Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8ue90oYkrv.exe

Overview

General Information

Sample name:8ue90oYkrv.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
Analysis ID:1408892
MD5:5a0d2bc66c17c640e81233cf6a200e07
SHA1:65ab84dc66feb7b7034ec5713b68fd39a6cd1a01
SHA256:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
Infos:

Detection

Score:45
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:49
Range:0 - 100

Signatures

Multi AV Scanner detection for dropped file
.NET source code contains potential unpacker
Machine Learning detection for dropped file
Machine Learning detection for sample
Abnormal high CPU Usage
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates Visual Basic Runtime Dlls
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries keyboard layouts
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Msiexec Execute Arbitrary DLL
Sigma detected: Use NTFS Short Name in Command Line
Sigma detected: Use Short Name Path in Command Line
Stores large binary data to the registry
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8ue90oYkrv.exe (PID: 5244 cmdline: C:\Users\user\Desktop\8ue90oYkrv.exe MD5: 5A0D2BC66C17C640E81233CF6A200E07)
    • TDService.exe (PID: 3624 cmdline: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="" MD5: A94A3D60FA8A54AB71ABED39D5883D86)
      • TechkonDriver64Bit.exe (PID: 6352 cmdline: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s MD5: F6CD94DEAEA55BB414650D6A9CB7DD6C)
        • TechkonDriver64Bit.exe (PID: 3292 cmdline: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="" MD5: 5A3DA2206BD35C381B826FF748093684)
          • cmd.exe (PID: 6056 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • certutil.exe (PID: 7112 cmdline: certutil -f -addstore TrustedPublisher TK1.cer MD5: F17616EC0522FC5633151F7CAA278CAA)
            • certutil.exe (PID: 904 cmdline: certutil -f -addstore TrustedPublisher TK2.cer MD5: F17616EC0522FC5633151F7CAA278CAA)
          • x64DPInst.exe (PID: 1172 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 4140 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 5448 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 3836 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 1240 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 5880 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 5836 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 4724 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
  • msiexec.exe (PID: 2952 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 1776 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding F1FA5532D1DD3919F4D531B46B734EEE MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 5576 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 5148 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 2924 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 3652 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 12FD986294DFC1E2D717A71E276F9E78 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • TDService.exe (PID: 892 cmdline: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe" MD5: F00223A56D3F89627CC88625DBCB0C42)
  • svchost.exe (PID: 1500 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • drvinst.exe (PID: 5792 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.inf" "9" "439f12f93" "0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\progra~1\techko~1\techko~1\dens" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5284 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "00000000000000D8" "WinSta0\Default" "0000000000000174" "208" "c:\progra~1\techko~1\techko~1\mf-ir" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5700 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000198" "WinSta0\Default" "00000000000001A4" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5284 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\spectrojet_x64.inf" "9" "4b5792527" "00000000000001A8" "WinSta0\Default" "00000000000001A0" "208" "c:\progra~1\techko~1\techko~1\spectr~4" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5876 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.inf" "9" "40b9ce367" "00000000000001C8" "WinSta0\Default" "00000000000001CC" "208" "c:\progra~1\techko~1\techko~1\spectr~3" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5040 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.inf" "9" "48bc6c0e7" "00000000000001CC" "WinSta0\Default" "0000000000000198" "208" "c:\progra~1\techko~1\techko~1\spectr~2" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 4832 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.inf" "9" "46d73562f" "00000000000001E8" "WinSta0\Default" "00000000000001EC" "208" "c:\progra~1\techko~1\techko~1\spectr~1" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 5408 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.inf" "9" "4c691d78b" "00000000000001D4" "WinSta0\Default" "00000000000001D8" "208" "c:\progra~1\techko~1\techko~1\spc171~1" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\mia595B.tmp\TDService.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          SourceRuleDescriptionAuthorStrings
          00000002.00000000.2039012583.0000000000401000.00000020.00000001.01000000.00000004.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            SourceRuleDescriptionAuthorStrings
            2.0.TDService.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              Source: Process startedAuthor: frack113: Data: Command: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, CommandLine: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\msiexec.exe, NewProcessName: C:\Windows\SysWOW64\msiexec.exe, OriginalFileName: C:\Windows\SysWOW64\msiexec.exe, ParentCommandLine: C:\Windows\system32\msiexec.exe /V, ParentImage: C:\Windows\System32\msiexec.exe, ParentProcessId: 2952, ParentProcessName: msiexec.exe, ProcessCommandLine: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, ProcessId: 5576, ProcessName: msiexec.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", CommandLine: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", CommandLine|base64offset|contains: , Image: C:\ProgramData\mia595B.tmp\TDService.exe, NewProcessName: C:\ProgramData\mia595B.tmp\TDService.exe, OriginalFileName: C:\ProgramData\mia595B.tmp\TDService.exe, ParentCommandLine: C:\Users\user\Desktop\8ue90oYkrv.exe, ParentImage: C:\Users\user\Desktop\8ue90oYkrv.exe, ParentProcessId: 5244, ParentProcessName: 8ue90oYkrv.exe, ProcessCommandLine: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", ProcessId: 3624, ProcessName: TDService.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", CommandLine: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", CommandLine|base64offset|contains: , Image: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, NewProcessName: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, OriginalFileName: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, ParentCommandLine: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s, ParentImage: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe, ParentProcessId: 6352, ParentProcessName: TechkonDriver64Bit.exe, ProcessCommandLine: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", ProcessId: 3292, ProcessName: TechkonDriver64Bit.exe
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, ProcessId: 1500, ProcessName: svchost.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeVirustotal: Detection: 9%Perma Link
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeVirustotal: Detection: 8%Perma Link
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJoe Sandbox ML: detected
              Source: C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJoe Sandbox ML: detected
              Source: C:\ProgramData\mia595B.tmp\TDService.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeJoe Sandbox ML: detected
              Source: 8ue90oYkrv.exeJoe Sandbox ML: detected

              Compliance

              barindex
              Source: 8ue90oYkrv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbHJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64BitJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDensJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLanJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJetJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlateJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IRJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENSJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\CertJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK1.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK2.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.BatJump to behavior
              Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: 8ue90oYkrv.exeStatic PE information: certificate valid
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb0eNe @e_CorExeMainmscoree.dll source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb,NNN @N_CorDllMainmscoree.dll source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb, AH/@ source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: GameuxInstallHelper.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb(0 source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdbH source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, 00000010.00000002.2208938740.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000010.00000000.2160181246.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000000.2212920742.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000002.2247850295.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 0000001F.00000000.2497378544.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp
              Source: Binary string: w:\_thesycon\usb\usbio\_main\bin\fre\amd64\usbio_x64.pdb source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.000000000311F000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, 00000010.00000003.2179903592.0000000000EB2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2185360967.000001BEB9B90000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190820569.000001BEB9BF1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdb source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, x64DPInst.exe, 00000010.00000002.2208938740.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000010.00000000.2160181246.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000000.2212920742.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000002.2247850295.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 0000001F.00000000.2497378544.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp
              Source: Binary string: gacutlrc.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\System32\cmd.exeFile opened: c:
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00407AC0 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,0_2_00407AC0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC72A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,2_2_6CC72A30
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC62470 FindClose,FindFirstFileW,FindFirstFileW,2_2_6CC62470
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E2A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,10_2_693E2A30
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693D2470 FindClose,FindFirstFileW,FindFirstFileW,10_2_693D2470
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\userJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: TechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIP
              Source: TDService.exe, 00000002.00000003.2613953321.000000000297B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.TECHKON.COM/MICROSOFT
              Source: drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl
              Source: drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl$
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
              Source: drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crlj
              Source: drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com
              Source: drvinst.exe, 00000012.00000003.2195942001.000001BEB9B8D000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQJ1TBLBrQ9OnPHXPVaWb87MxkNlgQUwu79F9f%2Btw%2FGc
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
              Source: drvinst.exe, 00000012.00000003.2195942001.000001BEB9B42000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9B42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.comhttp://crl.thawte.com/ThawteTimestampingCA.crl
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sawebservice.red-gate.com/
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://standards.iso.org/iso/19770/-2/2008/schema.xsd
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2196676021.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
              Source: drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2196676021.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
              Source: drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crlaH7#
              Source: drvinst.exe, 00000012.00000003.2195942001.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2196676021.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crlra
              Source: drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9BB9000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2196676021.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
              Source: drvinst.exe, 00000012.00000003.2195942001.000001BEB9B8D000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com1.3.6.1.5.5.7.48.2http://ts-aia.ws.symantec.com/tss-ca-g2.cer
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/
              Source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/InstallAware
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/buydirect.aspopen
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/x2/
              Source: 8ue90oYkrv.exe, 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000002.2610568433.0000000000440000.00000002.00000001.01000000.0000000D.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2148764092.0000000003206000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2121119719.000000007FE3A000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000000.2117973572.000000000095B000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: http://www.installaware.comz
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2613953321.00000000029A8000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TECHKON
              Source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2148764092.000000000318C000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2121119719.000000007F940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zip
              Source: TechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zipiJu
              Source: TechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zipn
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/L
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
              Source: TechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002804000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.techkon.com/
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2613953321.000000000297B000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.techkon.com/Microsoft
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\B06B5044\C2555B5\spectrojet_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\SETA96F.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\SETE1E4.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\1ABF3862\DFC33D3E\spectrodens_x64.catJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\7AA455DC\9C4070E9\dens_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\SETA7C9.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\4D56F533\BD12AE78\spectrodens_ir_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\SET16FE.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\SETDF64.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\SET19EC.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\SETB844.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\52B152B3\9B44F18F\spectrodrive_x64.catJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\56A7DD7A\5EDECBEE\spectrojet_x64.catJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\9E7D6EA9\A1D4A3D9\TK2.cerJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\SETC94B.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\SET9B08.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\SET30FE.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\849003A2\CFFA0AE5\spectroplate_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\SET2E10.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\SET347.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\F2F92670\383AE05B\spectrodrive_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\SETC583.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\SETB68E.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\66E41FEB\A1D4A3D9\TK1.cerJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\SET94ED.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\SET9DF.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a91.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6BBA.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C57.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C97.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6CC7.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6CF7.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a95.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a95.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a96.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8830.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88BE.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{55EA8940-B618-47BD-A642-20BFB2A64F78}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88FE.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI891E.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI897D.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a99.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5c6a99.msiJump to behavior
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Windows\DPINST.LOG
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\dens_x64.inf_amd64_0443b10bbf7d32a7
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodens_ir_x64.inf_amd64_8d12fea260853771
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem5.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectroplate_x64.inf_amd64_c71201b931dd1be0
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem6.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrojet_x64.inf_amd64_5ffa68417e0a7d5b
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem7.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodrive_x64.inf_amd64_4202c4b809e7c711
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem8.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodrive_x64.inf_amd64_2098370fcaa48685
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem9.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodens_x64.inf_amd64_f8d6912081a30de7
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem10.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrojet_x64.inf_amd64_8d9b062068cda5fb
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem11.inf
              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI6BBA.tmpJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0041F2D00_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0040AEE00_2_0040AEE0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004010000_2_00401000
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004011000_2_00401100
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004011C00_2_004011C0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004011D80_2_004011D8
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004042D00_2_004042D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004102D00_2_004102D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004013F00_2_004013F0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0040E4400_2_0040E440
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0042244E0_2_0042244E
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004055100_2_00405510
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004045A00_2_004045A0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004015B00_2_004015B0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004037600_2_00403760
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004128A00_2_004128A0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0040D9000_2_0040D900
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00401AB00_2_00401AB0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00408DD00_2_00408DD0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0040EFF00_2_0040EFF0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC64C002_2_6CC64C00
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC5AE702_2_6CC5AE70
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC58AB02_2_6CC58AB0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC564602_2_6CC56460
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC635F02_2_6CC635F0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC6FEE02_2_6CC6FEE0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC78E1B2_2_6CC78E1B
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC6B9C02_2_6CC6B9C0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC6E9502_2_6CC6E950
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC5B4472_2_6CC5B447
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC7E6B02_2_6CC7E6B0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC5E6702_2_6CC5E670
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC7E78B2_2_6CC7E78B
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC5D1B02_2_6CC5D1B0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000100010_2_10001000
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000902810_2_10009028
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001733010_2_10017330
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_100153E010_2_100153E0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000D45010_2_1000D450
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001E5C310_2_1001E5C3
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001771010_2_10017710
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001E75110_2_1001E751
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000E77010_2_1000E770
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_100127E010_2_100127E0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001E82B10_2_1001E82B
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_100178D010_2_100178D0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000C8E010_2_1000C8E0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10014A4010_2_10014A40
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000EB1010_2_1000EB10
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1000CCA010_2_1000CCA0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001AD1A10_2_1001AD1A
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10016D8010_2_10016D80
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10017DC010_2_10017DC0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10012F0010_2_10012F00
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10016F8010_2_10016F80
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693C8AB010_2_693C8AB0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693D4C0010_2_693D4C00
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693CAE7010_2_693CAE70
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693D35F010_2_693D35F0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693C646010_2_693C6460
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693DE95010_2_693DE950
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693DB9C010_2_693DB9C0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E8E1B10_2_693E8E1B
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693DFEE010_2_693DFEE0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693CD1B010_2_693CD1B0
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693CB44710_2_693CB447
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693EE78B10_2_693EE78B
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693CE67010_2_693CE670
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693EE6B010_2_693EE6B0
              Source: C:\Windows\System32\svchost.exeProcess token adjusted: Security
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: String function: 6CC54C80 appears 39 times
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: String function: 6CC77AA4 appears 37 times
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: String function: 693C4C80 appears 39 times
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: String function: 10018EB0 appears 95 times
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: String function: 693E7AA4 appears 37 times
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: String function: 00422A14 appears 35 times
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
              Source: mia.lib.0.drStatic PE information: Resource name: RC_DATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: stdole2.tlb.0.drStatic PE information: No import functions for PE file found
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003A84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameADVPACK.DLLx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003FB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003FB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF16.DLL5%ProductNameMicrosoft vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003FB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF32.DLLj% vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelcms.dll vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.000000000405E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOLEPRO32.DLL( vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServiceConnection.dlld" vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003AF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedzncore.dll vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003AF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedznet.dllD vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUSBIOCOM.dllT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003AB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomcat.dllx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServerApp.exed" vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003FFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDSCON.ocx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_wrapper.dll4 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_.dll4 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGameuxInstallHelper.DLLb! vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagedVCL.Utils.dll8 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutil.exeT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutlrc.dllT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamez vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServiceLogMonitor.exeX vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTechkonSpectroDriveUpdate.exeT vs 8ue90oYkrv.exe
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: version.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: mpr.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: winmm.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: winsta.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: olepro32.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wldp.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: propsys.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: profapi.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: srclient.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: spp.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: msi.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: netutils.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: edputil.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: slc.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: userenv.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: sppc.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usbiocom.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msvbvm60.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: netfxperf.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: msimg32.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: version.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: mpr.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: winmm.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: wtsapi32.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: winsta.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: olepro32.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: wldp.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: propsys.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: profapi.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: dwmapi.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: mscoree.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: srclient.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: spp.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: powrprof.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: vssapi.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: vsstrace.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: umpdc.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: msi.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: srpapi.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: tsappcmp.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: netapi32.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: wkscli.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: netutils.dll
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certca.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: version.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certca.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: version.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptbase.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: apphelp.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: umpnpmgr.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: 8ue90oYkrv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: TechkonSpectroJetUpdate.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDServerApp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDService.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDService.exe0.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TechkonSpectroDriveUpdate.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TechkonSpectroJetUpdate.exe.0.dr, SimpleZip.csCryptographic APIs: 'CreateDecryptor'
              Source: TechkonSpectroJetUpdate.exe.0.dr, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
              Source: TechkonSpectroJetUpdate.exe.0.dr, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDServerApp.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
              Source: TDServerApp.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDServerApp.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDService.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
              Source: TDService.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDService.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal45.evad.winEXE@59/343@0/0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0041E6A0 GetVersion,CoCreateInstance,0_2_0041E6A0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC72980 LoadResource,SizeofResource,LockResource,CreateFileW,WriteFile,FindCloseChangeNotification,DeleteFileW,2_2_6CC72980
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbHJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\IIIQFJump to behavior
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeMutant created: \Sessions\1\BaseNamedObjects\Global\DPINST_LOG_SCROLLER_MUTEX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeMutant created: NULL
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMutant created: \BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5952:120:WilError_03
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\lang.locJump to behavior
              Source: Yara matchFile source: 2.0.TDService.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000000.2039012583.0000000000401000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\mia595B.tmp\TDService.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exe, type: DROPPED
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: y`0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: "-k=0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: "/k=0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: -k=0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: /k=0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Title0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: BeginPrompt0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Progress0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Directory0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: RunProgram0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: ExecuteFile0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: @KA0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: setup.exe0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: %%T0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: %%T\0_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: mia.lib0_2_0041F2D0
              Source: 8ue90oYkrv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
              Source: x64DPInst.exeString found in binary or memory: Some post-install cleanup tasks failed. Error code is 0x%X
              Source: x64DPInst.exeString found in binary or memory: Could not re-add '%s' to reference list of driver store entry '%s'
              Source: x64DPInst.exeString found in binary or memory: Successfully re-added '%s' to reference list of driver store entry '%s'
              Source: x64DPInst.exeString found in binary or memory: Install option set: Suppress pre-install of Plug and Play drivers if no matching devices are present.
