70ff3fa34d103424fb60953c87ed80e29c902d61ca9d4b87b7b
                        • Instruction ID: 1816c842fa04ae11dd21936e9908a1d688167d6a4e62d1f2172a46823d368f31
                        • Opcode Fuzzy Hash: 7ac687c544e2f70ff3fa34d103424fb60953c87ed80e29c902d61ca9d4b87b7b
                        • Instruction Fuzzy Hash: 4D1188B2E1010C7BE758C668CC42FFE73AC9B1C300F40026AF91DE7581EA74DA459B91
                        APIs
                        • OmCommand.LIBOMAPI(?,MAXSAMPLES,?,00000100,MAXSAMPLES=,000007D0,?,0000000A), ref: 6D00CCC7
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: MAXSAMPLES$MAXSAMPLES=
                        • API String ID: 1098371912-1163244196
                        • Opcode ID: 60a4d1d87b9efa0e3b7c059b29b44a10adeae5de1e0e32da9046c39a13242903
                        • Instruction ID: eae64831a62a54ec633395812f83bedc82225a2dcafc9fa23871337a98377e67
                        • Opcode Fuzzy Hash: 60a4d1d87b9efa0e3b7c059b29b44a10adeae5de1e0e32da9046c39a13242903
                        • Instruction Fuzzy Hash: 27118231E4421CA7FB10DB649C41BFDB3B89F59314F1142DAED49EB280EB706A908BD1
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,LOCK=,000007D0,?,0000000A,?,UNLOCK %d,?), ref: 6D00D9D5
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: UNLOCK %d$LOCK=
                        • API String ID: 1098371912-2081717695
                        • Opcode ID: 6839f8e2e9a1788d6662b45c5ec0c62307cb358cb431aca8038b21869f70b0c2
                        • Instruction ID: d7a96fc0fc4146cade979f86b3035f1adecc1a1abcc2bd6873d1cbf209e92de6
                        • Opcode Fuzzy Hash: 6839f8e2e9a1788d6662b45c5ec0c62307cb358cb431aca8038b21869f70b0c2
                        • Instruction Fuzzy Hash: 04118F71E4810CAAFB50DB64CC41BFD73B89F1A314F1142D9F94DEB190EB71AA948BA1
                        APIs
                        • OmCommand.LIBOMAPI(?,lock,?,00000100,LOCK=,000007D0,?,0000000A), ref: 6D00D867
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: lock$LOCK=
                        • API String ID: 1098371912-2458490141
                        • Opcode ID: 33ef95e584aae676935d5691bea527a83c75781187cec847029cf7ebc5259cfa
                        • Instruction ID: ea77031e7db9471d47093afeb5ffe0692bcae9768da64f9ec1387a407a083081
                        • Opcode Fuzzy Hash: 33ef95e584aae676935d5691bea527a83c75781187cec847029cf7ebc5259cfa
                        • Instruction Fuzzy Hash: C3110831E4421DA7FB109B248C41BFD73B8DF59318F054299EE49EB281EB70AA948FD1
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,LED=,000007D0,?,0000000A,?,LED %d,?), ref: 6D00D563
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: LED %d$LED=
                        • API String ID: 1098371912-1559619084
                        • Opcode ID: f85f6f4255cdde8a97eec4c431095e59468e4d05b9d42097d0008e2639114cba
                        • Instruction ID: 9e3fc01b5fa9f1d9c451f57d83bd602882e4f46fc38ea6aef4fddc3ddc87b52d
                        • Opcode Fuzzy Hash: f85f6f4255cdde8a97eec4c431095e59468e4d05b9d42097d0008e2639114cba
                        • Instruction Fuzzy Hash: 0F113071E4420CAAFB10DB64CD41BFDB3B89F5D304F1182A5ED0DE6190EB71AA948BA1
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,MAXSAMPLES=,000007D0,?,0000000A,?,MAXSAMPLES %u,?), ref: 6D00CD93
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: MAXSAMPLES %u$MAXSAMPLES=
                        • API String ID: 1098371912-1988451946
                        • Opcode ID: 90c7ff23c18d6be54ea8325a0292c588a253a27e3fd7b19181702a8ac910f4c4
                        • Instruction ID: 0360abf2c9f5c832d7dee14547322320af1be31fd01d85aaaa701454353ff6d7
                        • Opcode Fuzzy Hash: 90c7ff23c18d6be54ea8325a0292c588a253a27e3fd7b19181702a8ac910f4c4
                        • Instruction Fuzzy Hash: 86118231E4420DAAFB10CF75CD40BED73B89F09304F018296BA0DE6190EB70AA948B95
                        APIs
                        • OmCommand.LIBOMAPI(?,?,?,00000100,SESSION=,000007D0,?,0000000A,?,SESSION %u,?), ref: 6D00C483
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: SESSION %u$SESSION=
