Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1659984
MD5:7d41b083ab75ae56089f43076b4d4750
SHA1:9b7c2adca9999488f9386ab3bf66587c83c19002
SHA256:ce97912ff64a09437f2c37a836b8a9a7b3d53b7d4d6bc5779301c170a988b349
Infos:

Detection

Score:1
Range:0 - 100
Confidence:80%

Signatures

PE file contains executable resources (Code or Archives)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • setup.exe (PID: 6312 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: 7D41B083AB75AE56089F43076B4D4750)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: setup.exeStatic PE information: certificate valid
Source: Binary string: c:\P4\NIInstallers\trunk\16.0\src\MetaInstaller\Unicode_Release\setup.pdb source: setup.exe, 00000000.00000002.1276327822.00000000007E6000.00000040.00000001.01000000.00000003.sdmp
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://apache.org/xml/UknownNSUCS4UCS-4UCS_4UCS-4
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://apache.org/xml/features/dom/byte-order-markformat-pretty-print
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://apache.org/xml/messages/XML4CErrors#FIXEDEBCDIC-CP-USIBM037IBM1047IBM-1047IBM1140IBM01140CCSI
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://apache.org/xml/messages/XMLValidityWINDOWS-1252XERCES-XMLCHxmlxml
Source: setup.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: setup.exe, 00000000.00000002.1276327822.00000000008E9000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://digital.ni.com/express.nsf/bycode/WinFastStartup
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://digital.ni.com/express.nsf/bycode/WinFastStartupSOFTWARE
Source: setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://digital.ni.com/express.nsf/bycode/exke86
Source: setup.exeString found in binary or memory: http://ocsp.thawte.com0
Source: setup.exeString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: setup.exeString found in binary or memory: http://s.symcd.com0_
Source: setup.exeString found in binary or memory: http://sw.symcb.com/sw.crl0f
Source: setup.exeString found in binary or memory: http://sw.symcd.com0
Source: setup.exeString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: setup.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: setup.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: setup.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: setup.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: setup.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: setup.exeString found in binary or memory: https://d.symcb.com/rpa0)
Source: setup.exeStatic PE information: Resource name: RT_DIALOG type: COM executable for DOS
Source: setup.exeStatic PE information: Resource name: RT_GROUP_CURSOR type: DOS executable (COM)
Source: setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: riched32.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
Source: setup.exeStatic PE information: certificate valid
Source: setup.exeStatic file information: File size 1471560 > 1048576
Source: setup.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x143a00
Source: Binary string: c:\P4\NIInstallers\trunk\16.0\src\MetaInstaller\Unicode_Release\setup.pdb source: setup.exe, 00000000.00000002.1276327822.00000000007E6000.00000040.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Software Packing
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1659984 Sample: setup.exe Startdate: 08/04/2025 Architecture: WINDOWS Score: 1 4 setup.exe 1 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
setup.exe0%VirustotalBrowse
setup.exe2%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://apache.org/xml/messages/XML4CErrors#FIXEDEBCDIC-CP-USIBM037IBM1047IBM-1047IBM1140IBM01140CCSIsetup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
    high
    http://apache.org/xml/UknownNSUCS4UCS-4UCS_4UCS-4setup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
      high
      http://crl.thawte.com/ThawteTimestampingCA.crl0setup.exefalse
        high
        http://apache.org/xml/features/dom/byte-order-markformat-pretty-printsetup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
          high
          http://ocsp.thawte.com0setup.exefalse
            high
            http://apache.org/xml/messages/XMLValidityWINDOWS-1252XERCES-XMLCHxmlxmlsetup.exe, 00000000.00000002.1276327822.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1659984
              Start date and time:2025-04-08 21:24:29 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 1m 52s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:setup.exe
              Detection:CLEAN
              Classification:clean1.winEXE@1/0@0/0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe, ShellExperienceHost.exe, SgrmBroker.exe, svchost.exe
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
              Entropy (8bit):7.907903047353753
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.39%
              • UPX compressed Win32 Executable (30571/9) 0.30%
              • Win32 EXE Yoda's Crypter (26571/9) 0.26%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              File name:setup.exe
              File size:1'471'560 bytes
              MD5:7d41b083ab75ae56089f43076b4d4750
              SHA1:9b7c2adca9999488f9386ab3bf66587c83c19002
              SHA256:ce97912ff64a09437f2c37a836b8a9a7b3d53b7d4d6bc5779301c170a988b349
              SHA512:5f9c3234a5c9bf9f63a11a4901d3a9b45d19ca5b7f66124213a7d57f099769dd28dd7d54080601ea51643f69dc5c271f01b3e26a4fed559846bd3fba69985bc7
              SSDEEP:24576:2uJYOwAqIRCQVIOZW3X5qFqxoLXtf++DQTKitrKeBEgLhJWHtbU4/R3gQS/LfzrU:ViA380E3nSA+DQ9rKeBNuNbF/RQQS/LM
              TLSH:0D653389DF14DAB2F6A5817F8457C6C59F71F88273E5CF8B6CA1AE4EB9F07026A01014
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l...(.pA(.pA(.pA-./A,.pA...A+.pA!..A..pA!..A..pA6..A+.pA.K.A..pA.K.A7.pA(.qA..pA!..A..pA!..A).pA6..A).pA!..A).pARich(.pA.......