              Source: x64DPInst.exeString found in binary or memory: Error 0x%X - Could not delete service info key for '%ws', even though there are no more DIFx-installed driver stores using this se
              Source: x64DPInst.exeString found in binary or memory: During undo of install, we failed to re-install the driver. Error code 0x%X
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile read: C:\Users\user\Desktop\8ue90oYkrv.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\8ue90oYkrv.exe C:\Users\user\Desktop\8ue90oYkrv.exe
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess created: C:\ProgramData\mia595B.tmp\TDService.exe .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F1FA5532D1DD3919F4D531B46B734EEE
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX
              Source: unknownProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe"
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess created: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 12FD986294DFC1E2D717A71E276F9E78
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.inf" "9" "439f12f93" "0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\progra~1\techko~1\techko~1\dens"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "00000000000000D8" "WinSta0\Default" "0000000000000174" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000198" "WinSta0\Default" "00000000000001A4" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.inf" "9" "40b9ce367" "00000000000001C8" "WinSta0\Default" "00000000000001CC" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.inf" "9" "48bc6c0e7" "00000000000001CC" "WinSta0\Default" "0000000000000198" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.inf" "9" "46d73562f" "00000000000001E8" "WinSta0\Default" "00000000000001EC" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.inf" "9" "4c691d78b" "00000000000001D4" "WinSta0\Default" "00000000000001D8" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess created: C:\ProgramData\mia595B.tmp\TDService.exe .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /sJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F1FA5532D1DD3919F4D531B46B734EEEJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 12FD986294DFC1E2D717A71E276F9E78Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess created: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""Jump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.inf" "9" "439f12f93" "0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\progra~1\techko~1\techko~1\dens"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "00000000000000D8" "WinSta0\Default" "0000000000000174" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000198" "WinSta0\Default" "00000000000001A4" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "00000000000000D8" "WinSta0\Default" "0000000000000174" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.inf" "9" "40b9ce367" "00000000000001C8" "WinSta0\Default" "00000000000001CC" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.inf" "9" "48bc6c0e7" "00000000000001CC" "WinSta0\Default" "0000000000000198" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.inf" "9" "46d73562f" "00000000000001E8" "WinSta0\Default" "00000000000001EC" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.inf" "9" "4c691d78b" "00000000000001D4" "WinSta0\Default" "00000000000001D8" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbHJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64BitJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDensJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLanJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJetJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlateJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IRJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENSJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\CertJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK1.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK2.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.BatJump to behavior
              Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: 8ue90oYkrv.exeStatic PE information: certificate valid
              Source: 8ue90oYkrv.exeStatic file information: File size 13453632 > 1048576
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb0eNe @e_CorExeMainmscoree.dll source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb,NNN @N_CorDllMainmscoree.dll source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb, AH/@ source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: GameuxInstallHelper.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb(0 source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000003F79000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdbH source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, 00000010.00000002.2208938740.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000010.00000000.2160181246.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000000.2212920742.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000002.2247850295.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 0000001F.00000000.2497378544.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp
              Source: Binary string: w:\_thesycon\usb\usbio\_main\bin\fre\amd64\usbio_x64.pdb source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.000000000311F000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, 00000010.00000003.2179903592.0000000000EB2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2185360967.000001BEB9B90000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190820569.000001BEB9BF1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdb source: TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe, x64DPInst.exe, 00000010.00000002.2208938740.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000010.00000000.2160181246.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000000.2212920742.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 00000014.00000002.2247850295.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, x64DPInst.exe, 0000001F.00000000.2497378544.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp
              Source: Binary string: gacutlrc.pdb source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: TechkonSpectroJetUpdate.exe.0.dr, AssemblyResolverHelper.cs.Net Code: ResolveAssembly System.Reflection.Assembly.Load(byte[])
              Source: TDServerApp.exe.0.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TDService.exe.0.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TDService.exe0.0.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TechkonSpectroDriveUpdate.exe.0.dr, AssemblyResolverHelper.cs.Net Code: ResolveAssembly System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00425561 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00425561
              Source: TDService.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x127b7b
              Source: TDService.exe1.0.drStatic PE information: real checksum: 0x0 should be: 0x519d69
              Source: mMSIExec.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x16af1f
              Source: dzncore.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x3f85f
              Source: stdole2.tlb.0.drStatic PE information: real checksum: 0x0 should be: 0x52af
              Source: mia.lib.0.drStatic PE information: real checksum: 0x78abd should be: 0xa3ca7
              Source: TDServiceLogMonitor.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x11f04
              Source: TechkonSpectroDriveUpdate.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x1ba8a4
              Source: lcms.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x35ee6
              Source: TDServerApp.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x132619
              Source: TDService.exe0.0.drStatic PE information: real checksum: 0x0 should be: 0x127b7b
              Source: TechkonSpectroJetUpdate.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xe77a0
              Source: mVBExec.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x14f360
              Source: mMSIExec.dll.0.drStatic PE information: section name: .didata
              Source: msvbvm60.dll.0.drStatic PE information: section name: ENGINE
              Source: mVBExec.dll.0.drStatic PE information: section name: .didata
              Source: TDService.exe1.0.drStatic PE information: section name: .didata
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004300F8 push eax; retf 0_2_00430145
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0043368D pushad ; retf 0002h0_2_00433699
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00422A59 push ecx; ret 0_2_00422A6C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00434BC8 push eax; retn 0042h0_2_00434BC9
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC77AE9 push ecx; ret 2_2_6CC77AFC
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10013130 push ecx; mov dword ptr [esp], ecx10_2_10013131
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001D2C0 push eax; ret 10_2_1001D2EE
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10018EB0 push eax; ret 10_2_10018ECE
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E7AE9 push ecx; ret 10_2_693E7AFC
              Source: TechkonSpectroJetUpdate.exe.0.drStatic PE information: section name: .text entropy: 7.8810776452765055
              Source: TDServerApp.exe.0.drStatic PE information: section name: .text entropy: 7.851236452154908
              Source: TDService.exe.0.drStatic PE information: section name: .text entropy: 7.950881957105219
              Source: TDService.exe0.0.drStatic PE information: section name: .text entropy: 7.950881957105219
              Source: TechkonSpectroDriveUpdate.exe.0.drStatic PE information: section name: .text entropy: 7.905714785753008
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\SETA7EA.tmpJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\TDService.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8830.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\SETA2F.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\1A2661C4\F965E9F6\USBIOCOM.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\SET173E.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\34E6DE3C\FDA73152\TDService.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C57.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\olepro32.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\mia.libJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI891E.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\C64028C1\DF012C2A\TDSCON.ocxJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\SETA9B0.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\SETC9AB.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88BE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6BBA.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\SET57C.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\F0FC8706\FDA73152\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\SET2E51.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\Users\user\AppData\Local\Temp\mia2\mDIFxEXE.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\SET951E.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\mia.libJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\SETDF85.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\SET9B38.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\SET313F.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\1872974D\9EB13253\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6CC7.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\Users\user\AppData\Local\Temp\mia2\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\SETB6BF.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\SET1A7B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88FE.tmpJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\SETB875.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mDIFxIDE.dll\x64DPInst.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\oleaut32.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\SETE215.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C97.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\SETC5B3.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: 5c6a94.rbf (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\F0FC8706\FDA73152\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\TDService.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\1A2661C4\F965E9F6\USBIOCOM.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\34E6DE3C\FDA73152\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mDIFxIDE.dll\x64DPInst.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\oleaut32.dllJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\olepro32.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\C64028C1\DF012C2A\TDSCON.ocxJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\1872974D\9EB13253\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\SET1A7B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88FE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8830.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\SETC9AB.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\SETB875.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\SETA2F.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI88BE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C57.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6BBA.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\SET9B38.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI891E.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\SET313F.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\SETA9B0.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6CC7.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\SETE215.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C97.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\mia595B.tmp\mia.libJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\mia7B89.tmp\mia.libJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\TDServiceLogJump to behavior
              Source: C:\Windows\System32\drvinst.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 Blob
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\conhost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 1050000 memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 37D0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeWindow / User API: threadDelayed 700Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeWindow / User API: threadDelayed 8427Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\SETA7EA.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI8830.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\SET2E51.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\SETA2F.tmpJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia2\mDIFxEXE.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\SET951E.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\SET173E.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\SETDF85.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6C57.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\SET9B38.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI891E.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\SET313F.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\SETA9B0.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6CC7.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia2\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\SETB6BF.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\SET1A7B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI88FE.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\SETC9AB.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\SETB875.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\ProgramData\mia595B.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI88BE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6BBA.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\mia7B89.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\SET57C.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\SETE215.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6C97.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\mia595B.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\SETC5B3.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-18727
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-18824
              Source: C:\ProgramData\mia595B.tmp\TDService.exeAPI coverage: 8.4 %
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeAPI coverage: 9.0 %
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6204Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6204Thread sleep count: 700 > 30Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6204Thread sleep time: -700000s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 1576Thread sleep count: 137 > 30Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6204Thread sleep count: 8427 > 30Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6204Thread sleep time: -8427000s >= -30000sJump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe TID: 1084Thread sleep time: -32656s >= -30000s
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00407AC0 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,0_2_00407AC0
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC72A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,2_2_6CC72A30
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC62470 FindClose,FindFirstFileW,FindFirstFileW,2_2_6CC62470
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E2A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,10_2_693E2A30
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693D2470 FindClose,FindFirstFileW,FindFirstFileW,10_2_693D2470
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_10001B41 GetSystemInfo,10_2_10001B41
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\userJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeAPI call chain: ExitProcess graph end nodegraph_2-23098
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeAPI call chain: ExitProcess graph end nodegraph_10-37089
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00423B3C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00423B3C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00425561 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00425561
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004240E4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004240E4
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00424945 SetUnhandledExceptionFilter,0_2_00424945
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00423B3C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00423B3C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_00420DEF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00420DEF
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC76CD8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6CC76CD8
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC75A8A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6CC75A8A
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: 2_2_6CC751C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6CC751C7
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001B723 SetUnhandledExceptionFilter,10_2_1001B723
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_1001B735 SetUnhandledExceptionFilter,10_2_1001B735
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E5A8A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_693E5A8A
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E6CD8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_693E6CD8
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: 10_2_693E51C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_693E51C7
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\ProgramData\mia595B.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /sJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Progmanadvapi32.dllCreateProcessWithTokenW
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ProgmanU
              Source: 8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndU
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: GetLocaleInfoA,0_2_004295EA
              Source: C:\ProgramData\mia595B.tmp\TDService.exeCode function: GetLocaleInfoA,2_2_6CC7DEDB
              Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exeCode function: GetLocaleInfoA,10_2_693EDEDB
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{9ccfaa64-2bee-634c-b74d-8157966ed19d}\dens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{f09e7a60-0e8b-a74a-a66b-6aa4b1d719a9}\spectrodens_ir_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{8e8837bf-ff02-614c-8e7a-b11b44ac36ff}\spectroplate_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{7b9975a3-1615-624f-909c-3def7f6b1f3d}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{5ffce88b-5d36-134d-9774-6562c8b1bb19}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{30f5102e-ba4d-fb49-b3b3-10ebc04c2be4}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c963bf1b-f2fe-ff4c-9e09-0dcb6f3d7b7a}\spectrodens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c3ecf213-5717-4245-af4a-4040958206cd}\spectrojet_x64.cat VolumeInformation
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_004250BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004250BC
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 0_2_0041F2D0 MessageBoxW,CoInitialize,_memset,GetVersionExW,GetCommandLineW,_malloc,__CxxThrowException@8,MessageBoxW,_malloc,__CxxThrowException@8,MessageBoxW,MessageBoxW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,ShellExecuteExW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateProcessW,GetLastError,CloseHandle,WaitForSingleObject,GetExitCodeProcess,FindCloseChangeNotification,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_0041F2D0
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Windows\System32\certutil.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B6E6CB217307F0D3CD5CA360D368887B8FA98BA3 Blob
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              1
              Replication Through Removable Media
              1
              Windows Management Instrumentation
              1
              Scripting
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Native API
              1
              DLL Side-Loading
              21
              Windows Service
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory11
              Peripheral Device Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts3
              Command and Scripting Interpreter
              21
              Windows Service
              12
              Process Injection
              3
              Obfuscated Files or Information
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
              Software Packing
              NTDS46
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets11
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              File Deletion
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items43
              Masquerading
              DCSync31
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Modify Registry
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
              Virtualization/Sandbox Evasion
              /etc/passwd and /etc/shadow2
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
