

#PEAZIP 7Z TO OVA WINDOWS#
"is-MHSRV.tmp" has type "PE32 executable (console) Intel 80386 for MS Windows UPX compressed" "is-G2UPG.tmp" has type "UTF-8 Unicode (with BOM) text with very long lines with CRLF line terminators" "is-AOKJ8.tmp" has type "UTF-8 Unicode (with BOM) text with very long lines with CRLF LF line terminators" "is-J11V0.tmp" has type "UTF-8 Unicode (with BOM) text with very long lines with CRLF line terminators" "is-DQKTH.tmp" has type "PE32 executable (console) Intel 80386 (stripped to external PDB) for MS Windows" "conf.txt" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators" "is-MOHB2.tmp" has type "Windows Registry text (Win2K or above)" "is-521ES.tmp" has type "ASCII text with CRLF line terminators" "is-59LTJ.tmp" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows" "is-DFMKI.tmp" has type "Little-endian UTF-16 Unicode text with CRLF CR line terminators" "is-URVRQ.tmp" has type "PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows" Source Hybrid Analysis Technology relevance 10/10 from peazip-6.4.0.WINDOWS.tmp (PID: 3216) ( Show Stream) Which is directly followed by "cmp ax, 0005h" and "jnc 004B86B7h". Which is directly followed by "cmp ax, 00000601h" and "jc 004CBAAFh". Which is directly followed by "cmp al, 04h" and "jc 0044DED0h".

Which is directly followed by "cmp edx, 05h" and "jne 00408E03h". Which is directly followed by "cmp ax, 0005h" and "jc 0047FF1Fh". Which is directly followed by "cmp edx, 05h" and "jne 0040648Bh". "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Open with PeaZip.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Extract here (in new folder).lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Extract.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Extract here.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Secure delete.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Split file.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Encrypt.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Add to sfx and send by mail.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Add to self-extracting archive.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Add to separate.
#PEAZIP 7Z TO OVA ZIP#
ZIP and send by mail.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Add to.

7Z and send by mail.lnk" with delete access "peazip-6.4.0.WINDOWS.tmp" opened "%APPDATA%\Microsoft\Windows\SendTo\Convert.lnk" with delete access "" opened "%APPDATA%\Microsoft\Windows\SendTo\Add to archive.lnk" with delete access