              Icon Hash:a6a7b4b4a4e5e563
              Entrypoint:0x90a7c0
              Entrypoint Section:UPX1
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x575745F4 [Tue Jun 7 22:08:52 2016 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:ab8c7e344596e3e6d6c6a5375f98bde9
              Signature Valid:true
              Signature Issuer:CN=Symantec Class 3 Extended Validation Code Signing CA - G2, OU=Symantec Trust Network, O=Symantec Corporation, C=US
              Signature Validation Error:The operation completed successfully
              Error Number:0
              Not Before, Not After
              • 30/08/2015 20:00:00 30/08/2018 19:59:59
              Subject Chain
              • CN=National Instruments Corporation, O=National Instruments Corporation, L=Austin, S=Texas, C=US, SERIALNUMBER=2398688, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
              Version:3
              Thumbprint MD5:9C9D38965AAD7983928E390346E2AB1A
              Thumbprint SHA-1:D40EA2D10461CDCB7DBEA7534C73ECE315A5EAE9
              Thumbprint SHA-256:3FAB0D1BCA68CBE66AE47DC1522D44CDE49ADD376BEF0EBEABC5548EE010A7F7
              Serial:4447EEA22628B51A9983078B74068D9B
              Instruction
              pushad
              mov esi, 007C7000h
              lea edi, dword ptr [esi-003C6000h]
              push edi
              or ebp, FFFFFFFFh
              jmp 00007FD038F1C5D2h
              nop
              nop
              nop
              nop
              nop
              nop
              mov al, byte ptr [esi]
              inc esi
              mov byte ptr [edi], al
              inc edi
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              jc 00007FD038F1C5AFh
              mov eax, 00000001h
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              adc eax, eax
              add ebx, ebx
              jnc 00007FD038F1C5CDh
              jne 00007FD038F1C5EAh
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              jc 00007FD038F1C5E1h
              dec eax
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              adc eax, eax
              jmp 00007FD038F1C596h
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              adc ecx, ecx
              jmp 00007FD038F1C614h
              xor ecx, ecx
              sub eax, 03h
              jc 00007FD038F1C5D3h
              shl eax, 08h
              mov al, byte ptr [esi]
              inc esi
              xor eax, FFFFFFFFh
              je 00007FD038F1C637h
              sar eax, 1
              mov ebp, eax
              jmp 00007FD038F1C5CDh
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              jc 00007FD038F1C58Eh
              inc ecx
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              jc 00007FD038F1C580h
              add ebx, ebx
              jne 00007FD038F1C5C9h
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              adc ecx, ecx
              add ebx, ebx
              jnc 00007FD038F1C5B1h
              jne 00007FD038F1C5CBh
              mov ebx, dword ptr [esi]
              sub esi, FFFFFFFCh
              adc ebx, ebx
              jnc 00007FD038F1C5A6h
              add ecx, 02h
              cmp ebp, FFFFFB00h
              adc ecx, 02h
              lea edx, dword ptr [eax+eax]
              Programming Language:
              • [ C ] VS2003 (.NET) build 3077
              • [ASM] VS2008 SP1 build 30729
              • [ C ] VS2008 SP1 build 30729
              • [C++] VS2008 build 21022
              • [ C ] VS2005 build 50727
              • [IMP] VS2005 build 50727
              • [C++] VS2008 SP1 build 30729
              • [EXP] VS2008 SP1 build 30729
              • [RES] VS2008 build 21022
              • [LNK] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x52c6f40x6c.rsrc
              IMAGE_DIRECTORY_ENTRY_IMPORT0x52c3740x380.rsrc
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x50b0000x21374.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x1656000x1e48UPX0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x50a96c0x48UPX1
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x46c7e40xc0UPX1
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              UPX00x10000x3c60000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              UPX10x3c70000x1440000x143a00ec374e30f7610c8cff7e3144a2ff2d64False0.9854696250965623data7.9264786499236735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x50b0000x220000x2180039725c214c31ce71a23e6ae55b785196False0.8321332789179104data7.376805774734939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_CURSOR0x4b07000x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b08340xb4dataEnglishUnited States1.0611111111111111