              Process Injection
              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1408892 Sample: 8ue90oYkrv Startdate: 14/03/2024 Architecture: WINDOWS Score: 45 128 Multi AV Scanner detection for dropped file 2->128 130 .NET source code contains potential unpacker 2->130 132 Machine Learning detection for sample 2->132 134 Machine Learning detection for dropped file 2->134 10 8ue90oYkrv.exe 1 124 2->10         started        13 msiexec.exe 354 120 2->13         started        15 svchost.exe 2->15         started        17 TDService.exe 5 4 2->17         started        process3 file4 86 C:\ProgramData\mia595B.tmp\mia.lib, PE32 10->86 dropped 88 C:\ProgramData\mia595B.tmp\...\mVBExec.dll, PE32 10->88 dropped 90 C:\ProgramData\mia595B.tmp\...\mMSIExec.dll, PE32 10->90 dropped 98 26 other files (15 malicious) 10->98 dropped 19 TDService.exe 16 99 10->19         started        92 C:\Windows\SysWOW64\lcms.dll, PE32 13->92 dropped 94 C:\Windows\SysWOW64\USBIOCOM.dll, PE32 13->94 dropped 96 C:\Windows\SysWOW64\TDSCON.ocx, PE32 13->96 dropped 100 28 other files (27 malicious) 13->100 dropped 23 msiexec.exe 87 13->23         started        25 msiexec.exe 35 13->25         started        27 msiexec.exe 31 13->27         started        35 2 other processes 13->35 29 drvinst.exe 15->29         started        31 drvinst.exe 15->31         started        33 drvinst.exe 15->33         started        37 5 other processes 15->37 process5 file6 70 5 other files (4 malicious) 19->70 dropped 136 Machine Learning detection for dropped file 19->136 39 TechkonDriver64Bit.exe 1 155 19->39         started        72 2 other malicious files 29->72 dropped 60 C:\Windows\...\spectrodens_ir_x64.sys (copy), PE32+ 31->60 dropped 62 C:\Windows\System32\...\SETA9B0.tmp, PE32+ 31->62 dropped 74 2 other malicious files 33->74 dropped 64 C:\Windows\...\spectrodens_x64.sys (copy), PE32+ 37->64 dropped 66 C:\Windows\System32\...\SET1A7B.tmp, PE32+ 37->66 dropped 68 C:\Windows\...\spectrojet_x64.sys (copy), PE32+ 37->68 dropped 76 7 other malicious files 37->76 dropped signatures7 process8 file9 78 C:\ProgramData\mia7B89.tmp\mia.lib, PE32 39->78 dropped 80 C:\ProgramData\mia7B89.tmp\...\mMSIExec.dll, PE32 39->80 dropped 82 C:\ProgramData\mia7B89.tmp\...\mDIFxEXE.dll, PE32 39->82 dropped 84 10 other files (9 malicious) 39->84 dropped 42 TechkonDriver64Bit.exe 39->42         started        process10 file11 102 C:\Users\user\AppData\Local\...\mMSIExec.dll, PE32 42->102 dropped 104 C:\Users\user\AppData\Local\...\mDIFxEXE.dll, PE32 42->104 dropped 106 C:\ProgramData\...\mia.lib, PE32 42->106 dropped 108 C:\ProgramData\...\TechkonDriver64Bit.exe, PE32 42->108 dropped 45 x64DPInst.exe 42->45         started        48 x64DPInst.exe 42->48         started        50 x64DPInst.exe 42->50         started        52 6 other processes 42->52 process12 file13 110 C:\Users\user\AppData\...\dens_x64.sys (copy), PE32+ 45->110 dropped 112 C:\Users\user\AppData\Local\...\SET951E.tmp, PE32+ 45->112 dropped 114 C:\Users\...\spectrodens_ir_x64.sys (copy), PE32+ 48->114 dropped 116 C:\Users\user\AppData\Local\...\SETA7EA.tmp, PE32+ 48->116 dropped 124 2 other malicious files 50->124 dropped 118 C:\Users\user\...\spectrojet_x64.sys (copy), PE32+ 52->118 dropped 120 C:\Users\user\AppData\Local\...\SET2E51.tmp, PE32+ 52->120 dropped 122 C:\Users\user\...\spectrojet_x64.sys (copy), PE32+ 52->122 dropped 126 7 other malicious files 52->126 dropped 54 conhost.exe 52->54         started        56 certutil.exe 52->56         started        58 certutil.exe 52->58         started        process14

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              8ue90oYkrv.exe4%ReversingLabs
              8ue90oYkrv.exe1%VirustotalBrowse
              8ue90oYkrv.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe100%Joe Sandbox ML
              C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exe100%Joe Sandbox ML
              C:\ProgramData\mia595B.tmp\TDService.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe100%Joe Sandbox ML
              5c6a94.rbf (copy)2%ReversingLabs
              5c6a94.rbf (copy)6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exe0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe2%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe2%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dll0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exe1%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe10%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe5%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe8%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dll0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dll0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sys0%ReversingLabs
              C:\ProgramData\mia595B.tmp\TDService.exe0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\1872974D\9EB13253\TechkonDriver64Bit.exe0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\1A2661C4\F965E9F6\USBIOCOM.dll0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exe2%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dll0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\34E6DE3C\FDA73152\TDService.exe2%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exe0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCX0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exe0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exe0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dll0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dll0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\C64028C1\DF012C2A\TDSCON.ocx0%ReversingLabs
              C:\ProgramData\mia595B.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exe5%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://ocsp.thawte.com00%URL Reputationsafe
              http://www.smartassembly.com/webservices/Reporting/L0%Avira URL Cloudsafe
              http://www.mywebsite.com/TECHKON0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/UploadReport20%Avira URL Cloudsafe
              http://ocsp.thawte.comhttp://crl.thawte.com/ThawteTimestampingCA.crl0%Avira URL Cloudsafe
              http://www.installaware.comz0%Avira URL Cloudsafe
              http://www.installaware.com/0%Avira URL Cloudsafe
              http://www.mywebsite.com/TechkonDriver64Bit.7zipiJu0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/L1%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/UploadReport20%VirustotalBrowse
              http://www.techkon.com/Microsoft0%Avira URL Cloudsafe
              HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIP0%Avira URL Cloudsafe
              http://www.mywebsite.com/TECHKON0%VirustotalBrowse
              http://www.mywebsite.com/TechkonDriver64Bit.7zipn0%Avira URL Cloudsafe
              http://www.installaware.com/buydirect.aspopen0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%VirustotalBrowse
              http://www.installaware.com/0%VirustotalBrowse
              http://www.installaware.com/InstallAware0%Avira URL Cloudsafe
              HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIP1%VirustotalBrowse
              http://www.techkon.com/0%Avira URL Cloudsafe
              http://www.techkon.com/Microsoft0%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/0%Avira URL Cloudsafe
              http://www.installaware.com/x2/0%Avira URL Cloudsafe
              http://www.installaware.com/buydirect.aspopen1%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/0%VirustotalBrowse
              http://www.installaware.com/x2/1%VirustotalBrowse
              http://www.techkon.com/0%VirustotalBrowse
              http://www.installaware.com/InstallAware1%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.mywebsite.com/TECHKON8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2613953321.00000000029A8000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F940000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.smartassembly.com/webservices/Reporting/L8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.thawte.com08ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://sawebservice.red-gate.com/8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://standards.iso.org/iso/19770/-2/2008/schema.xsd8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.smartassembly.com/webservices/Reporting/UploadReport28ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.thawte.comhttp://crl.thawte.com/ThawteTimestampingCA.crldrvinst.exe, 00000012.00000003.2195942001.000001BEB9B42000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198866038.000001BEB9B42000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.installaware.comz8ue90oYkrv.exe, 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039562862.00000000007FF000.00000002.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000002.2610568433.0000000000440000.00000002.00000001.01000000.0000000D.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2148764092.0000000003206000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2121119719.000000007FE3A000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000000.2117973572.000000000095B000.00000002.00000001.01000000.0000000E.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.installaware.com/8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.0000000000418000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.mywebsite.com/TechkonDriver64Bit.7zipiJuTechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.techkon.com/Microsoft8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2613953321.000000000297B000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2097703170.0000000005051000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007F940000.00000004.00001000.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIPTechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.mywebsite.com/TechkonDriver64Bit.7zipnTechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002754000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.thawte.com/ThawteTimestampingCA.crljdrvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://ocsp.thawte.comdrvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.thawte.com/ThawteTimestampingCA.crl08ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000003302000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2195942001.000001BEB9BE2000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BD3000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000002.2198821613.000001BEB9B05000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000012.00000003.2190859904.000001BEB9BE4000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000015.00000003.2222410790.000001CF288AF000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://crl.thawte.com/ThawteTimestampingCA.crl$drvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.installaware.com/buydirect.aspopen8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            HTTP://WWW.TECHKON.COM/MICROSOFTTDService.exe, 00000002.00000003.2613953321.000000000297B000.00000004.00001000.00020000.00000000.sdmpfalse
                              unknown
                              http://www.installaware.com/InstallAwareTechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002A6C000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.techkon.com/TechkonDriver64Bit.exe, 0000000A.00000003.2600608486.0000000002804000.00000004.00001000.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.mywebsite.com/TechkonDriver64Bit.7zipTechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2148764092.000000000318C000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000A.00000003.2121119719.000000007F940000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                http://www.smartassembly.com/webservices/UploadReportLogin/8ue90oYkrv.exe, 00000000.00000003.2035416907.0000000002A36000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.installaware.com/x2/8ue90oYkrv.exe, 00000000.00000003.2035416907.00000000030FA000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000002.00000000.2039012583.000000000077E000.00000020.00000001.01000000.00000004.sdmp, TDService.exe, 00000002.00000003.2043556777.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 00000009.00000003.2115091440.0000000002D6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • 1%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.thawte.com/ThawteTimestampingCA.crldrvinst.exe, 00000012.00000003.2190983896.000001BEB9BC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  No contacted IP infos
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1408892
                                  Start date and time:2024-03-14 12:12:53 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 13m 1s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:35
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:8ue90oYkrv.exe
                                  (renamed file extension from none to exe, renamed because original name is a hash value)
                                  Original Sample Name:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
                                  Detection:MAL
                                  Classification:mal45.evad.winEXE@59/343@0/0
                                  EGA Information:
                                  • Successful, ratio: 60%
                                  HCA Information:
                                  • Successful, ratio: 63%
                                  • Number of executed functions: 155
                                  • Number of non-executed functions: 157
                                  Cookbook Comments:
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 52.165.165.26, 72.21.81.240, 20.166.126.56, 23.206.121.28, 23.206.121.20, 52.165.164.15
                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                  • Execution Graph export aborted for target TechkonDriver64Bit.exe, PID 6352 because there are no executed function
                                  • Execution Graph export aborted for target x64DPInst.exe, PID 1172 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  12:14:22API Interceptor3599176x Sleep call for process: TDService.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1150976
                                  Entropy (8bit):7.90148039825505
                                  Encrypted:false
                                  SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                                  MD5:F00223A56D3F89627CC88625DBCB0C42
                                  SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                                  SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                                  SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  • Antivirus: Virustotal, Detection: 6%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):34382
                                  Entropy (8bit):5.158756389621352
                                  Encrypted:false
                                  SSDEEP:768:CyTwT115cmcDdWW3pv2ltwuNDxTpt7t7t7t7t7t7t7t7t6t7tdt7txJr7zSvi8Sc:VTo115cmcDdWW3pv2ltwuNDWI
                                  MD5:8F9B946A436E48D4C80ED812D5B2211F
                                  SHA1:B6B46C51803DE72C966AE34131939A7ADEA8B2D2
                                  SHA-256:A6FF54CB0E1A171305455DF89FE698243F75DBD90A56B3C4C0673776971C0E37
                                  SHA-512:6087D455CC12944755C29BF43C56629A60653C465ED83A425F2606E5DB5C95F0B0B404C513A365E7B335DA6C12F71B2FE22BBF0BFB398D02E1D04690B7743F05
                                  Malicious:false
                                  Preview:...@IXOS.@.....@.anX.@.....@.....@.....@.....@.....@......&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}..TECHKON Device Service..TDService.msi.@.....@.....@.....@........\PROGRA~3\&.{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Service......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{CD0C69EF-2B12-47ED-87B7-5A1DB20CBCD9}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{4D6F449F-FA68-42B5-A305-16C45F308B8F}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{96ED6BF5-4AA1-4668-AEEE-E5101CDF29BA}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{672A692B-629D-4B2A-A63B-2E211EA7164C}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{877EEC96-C1A3-45AB-B6E1-782150290E44}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{C166FAF3-5D3D-41C9-B181-43DF2464FB59}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{1E484634-B892-4CBA-9690-0E
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:modified
                                  Size (bytes):46696
                                  Entropy (8bit):5.127122725660687
                                  Encrypted:false
                                  SSDEEP:768:f9Lc5CLgpPGZvWs5idXxqlcsS8/4r/RmBkE/l/83tOtatNtWtdtAtstSthtkt7tr:1Lc5CLgpPGZvWs5idXxqlcsS8/4r/Rmx
                                  MD5:4948A45A621BBC100C76D2A409BEEBA7
                                  SHA1:682107DD4AFD596EE4001F98CD1F3EA3E9252434
                                  SHA-256:B9481B573E294F4D0DF5A6C2CB588810333B129652B6F72F64199F9C5174F037
                                  SHA-512:335E4BBCE700D78887CFC86D653FAB279871D81ADF6769CD4E88C500AF757C1DC4DA4FCCB78C46796AEB534A932D62AB2354ADA18A1D65173DBB66058DC665F2
                                  Malicious:false
                                  Preview:...@IXOS.@.....@.anX.@.....@.....@.....@.....@.....@......&.{55EA8940-B618-47BD-A642-20BFB2A64F78}..TECHKON Device Driver 64Bit..TechkonDriver64Bit.msi.@.....@.....@.....@........\PROGRA~3\&.{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Driver 64Bit......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{5702EAC5-033D-48B5-B83F-DEF9ECF4C262}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{52B0046B-434A-4EA9-9AC7-766C93D4D3F6}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{6D03A36D-9750-4B1E-8344-0CE7ACED2DE2}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{2B8BCB22-4191-4BD5-817D-B0123E06B87F}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{2CBD538B-C017-439A-8339-57F7ED6A8246}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{CDF804F9-6941-49E0-8B67-519B61E33E8A}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{DB88E18
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2871552
                                  Entropy (8bit):7.91890094076526
                                  Encrypted:false
                                  SSDEEP:49152:NnnZhJegT3345UB8r/fecnYWgPmGWy0tGGDOYEHamRS1j1fC5j9IXvWm6BPX:5nZygT33wtr/fmZxWywGGDOBxRkj1f6x
                                  MD5:3A0BF599146750C008BA6960C694470D
                                  SHA1:22E869B8C60BBFB263A7AF2B5350386617EB6E72
                                  SHA-256:3F1DC61B0BF0B93B1CD5478F151895B357DA92CAD2A48857E2FC4645C41E2DA3
                                  SHA-512:5E6ED7829C8DC1879C67FF6F142A96575251C583A5AE9103A48587BFF42C463B59B5EAB7F543414838AEA4E5BBCA6C0F8433CE3BEF6367632B663F242DF7D30F
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@...................................+......................................`......................+. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2902256
                                  Entropy (8bit):7.920111663334885
                                  Encrypted:false
                                  SSDEEP:49152:ynnZhJevas/0bxZjXAqySgkyneVSTTHJ7Als2GT/R1OPS5R+dQ:4nZA2xZjXgkAMSH24t1L5R+dQ
                                  MD5:F6CD94DEAEA55BB414650D6A9CB7DD6C
                                  SHA1:06AC62B0283E0490C9F66D3DE1E5CA47866CA3AA
                                  SHA-256:08F2DBAF4537368977DC0F0790F1FFF6FD65D30F4C91FED2B2CACC9A7F307A07
                                  SHA-512:3688F2622F43570DC1BD53B027D9A6C57FDE7DD4A34697D2E283549CF780F789A033FAA6EF5AB20EA49551921AC71844407AAAD0EDC87F9AAC9D1C2413D58F2C
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@..................................$-......................................`....................../,. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1253376
                                  Entropy (8bit):7.783380196730505
                                  Encrypted:false
                                  SSDEEP:24576:vF2oerN+CFfmxlJHLjyyrRyx/tCA1Q49UMEEXEimWZ2Eoxch6YB4:Mz9FOLjyywxNbrEEXhFoxch3
                                  MD5:0B682718F2229F8526387698D1F60DAF
                                  SHA1:FD7A024C14B1874587B1C6F94ED8AE4BA55C385C
                                  SHA-256:2491D1F5D96A265794972F7BAB6173005B300BC1E85ACDA346E882D6DEBB366A
                                  SHA-512:2D3B801A91C92DEC134AB0A81D7CFD2ADDA1045FD0A706B2605CB3046BEB19D97DD49D4A1418CA4966EDAE91A6CDB10A21379B85E1C035C20FB1FCE14851E597
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  • Antivirus: Virustotal, Detection: 6%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W.....................`......|.... ........@.. .......................`............@.................................2...J.......P@...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...P@.......P..................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1150976
                                  Entropy (8bit):7.90148039825505
                                  Encrypted:false
                                  SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                                  MD5:F00223A56D3F89627CC88625DBCB0C42
                                  SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                                  SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                                  SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  • Antivirus: Virustotal, Detection: 6%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1316
                                  Entropy (8bit):4.824855858394781
                                  Encrypted:false
                                  SSDEEP:24:cPN97KgwMV+nCGgMSqX+nH1WqBN3kmugmC4mA0snxs5XFF:cPr7/wdCGgXHH1Wqfi5mA0sxsvF
                                  MD5:83B25C1067C9BE0BCDF289BBED80D363
                                  SHA1:25FABE1F042D90F5678C3F97FCA6260BF27619D5
                                  SHA-256:1AB2F18023EE11A92E4A3D5D7F5A9FB9A8ED8D69D93D8D804CCCEB1E431A2442
                                  SHA-512:FCA4C27E0FDEAD9537694168AEA7DF3F2A05FB8E05F3EA8ECC6241E8A16A801532C9F71C777AC16528747D2160B1C9B5898CB5B8AF6C751509BE296F0CF280C0
                                  Malicious:false
                                  Preview:.<configuration>...<configSections>....<section name="log4net" type="System.Configuration.IgnoreSectionHandler" />...</configSections>...<runtime>...</runtime>...<log4net>....<appender name="TraceAppender" type="log4net.Appender.TraceAppender">.....<layout type="log4net.Layout.PatternLayout">......<conversionPattern value="%date [%thread] %-5level- %message%newline" />.....</layout>....</appender>.. .. <appender name="RollingFileAppender" type="log4net.Appender.RollingFileAppender">.. <file value="TDServiceLog.txt" />.. <appendToFile value="true" />.. <rollingStyle value="Size" />.. <maxSizeRollBackups value="10" />.. <maximumFileSize value="100KB" />.. <staticLogFileName value="true" />.. <threshold value="INFO"/>.. <lockingModel type="log4net.Appender.FileAppender+MinimalLock" />.. <layout type="log4net.Layout.PatternLayout">.. <conversionPattern value="%
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):24576
                                  Entropy (8bit):3.368242915265491