                        • API String ID: 1098371912-3541579760
                        • Opcode ID: dbbc6a3d6bb10247104f5982fc63b4758c78b5d1cd1237dd5ef7cc67126b814e
                        • Instruction ID: d708b1bdf31e440b645be1e1470388155ce8922c7648747ae12448511243be41
                        • Opcode Fuzzy Hash: dbbc6a3d6bb10247104f5982fc63b4758c78b5d1cd1237dd5ef7cc67126b814e
                        • Instruction Fuzzy Hash: 35118E31E4420CAAFB10CF74CD80BFD73B89F1D304F018299B90DEA191EB71AA948B95
                        APIs
                        • OmCommand.LIBOMAPI(?,STATUS 2,?,00000100,BATTHEALTH=,000007D0,?,0000000A), ref: 6D00D4B3
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: Command
                        • String ID: STATUS 2$BATTHEALTH=
                        • API String ID: 1098371912-2118528183
                        • Opcode ID: 61a678066b82f8169f08fee12ce8a1f26159991e5d13f737430e17ec764c009b
                        • Instruction ID: c6037b405aad8a98c1653c2b1c5fd2d798e4998121d2ff6b95186218e5979f37
                        • Opcode Fuzzy Hash: 61a678066b82f8169f08fee12ce8a1f26159991e5d13f737430e17ec764c009b
                        • Instruction Fuzzy Hash: AA017170E4420CA7FB10CB619C41BFDB3B89F1A304F4142D9AE4CA6181EB706A908F91
                        APIs
                          • Part of subcall function 6D01671C: EnterCriticalSection.KERNEL32(0000001C,?,6D016850,00000001,6D02F6F0,0000001C,6D0191AD,?,6D00B191,00000000,00000000,00000000,6D02F880,00000010,6D019158,?), ref: 6D016737
                        • FlushFileBuffers.KERNEL32(00000000,6D02FA60,0000000C,6D01E89B,6D0310E0,6D0310E0,?,6D0310E0,?,000003E8), ref: 6D01E828
                        • GetLastError.KERNEL32 ref: 6D01E839
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                        • String ID: &om.downloadMutex
                        • API String ID: 4109680722-665916619
                        • Opcode ID: be4c15c8f0453143cd7eee2cc6abe60f231d520a0736774f49052ed8f28b4f49
                        • Instruction ID: 5e37e7a2651f8e317f8df5a6e6d179e3d494430b7792f71dabd996a3b457af31
                        • Opcode Fuzzy Hash: be4c15c8f0453143cd7eee2cc6abe60f231d520a0736774f49052ed8f28b4f49
                        • Instruction Fuzzy Hash: 0F01DF71E182019FEB00DFF8CC44B4D7BB9AF4A724B16420AE525DB2E1DB7499418B80
                        APIs
                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 6D00E6A2
                          • Part of subcall function 6D00E619: std::exception::exception.LIBCONCRT ref: 6D00E626
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 6D00E6B0
                          • Part of subcall function 6D00FE27: RaiseException.KERNEL32(?,?,?,6D00F090,?,76E82FA0,?,?,?,?,?,?,6D00F090,?,6D02F494), ref: 6D00FE87
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.1723737782.000000006D001000.00000020.00000001.01000000.00000017.sdmp, Offset: 6D000000, based on PE: true
                        • Associated: 00000010.00000002.1723685597.000000006D000000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1723955939.000000006D027000.00000002.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724049058.000000006D031000.00000004.00000001.01000000.00000017.sdmpDownload File
                        • Associated: 00000010.00000002.1724107549.000000006D033000.00000002.00000001.01000000.00000017.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_6d000000_OmGui.jbxd
                        Similarity
                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                        • String ID: Unknown exception
                        • API String ID: 1586462112-410509341
                        • Opcode ID: d206657f72c48defb3938d578c053874bd9739087d38c2c95929cbada278c72c
                        • Instruction ID: 05fdfcda8bcc81fae1f1e5979fd36ef71fa87fb2ac18f0f39d1f323ce4d30b7e
                        • Opcode Fuzzy Hash: d206657f72c48defb3938d578c053874bd9739087d38c2c95929cbada278c72c
                        • Instruction Fuzzy Hash: 33D0A738E0410877FB00DAA4D820B5C7B7C6F00288B9080A4AA44D7051F770E60587C0