              RT_CURSOR0x4b08e80x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b0a1c0x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b0b500x134OpenPGP Secret KeyEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b0c840x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b0db80x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b0eec0x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b10200x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b11540x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b12880x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b13bc0x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b14f00x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b16240x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b17580x134dataEnglishUnited States1.0357142857142858
              RT_CURSOR0x4b188c0x134dataEnglishUnited States1.0357142857142858
              RT_BITMAP0x4b19c00x3e8dataEnglishUnited States1.011
              RT_BITMAP0x4b1da80x3e8dataEnglishUnited States1.011
              RT_BITMAP0x4b21900x1328dataEnglishUnited States1.0
              RT_BITMAP0x4b34b80x1328dataEnglishUnited States0.9959216965742251
              RT_BITMAP0x4b47e00x3e8dataEnglishUnited States1.011
              RT_BITMAP0x4b4bc80x1328dataEnglishUnited States0.9959216965742251
              RT_BITMAP0x4b5ef00x1328dataEnglishUnited States0.9906199021207178
              RT_BITMAP0x4b72180x1328dataEnglishUnited States0.9914355628058727
              RT_BITMAP0x4b85400x1328dataEnglishUnited States0.9971451876019576
              RT_BITMAP0x4b98680x3e8dataEnglishUnited States1.011
              RT_BITMAP0x4b9c500xb8dataEnglishUnited States1.059782608695652
              RT_BITMAP0x4b9d080x144dataEnglishUnited States1.0339506172839505
              RT_ICON0x50e7040x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6047297297297297
              RT_ICON0x50e8300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5404624277456648
              RT_ICON0x4ba4dc0x8a8dataEnglishUnited States1.0049638989169676
              RT_ICON0x4bad840x568dataEnglishUnited States1.0079479768786128
              RT_ICON0x4bb2ec0xca8dataEnglishUnited States1.003395061728395
              RT_ICON0x4bbf940x368dataEnglishUnited States1.0126146788990826
              RT_ICON0x4bc2fc0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bc4a40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bc64c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bc7f40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bc99c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bcb440x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bccec0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bce940x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd03c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd1e40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd38c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd5340x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd6dc0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bd8840x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bda2c0x2e8dataEnglishUnited States1.0147849462365592
              RT_ICON0x4bdd140x128dataEnglishUnited States1.037162162162162
              RT_ICON0x4bde3c0x568dataEnglishUnited States1.0079479768786128
              RT_ICON0x4be3a40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4be54c0x2e8dataEnglishUnited States1.0147849462365592
              RT_ICON0x4be8340x128dataEnglishUnited States1.037162162162162
              RT_ICON0x4be95c0x568dataEnglishUnited States1.0079479768786128
              RT_ICON0x4beec40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bf06c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4bf2140x2e8dataEnglishUnited States1.0147849462365592
              RT_ICON0x4bf4fc0x1ca8dataEnglishUnited States0.9941384950926936
              RT_ICON0x4c11a40xca8dataEnglishUnited States1.003395061728395
              RT_ICON0x4c1e4c0x668OpenPGP Public KeyEnglishUnited States1.0067073170731706
              RT_ICON0x4c24b40x1ca8dataEnglishUnited States0.9946837513631407
              RT_ICON0x4c415c0xca8dataEnglishUnited States1.003395061728395
              RT_ICON0x4c4e040x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c546c0x1ca8dataEnglishUnited States0.9934569247546347
              RT_ICON0x4c71140xca8dataEnglishUnited States0.9962962962962963
              RT_ICON0x4c7dbc0x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c84240x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c8a8c0x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c90f40x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c975c0x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4c9dc40x668dataEnglishUnited States1.0067073170731706