                                  Encrypted:false
                                  SSDEEP:192:kRYqGL5n0f1auFrzr9VCj0aWSXRaf4iPH0uTiF7odzFaGFbieHr/zZYZud:37l08kCBZBaf9/BiqzFdFbieHTzZYcd
                                  MD5:10195658250CA94B280DECCB4997B198
                                  SHA1:765684257978376B463369065C552366282963F3
                                  SHA-256:6801FD3462EE096A683D97A65D6E421E8B1419E9EEDC4A47BE7E2A14BCFA2CEF
                                  SHA-512:016207696A3D7E4D719F3506F5C6F5CF66B77C56226778C328A0A0D6D807D572650CC460A9343276A05F2448BBC16EF0F8DF844BA257ECF8573C48343F6A0B36
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..W...........!.....0... ......^N... ...`....@.. ...............................L....@..................................N..W....`..h...........................XM............................................... ............... ..H............text...d.... ...0.................. ..`.rsrc...h....`.......@..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):45056
                                  Entropy (8bit):3.9261380700304658
                                  Encrypted:false
                                  SSDEEP:384:GJzxPeOGEk4GKz7csqunx2gs1RteTOJ722RELbcAbZtLWs8:EzxNksqaJr2SLIEZ
                                  MD5:9CFAB4DAACA85482012D97693EA88201
                                  SHA1:095C31E6257CC5028E4605266477526D3B256B2B
                                  SHA-256:0EBB561BC5FB6FEB35ADE2BE679AB8149C9942253ADD9A1C2B7A6F53ADFE4E46
                                  SHA-512:9B6587CE414365420E96CA430C8DE170006CFF9ACEB51E7BF95BBFF6845AA936E8BF35D30B6442D23D48B460A085FA47673959BD3CB996970894549A71B7AB9F
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 1%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r..W.................P...P......^e... ........@.. ....................................@..................................e..S........?..........................\d............................................... ............... ..H............text...dE... ...P.................. ..`.rsrc....?.......@...`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1753088
                                  Entropy (8bit):7.88327202760358
                                  Encrypted:false
                                  SSDEEP:49152:8t723QiNn1X9NVWevTX9giFzbmjEanZQTS:8k3QiNnjNVWeLNg6nmj9n
                                  MD5:819E58177441A1A5EAEE35216DC4B6D7
                                  SHA1:65306A7FEF4AC738EA7177833B1D966E0B6C0BA5
                                  SHA-256:2E03F7A87D69FE8B32A0B9604E270A3AF9DD3421351BE230889B7E24F2F6F88C
                                  SHA-512:D8B7D560364D348ABFD956ACA24EC5631AB7488E3D49C27256B829D4EA165E0C56DC579E2E0EF1209029B7559B16A401AE63CDBBB2C773DAC176D7ABBAA3823A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 10%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. ....................................@.................................h...J.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):917504
                                  Entropy (8bit):7.835247620836694
                                  Encrypted:false
                                  SSDEEP:24576:foVuryMKftmxBFAsBnnJO16noCKPxKnp:gVoyMKftoYsFnI1DRPU
                                  MD5:6E5F4B906BD48CB77E3830F2871F726E
                                  SHA1:7C070D83CAD9F33D4A9EC01CDE9E0BB3AFE51409
                                  SHA-256:6DD53DECDE4A70E8B42657FAE088C22C07D8553E59506524ABA608BA087066F1
                                  SHA-512:616B153C677FE7F403D179664E24AD5FCD6041237A9A2A9FC4CA0A2C8B0050E74AA953E7349EC23780485D7D4984AA5072A8CCA26CDF9BC8439981424CC46C32
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 5%
                                  • Antivirus: Virustotal, Detection: 8%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. .......................@............@.................................X...J............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):18285
                                  Entropy (8bit):3.2625513904435572
                                  Encrypted:false
                                  SSDEEP:384:Lgxt0XdZ+3rWJr1N684b86fZMaTx111m+0:QiM3Q13A6aN111c
                                  MD5:1EBA2DF49DE0B85065585C6042C0770B
                                  SHA1:FE847BFA3FA1DC279BF7FDCB62BC27EFD4306B91
                                  SHA-256:BD0732871DBEAEE6A3BD9D5D0C5E1A32CB3752A857D203857AE2A99780004232
                                  SHA-512:17CA2455054057A486EA2D77439CFFCE4AFC4564E99219AAE7BB44DAE0511F552D8DC5C071A8FA01CDE208EE36EADD90600DE9976FC9CA31CE6310FDD448A005
                                  Malicious:false
                                  Preview:Remission..16.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..17.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..18.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..19.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..20.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..21.0,212.0,21.0,21.0,211.0,213.0,217.0,22.0,224.0,227.0,228
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4658
                                  Entropy (8bit):3.6044727088231916
                                  Encrypted:false
                                  SSDEEP:96:IPGiqjELGICWPCVo61VAZ1MluVPKEb81H:IPooLGICBVo6Oc
                                  MD5:55B6DFD4BEE7501D0A45D4BA9A865C06
                                  SHA1:8D4395E23F830F37FB59FBC8A03D15753E89F65F
                                  SHA-256:BE03976E9EB14CD5C07E3B7B0C7AD26B637F3AFC765959D080EE91BAD095B513
                                  SHA-512:63B07E67AAAAAB735967651AD1B3B8FC960F2809C02AF8DADD01BBEA9A722E56AA1C0BF8E95185965B919757DB6B3E5E5EB66CB3ED555416B755142D1D6E89AC
                                  Malicious:false
                                  Preview:Remission..Black.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..Cyan.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..Magenta.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..Yellow.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..Black_SD90.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..Black_SD0.0,212.0,21.0,21.0,211.0,213
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):245760
                                  Entropy (8bit):6.22180183473209
                                  Encrypted:false
                                  SSDEEP:6144:WNO7HqL+9Qxpw1Lpaofbn+0u61wxkM2AbuACH9d7jWy:WNO7HJX16uph
                                  MD5:5D1E5758CEE95AC926D0C9F7C18095EE
                                  SHA1:8253C41EF9539BDAD5FC15DB4FABA99C23242CD2
                                  SHA-256:4E48950BB961EA13C4DD489D915D0DF83304D52C950A99E3E6B981EAC22112D9
                                  SHA-512:B074D0DE952407F5DC721DE7157EC9957A8AD98A9C04F27F04A7BA81B5F0064DEB93F8D370539A4D37598E95B9D1EC5F91B13AFEC26BBA04309138E03F763750
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^W...6...6...6..a*...6..u)...6..*...6..u)..S6.......6..>...6...6..6.......6...0...6.......6..Rich.6..........PE..L.../l.?...........!................9................................................................'..............`...........d...............................x.......................................................x............................text............................... ..`.rdata........... ..................@..@.data....t.......p..................@....rsrc...............................@..@.reloc.. ".......0..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):61440
                                  Entropy (8bit):5.191530389320213
                                  Encrypted:false
                                  SSDEEP:768:idEKqzhqGRvl2ZTDATBSNdCskYW50dstrF/vmifdXJNs7GGSZhRhudUrvf:idErzhqGNl2dATskYgLhfhC2vf
                                  MD5:2B3281E100D19123A8E307FBB2DB0939
                                  SHA1:501376281A00B9B9A90BE2F7DACA3DB87C96DCC0
                                  SHA-256:24C362E5E8819F46C23DF1D2C36C5343D088293AF4178D9ED8B966296F0BB43E
                                  SHA-512:3ACB639C1C0AAB53EE9FDCB3E5F9C3767F70536858D96EBEE7841567C7C1C130F5D8DFB6FF6F491B17A56B3D579C2545E8909B3C2EB5D6D5947FEA1D6C15045A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q.?...........!......... ........... ........... ....................... ......"...........................................S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):96
                                  Entropy (8bit):4.2832136787344055
                                  Encrypted:false
                                  SSDEEP:3:HrJQyogRM/fyAiLJQyogRM/cLGr:HeFT9b
                                  MD5:C10BB4CF9692695632DE53434201ACA9
                                  SHA1:4215207F1C5E53C2CBA1638C7B27B587F0E48FC6
                                  SHA-256:CC11C5FEA0D555905CC67BF2081C55F9F82A049EE65A89A371D2310BF37AA8EB
                                  SHA-512:27234743327A5F7F46B60CD1F544C77353AA93C29E583EE8A8DB801D5E654EEDB2AAF30F8F4EA4219BB53B739C9E51694143009F9533BB456F0B44F2E2ADC862
                                  Malicious:false
                                  Preview:certutil -f -addstore TrustedPublisher TK1.cer..certutil -f -addstore TrustedPublisher TK2.cer..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Certificate, Version=3
                                  Category:dropped
                                  Size (bytes):1379
                                  Entropy (8bit):7.164821094442024
                                  Encrypted:false
                                  SSDEEP:24:3hE3IaffyrWghhywWGwBBrG7V+vXx9uyv1jTRgjDiuVz0mkhfAwfSLC:36DffrgarB8V+vXx9uyv0DiuVxkhfEm
                                  MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                                  SHA1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                                  SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                                  SHA-512:7232D3260D6714B6DD1B403AB1F838E2D6A33F9AA37D50C2DE4328DBFEA450C3A77875A333968219CB4F8B21140559310FBA42C9833F740A928554387EFFD969
                                  Malicious:false
                                  Preview:0.._0..G.......,h..g.0L.....1..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...140304000000Z..170602235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........!.`.x..qr.r.....y.....$<.]./..E.EyJ.&4..}....}Y.O..5up....77.B.E,.U..P..b@.T.Ek..mr_9#.?.n..S....^?j....Z....m8.....L+..n...s.....k.......<|>_.T9.C...u.S}N...3.C.oKqup>..?`,..U.."..p..3<d<..$Q....|_...`U.(m...f...j....+-.. F`.....[..e|..g.?5........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Certificate, Version=3
                                  Category:dropped
                                  Size (bytes):1379
                                  Entropy (8bit):7.175302981793894
                                  Encrypted:false
                                  SSDEEP:24:/3IaffyrW+hywWGwBBrG7pLqQ9xtRgjDiuVz0mkh6fyzjOlJ9X2I0:/DffrJrB80mgDiuVxkh6fyzSx0
                                  MD5:1E256F3CD8A847D91596BF2C37DBF285
                                  SHA1:6641ED279EF1A7A8E6D06BCEB38570B429101AA2
                                  SHA-256:6FCE0715E8C7D2B5BF2D7B049AE6CB6842E2D9757A2D9296A1587BBD05C2FE25
                                  SHA-512:91DAD8AFEA4A493269688CA7B7642DA7A663742C5811AADB3EE13D66DCB3BE2B1ED5EA6A9F45FBF9E6E432AEED0A9AE1AAA4A921658F2D5DDF2524C5EF195C3A
                                  Malicious:false
                                  Preview:0.._0..G.......7......'@...\...0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...110320000000Z..120307235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........6.....:N~lw..F..J7h...5x._9..\....:.)z..].......g.....4.....D..FI.......s....`L....}..`~.U..E.H....*Q........sv.....x.eLh...`..<^.%.. .J.....(5...^.....U.P.....r.......{..u...O..0....V.y......$#...#. N..:...E.L0.CZ..B3.E..@x.?.|..B.".....&.<.........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):5295078
                                  Entropy (8bit):6.41595061147608
                                  Encrypted:false
                                  SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJF:hTaRZ8tjD4+wD5ZksyPHIFIF
                                  MD5:A94A3D60FA8A54AB71ABED39D5883D86
                                  SHA1:3FC14B383FD699017AA7B7281C28F143AEAF7B9F
                                  SHA-256:3AC4616A5ABF9A408EDCCC48D15AB9DD6441DAD273C8F477C1EB291812949451
                                  SHA-512:172CE336A3343D8ED92EDA525A549F1E388D37076F71DC28C043FABC94B04761B7E936871F203C2B681EB4BFCC8C239327656F51003CD46D11C94589B1E8CC13
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia595B.tmp\TDService.exe, Author: Joe Security
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):766976
                                  Entropy (8bit):6.307836502585046
                                  Encrypted:false
                                  SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                                  MD5:D471255784CC4AE28EA97447F67DA9F2
                                  SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                                  SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                                  SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:7-zip archive data, version 0.3
                                  Category:dropped
                                  Size (bytes):3831837
                                  Entropy (8bit):6.288047394335939
                                  Encrypted:false
                                  SSDEEP:49152:zXlXDzXmLXrXxXzX4XOXWXmOX+rXAEJD2d8hMcSCnmNPIkFVZ+cocaFjhkSYKPM:xw4BF3ai
                                  MD5:3EA26D5D84024858345551BDD209F62A
                                  SHA1:DE89AEAB1CBE1328B0CDB7C17BE2B43BEA076E30
                                  SHA-256:E58F0C20DFFBB1299D972CC7C3556DDDDE8D6888570FEEF208E48EAD68877149
                                  SHA-512:5E8F2CCA528F77CC624FD17228D796E3921008A9D73511793E33FE6F4B94463D5304A969A4F18DD0BCDD2C5B0663861570E861DAC58355EF641860BB071AE607
                                  Malicious:false
                                  Preview:7z..'.......'p:...............M...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2902256
                                  Entropy (8bit):7.920111663334885
                                  Encrypted:false
                                  SSDEEP:49152:ynnZhJevas/0bxZjXAqySgkyneVSTTHJ7Als2GT/R1OPS5R+dQ:4nZA2xZjXgkAMSH24t1L5R+dQ
                                  MD5:F6CD94DEAEA55BB414650D6A9CB7DD6C
                                  SHA1:06AC62B0283E0490C9F66D3DE1E5CA47866CA3AA
                                  SHA-256:08F2DBAF4537368977DC0F0790F1FFF6FD65D30F4C91FED2B2CACC9A7F307A07
                                  SHA-512:3688F2622F43570DC1BD53B027D9A6C57FDE7DD4A34697D2E283549CF780F789A033FAA6EF5AB20EA49551921AC71844407AAAD0EDC87F9AAC9D1C2413D58F2C
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@..................................$-......................................`....................../,. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):180224
                                  Entropy (8bit):6.031963137664287
                                  Encrypted:false
                                  SSDEEP:3072:LwlZ+P6imnm8mFmT73tgHnV53kAgcvzgRm1trohJkwh:cZ+6imnm8mFmT73krb6gonf
                                  MD5:CEC1791BEC45F9D86771AF4F24EAA3F4
                                  SHA1:1B806C9A7189C7801EF643C5AEA03CD6B0DEDCC4
                                  SHA-256:7878EB862C0A8AB0766236E6C2183FAC93A0C734276347A143B454E2FB8B4F58
                                  SHA-512:BF917BA4C20DB97685A4BFEA266ECE11C77286F9480E546007FC1D830E4DFBA0966F6B5B59D74AFC89713276BB899755DFABC8F3C42A8422E612401C761A9BE7
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%.v.v.v.Y.v.v.Y.v...v"..v.v"..v.v.vE..v.Y.v..v.Y.v...v.Y.v...v.Y.v...vRich.v........PE..L...Q..K...........!.....`...P...............p......................................[...............................0................0..................................................................@............p..l............................text...._.......`.................. ..`.rdata...x...p.......p..............@..@.data....9....... ..................@....rsrc........0......................@..@.reloc..V'.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1253376
                                  Entropy (8bit):7.783380196730505
                                  Encrypted:false
                                  SSDEEP:24576:vF2oerN+CFfmxlJHLjyyrRyx/tCA1Q49UMEEXEimWZ2Eoxch6YB4:Mz9FOLjyywxNbrEEXhFoxch3
                                  MD5:0B682718F2229F8526387698D1F60DAF
                                  SHA1:FD7A024C14B1874587B1C6F94ED8AE4BA55C385C
                                  SHA-256:2491D1F5D96A265794972F7BAB6173005B300BC1E85ACDA346E882D6DEBB366A
                                  SHA-512:2D3B801A91C92DEC134AB0A81D7CFD2ADDA1045FD0A706B2605CB3046BEB19D97DD49D4A1418CA4966EDAE91A6CDB10A21379B85E1C035C20FB1FCE14851E597
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W.....................`......|.... ........@.. .......................`............@.................................2...J.......P@...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...P@.......P..................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):24576
                                  Entropy (8bit):3.368242915265491
                                  Encrypted:false
                                  SSDEEP:192:kRYqGL5n0f1auFrzr9VCj0aWSXRaf4iPH0uTiF7odzFaGFbieHr/zZYZud:37l08kCBZBaf9/BiqzFdFbieHTzZYcd
                                  MD5:10195658250CA94B280DECCB4997B198
                                  SHA1:765684257978376B463369065C552366282963F3
                                  SHA-256:6801FD3462EE096A683D97A65D6E421E8B1419E9EEDC4A47BE7E2A14BCFA2CEF
                                  SHA-512:016207696A3D7E4D719F3506F5C6F5CF66B77C56226778C328A0A0D6D807D572650CC460A9343276A05F2448BBC16EF0F8DF844BA257ECF8573C48343F6A0B36
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..W...........!.....0... ......^N... ...`....@.. ...............................L....@..................................N..W....`..h...........................XM............................................... ............... ..H............text...d.... ...0.................. ..`.rsrc...h....`.......@..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1150976
                                  Entropy (8bit):7.90148039825505
                                  Encrypted:false
                                  SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                                  MD5:F00223A56D3F89627CC88625DBCB0C42
                                  SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                                  SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                                  SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4658
                                  Entropy (8bit):3.6044727088231916
                                  Encrypted:false
                                  SSDEEP:96:IPGiqjELGICWPCVo61VAZ1MluVPKEb81H:IPooLGICBVo6Oc
                                  MD5:55B6DFD4BEE7501D0A45D4BA9A865C06
                                  SHA1:8D4395E23F830F37FB59FBC8A03D15753E89F65F
                                  SHA-256:BE03976E9EB14CD5C07E3B7B0C7AD26B637F3AFC765959D080EE91BAD095B513
                                  SHA-512:63B07E67AAAAAB735967651AD1B3B8FC960F2809C02AF8DADD01BBEA9A722E56AA1C0BF8E95185965B919757DB6B3E5E5EB66CB3ED555416B755142D1D6E89AC
                                  Malicious:false
                                  Preview:Remission..Black.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..Cyan.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..Magenta.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..Yellow.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..Black_SD90.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..Black_SD0.0,212.0,21.0,21.0,211.0,213
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2871552
                                  Entropy (8bit):7.91890094076526
                                  Encrypted:false
                                  SSDEEP:49152:NnnZhJegT3345UB8r/fecnYWgPmGWy0tGGDOYEHamRS1j1fC5j9IXvWm6BPX:5nZygT33wtr/fmZxWywGGDOBxRkj1f6x
                                  MD5:3A0BF599146750C008BA6960C694470D
                                  SHA1:22E869B8C60BBFB263A7AF2B5350386617EB6E72
                                  SHA-256:3F1DC61B0BF0B93B1CD5478F151895B357DA92CAD2A48857E2FC4645C41E2DA3
                                  SHA-512:5E6ED7829C8DC1879C67FF6F142A96575251C583A5AE9103A48587BFF42C463B59B5EAB7F543414838AEA4E5BBCA6C0F8433CE3BEF6367632B663F242DF7D30F
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@...................................+......................................`......................+. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):124688
                                  Entropy (8bit):5.941729779329973
                                  Encrypted:false
                                  SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                                  MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                                  SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                                  SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                                  SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):45056
                                  Entropy (8bit):3.9261380700304658
                                  Encrypted:false
                                  SSDEEP:384:GJzxPeOGEk4GKz7csqunx2gs1RteTOJ722RELbcAbZtLWs8:EzxNksqaJr2SLIEZ
                                  MD5:9CFAB4DAACA85482012D97693EA88201
                                  SHA1:095C31E6257CC5028E4605266477526D3B256B2B
                                  SHA-256:0EBB561BC5FB6FEB35ADE2BE679AB8149C9942253ADD9A1C2B7A6F53ADFE4E46
                                  SHA-512:9B6587CE414365420E96CA430C8DE170006CFF9ACEB51E7BF95BBFF6845AA936E8BF35D30B6442D23D48B460A085FA47673959BD3CB996970894549A71B7AB9F
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r..W.................P...P......^e... ........@.. ....................................@..................................e..S........?..........................\d............................................... ............... ..H............text...dE... ...P.................. ..`.rsrc....?.......@...`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1753088
                                  Entropy (8bit):7.88327202760358
                                  Encrypted:false
                                  SSDEEP:49152:8t723QiNn1X9NVWevTX9giFzbmjEanZQTS:8k3QiNnjNVWeLNg6nmj9n
                                  MD5:819E58177441A1A5EAEE35216DC4B6D7
                                  SHA1:65306A7FEF4AC738EA7177833B1D966E0B6C0BA5
                                  SHA-256:2E03F7A87D69FE8B32A0B9604E270A3AF9DD3421351BE230889B7E24F2F6F88C