              RT_ICON0x4ca42c0xca8OpenPGP Secret KeyEnglishUnited States1.003395061728395
              RT_ICON0x4cb0d40x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4cb27c0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4cb4240x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4cb5cc0x1a8dataEnglishUnited States1.025943396226415
              RT_ICON0x4cb7740x468dataEnglishUnited States1.0097517730496455
              RT_ICON0x4cbbdc0xca8dataEnglishUnited States1.003395061728395
              RT_ICON0x50ed9c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5174731182795699
              RT_ICON0x50f0880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7608303249097473
              RT_ICON0x50f9340x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.4024390243902439
              RT_ICON0x50ffa00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6071428571428571
              RT_ICON0x510e4c0x54f3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9929185634800203
              RT_ICON0x5163440x9381PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9919758480972432
              RT_ICON0x51f6cc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5682624113475178
              RT_ICON0x51fb380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6181988742964353
              RT_ICON0x520be40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5099585062240664
              RT_ICON0x5231900x88fbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9958935751561296
              RT_DIALOG0x4e95500x1e0dataEnglishUnited States1.0229166666666667
              RT_DIALOG0x4e97300xe8dataEnglishUnited States1.0474137931034482
              RT_DIALOG0x4e98180x64dataEnglishUnited States1.07
              RT_DIALOG0x4e987c0x302dataEnglishUnited States1.0142857142857142
              RT_DIALOG0x4e9b800x20dataEnglishUnited States1.34375
              RT_DIALOG0x4e9ba00x18dataEnglishUnited States1.375
              RT_DIALOG0x4e9bb80x144dataEnglishUnited States1.0339506172839505
              RT_DIALOG0x4e9cfc0x136dataEnglishUnited States1.0354838709677419
              RT_DIALOG0x4e9e340x32dataEnglishUnited States1.12
              RT_DIALOG0x4e9e680x1a4dataEnglishUnited States1.026190476190476
              RT_DIALOG0x4ea00c0x296dataEnglishUnited States0.9954682779456193
              RT_DIALOG0x4ea2a40x220dataEnglishUnited States1.0202205882352942
              RT_DIALOG0x4ea4c40xc0dataEnglishUnited States1.0572916666666667
              RT_DIALOG0x4ea5840x238COM executable for DOSEnglishUnited States1.0193661971830985
              RT_DIALOG0x4ea7bc0x17edataEnglishUnited States1.0287958115183247
              RT_DIALOG0x4ea93c0xe2dataEnglishUnited States1.0486725663716814
              RT_DIALOG0x4eaa200xd4dataEnglishUnited States1.0518867924528301
              RT_DIALOG0x4eaaf40xe2dataEnglishUnited States1.0353982300884956
              RT_DIALOG0x4eabd80x114dataEnglishUnited States1.039855072463768
              RT_DIALOG0x4eacec0x8cdataEnglishUnited States1.0785714285714285
              RT_DIALOG0x4ead780xd8dataEnglishUnited States1.0509259259259258
              RT_DIALOG0x4eae500xcadataEnglishUnited States1.0544554455445545
              RT_DIALOG0x4eaf1c0x49edataEnglishUnited States1.0050761421319796
              RT_DIALOG0x4eb3bc0x5f8dataEnglishUnited States0.9941099476439791
              RT_DIALOG0x4eb9b40xe8dataEnglishUnited States1.0474137931034482
              RT_DIALOG0x4eba9c0x34dataEnglishUnited States1.1730769230769231
              RT_STRING0x4ebad00x5b4dataEnglishUnited States0.9815068493150685
              RT_STRING0x4ec0840x974dataEnglishUnited States0.9768595041322314
              RT_STRING0x4ec9f80x86adataEnglishUnited States0.968430826369545
              RT_STRING0x4ed2640x358dataEnglishUnited States1.0128504672897196
              RT_STRING0x4ed5bc0x616dataEnglishUnited States1.0070603337612323
              RT_STRING0x4edbd40x2cadataEnglishUnited States1.015406162464986
              RT_STRING0x4edea00x446dataEnglishUnited States0.9990859232175503
              RT_STRING0x4ee2e80x44adataEnglishUnited States0.9981785063752276
              RT_STRING0x4ee7340x3e6dataEnglishUnited States1.0110220440881763
              RT_STRING0x4eeb1c0x662dataEnglishUnited States0.9938800489596084
              RT_STRING0x4ef1800x90edataEnglishUnited States0.9754098360655737
              RT_STRING0x4efa900x67edataEnglishUnited States0.9897713598074609
              RT_STRING0x4f01100x5daSysEx File - ELKAEnglishUnited States0.9919893190921228
              RT_STRING0x4f06ec0x7e6dataEnglishUnited States0.9915924826904056
              RT_STRING0x4f0ed40x79cdataEnglishUnited States1.0010266940451746
              RT_STRING0x4f16700x59edataEnglishUnited States1.0076495132127956
              RT_STRING0x4f1c100x540Novell LANalyzer capture fileEnglishUnited States1.0081845238095237
              RT_STRING0x4f21500x580dataEnglishUnited States0.9879261363636364
              RT_STRING0x4f26d00xdedataEnglishUnited States1.0495495495495495
              RT_STRING0x4f27b00x2f2dataEnglishUnited States1.0145888594164456
              RT_STRING0x4f2aa40x4d2dataEnglishUnited States1.0089141004862237
              RT_STRING0x4f2f780x288dataGermanGermany1.0169753086419753
              RT_STRING0x4f32000x20edataEnglishUnited States1.020912547528517
              RT_STRING0x4f34100x252dataFrenchFrance1.0185185185185186
              RT_STRING0x4f36640x148dataJapaneseJapan1.0335365853658536
              RT_STRING0x4f37ac0x14adataKoreanNorth Korea1.0333333333333334
              RT_STRING0x4f37ac0x14adataKoreanSouth Korea1.0333333333333334
              RT_STRING0x4f38f80xe8dataChineseChina1.0474137931034482
              RT_STRING0x4f39e00x438dataGermanGermany1.010185185185185
              RT_STRING0x4f3e180x33adataEnglishUnited States1.013317191283293
              RT_STRING0x4f41540x418dataFrenchFrance1.0104961832061068
              RT_STRING0x4f456c0x22edataJapaneseJapan1.0197132616487454
              RT_STRING0x4f479c0x232dataKoreanNorth Korea1.019572953736655
              RT_STRING0x4f479c0x232dataKoreanSouth Korea1.019572953736655
              RT_STRING0x4f49d00x172dataChineseChina1.0297297297297296
              RT_STRING0x4f4b440x124dataGermanGermany1.0376712328767124
              RT_STRING0x4f4c680xf0dataEnglishUnited States1.0333333333333334
              RT_STRING0x4f4d580x142dataFrenchFrance1.0341614906832297
              RT_STRING0x4f4e9c0x9adataJapaneseJapan1.0714285714285714
              RT_STRING0x4f4f380xb2dataKoreanNorth Korea1.0617977528089888
              RT_STRING0x4f4f380xb2dataKoreanSouth Korea1.0617977528089888
              RT_STRING0x4f4fec0x6edataChineseChina1.1
              RT_STRING0x4f505c0x166dataGermanGermany1.0307262569832403
              RT_STRING0x4f51c40x10adataEnglishUnited States1.0413533834586466
              RT_STRING0x4f52d00x14adataFrenchFrance1.0333333333333334
              RT_STRING0x4f541c0xb2dataJapaneseJapan1.050561797752809
              RT_STRING0x4f54d00xb4dataKoreanNorth Korea1.0611111111111111
              RT_STRING0x4f54d00xb4dataKoreanSouth Korea1.0611111111111111
              RT_STRING0x4f55840x6edataChineseChina1.1
              RT_STRING0x4f55f40x1a0dataGermanGermany1.0264423076923077
              RT_STRING0x4f57940x16edataEnglishUnited States1.030054644808743
              RT_STRING0x4f59040x1c6dataFrenchFrance1.024229074889868
              RT_STRING0x4f5acc0xccdataJapaneseJapan1.053921568627451
              RT_STRING0x4f5b980xd0dataKoreanNorth Korea1.0528846153846154
              RT_STRING0x4f5b980xd0dataKoreanSouth Korea1.0528846153846154
              RT_STRING0x4f5c680x78dataChineseChina1.0916666666666666
              RT_STRING0x4f5ce00x37eOpenPGP Secret KeyGermanGermany1.012304250559284
              RT_STRING0x4f60600x294dataEnglishUnited States1.0166666666666666
              RT_STRING0x4f62f40x35edataFrenchFrance1.0127610208816706
              RT_STRING0x4f66540x184dataJapaneseJapan1.0283505154639174
              RT_STRING0x4f67d80x190dataKoreanNorth Korea1.0275
              RT_STRING0x4f67d80x190dataKoreanSouth Korea1.0275
              RT_STRING0x4f69680xdcdataChineseChina1.05
              RT_STRING0x4f6a440x3b6dataGermanGermany1.0115789473684211
              RT_STRING0x4f6dfc0x33adataEnglishUnited States1.013317191283293
              RT_STRING0x4f71380x428dataFrenchFrance1.0103383458646618
              RT_STRING0x4f75600x1eedataJapaneseJapan1.0222672064777327
              RT_STRING0x4f77500x1eedataKoreanNorth Korea1.0222672064777327
              RT_STRING0x4f77500x1eedataKoreanSouth Korea1.0222672064777327
              RT_STRING0x4f79400x134dataChineseChina0.9902597402597403
              RT_STRING0x4f7a740xb4dataGermanGermany1.0444444444444445
              RT_STRING0x4f7b280x88dataEnglishUnited States1.0808823529411764
              RT_STRING0x4f7bb00xa0dataFrenchFrance1.06875
              RT_STRING0x4f7c500x4cOpenPGP Secret KeyJapaneseJapan1.144736842105263
              RT_STRING0x4f7c9c0x54dataKoreanNorth Korea1.130952380952381
              RT_STRING0x4f7c9c0x54dataKoreanSouth Korea1.130952380952381
              RT_STRING0x4f7cf00x3cdataChineseChina1.1833333333333333
              RT_STRING0x4f7d2c0x50dataGermanGermany1.0875
              RT_STRING0x4f7d7c0x48dataEnglishUnited States1.1527777777777777
              RT_STRING0x4f7dc40x50dataFrenchFrance1.1375
              RT_STRING0x4f7e140x3edataJapaneseJapan1.1774193548387097
              RT_STRING0x4f7e540x46dataKoreanNorth Korea1.1571428571428573
              RT_STRING0x4f7e540x46dataKoreanSouth Korea1.1571428571428573