                                  SHA-512:D8B7D560364D348ABFD956ACA24EC5631AB7488E3D49C27256B829D4EA165E0C56DC579E2E0EF1209029B7559B16A401AE63CDBBB2C773DAC176D7ABBAA3823A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. ....................................@.................................h...J.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):245760
                                  Entropy (8bit):6.22180183473209
                                  Encrypted:false
                                  SSDEEP:6144:WNO7HqL+9Qxpw1Lpaofbn+0u61wxkM2AbuACH9d7jWy:WNO7HJX16uph
                                  MD5:5D1E5758CEE95AC926D0C9F7C18095EE
                                  SHA1:8253C41EF9539BDAD5FC15DB4FABA99C23242CD2
                                  SHA-256:4E48950BB961EA13C4DD489D915D0DF83304D52C950A99E3E6B981EAC22112D9
                                  SHA-512:B074D0DE952407F5DC721DE7157EC9957A8AD98A9C04F27F04A7BA81B5F0064DEB93F8D370539A4D37598E95B9D1EC5F91B13AFEC26BBA04309138E03F763750
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^W...6...6...6..a*...6..u)...6..*...6..u)..S6.......6..>...6...6..6.......6...0...6.......6..Rich.6..........PE..L.../l.?...........!................9................................................................'..............`...........d...............................x.......................................................x............................text............................... ..`.rdata........... ..................@..@.data....t.......p..................@....rsrc...............................@..@.reloc.. ".......0..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):212992
                                  Entropy (8bit):6.4058590918443175
                                  Encrypted:false
                                  SSDEEP:6144:U+l+8gbiTF32Cw0oSGWhuLuGser+VbGrIQL:idbgFmJSGWhWuGseapkr
                                  MD5:05D89328C51E732DE076DA05239D1D79
                                  SHA1:C89B8500D13D540D9F6D8FA651F13E2F9990DECE
                                  SHA-256:EE0BC472EC26CE050315AAAE1D85AE51BAF17E8A2A548E3161DED665CF324DD1
                                  SHA-512:9EFE29F322A0A3049D0E5332C92A434B2F9797C0D3DB09414FCF8D6F5A01C4157716D5D252B38879312D5675712AD875B2A8D7E9407849CE1B992B94D5E50FF3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9K!3}*O`}*O`}*O`.5D`|*O`.6A``*O`.5E`.*O`.5\`x*O`}*N`3*O`{.E`i*O`.,I`|*O`..K`|*O`Rich}*O`........................PE..L......B...........!.....p..........w...................................................................................W.......<....`.......................p.......................................................................................text....k.......p.................. ..`.rdata...(.......0..................@..@.data...X........`..................@....rsrc........`......................@..@.reloc.......p... ... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):5.853209211745096
                                  Encrypted:false
                                  SSDEEP:1536:YxeYFH0dtYcPdtYc0F9J174KlwOAYQog4wBYo4IYo4N65xpUV:YTFXNxF9j7j65xpUV
                                  MD5:9AA2C7DEAF5B8DBED62A60F723553858
                                  SHA1:6BFE53D07A3970523DC8C796EE24F392D2686BF7
                                  SHA-256:28D0E73EE5616C2A76829A0A430F465B598987B4798F6BA46234393E40167BA9
                                  SHA-512:AF2C404702563143B3ED6FC26C45D4E1CBB074F006420FF04F963C1F13783CA141C13D08918AFA9537A2DAABABC631C18DBB6562BC50AA3CB49294CCD00714F3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......UBq..#...#...#...?...#..^....#..'....#.......#..Rich.#..........PE..L...Y..J...........!.........@......(........................................@......"J..........................................(.......D....................0..............................................X... .......(............................text............................... ..`.data...H...........................@....rsrc...D........ ..................@..@.reloc.......0.......0..............@..B2..H............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):917504
                                  Entropy (8bit):7.835247620836694
                                  Encrypted:false
                                  SSDEEP:24576:foVuryMKftmxBFAsBnnJO16noCKPxKnp:gVoyMKftoYsFnI1DRPU
                                  MD5:6E5F4B906BD48CB77E3830F2871F726E
                                  SHA1:7C070D83CAD9F33D4A9EC01CDE9E0BB3AFE51409
                                  SHA-256:6DD53DECDE4A70E8B42657FAE088C22C07D8553E59506524ABA608BA087066F1
                                  SHA-512:616B153C677FE7F403D179664E24AD5FCD6041237A9A2A9FC4CA0A2C8B0050E74AA953E7349EC23780485D7D4984AA5072A8CCA26CDF9BC8439981424CC46C32
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 5%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. .......................@............@.................................X...J............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):61440
                                  Entropy (8bit):5.191530389320213
                                  Encrypted:false
                                  SSDEEP:768:idEKqzhqGRvl2ZTDATBSNdCskYW50dstrF/vmifdXJNs7GGSZhRhudUrvf:idErzhqGNl2dATskYgLhfhC2vf
                                  MD5:2B3281E100D19123A8E307FBB2DB0939
                                  SHA1:501376281A00B9B9A90BE2F7DACA3DB87C96DCC0
                                  SHA-256:24C362E5E8819F46C23DF1D2C36C5343D088293AF4178D9ED8B966296F0BB43E
                                  SHA-512:3ACB639C1C0AAB53EE9FDCB3E5F9C3767F70536858D96EBEE7841567C7C1C130F5D8DFB6FF6F491B17A56B3D579C2545E8909B3C2EB5D6D5947FEA1D6C15045A
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q.?...........!......... ........... ........... ....................... ......"...........................................S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1316
                                  Entropy (8bit):4.824855858394781
                                  Encrypted:false
                                  SSDEEP:24:cPN97KgwMV+nCGgMSqX+nH1WqBN3kmugmC4mA0snxs5XFF:cPr7/wdCGgXHH1Wqfi5mA0sxsvF
                                  MD5:83B25C1067C9BE0BCDF289BBED80D363
                                  SHA1:25FABE1F042D90F5678C3F97FCA6260BF27619D5
                                  SHA-256:1AB2F18023EE11A92E4A3D5D7F5A9FB9A8ED8D69D93D8D804CCCEB1E431A2442
                                  SHA-512:FCA4C27E0FDEAD9537694168AEA7DF3F2A05FB8E05F3EA8ECC6241E8A16A801532C9F71C777AC16528747D2160B1C9B5898CB5B8AF6C751509BE296F0CF280C0
                                  Malicious:false
                                  Preview:.<configuration>...<configSections>....<section name="log4net" type="System.Configuration.IgnoreSectionHandler" />...</configSections>...<runtime>...</runtime>...<log4net>....<appender name="TraceAppender" type="log4net.Appender.TraceAppender">.....<layout type="log4net.Layout.PatternLayout">......<conversionPattern value="%date [%thread] %-5level- %message%newline" />.....</layout>....</appender>.. .. <appender name="RollingFileAppender" type="log4net.Appender.RollingFileAppender">.. <file value="TDServiceLog.txt" />.. <appendToFile value="true" />.. <rollingStyle value="Size" />.. <maxSizeRollBackups value="10" />.. <maximumFileSize value="100KB" />.. <staticLogFileName value="true" />.. <threshold value="INFO"/>.. <lockingModel type="log4net.Appender.FileAppender+MinimalLock" />.. <layout type="log4net.Layout.PatternLayout">.. <conversionPattern value="%
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):124688
                                  Entropy (8bit):5.941729779329973
                                  Encrypted:false
                                  SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                                  MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                                  SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                                  SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                                  SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):18285
                                  Entropy (8bit):3.2625513904435572
                                  Encrypted:false
                                  SSDEEP:384:Lgxt0XdZ+3rWJr1N684b86fZMaTx111m+0:QiM3Q13A6aN111c
                                  MD5:1EBA2DF49DE0B85065585C6042C0770B
                                  SHA1:FE847BFA3FA1DC279BF7FDCB62BC27EFD4306B91
                                  SHA-256:BD0732871DBEAEE6A3BD9D5D0C5E1A32CB3752A857D203857AE2A99780004232
                                  SHA-512:17CA2455054057A486EA2D77439CFFCE4AFC4564E99219AAE7BB44DAE0511F552D8DC5C071A8FA01CDE208EE36EADD90600DE9976FC9CA31CE6310FDD448A005
                                  Malicious:false
                                  Preview:Remission..16.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..17.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..18.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..19.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..20.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..21.0,212.0,21.0,21.0,211.0,213.0,217.0,22.0,224.0,227.0,228
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1150976
                                  Entropy (8bit):7.90148039825505
                                  Encrypted:false
                                  SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                                  MD5:F00223A56D3F89627CC88625DBCB0C42
                                  SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                                  SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                                  SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1448448
                                  Entropy (8bit):6.68350408954223
                                  Encrypted:false
                                  SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                                  MD5:18B85C5A139BAEAFD89C70B8C6561A52
                                  SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                                  SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                                  SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):74960
                                  Entropy (8bit):6.080943948881524
                                  Encrypted:false
                                  SSDEEP:1536:3TlRSuxQYyqUB9XzWqxGHVcIIX5ZDBZGscEvWlExtJl966CX6q0uE:FfUB9XamGHpw5ZDXXPOixtJz3CX6qQ
                                  MD5:81E5C8596A7E4E98117F5C5143293020
                                  SHA1:45B7FE0989E2DF1B4DFD227F8F3B73B6B7DF9081
                                  SHA-256:7D126ED85DF9705EC4F38BD52A73B621CF64DD87A3E8F9429A569F3F82F74004
                                  SHA-512:05B1E9EEF13F7C140EB21F6DCB705EE3AAAFABE94857AA86252AFA4844DE231815078A72E63D43725F6074AA5FEFE765FEB93A6B9CD510EE067291526BB95EC6
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~c.3...."......#.................3.............p................................g....................................................%.......................... ...8............................................................................text....................... ....... ..`.data...............................@....rsrc....%.......&..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:MS-DOS executable, NE for MS Windows 3.x (DLL or font)
                                  Category:dropped
                                  Size (bytes):2272
                                  Entropy (8bit):5.626412274243338
                                  Encrypted:false
                                  SSDEEP:48:iuB0q8Z8LCQZ5U45owLkq10Ju1pwZbQP+DWmnDypKGDsQVG:NB0q7L35S22u1pwZC+ymnDmKGDsv
                                  MD5:7210D5407A2D2F52E851604666403024
                                  SHA1:242FDE2A7C6A3EFF245F06813A2E1BDCAA9F16D9
                                  SHA-256:337D2FB5252FC532B7BF67476B5979D158CA2AC589E49C6810E2E1AFEBE296AF
                                  SHA-512:1755A26FA018429AEA00EBCC786BB41B0D6C4D26D56CD3B88D886B0C0773D863094797334E72D770635ED29B98D4C8C7F0EC717A23A22ADEF705A1CCF46B3F68
                                  Malicious:false
                                  Preview:MZR.....................@...............................................!..L.!This program requires Microsoft Windows...$.......NE.<............................1.@.P.|.....M.............R.......r.P.r.`.r.q.r...........l...0...............p...0..........W95INF16...WEP...DLLENTRYPOINT...........KERNEL.USER.SETUPX....?.z...?.....?.!...INF Installation Library...W95THK_THUNKDATA16.....................................................................EU...WQ.V..j.j.Q......j....f..]M.EU....f..]M....2...v.2...6...:.XZh..h..h>.hV..RP.....w95thk_ThunkData32..U..F..p........U...h ..h...v.f.v..@.I.=....@.........V.^.&....f.v..F..P.........t....M.v...6L...6X......Ph...........u.....P..6d........t..v.......j....F..^.&..3.^.........WV.v..v.V......N.....N.;.v.QVQP........&.?\t..F.&..\G.^.&.? t.......F&.< t..v.W.V.....^_........WV..C.......f....3.........F..F.f.v..F..P............j......P.......u......P.......t..F...j.f.v......3.....~....f.~..u..F......F...3..F.F.F.f+.f.N.f.N.h..h...N..Q......
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):4608
                                  Entropy (8bit):2.9774207313950316
                                  Encrypted:false
                                  SSDEEP:48:6Z3Mi+h0U47yaE6akf1WbvgFfSBZW3IezfXNFk5WgF:VEyaVaVv+aPWJXNyWg
                                  MD5:4BE7661C89897EAA9B28DAE290C3922F
                                  SHA1:4C9D25195093FEA7C139167F0C5A40E13F3000F2
                                  SHA-256:E5E9F7C8DBD47134815E155ED1C7B261805EDA6FDDEA6FA4EA78E0E4FB4F7FB5
                                  SHA-512:2035B0D35A5B72F5EA5D5D0D959E8C36FC7AC37DEF40FA8653C45A49434CBE5E1C73AAF144CBFBEFC5F832E362B63D00FC3157CA8A1627C3C1494C13A308FC7F
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=2...........!......................... .....p.........................p...................................... .......@..<....P.......................`..0...................................................d@..(............................text............................... ..`.rdata....... ......................@..@.data........0......................@....idata..@....@......................@....rsrc........P......................@....reloc..\....`......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):147728
                                  Entropy (8bit):5.909287934496192
                                  Encrypted:false
                                  SSDEEP:3072:h+qD1Cd/Oa5kXFlqkFGr3CAP7LCyInPEggen5Ez:hlCd/OaaFEjCAPKyOE6na
                                  MD5:C89E401800DE62E5702E085D898EED20
                                  SHA1:72FB4F088C6AC02097B55FB267C76FBF5E0FA1F7
                                  SHA-256:DE83C9D9203050B40C098E4143EF8F577AA90016C7A64D4F2931B57A4C43E566
                                  SHA-512:70006D70DCB47361FF43E4F7C458655AD2474B70CB917873AA77D2CC06465A68D375D36C494D154A03DBBFF891DF7DD6CAB3D2C7B08E8650B9FF170E30838070
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ru..ru..ru..mf..ru..ru..su.Rich.ru.........................PE..L....!.6...........#..................... ........<e.........................`... ..^q..................................n.......d....0.......................@..0...P!............................................... ..L............................text...n.... ....... .............. ..`.data....d.......P..................@....rsrc........0......................@..@.reloc..v....@... ... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):22288
                                  Entropy (8bit):4.814478820147639
                                  Encrypted:false
                                  SSDEEP:384:23Fob3slaN3oF1fHICOoMzMv/QTIBjDVquODJXsUW7ftWs6:Yo7s28JnOxzMv/QsBjRqugXspd
                                  MD5:3B180DA2B50B954A55FE37AFBA58D428
                                  SHA1:C2A409311853AD4608418E790621F04155E55000
                                  SHA-256:96D04CDFAF4F4D7B8722B139A15074975D4C244302F78034B7BE65DF1A92FD03
                                  SHA-512:CF94AD749D91169078B8829288A2FC8DE86EC2FE83D89DC27D54D03C73C0DECA66B5D83ABBEAA1FF09D0ACAC4C4352BE6502945B5187ECDE952CBB08037D07E8
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...rD.2....i......#.....2...................P.....w.................................................................?......*<..d....`.......................p..4...............................................X....................................text...#0.......2.......... V...... ..`.data........P.......B..............@....rsrc........`.......N..............@..@.reloc.......p.......R..............@..BkD.2(.....22...jD.2?....%.2J...........ole32.dll.KERNEL32.dll.USER32.dll.ADVAPI32.dll..........................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1326592
                                  Entropy (8bit):6.662178971692568
                                  Encrypted:false
                                  SSDEEP:24576:9JGBDZIKwoTaK/T/Tua+hWWfnElT/XhBiSwmK9lHcPJMgh:vqxaSzqUNBXhkSwQPi
                                  MD5:AC12DEC48405495C2008858D243DA8BC
                                  SHA1:0B6AD42CDE232A81B415481B772319FB1138C35E
                                  SHA-256:AD45020E327C16F0A847C38A058E606A7738EA6D0DDAAF80439797CA95F5FD43
                                  SHA-512:F6A381063DC321C85BD9FFECD524FCFA4EB968AA7644AB339F292B7037BE9C1FA997D2CAD382BE92848010AEEEA38209908B5FAE17CD0B261E0DBEFA38BF5F58
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.....................t.....................Q....................................................................N.......\7.......Z..........................................................................,................................text...\........................... ..`.itext.............................. ..`.data....M.......N..................@....bss.....T...@...........................idata..\7.......8..................@....didata..............P..............@....edata..N............Z..............@..@.rdata...............\..............@..@.reloc...............^..............@..B.rsrc....Z.......Z..................@..@.....................>..............@..@........................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):1386496
                                  Entropy (8bit):6.507253562372704
                                  Encrypted:false
                                  SSDEEP:24576:jrWIEO0eDfcPOvCOpMEPJonhql5oHS+zh3JajtObuF+T+NUFRjUgIeX40sgdp:jrOuCQhJohq3oHrh3JajtObu2+NUF5Vd
                                  MD5:F28EB5CBC3CA6D8C787F09F047D1F9C8
                                  SHA1:70DB1FAC822974BC9B636A984BCC1DA2E67F8DE5
                                  SHA-256:3EF32E0152CC3FA07C417E6AADF9EAD83A17B5FDEE73799044E1BD7564725D6E
                                  SHA-512:84F811F75E9D5143898728D2109B349802A292D4EF2CCAE4B4421D20268A33C6DDEE9C70E8BDEB474A3AC70307B2554C00CE786CA1F446807610FA2717F3745F
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#.........v.....................f......................... .......N...............................0...Q..............L.................... .......................................................................................text.............................. ..`ENGINE.............................. ..`.data....n.......p..................@....rsrc...l...........................@..@.reloc....... ....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):598288
                                  Entropy (8bit):6.644743270512807
                                  Encrypted:false
                                  SSDEEP:12288:HCKynQWKglDhrUtrvT/NInIk4NDXsR6lMlpGz:HGXqB8V6lMlMz
                                  MD5:7B156D230278B8C914EF3F4169FEC1CC
                                  SHA1:6B58E20B2538CB308091DA838710F6AAD933A301
                                  SHA-256:BAEB2F7C1B8BE56738D34E1D1DDF8E0EEBD3A633215DC1575E14656BE38B939D
                                  SHA-512:E4EC2BC714069E0A6B56D89B52AABAD92E5BA741DC6F26D2FC2D72AA9AD2EC465DEA523CCCD810331AB78B5FB8A1244B2B521303418EAD5BD6BE5A58B43794C5
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ibW.-.9.-.9.-.9...7.(.9.{.*.,.9.-.9...9.Rich-.9.................PE..L....#.6...........#..... ...................p....4e......................... ......+................................6..%$.......................................g...................................................................................text............ ... .............. ..`.data....a...0...`...@..............@....rsrc...............................@..@.reloc...g.......p..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):164112
                                  Entropy (8bit):5.8462943829831575
                                  Encrypted:false
                                  SSDEEP:3072:+VrhrwLXcA2Ha/joWklbo/Acjwm4AaW7zozn/zgOh0Z76:fklbsqmyWnoz/P
                                  MD5:CE0155405EA902797E88B92A78443AEB
                                  SHA1:8ADFF69050D14A57D7F553CA8978439AF188C192
                                  SHA-256:789C3C45EDA1749BD939F4A96616E1E9EF1B7DCC62A2889F65088954C64D0938
                                  SHA-512:3FDE09067F9CA8D315DE07C8DB972F99723EA4C3F997DC58210F9D6565CAA9935C79F13E8B2D20ADC5609919A381E4C2A90A0B3123A35947997229D7C615E162
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.'r!.I!!.I!!.I!w.Z!*.I!!.I!\.I!Rich!.I!........PE..L....!.6...........#.................)... ........0_............................. ..>................................................0...3...................p...... #............................................... ...............................text...q.... ....... .............. ..`.data....X.......P..................@....rsrc....3...0...@... ..............@..@.reloc.......p... ...`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):17920
                                  Entropy (8bit):4.083884450202126
                                  Encrypted:false
                                  SSDEEP:384:cogoEvM/uFrR+X6QNn1pcJIrWocDGWct:cogoEvM0rgqQNn3
                                  MD5:1B02577F0ADDEA32EB02A50D4A4CDD1E
                                  SHA1:36F701CCEC78A5D218FEA23FD05351890F14CF7D
                                  SHA-256:6EA525BFACE5467C1045C3708F339A4B92A3A273F70656E061C7F7322C56D667
                                  SHA-512:87FD4AA5158D09EB97B6131E651DB2A4761546907A960AF7792F8E95947C0A825E84F88ECCF42EC896FF5BB2BBC461488B898D5F1BD853847317493C44B330C9
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......eU!.!4O.!4O.!4O.!4O. 4O.Rich!4O.................PE..L....!.6...........!.........D...............................................p...........................................................@...................`.......................................................................................rsrc....@.......B..................@..@.reloc.......`.......D..............@..B.............!.6............ .......8........!.6............P........!.6............h........!.6.....................!.6....................@:...........J................T.Y.P.E.L.I.B.MSFT................A...........*................................... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...............h...........................................L...P.......
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:Generic INItialization configuration [DestinationDirs]
                                  Category:dropped
                                  Size (bytes):1069
                                  Entropy (8bit):5.4959184158351215
                                  Encrypted:false
                                  SSDEEP:24:yuZq732XeLfX8IUy3k8exg5S3X8n2uNXVANXVMbNX9NXR/NXVuZZNXV0pT7:BJeL/8IhvFSn82CVoVMB/DViDV057
                                  MD5:F8854BDCD55ECCF24F077981ADFE6B9A
                                  SHA1:377FC226B1C10B244F1E32F6EA3A20B5D47D4777
                                  SHA-256:E5A9050E93487A1D296CEEC10B95BE9F92EB877AA2913296B5C31B9F74F7C788
                                  SHA-512:6331F337A1595D6F83281614E6A92AABA9D8B27FDA3B5CF4E85F1B49AC335E10F0F62CD147131D53C473B3ACC42BC27F2D02073F0CC60755CA10871EF2E7AC8E
                                  Malicious:false
                                  Preview:; INF file for Visual Basic 6.0 Run-time Redist Pack....[DefaultInstall]..CopyFiles=install.files..RegisterOCXs=RegisterFiles....[DestinationDirs]..install.files=11....[install.files]..OLEAUT32.DLL,,OLEAUT32.DLL,32;..OLEPRO32.DLL,,OLEPRO32.DLL,32;..ASYCFILT.DLL,,ASYCFILT.DLL,32;..STDOLE2.TLB,,STDOLE2.TLB,32;..MSVBVM60.DLL,,MSVBVM60.DLL,32;..COMCAT.DLL,,COMCAT.DLL,32;....[RegisterFiles]..%11%\OLEAUT32.DLL..%11%\OLEPRO32.DLL..%11%\MSVBVM60.DLL..%11%\COMCAT.DLL....[OLEAUT32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=2,40,4275,1....[OLEPRO32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=5,0,4275,1....[ASYCFILT.DLL]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[STDOLE2.TLB]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[MSVBVM60.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=6,0,97,82....[COMCAT.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=4,71,1460,1....[version]..signature
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):766976
                                  Entropy (8bit):6.307836502585046
                                  Encrypted:false
                                  SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                                  MD5:D471255784CC4AE28EA97447F67DA9F2
                                  SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                                  SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                                  SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):641845
                                  Entropy (8bit):6.759953089731109
                                  Encrypted:false
                                  SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                                  MD5:AA00215FC4A6D307A143871D1C9904A6
                                  SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                                  SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                                  SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):5299123
                                  Entropy (8bit):6.417889890443472
                                  Encrypted:false
                                  SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJk:hTaRZ8tjD4+wD5ZksyPHIFIk
                                  MD5:5A3DA2206BD35C381B826FF748093684
                                  SHA1:AE5A7D9CEB4324BCE26B6E2ED7C1FE18DEAF917E
                                  SHA-256:E94B30CF6F7FA8F30EB21B5A4B3316B5F005321C31A2139095882450D8BF8C78
                                  SHA-512:DBA818B5E442EA797E4F20F313C2196BA366DE82784968A1F2F29C8F3AAEE5BC09B7B9CC33A959C0E2507F31517E32D48C118CDE5119A741C5378DCF29856801
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, Author: Joe Security
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):770048
                                  Entropy (8bit):6.313135922265424
                                  Encrypted:false
                                  SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                                  MD5:6957CC6E903D183839C08109EDE46105
                                  SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                                  SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                                  SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:7-zip archive data, version 0.3
                                  Category:dropped
                                  Size (bytes):3821599
                                  Entropy (8bit):6.2872927335703555
                                  Encrypted:false
                                  SSDEEP:49152:YXlXDzXmLXrXxXzX4XOXWXmOX+rX14rFRMSigFEkEi24EJD2d8hMcSCnmNPIkFVT:cTE94w4BF5
                                  MD5:839619AB3C498F9119516797217ECE8B
                                  SHA1:83593C1247452E23F900E2F383B80FCE222E77D5
                                  SHA-256:C0BA92E82179F99A6CBAE6B26E2CF94DA86D9C2A89FC71552484150D4FB1A237
                                  SHA-512:8947009EE28BD4A8D6C2BEE4B03474A981A28C789021B31C6B3010FD0727180F16D7FE95F35DE13A533CA56953DE37CC088F496FA82CD4FA0371B9D422C79816
                                  Malicious:false
                                  Preview:7z..'...P=".'H:..............oB....TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Certificate, Version=3
                                  Category:dropped
                                  Size (bytes):1379
                                  Entropy (8bit):7.164821094442024
                                  Encrypted:false
                                  SSDEEP:24:3hE3IaffyrWghhywWGwBBrG7V+vXx9uyv1jTRgjDiuVz0mkhfAwfSLC:36DffrgarB8V+vXx9uyv0DiuVxkhfEm
                                  MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                                  SHA1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                                  SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                                  SHA-512:7232D3260D6714B6DD1B403AB1F838E2D6A33F9AA37D50C2DE4328DBFEA450C3A77875A333968219CB4F8B21140559310FBA42C9833F740A928554387EFFD969
                                  Malicious:false
                                  Preview:0.._0..G.......,h..g.0L.....1..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...140304000000Z..170602235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........!.`.x..qr.r.....y.....$<.]./..E.EyJ.&4..}....}Y.O..5up....77.B.E,.U..P..b@.T.Ek..mr_9#.?.n..S....^?j....Z....m8.....L+..n...s.....k.......<|>_.T9.C...u.S}N...3.C.oKqup>..?`,..U.."..p..3<d<..$Q....|_...`U.(m...f...j....+-.. F`.....[..e|..g.?5........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Certificate, Version=3
                                  Category:dropped
                                  Size (bytes):1379
                                  Entropy (8bit):7.175302981793894
                                  Encrypted:false
                                  SSDEEP:24:/3IaffyrW+hywWGwBBrG7pLqQ9xtRgjDiuVz0mkh6fyzjOlJ9X2I0:/DffrJrB80mgDiuVxkh6fyzSx0
                                  MD5:1E256F3CD8A847D91596BF2C37DBF285
                                  SHA1:6641ED279EF1A7A8E6D06BCEB38570B429101AA2
                                  SHA-256:6FCE0715E8C7D2B5BF2D7B049AE6CB6842E2D9757A2D9296A1587BBD05C2FE25
                                  SHA-512:91DAD8AFEA4A493269688CA7B7642DA7A663742C5811AADB3EE13D66DCB3BE2B1ED5EA6A9F45FBF9E6E432AEED0A9AE1AAA4A921658F2D5DDF2524C5EF195C3A
                                  Malicious:false
                                  Preview:0.._0..G.......7......'@...\...0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...110320000000Z..120307235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........6.....:N~lw..F..J7h...5x._9..\....:.)z..].......g.....4.....D..FI.......s....`L....}..`~.U..E.H....*Q........sv.....x.eLh...`..<^.%.. .J.....(5...^.....U.P.....r.......{..u...O..0....V.y......$#...#. N..:...E.L0.CZ..B3.E..@x.?.|..B.".....&.<.........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):96
                                  Entropy (8bit):4.2832136787344055
                                  Encrypted:false
                                  SSDEEP:3:HrJQyogRM/fyAiLJQyogRM/cLGr:HeFT9b
                                  MD5:C10BB4CF9692695632DE53434201ACA9
                                  SHA1:4215207F1C5E53C2CBA1638C7B27B587F0E48FC6
                                  SHA-256:CC11C5FEA0D555905CC67BF2081C55F9F82A049EE65A89A371D2310BF37AA8EB
                                  SHA-512:27234743327A5F7F46B60CD1F544C77353AA93C29E583EE8A8DB801D5E654EEDB2AAF30F8F4EA4219BB53B739C9E51694143009F9533BB456F0B44F2E2ADC862
                                  Malicious:false
                                  Preview:certutil -f -addstore TrustedPublisher TK1.cer..certutil -f -addstore TrustedPublisher TK2.cer..
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1316352
                                  Entropy (8bit):6.662123826541052
                                  Encrypted:false
                                  SSDEEP:24576:htJHEI7Kl/eZfZblU8u+noMRBqSPSUO9z8mF36X+huHcN2:rkl6PoMRMSSzy+hwcN2
                                  MD5:595209D10BD0EC1B01F8AC31195E7902
                                  SHA1:849F59A743DE094C7CF05C7F89B0ED22309B619C
                                  SHA-256:8D67E430AB5300BBA92B1D1B45D2E87C13E8B0D61A75D02A70BC203696430534
                                  SHA-512:3AA7C32A3BC9F0A1E5D4B67B657A216131FBDD62E5794403D01FBBCA663420D861460DAEA6ECEA6F2C4268E67B1E2A71DEDE6E6A57FF041E34BFD3F3130EC328
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...X..V.....................j.....................Q....................................................................O........5.......T.............................................................................H.......^....................text...h........................... ..`.itext..T........................... ..`.data....M.......N..................@....bss....TS... ...........................idata...5.......6..................@....didata.^............0..............@....edata..O............:..............@..@.rdata...............<..............@..@.reloc...............>..............@..B.rsrc....T.......T..................@..@....................................@..@........................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):1050104
                                  Entropy (8bit):5.617498652730841
                                  Encrypted:false
                                  SSDEEP:12288:uIId79EaUTvwieMozMEcOigSpuPMaLium:xIdqaWw1MsbTScP0
                                  MD5:BE3C79033FA8302002D9D3A6752F2263
                                  SHA1:A01147731F2E500282ECA5ECE149BCC5423B59D6
                                  SHA-256:181BF85D3B5900FF8ABED34BC415AFC37FC322D9D7702E14D144F96A908F5CAB
                                  SHA-512:77097F220CC6D22112B314D3E42B6EEDB9CCD72BEB655B34656326C2C63FB9209977DDAC20E9C53C4EC7CCC8EA6910F400F050F4B0CB98C9F42F89617965AAEA
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g9I.#X'.#X'.#X'.* ..!X'.* ..7X'.* ..<X'.#X&.Y'.* ..fX'.* ...X'...Y."X'.* .."X'.* .."X'.Rich#X'.................PE..d......J..........".......................................................................@.......... ......................................H...@.......pY...0..\m.......%...........................................................................................text............................... ..`.data... ...........................@....pdata..\m...0...n..................@..@.rsrc....`.......Z...v..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1448448
                                  Entropy (8bit):6.68350408954223
                                  Encrypted:false
                                  SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                                  MD5:18B85C5A139BAEAFD89C70B8C6561A52
                                  SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                                  SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                                  SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):770048
                                  Entropy (8bit):6.313135922265424
                                  Encrypted:false
                                  SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                                  MD5:6957CC6E903D183839C08109EDE46105
                                  SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                                  SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                                  SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):641845
                                  Entropy (8bit):6.759953089731109
                                  Encrypted:false
                                  SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                                  MD5:AA00215FC4A6D307A143871D1C9904A6
                                  SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                                  SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                                  SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):294
                                  Entropy (8bit):5.21221799398743
                                  Encrypted:false
                                  SSDEEP:6:SpXr+pVSDDDLm+6WWq5vR7xXrlqt+TzTEQjM41wy:SpOSDC+Zb7eKTEsMXy
                                  MD5:5E1B362822AF7B65CEADD04E17FE93DD
                                  SHA1:E97136FF549A5EA648B53C852A6CF83D7B214CB8
                                  SHA-256:3BA47D29D3B8810C479BD6D3D470FC400AA15AA35187BB1FA72C7E20E2573009
                                  SHA-512:76A2D74395DA1EB6E2292B9CEB743718C9AA8BC03E0F88F7A250E281B5DBD4394429979B89BBD878822984B8C7B821667F2BC30BD833B0CBCA1B61DA23CD0F19
                                  Malicious:false
                                  Preview:MYAH-PREDEF-COMPONENT..TECHKON Device Service..$..TRUE..TRUE..$..$..$..$..MYAH-PREDEF-COMPONENT..11974355..TECHKON DEVICE SERVICE..1150976..$..C:\Program Files (x86)\\TECHKON GmbH\TECHKON Device Service SDK..TRUE....C:\PROGRA~3\{C39D0~1\..MYAH64WOW..x64..OVERRIDECACHE....NATIVE_ENGINE..FALSE..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):5295078
                                  Entropy (8bit):6.41595061147608
                                  Encrypted:false
                                  SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJF:hTaRZ8tjD4+wD5ZksyPHIFIF
                                  MD5:A94A3D60FA8A54AB71ABED39D5883D86
                                  SHA1:3FC14B383FD699017AA7B7281C28F143AEAF7B9F
                                  SHA-256:3AC4616A5ABF9A408EDCCC48D15AB9DD6441DAD273C8F477C1EB291812949451
                                  SHA-512:172CE336A3343D8ED92EDA525A549F1E388D37076F71DC28C043FABC94B04761B7E936871F203C2B681EB4BFCC8C239327656F51003CD46D11C94589B1E8CC13
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exe, Author: Joe Security
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Unicode text, UTF-8 text, with no line terminators
                                  Category:dropped
                                  Size (bytes):3
                                  Entropy (8bit):1.584962500721156
                                  Encrypted:false
                                  SSDEEP:3:g:g
                                  MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA
                                  SHA1:57218C316B6921E2CD61027A2387EDC31A2D9471
                                  SHA-256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5
                                  SHA-512:37C783B80B1D458B89E712C2DFE2777050EFF0AEFC9F6D8BEEDEE77807D9AEB2E27D14815CF4F0229B1D36C186BB5F2B5EF55E632B108CC41E9FB964C39B42A5
                                  Malicious:false
                                  Preview:.