              RT_STRING0x4f7e9c0x32dataChineseChina1.1
              RT_STRING0x4f7ed00x47cdataGermanGermany1.009581881533101
              RT_STRING0x4f834c0x380dataEnglishUnited States1.0122767857142858
              RT_STRING0x4f86cc0x4f2dataFrenchFrance1.0086887835703002
              RT_STRING0x4f8bc00x2b6dataJapaneseJapan0.9855907780979827
              RT_STRING0x4f8e780x2aadataKoreanNorth Korea1.002932551319648
              RT_STRING0x4f8e780x2aadataKoreanSouth Korea1.002932551319648
              RT_STRING0x4f91240x180dataChineseChina1.0286458333333333
              RT_STRING0x4f92a40xa88dataGermanGermany0.9855341246290801
              RT_STRING0x4f9d2c0x98cdataEnglishUnited States0.9946808510638298
              RT_STRING0x4fa6b80xb36dataFrenchFrance0.997212543554007
              RT_STRING0x4fb1f00x524dataJapaneseJapan1.0083586626139818
              RT_STRING0x4fb7140x5eedataKoreanNorth Korea1.0072463768115942
              RT_STRING0x4fb7140x5eedataKoreanSouth Korea1.0072463768115942
              RT_STRING0x4fbd040x390dataChineseChina1.0120614035087718
              RT_STRING0x4fc0940x1dcdataGermanGermany1.023109243697479
              RT_STRING0x4fc2700x18cdataEnglishUnited States1.0277777777777777
              RT_STRING0x4fc3fc0x202dataFrenchFrance1.0214007782101167
              RT_STRING0x4fc6000xd8dataJapaneseJapan1.0509259259259258
              RT_STRING0x4fc6d80xc6dataKoreanNorth Korea1.0555555555555556
              RT_STRING0x4fc6d80xc6dataKoreanSouth Korea1.0555555555555556
              RT_STRING0x4fc7a00x80dataChineseChina1.0859375
              RT_STRING0x4fc8200xa6dataGermanGermany1.0662650602409638
              RT_STRING0x4fc8c80x8cdataEnglishUnited States1.0785714285714285
              RT_STRING0x4fc9540xa6dataFrenchFrance1.0662650602409638
              RT_STRING0x4fc9fc0x6edataJapaneseJapan1.1
              RT_STRING0x4fca6c0x72dataKoreanNorth Korea1.0964912280701755
              RT_STRING0x4fca6c0x72dataKoreanSouth Korea1.0964912280701755
              RT_STRING0x4fcae00x40dataChineseChina1.171875
              RT_STRING0x4fcb200x136dataGermanGermany1.0354838709677419
              RT_STRING0x4fcc580x11edataEnglishUnited States1.0384615384615385
              RT_STRING0x4fcd780x11edataFrenchFrance1.0384615384615385
              RT_STRING0x4fce980x11edataJapaneseJapan1.0384615384615385
              RT_STRING0x4fcfb80xf4dataKoreanNorth Korea1.0450819672131149
              RT_STRING0x4fcfb80xf4dataKoreanSouth Korea1.0450819672131149
              RT_STRING0x4fd0ac0x11edataChineseChina1.0384615384615385
              RT_STRING0x4fd1cc0x5aOpenPGP Public KeyGermanGermany1.1222222222222222
              RT_STRING0x4fd2280x52dataEnglishUnited States1.1341463414634145
              RT_STRING0x4fd27c0x52dataFrenchFrance1.1341463414634145
              RT_STRING0x4fd2d00x52dataJapaneseJapan1.1341463414634145
              RT_STRING0x4fd3240x44dataKoreanNorth Korea1.161764705882353
              RT_STRING0x4fd3240x44dataKoreanSouth Korea1.161764705882353
              RT_STRING0x4fd3680x52dataChineseChina1.1341463414634145
              RT_STRING0x4fd3bc0x68dataGermanGermany1.1057692307692308
              RT_STRING0x4fd4240x6adataEnglishUnited States1.1037735849056605
              RT_STRING0x4fd4900x70dataFrenchFrance1.0982142857142858
              RT_STRING0x4fd5000x48dataJapaneseJapan1.1527777777777777
              RT_STRING0x4fd5480x4adataKoreanNorth Korea1.1486486486486487
              RT_STRING0x4fd5480x4adataKoreanSouth Korea1.1486486486486487
              RT_STRING0x4fd5940x38dataChineseChina1.1964285714285714
              RT_STRING0x4fd5cc0x21adataGermanGermany1.020446096654275
              RT_STRING0x4fd7e80x222dataEnglishUnited States1.02014652014652
              RT_STRING0x4fda0c0x286dataFrenchFrance1.0170278637770898
              RT_STRING0x4fdc940x11cdataJapaneseJapan1.0387323943661972
              RT_STRING0x4fddb00x174dataKoreanNorth Korea1.0295698924731183
              RT_STRING0x4fddb00x174dataKoreanSouth Korea1.0295698924731183
              RT_STRING0x4fdf240xccdataChineseChina1.053921568627451
              RT_STRING0x4fdff00x2d6dataGermanGermany1.0151515151515151
              RT_STRING0x4fe2c80x270dataEnglishUnited States1.017628205128205
              RT_STRING0x4fe5380x2cedataFrenchFrance1.0153203342618384
              RT_STRING0x4fe8080x168dataJapaneseJapan1.0305555555555554
              RT_STRING0x4fe9700x198dataKoreanNorth Korea1.0269607843137254
              RT_STRING0x4fe9700x198dataKoreanSouth Korea1.0269607843137254
              RT_STRING0x4feb080xdedataChineseChina1.0495495495495495
              RT_STRING0x4febe80x1e0dataGermanGermany1.0229166666666667
              RT_STRING0x4fedc80x12adataEnglishUnited States1.0369127516778522
              RT_STRING0x4feef40x17edataFrenchFrance1.0287958115183247
              RT_STRING0x4ff0740xecdataJapaneseJapan1.0466101694915255
              RT_STRING0x4ff1600xe6dataKoreanNorth Korea1.0478260869565217
              RT_STRING0x4ff1600xe6dataKoreanSouth Korea1.0478260869565217
              RT_STRING0x4ff2480x98dataChineseChina1.0723684210526316
              RT_STRING0x4ff2e00x96dataGermanGermany1.0733333333333333
              RT_STRING0x4ff3780x6cdataEnglishUnited States1.1018518518518519
              RT_STRING0x4ff3e40x80dataFrenchFrance1.0859375
              RT_STRING0x4ff4640x4adataJapaneseJapan1.1486486486486487
              RT_STRING0x4ff4b00x48dataKoreanNorth Korea1.1527777777777777
              RT_STRING0x4ff4b00x48dataKoreanSouth Korea1.1527777777777777
              RT_STRING0x4ff4f80x3adataChineseChina1.1896551724137931
              RT_STRING0x4ff5340x1f2dataGermanGermany1.0220883534136547
              RT_STRING0x4ff7280x196dataEnglishUnited States1.0270935960591132
              RT_STRING0x4ff8c00x21adataFrenchFrance1.020446096654275
              RT_STRING0x4ffadc0x132dataJapaneseJapan1.0359477124183007
              RT_STRING0x4ffc100x11cdataKoreanNorth Korea1.0387323943661972
              RT_STRING0x4ffc100x11cdataKoreanSouth Korea1.0387323943661972
              RT_STRING0x4ffd2c0xe2OpenPGP Public KeyChineseChina1.0486725663716814
              RT_STRING0x4ffe100x50dataGermanGermany1.1375
              RT_STRING0x4ffe600x44dataEnglishUnited States1.161764705882353
              RT_STRING0x4ffea40x42dataFrenchFrance1.1666666666666667
              RT_STRING0x4ffee80x2adataJapaneseJapan1.2619047619047619
              RT_STRING0x4fff140x2edataKoreanNorth Korea1.2391304347826086
              RT_STRING0x4fff140x2edataKoreanSouth Korea1.2391304347826086
              RT_STRING0x4fff440x28dataChineseChina1.275
              RT_STRING0x4fff6c0x4aedataEnglishUnited States1.0091819699499165
              RT_STRING0x50041c0x3f0dataEnglishUnited States1.0109126984126984
              RT_STRING0x50080c0x3e2dataEnglishUnited States1.011066398390342
              RT_STRING0x500bf00x6cdataEnglishUnited States1.1018518518518519
              RT_STRING0x500c5c0xbe6dataEnglishUnited States0.9517399868680236
              RT_STRING0x5018440x18a2dataEnglishUnited States0.9744687599111956
              RT_STRING0x5030e80x478dataEnglishUnited States1.0096153846153846
              RT_STRING0x5035600x148dataEnglishUnited States1.0335365853658536
              RT_STRING0x5036a80x2e8dataEnglishUnited States1.0147849462365592
              RT_STRING0x5039900x220dataEnglishUnited States1.0202205882352942
              RT_STRING0x503bb00x22adataEnglishUnited States1.01985559566787
              RT_STRING0x503ddc0x82dataEnglishUnited States1.0846153846153845
              RT_STRING0x503e600x2adataEnglishUnited States1.2619047619047619
              RT_STRING0x503e8c0x184dataEnglishUnited States1.0283505154639174
              RT_STRING0x5040100x4e6dataEnglishUnited States1.0087719298245614
              RT_STRING0x5044f80x264dataEnglishUnited States1.0179738562091503
              RT_STRING0x50475c0x2dadataEnglishUnited States1.015068493150685
              RT_STRING0x504a380x8aPGP Secret Sub-key -EnglishUnited States1.0797101449275361
              RT_STRING0x504ac40xacdataEnglishUnited States1.063953488372093
              RT_STRING0x504b700xdedataEnglishUnited States1.0495495495495495
              RT_STRING0x504c500x4a8dataEnglishUnited States1.0092281879194631
              RT_STRING0x5050f80x228dataEnglishUnited States1.019927536231884
              RT_STRING0x5053200x2cdataEnglishUnited States1.2045454545454546
              RT_STRING0x50534c0x42dataEnglishUnited States1.1666666666666667
              RT_ACCELERATOR0x5053900x10compacted dataEnglishUnited States1.5
              RT_GROUP_CURSOR0x5053a00x22dataEnglishUnited States1.2647058823529411
              RT_GROUP_CURSOR0x5053c40x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x5053d80x14dataEnglishUnited States1.45
              RT_GROUP_CURSOR0x5053ec0x14Non-ISO extended-ASCII text, with no line terminators, with escape sequencesEnglishUnited States1.45
              RT_GROUP_CURSOR0x5054000x14DOS executable (COM)EnglishUnited States1.4
              RT_GROUP_CURSOR0x5054140x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x5054280x14dataEnglishUnited States1.45
              RT_GROUP_CURSOR0x50543c0x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x5054500x14dataEnglishUnited States1.45
              RT_GROUP_CURSOR0x5054640x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x5054780x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x50548c0x14dataEnglishUnited States1.4
              RT_GROUP_CURSOR0x5054a00x14dataEnglishUnited States1.45