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):766976
                                  Entropy (8bit):6.307836502585046
                                  Encrypted:false
                                  SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                                  MD5:D471255784CC4AE28EA97447F67DA9F2
                                  SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                                  SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                                  SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):2338
                                  Entropy (8bit):5.3568493851447085
                                  Encrypted:false
                                  SSDEEP:48:n52QnlauJANzvc+/zM2WTZowX6U4WqARxCmlyqGkcz8wV30/33BB+:PZhJwVUBY
                                  MD5:ECAD24E51736561AFB45CB6F30A38B99
                                  SHA1:3D8E74E5CB6F940D87985B6386C10B123291278B
                                  SHA-256:2F167DB1CA0687F1F639588BF8195E5AD52E4B9A11FEFE8E83674585DAE8A389
                                  SHA-512:6E8E111525F7AF8498F3BAD574E83F78328F0BEC670407668662B707C10F5DD336E11E3FF8826ADF8C2553B2AAE89467EE62A460D616AE0FE8107484A8F1C738
                                  Malicious:false
                                  Preview:.AEDD97940..FALSE..A3CE6DECE..FALSE..A34E6DE3C..FALSE..A25D64044..FALSE..A3476C065..FALSE..A8135F827..FALSE..A8808A0B2..FALSE..ACC3273D..FALSE..AA913E6AF..FALSE..ACECD985D..FALSE..AC5D9D236..FALSE..A1A2661C4..FALSE..AC64028C1..FALSE..A3CEB12CD..FALSE..A1872974D..FALSE..AD4D85249..FALSE..AEACB8D8..FALSE..A7C4CDFEC..FALSE..A95FFAA1..FALSE..AF0FC8706..FALSE..AD7FB24C5..FALSE..A86D611ED..FALSE..AEDD97940..TRUE..PEDD97940_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A3CE6DECE..TRUE..P3CE6DECE_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A34E6DE3C..TRUE..P34E6DE3C_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A25D64044..TRUE..P25D64044_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A3476C065..TRUE..P3476C065_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A8135F827..TRUE..P8135F827_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A8808A0B2..TRUE..P8808A0B2_1..C:\Program
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:7-zip archive data, version 0.3
                                  Category:dropped
                                  Size (bytes):3831837
                                  Entropy (8bit):6.288047394335939
                                  Encrypted:false
                                  SSDEEP:49152:zXlXDzXmLXrXxXzX4XOXWXmOX+rXAEJD2d8hMcSCnmNPIkFVZ+cocaFjhkSYKPM:xw4BF3ai
                                  MD5:3EA26D5D84024858345551BDD209F62A
                                  SHA1:DE89AEAB1CBE1328B0CDB7C17BE2B43BEA076E30
                                  SHA-256:E58F0C20DFFBB1299D972CC7C3556DDDDE8D6888570FEEF208E48EAD68877149
                                  SHA-512:5E8F2CCA528F77CC624FD17228D796E3921008A9D73511793E33FE6F4B94463D5304A969A4F18DD0BCDD2C5B0663861570E861DAC58355EF641860BB071AE607
                                  Malicious:false
                                  Preview:7z..'.......'p:...............M...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):104
                                  Entropy (8bit):4.763214906845461
                                  Encrypted:false
                                  SSDEEP:3:fCSpmrc5Pk+T0kcAwS+h2h2MxB:rsc5Pk+r0grH
                                  MD5:36487EC6BBA7512EFC29BEFC31D9C8E0
                                  SHA1:BBC7D906BFEC90E60D3ED2768FD3DBF1E23A831C
                                  SHA-256:96DA35BCA6739A48B794F7A93643A4B449F1BDBD0A4506B2CEE752ACF351DF15
                                  SHA-512:044444B2237DEE8C9CBFB966F9C3EEEBB6FBD0D86643E692E0686A0254919218DB4277A50EF251A26D112286CF64A21685191052B1C31CE03186EF25CB30AC0B
                                  Malicious:false
                                  Preview:{CD1E6019-47AE-4334-A91E-595BA68B6E06}..{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}..TECHKON Device Service..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):641845
                                  Entropy (8bit):6.759953089731109
                                  Encrypted:false
                                  SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                                  MD5:AA00215FC4A6D307A143871D1C9904A6
                                  SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                                  SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                                  SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):266
                                  Entropy (8bit):5.172580566169641
                                  Encrypted:false
                                  SSDEEP:6:SpU7SDwVs6ZU9xXiaQoOXtCBnTzTEQjM41wy:SpU7SDXo6UoOd8fTEsMXy
                                  MD5:78A3F93BD0082F553E5B911C0DF9A218
                                  SHA1:C435D901BF62921AE6FA320616909CC7EA59A0E4
                                  SHA-256:B40D65735A6D1D806908ED541F1701C7AD59A9264E0C1081FAAF40635F9024FB
                                  SHA-512:9C48437D2270962228A0DE928E36E3D4829A932153AC7CF74E2A98895F97FB1E3C884FBF3D49EEE4DDADDEEC3004283E34152527F65B5EA814D3C943D41D395E
                                  Malicious:false
                                  Preview:MYAH-PREDEF-COMPONENT..TechkonDriver64Bit..$..TRUE..TRUE..$..$..$..$..MYAH-PREDEF-COMPONENT..531006..TECHKONDRIVER64BIT..0..$..C:\Program Files\\TECHKON GmbH\TECHKON Driver 64Bit..TRUE....C:\PROGRA~3\{CDCC2~1\..MYAH64WOW..x64..OVERRIDECACHE....NATIVE_ENGINE..FALSE..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):5299123
                                  Entropy (8bit):6.417889890443472
                                  Encrypted:false
                                  SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJk:hTaRZ8tjD4+wD5ZksyPHIFIk
                                  MD5:5A3DA2206BD35C381B826FF748093684
                                  SHA1:AE5A7D9CEB4324BCE26B6E2ED7C1FE18DEAF917E
                                  SHA-256:E94B30CF6F7FA8F30EB21B5A4B3316B5F005321C31A2139095882450D8BF8C78
                                  SHA-512:DBA818B5E442EA797E4F20F313C2196BA366DE82784968A1F2F29C8F3AAEE5BC09B7B9CC33A959C0E2507F31517E32D48C118CDE5119A741C5378DCF29856801
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exe, Author: Joe Security
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:Unicode text, UTF-8 text, with no line terminators
                                  Category:dropped
                                  Size (bytes):3
                                  Entropy (8bit):1.584962500721156
                                  Encrypted:false
                                  SSDEEP:3:g:g
                                  MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA
                                  SHA1:57218C316B6921E2CD61027A2387EDC31A2D9471
                                  SHA-256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5
                                  SHA-512:37C783B80B1D458B89E712C2DFE2777050EFF0AEFC9F6D8BEEDEE77807D9AEB2E27D14815CF4F0229B1D36C186BB5F2B5EF55E632B108CC41E9FB964C39B42A5
                                  Malicious:false
                                  Preview:.
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                  Category:dropped
                                  Size (bytes):770048
                                  Entropy (8bit):6.313135922265424
                                  Encrypted:false
                                  SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                                  MD5:6957CC6E903D183839C08109EDE46105
                                  SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                                  SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                                  SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4020
                                  Entropy (8bit):5.37043834977972
                                  Encrypted:false
                                  SSDEEP:96:7lpWBZ9pJNvlVPgXPaPsqJziqWq2FmGihH1c8ABhBdFFP5iqcXTUrXzgl:7lpWBZ9pJNvlVUSkyiPzwGihH1c8ABhI
                                  MD5:739620392BE69EC2AE2BD9439C1245AB
                                  SHA1:D3BDEB5E747681DDA9C72A1D9498388067FDCF9E
                                  SHA-256:ED341DC6C04D0485B207949E6E892BE3C4E5ACB18BFC46FD7C690FEBC0E55DFE
                                  SHA-512:0101E21EDF0DBA5ED4F14E32D743B959D01B254253BD53F422F2CFCC33A3AB9B45ECA337E38F1D330EDC906EEF7C21762251E3F6AC88C6C5CBBD8EE495FE07F5
                                  Malicious:false
                                  Preview:.A76FCA102..FALSE..A150AC403..FALSE..A1ABF3862..FALSE..A502E833A..FALSE..ACE56FB43..FALSE..A52B152B3..FALSE..AC0AC9330..FALSE..AE09F5A5F..FALSE..AF2F92670..FALSE..A94312164..FALSE..A5809A5D8..FALSE..A56A7DD7A..FALSE..A1A9DA512..FALSE..A84FEA59D..FALSE..A849003A2..FALSE..A98500B5D..FALSE..A4F27760E..FALSE..A4D56F533..FALSE..A7AA455DC..FALSE..AE1318D92..FALSE..A66980B9F..FALSE..A9167C40A..FALSE..A15F69ECD..FALSE..AB06B5044..FALSE..A66E41FEB..FALSE..A9E7D6EA9..FALSE..AB258770..FALSE..AB5CD4D0..FALSE..A537BC2C1..FALSE..A5D1665DA..FALSE..A6EB99A04..FALSE..AF5C9AD93..FALSE..A21D6E643..FALSE..A63D6488F..FALSE..AF835DFEA..FALSE..A9115C352..FALSE..A76FCA102..TRUE..P76FCA102_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A150AC403..TRUE..P150AC403_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A1ABF3862..TRUE..P1ABF3862_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A502E833A..TRUE..P502E833A_1..C:\Program Files\TECHKON GmbH\TECHKON D
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:7-zip archive data, version 0.3
                                  Category:dropped
                                  Size (bytes):3821599
                                  Entropy (8bit):6.2872927335703555
                                  Encrypted:false
                                  SSDEEP:49152:YXlXDzXmLXrXxXzX4XOXWXmOX+rX14rFRMSigFEkEi24EJD2d8hMcSCnmNPIkFVT:cTE94w4BF5
                                  MD5:839619AB3C498F9119516797217ECE8B
                                  SHA1:83593C1247452E23F900E2F383B80FCE222E77D5
                                  SHA-256:C0BA92E82179F99A6CBAE6B26E2CF94DA86D9C2A89FC71552484150D4FB1A237
                                  SHA-512:8947009EE28BD4A8D6C2BEE4B03474A981A28C789021B31C6B3010FD0727180F16D7FE95F35DE13A533CA56953DE37CC088F496FA82CD4FA0371B9D422C79816
                                  Malicious:false
                                  Preview:7z..'...P=".'H:..............oB....TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):109
                                  Entropy (8bit):4.682207123816963
                                  Encrypted:false
                                  SSDEEP:3:P1UckThRSnhZTYIT9ovtndNpnCmiTQeVnh2MjzXFTBQov:9UckTynVT9ovtndfCmi8eVhr3fQov
                                  MD5:6F37D4EFB813C85449B22D66C053DE6B
                                  SHA1:DDE70506FB522175DF612A6ADDF04E0009B30FAD
                                  SHA-256:3687950173500CEF8D7F3EB691FEE0F08866C463E4434282C8DD2A36EDC4A7C2
                                  SHA-512:5205A6BD0496FFBD307E9D49254D23E71D8C04C04F16A4E57AF708B826306AEFFFA999113D5A1FAFCAEA444C56D33ADAFF994337E6FE0D487C42EDBC289615B9
                                  Malicious:false
                                  Preview:{55EA8940-B618-47BD-A642-20BFB2A64F78}..{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}..TECHKON Device Driver 64Bit..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):641845
                                  Entropy (8bit):6.759953089731109
                                  Encrypted:false
                                  SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                                  MD5:AA00215FC4A6D307A143871D1C9904A6
                                  SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                                  SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                                  SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):174080
                                  Entropy (8bit):6.279217790646268
                                  Encrypted:false
                                  SSDEEP:3072:xyljBP/VZjAISqyTFjoZAO1h7BTF1rJa//diUTTBXJxO8hlIhb0:xeBnVZ8w4toZAcLrJa/liSVHU
                                  MD5:31CAD6A3EDD1C32981AD6B565CBEAC94
                                  SHA1:9338978C85A9423EE2A38CBA027F79192D684F1B
                                  SHA-256:B8521ABDA09EC17DDAD36528C1BC50395DC8C5F7C11C026A5B3FF23110C54182
                                  SHA-512:02E198B8EF192DE55DB35AE00A16A80B3309A9373A596C20D617B43DD7159A635BC303F371859E704375521A1242D02754807E2E9DFEF63FFD06993B24C17D3D
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..P....................6...>..............._...........6...P...o.^.....o.j....................Rich............................PE..L....S.L...........!........................................................@.......................................@.......9..P...............................@.......................................................,............................text............................... ..`.rdata...@.......B..................@..@.data.......P...4...4..............@....sxdata..............h..............@....rsrc................j..............@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):197429
                                  Entropy (8bit):5.976046888177846
                                  Encrypted:false
                                  SSDEEP:3072:VZ2NCsffL4WCb+gS5MJBdpzMObFz7m/RktZtUEEgny32rf:/4L4YCBdpzMAFe/oZtUYny3i
                                  MD5:B87AFAA4E8FE37C2878E240D7E5B74C4
                                  SHA1:BD4996CD4CC682E9DC8966BE8D697C91F46FABD7
                                  SHA-256:077898C146E917107BDB281F4E21C380C5E6B18E9B2213FBDE8FE5FD086336AE
                                  SHA-512:1EDC62AB821DDDA0EA312CFE4D79F908E3AD6B28C87C903CD956EC9A12E6F62010380A1C0801601185A30D24F9897D81A37A14BD4891E303691DCED2A50F7D1B
                                  Malicious:false
                                  Preview:Please install the common controls update from Microsoft before attempting to install this product...Setup resource not found..Setup resource decompression failure..Setup database not found..Runtime error in install: ..bytes..KB..MB..Attempting to get value of undefined variable ..Attempting to set value of undefined variable ..Copying: ..Unable to copy installation data to local folders..Downloading Web Media: ..Unable to download installation data from the web..Extracting Web Media: ..Unable to extract installation data downloaded from the web..Please locate your original setup sources to continue operation..Original setup sources required to complete operation, sources not found..General setup failure..Runtime error in setup script:..% complete..bytes received..InstallAware Wizard..InstallAware is preparing the InstallAware Wizard which will install this application. Please wait...Retry Download?..Downloading of installation data from the web has failed. Would you like to try again?