              RT_GROUP_CURSOR0x5054b40x14dataEnglishUnited States1.45
              RT_GROUP_CURSOR0x5054c80x14OpenPGP Public KeyEnglishUnited States1.45
              RT_GROUP_ICON0x52ba900xaedataEnglishUnited States0.6666666666666666
              RT_GROUP_ICON0x50558c0x3edataEnglishUnited States1.1774193548387097
              RT_GROUP_ICON0x5055cc0x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5055e00x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5055f40x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5056080x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x50561c0x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5056300x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5056440x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5056580x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x50566c0x14Non-ISO extended-ASCII text, with no line terminatorsEnglishUnited States1.45
              RT_GROUP_ICON0x5056800x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5056940x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5056a80x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5056bc0x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5056d00x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5056e40x30dataEnglishUnited States1.2291666666666667
              RT_GROUP_ICON0x5057140x30dataEnglishUnited States1.2291666666666667
              RT_GROUP_ICON0x5057440x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5057580x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x50576c0x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5057800x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5057940x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5057a80x22dataEnglishUnited States1.2647058823529411
              RT_GROUP_ICON0x5057cc0x3edataEnglishUnited States1.1451612903225807
              RT_GROUP_ICON0x50580c0x22dataEnglishUnited States1.2352941176470589
              RT_GROUP_ICON0x5058300x3edataEnglishUnited States1.1774193548387097
              RT_GROUP_ICON0x5058700x30dataEnglishUnited States1.2291666666666667
              RT_GROUP_ICON0x5058a00x14Non-ISO extended-ASCII text, with no line terminatorsEnglishUnited States1.45
              RT_GROUP_ICON0x5058b40x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5058c80x14dataEnglishUnited States1.4
              RT_GROUP_ICON0x5058dc0x14dataEnglishUnited States1.45
              RT_GROUP_ICON0x5058f00x14dataEnglishUnited States1.4
              RT_VERSION0x52bb440x34cdataEnglishUnited States0.42890995260663506
              RT_MANIFEST0x52be940x4e0ASCII text, with very long lines (799), with CRLF line terminatorsEnglishUnited States0.43669871794871795
              DLLImport
              KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
              COMDLG32.dllGetFileTitleW
              GDI32.dllArcTo
              MPR.dllWNetGetUserW
              ole32.dllCoInitialize
              OLEAUT32.dllSafeArrayPutElement
              PSAPI.DLLGetModuleFileNameExW
              RPCRT4.dllUuidCreate
              SHELL32.dllDragFinish
              USER32.dllGetDC
              VERSION.dllVerQueryValueW
              WININET.dllInternetCheckConnectionW
              WINSPOOL.DRVGetJobW
              WS2_32.dllclosesocket
              WTSAPI32.dllWTSFreeMemory
              NameOrdinalAddress
              NI_MetaToolbox_MetaOutput_GetSharedGlobalData10x61e5f0
              DescriptionData
              CompanyNameNational Instruments
              FileDescriptionNational Instruments Installer
              FileVersion16.0.0.171
              InternalNameMetaInstaller
              LegalCopyrightCopyright 2003-2016. All Rights Reserved.
              OriginalFilenameSetup.exe
              ProductNameNational Instruments Installer
              ProductVersion16.0.0
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              GermanGermany
              FrenchFrance
              JapaneseJapan
              KoreanNorth Korea
              KoreanSouth Korea
              ChineseChina
              No network behavior found
              0246810s020406080100

              Click to jump to process

              0246810s0.0051015MB

              Click to jump to process

              • File
              • Registry

              Click to dive into process behavior distribution

              Target ID:0
              Start time:15:25:23
              Start date:08/04/2025
              Path:C:\Users\user\Desktop\setup.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\setup.exe"
              Imagebase:0x400000
              File size:1'471'560 bytes
              MD5 hash:7D41B083AB75AE56089F43076B4D4750
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              No disassembly