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (343), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):71603
                                  Entropy (8bit):5.523940105836007
                                  Encrypted:false
                                  SSDEEP:1536:ewNhtmrNAKe1J4eFiLIidSxfuisTJIHvxDZN7kAblAFKqZLYjz1:Vtm572J4egLI4wIZYjZ
                                  MD5:6614F2128AFB570A9EB3BFBAC47340AB
                                  SHA1:99356886CF9A2EB83492EED2D1C7F7190353BDDB
                                  SHA-256:645F8C9588263BB3B0A5BA31A1705EF8931B2247EF6113C2F18F375B67DE94F8
                                  SHA-512:680B81C9BC89392B4068466AF9CA1C7053DFF548FF34BEEDDDC97A80C324DA696DC955EE6412073FDDE4442031C82DDEE6DAE2A0AAD140877D44941024C446FC
                                  Malicious:false
                                  Preview:.Comment..Comment..Code Folding Region..Get System Settings..If..MessageBox..Terminate Install..End..Set 64 Bit Mode..Code Folding Region..Comment..Code Folding Region..Comment..Code Folding Region..Comment..Set Variable..Set Variable..Comment..If..Set Variable..Set Variable..End..Comment..Code Folding Region..Comment..Code Folding Region..Comment..If..Comment..If..Terminate Install..End..Comment..Comment..If..Set Variable..Set Variable..(Un)Install MSI Setup..If..MessageBox..Terminate Install..End..If..MessageBox..If..Reboot and Resume..Else..Terminate Install..End..End..Set Variable..End..Comment..Hide Dialog..End..Code Folding Region..Comment..Code Folding Region..Comment..Code Folding Region..Comment..Define Component..Comment..Comment..Get System Settings..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..If..Set Variable..End..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..Code Folding R
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):767488
                                  Entropy (8bit):6.309153147556162
                                  Encrypted:false
                                  SSDEEP:12288:RZTHM4uBKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:RFM48x5BqPA2fc7wMz7
                                  MD5:A9CDCC1CCE934430F30F66BAF6118459
                                  SHA1:C53F64C4027301E8E94FAA739E3D59E593950854
                                  SHA-256:4EAEB8F7750D12B3CB411BC20BFF8A3948D977919B65A200B6AA58FC83D268B7
                                  SHA-512:82C938F3E64C3C88A7508BD9F3519D1FD803101B4EA12474C692585460FEA561D1FD9BD267B63C4F24301854E82DA3462BD4E4969E43277FD7AF48706B882176
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32879
                                  Entropy (8bit):3.303772475257304
                                  Encrypted:false
                                  SSDEEP:768:VDHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfwE:VDXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DA
                                  MD5:7ABD6BD2B201E76EA624B72EC854E178
                                  SHA1:B74ECA13809A2439B0A8B769328247EED6ECA6CC
                                  SHA-256:B7E2337DDFE813C051D10B5CBBBBDC7FCD0EEF4B5B2621C3A77D6B91743C0F4D
                                  SHA-512:66AF2C8901D8B421C1BC1265CBC8495E19C2346BF8B97D280079E1200578D450B6DEA570B712D350D5BE0A8B88A2615BE4075008D85CCA3CCF5D28A4D9194A9E
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32756
                                  Entropy (8bit):3.2836876237576345
                                  Encrypted:false
                                  SSDEEP:768:XyHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfn:X6XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DU
                                  MD5:BF3263127CD771470559490ADB76647B
                                  SHA1:8971CB4959D1BCA4A0EC48F3186309B00E16261B
                                  SHA-256:4811574E264AEB0927806A9A953CEA2A903ED18C36A34A10B67E40B99CA1670F
                                  SHA-512:9AF82B1F3EB3E735E2434BA803C1FC6D13BC1866A73D9F0FF466A23A5761291DD00A6C0D57BD24CE6CC2DCD0ACC16E863A2F30A41FC4BBBD041578F85AF6AD27
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):161047
                                  Entropy (8bit):1.9896602276153565
                                  Encrypted:false
                                  SSDEEP:192:E3Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CWNux1uAw1Dmi:EtI/gWf
                                  MD5:5F7AE8AAAC7F8E1E811BE95B187ABB10
                                  SHA1:C34C69B5AE6B4B2EFAE3236C386F2B0388F815A8
                                  SHA-256:984A34337FC921BCCBA721B8361D3806459D2F37CBF117F5CC35D6BD0D6FEF6D
                                  SHA-512:0A6F8E499686102AD85DD411958B3417A4E758FAC61A1D883420490AABDEF0F6CECED358997F83AB84FF7DC2D01A3E90903C899ED382B97165CF019B8C213709
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..u..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1561
                                  Entropy (8bit):5.018115004625162
                                  Encrypted:false
                                  SSDEEP:24:UuikSi+nfi0ZiFuEai/pZSruicvSi+pipUivuNsIi/pEaiDatfi/pTvSgREii/pH:U5ExAGVPbu1ZRMfkf3faWYt
                                  MD5:2FE4E500443ECB1E27A767BEE9A18C63
                                  SHA1:887A5789CDAC46BEA2829870DF02AD6B87A92270
                                  SHA-256:6492FEB41031C64C70FA8FABAABCCDE4846F9438B017D152C68C4B356C6A167A
                                  SHA-512:9475EB0E7509493A23DEA491CFA0A9A1DB0D339C216F1E38512DF18A74D80C69B6C8CE9C10131047227FFA3E979D5D6F144748569CFD9209C47977D770D94DD4
                                  Malicious:false
                                  Preview:IF (checkSuccess.Caption = COMPLETE) THEN textComplete.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN textReboot.Visible := True;..IF (checkSuccess.Caption = CANCEL) THEN textCancelled.Visible := True;..IF (checkSuccess.Caption = ERROR) THEN textError.Visible := True;..IF (checkSuccess.Caption = COMPLETE) THEN RunNow.Visible := True;..IF (checkRemove.Caption = TRUE) THEN textRemove.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN RebootNow.Visible := True;..IF (checkSuccess.Caption <> COMPLETE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN textReboot.Visible := False;..IF (checkSuccess.Caption <> CANCEL) THEN textCancelled.Visible := False;..IF (checkSuccess.Caption <> ERROR) THEN textError.Visible := False;..IF (checkSuccess.Caption <> COMPLETE) THEN RunNow.Visible := False;..IF (checkRemove.Caption <> TRUE) THEN textRemove.Visible := False;..IF (checkRemove.Caption = TRUE) THEN textComplete.Visible := Fal
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                  Category:dropped
                                  Size (bytes):1597
                                  Entropy (8bit):7.871063017224323
                                  Encrypted:false
                                  SSDEEP:24:X93kpZjQLmEcxtIwWXPAGpKpkZcks41xdrqUaBdJbYfxpJgx7YWg/uLwdCnq:N3Yj8mEcxywiPrpKpNMdr07SxgSt
                                  MD5:B7225A16DAF9DE1D514AEFE567FDF2F5
                                  SHA1:D6A00C526C425FCD5EF49B0C87814F2CF476CB59
                                  SHA-256:0E2DEFC9B470D3F9BD184D254493EFAD94EA0273C1FE17FC8FC651D47B01734E
                                  SHA-512:31412603AE87F2B9C9DAD2D0BA64868105586D1778846DE5F1C14667C4292DE36FC193B54670BDF130019B0B42AB59EEF2C2D8672226BA755181FEA894BD9246
                                  Malicious:false
                                  Preview:.PNG........IHDR... ... .....szz.....IDATx.W.L.W...!..dl.'.@.10.a.....2.T'.....SD..-PK@t.....:53.... :#F.......|"...L....6 m)Lw........9...K.+.b...z.x........=...J.V....n3[.B..v[m..../....o0.L....Q...&...$~?%%?PG..S<..]...$.Z......O.3".k....m]..2S9..4,.k+.xf..k.F...V..4[Ec'K.2.2..PK.....H$..H.....kA...M..>.zs.....^.*..K"...j..:..Hu.T..Q.....N...y'.+9.dR.{..Xn....w.f...R.KQB.]z........6>..,.......q.%........;.,......U{.i....Z.....)._I..7..J.q..d)...CM....;...,R~.B.S...E...p[-O........].F...%..A.%....{.%.*...]Q..>.-..f..C..i.Q..+5.......A'~.....J...M.mtN..0..r.>.@K.....D...<...CI^#.-.P.}?R..M.-.7..GS...Z^9s..<6.....>......<..g.~.9....{]Ju..}`..Z(..ikw^.,)X..g...|G.LQ9A^...9pe....7d.......SE.Q..../nx.}_..F...$..I..K...o4.^ ..e.X.Q.H......&........Q..............\n....J......./...7.....E.9.....$...K..!...c.`.=.Jd.nq.n.W.Q...Q.#s.w._.d....u...Q].-U.N.J..&.O..=......a+.k.....%.$..(.....@`...lx.......tDC..=.{...^"...@.....\{;#.^...G.q./AA.
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32086
                                  Entropy (8bit):3.1568876532608567
                                  Encrypted:false
                                  SSDEEP:768:PGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfp:P+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DC
                                  MD5:D5DF18B96E3A0E9DA52766BDEB603E4B
                                  SHA1:A1D313F08A9B663F8DB7BCB258EFA616BB2618DB
                                  SHA-256:C1E2B73702BE7EA8E2BB9CEC1F9D210757D67EB950D8A22EA39E0E2C5F9AF6B0
                                  SHA-512:AB60CE2806739B62EC063FABA81A17CFEEA3CFCD546E9DD8F486DA3491DF3BB76C7020E35B5C2898A923736672E3AE9CA2400978DCBFBD8B75E76B579B85FED1
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.B}..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):128
                                  Entropy (8bit):4.596663476123045
                                  Encrypted:false
                                  SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                                  MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                                  SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                                  SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                                  SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                                  Malicious:false
                                  Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1448448
                                  Entropy (8bit):6.68350408954223
                                  Encrypted:false
                                  SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                                  MD5:18B85C5A139BAEAFD89C70B8C6561A52
                                  SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                                  SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                                  SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1326592
                                  Entropy (8bit):6.662178971692568
                                  Encrypted:false
                                  SSDEEP:24576:9JGBDZIKwoTaK/T/Tua+hWWfnElT/XhBiSwmK9lHcPJMgh:vqxaSzqUNBXhkSwQPi
                                  MD5:AC12DEC48405495C2008858D243DA8BC
                                  SHA1:0B6AD42CDE232A81B415481B772319FB1138C35E
                                  SHA-256:AD45020E327C16F0A847C38A058E606A7738EA6D0DDAAF80439797CA95F5FD43
                                  SHA-512:F6A381063DC321C85BD9FFECD524FCFA4EB968AA7644AB339F292B7037BE9C1FA997D2CAD382BE92848010AEEEA38209908B5FAE17CD0B261E0DBEFA38BF5F58
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.....................t.....................Q....................................................................N.......\7.......Z..........................................................................,................................text...\........................... ..`.itext.............................. ..`.data....M.......N..................@....bss.....T...@...........................idata..\7.......8..................@....didata..............P..............@....edata..N............Z..............@..@.rdata...............\..............@..@.reloc...............^..............@..B.rsrc....Z.......Z..................@..@.....................>..............@..@........................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):160192
                                  Entropy (8bit):1.9416958546631025
                                  Encrypted:false
                                  SSDEEP:192:TdRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cdtq69wTEmC+:TvI/Lw76
                                  MD5:68E84CD5CA646B0204CD019CC6B63DCD
                                  SHA1:B00E7D577E350F96149E5C14C6DDA8B05994462D
                                  SHA-256:ECCE7B76CEE8E1C10D828DC932F1BFDC782F1B599C1BF13651C21B73A5AE1A4A
                                  SHA-512:E848350BD35C9DD7B7AFA741BD4089763EA990B7F27AF96C3067E308A9AF812D83DB5F48E2EF8A6CE3E221036B1C76F0802A87DF9FC16CEB8C3B8E03619A1C85
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32211
                                  Entropy (8bit):3.1826203678135156
                                  Encrypted:false
                                  SSDEEP:768:iVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfb:idXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Di
                                  MD5:1074D7C4D94AF399F1F6137AD183E70D
                                  SHA1:9C7BDC1EFDEC073746AD9B7478F113D9EBD403EB
                                  SHA-256:2AA0603ADAA5058A1C118C8F2FAACD333D31112EC4C75689F765E4BC3AF69473
                                  SHA-512:38C7A641A232F2A67F10904716D13C137F08A0A19F47D209994FF63BFB198D8BB89075CD78BD23FF26427CFB3BDC53585EC33735A6FFF5E76834278D958AD1ED
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left.D..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):370
                                  Entropy (8bit):4.959095954912026
                                  Encrypted:false
                                  SSDEEP:6:aG1uSLF2du6szW4Rl1Ac2duJRl1Ow0Ld2du4LRl1uSLju6szWAK1Ow0Lru4FK1AC:qITMDIb6UIJTc6S6jO
                                  MD5:D8BA1E1B3F547F94CB059C8ACEC89297
                                  SHA1:71A5043CA3BF89FECA070431985C232E28940AAB
                                  SHA-256:62EE20B127F44C2D91BBCC9A232689DD3F1BC3359E606257BF3B115D4CBBDD2C
                                  SHA-512:5DA1E4DEB8518CD7AF202E7169F181683C74A83F62D98A36DEB45A03E14F384410633017D16CCBB6E216904F40AC782D7BE97940EACAB7D60B2D54CB7DBAEDC9
                                  Malicious:false
                                  Preview:IF (checkWINST.Caption <> TRUE) THEN WINST.Visible := True;..IF (checkJS.Caption <> TRUE) THEN JS.Visible := True;..IF (checkDotNET.Caption <> TRUE) THEN dotNET.Visible := True;..IF (checkWINST.Caption = TRUE) THEN WINST.Visible := False;..IF (checkDotNET.Caption = TRUE) THEN dotNET.Visible := False;..IF (checkJS.Caption = TRUE) THEN JS.Visible := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):43052
                                  Entropy (8bit):4.120190601260142
                                  Encrypted:false
                                  SSDEEP:768:yJHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf9:yhXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dy
                                  MD5:57A89F49FD0EE39606E927B96B00CFE5
                                  SHA1:5D94926CAF2BE0284B0B4CB7E69ECFA7A9A63284
                                  SHA-256:8B4D56464B9F2050B89134F7BCC8CD0FAFE946CE062F320915B0404685BDA111
                                  SHA-512:186F50C78EBD96CB12E8F7D5DF249AFBBA3C71E5DF96AB4F293DB2AC99593459F634C0BFA3B1C2FF34063819894FB9F446000110069B1DE2DD63B47874956E7E
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):292
                                  Entropy (8bit):4.740550563860751
                                  Encrypted:false
                                  SSDEEP:6:a3jF2duukAiRcjjuukTDoRcjF2duukTDQTjjuukAh:csIrqar1sIroarg
                                  MD5:86B3EBFBD934B66842048F0AA241E5C5
                                  SHA1:F770786C29D12D8C33B975EF2BAAD6D59A90F7CF
                                  SHA-256:4AEDBF26E568E62B47517E91FBCC818A5B95BD7FDB8A7DC5B826C0BD194077A6
                                  SHA-512:FE37AD98EC8DE62CE6E6A46E284450BBE19B7D8EB8C7B3B81BD06BA22EEBA487C2CEE8C3B37CD84FEAA09F8F39BDF532371B57FCCC7788A2F54EDA3390E58FD3
                                  Malicious:false
                                  Preview:IF (TestRemove.Caption <> TRUE) THEN CaptionInstall.Visible := True;..IF (TestRemove.Caption = TRUE) THEN CaptionUninstall.Visible := True;..IF (TestRemove.Caption <> TRUE) THEN CaptionUninstall.Visible := False;..IF (TestRemove.Caption = TRUE) THEN CaptionInstall.Visible := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):42687
                                  Entropy (8bit):4.076635616143556
                                  Encrypted:false
                                  SSDEEP:768:PoHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf/i:PoXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DJ
                                  MD5:0379D6212582C3FFF4E2E205B9585151
                                  SHA1:72BCF5C26E8270EC72F53EDC69D970E65CEE7229
                                  SHA-256:9495AE09659EA231157D576BF325CF8A55C191A493CF9EA39979CBC3497B281B
                                  SHA-512:D65059609CF44FDEA5134CC542835B7CD1FCB0873854D6BDB6A15D53737CD090F65CA119D81A0D3DCA5E0289E666395E140564B457870BDFD5A6334EBE41BE0C
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.w.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):31936
                                  Entropy (8bit):3.1261873313705286
                                  Encrypted:false
                                  SSDEEP:768:KGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfjE:K+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Db
                                  MD5:92B2E967740B9A9566132617654F99CE
                                  SHA1:9E5CD494173A9BABFC520E085B66CAD832FA9263
                                  SHA-256:4CB5450E2366EB03855CB1890C84245BD21975B353807F820C461F56577E02D1
                                  SHA-512:233442A840DBCC4B37FF40CE8B97E2B4A157043A8B552236B2A24BA0DB18AA38CCA99B2F257272DA577793B129C047895D46A68214074D977E6930571974A3C4
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..|..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):128
                                  Entropy (8bit):4.596663476123045
                                  Encrypted:false
                                  SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                                  MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                                  SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                                  SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                                  SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                                  Malicious:false
                                  Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32180
                                  Entropy (8bit):3.176260859175472
                                  Encrypted:false
                                  SSDEEP:768:5UVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfA:5UdXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5F
                                  MD5:56BAD53F5F88A0340D5835A37CCC33C5
                                  SHA1:943A88F953CD36E9F79B6681BDB3949071F60188
                                  SHA-256:7BEB6D4F0AC884F33B9528E3C56BEE15E3D4BD33D16DE40F242B024CE68FC4B0
                                  SHA-512:79AD20CD678C8C3F9A6571BEBDAC570B7167813310C44BEC1D67EC881F9FFC843965FF0B047F31E154A616B2E917A291DD8765B217674A963A7FCD57C20737C5
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label5.Left.(.Top.H.Width.8.Height...Caption..&User Name:.FocusControl..Name...TLabel.Label6.Left.(.Top.x.Width.A.Height...Caption..&Organization:.FocusControl..Company...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!.
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):202
                                  Entropy (8bit):4.56478131967351
                                  Encrypted:false
                                  SSDEEP:6:aFiLYMtrk8FYMLYMtrk8W7qMtrkeqYRqMtrkt:+GYMtg+YMtgdmMtgpMtgt
                                  MD5:2FA9DDBED5C616D3838AD3934F3B2D7D
                                  SHA1:234B295897F4F8E6E991A5B362B5F5D8011EC24B
                                  SHA-256:4FB0948F1707CE29811F05CB06169D1360B08445AAA180EAB814EBADDF2BB101
                                  SHA-512:DAFE8B7BBF7BBFC6816707F131AB66924964576BD4BE5FD2986611212E7D7D436C71112CFCDD8EBF42F6C515700165D8305357DFA7030391E4B99E4998E91A70
                                  Malicious:false
                                  Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32912
                                  Entropy (8bit):3.310684742077839
                                  Encrypted:false
                                  SSDEEP:768:+tHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfMb:+VXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DP
                                  MD5:C44488F6F633D32EA08F480FC760607C
                                  SHA1:6979D51D6398EFFF9742D09E022534A05AB9271A
                                  SHA-256:95C6B4CF234F726DDE2F63F9B162817A6807B3F33CC513C6FAF5E8BA0FB2A79A
                                  SHA-512:1C8EA5B2C0898DB712D9027E1B2B8AB8B569B520CEFE755B62C648EA9EBB8C720357DD4DB9E6F03D4C8143C524942D22AE9FD83F89EF5553E5E88AFEA0235E53
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.|...TPF0.TfrmDesign.frmDesign.Left....Top.v.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):722
                                  Entropy (8bit):4.629672896174913
                                  Encrypted:false
                                  SSDEEP:12:+GYMtg+YMtgPt0YMtgPrYMtgP0ZYMtgPpDYMtgPuYMtgdmMtgpMtg6tkMtg63Mth:+ff7kkKSHFmBBApVeNF
                                  MD5:5D78380EBDAD86764F26B73474DF4900
                                  SHA1:D2574CD9FB599E81C6099738D9D7974CE4039AFD
                                  SHA-256:DAA5742D80E19668753D435DA0937A4409D22AF73FBAF9DF22EC4CBC34FF5D45
                                  SHA-512:3533A9D8F4B1D8BD703856B150B8CBA99CA8CF55EF2182EB7B7326BF742C2B4B5CEA896B818FB690E0678689A8B452F22F5F548124D0B8302D776E8B2335B26D
                                  Malicious:false
                                  Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Serial1.Text <> ) THEN Next.Enabled := True;..IF (Serial2.Text <> ) THEN Next.Enabled := True;..IF (Serial3.Text <> ) THEN Next.Enabled := True;..IF (Serial4.Text <> ) THEN Next.Enabled := True;..IF (Serial5.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Serial1.Text = ) THEN Next.Enabled := False;..IF (Serial2.Text = ) THEN Next.Enabled := False;..IF (Serial3.Text = ) THEN Next.Enabled := False;..IF (Serial4.Text = ) THEN Next.Enabled := False;..IF (Serial5.Text = ) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):33198
                                  Entropy (8bit):3.359763390973846
                                  Encrypted:false
                                  SSDEEP:768:DIHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf7q:DIXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                                  MD5:EFB592762376173C651EC1755E26DD1F
                                  SHA1:3ECBFC3F6058E6F827A2FD91A7AB94EB7E60A045
                                  SHA-256:ED39514751D8C9913F0A3C222F29FFC85F0EE3D107A222BD668DB96125190A03
                                  SHA-512:062BBBBBEC95FA272D2F35EACAF2DE3D8BD3D04E027FB34059CD25D0E482D525393D81AA7DD575BDB5970DA298A87C916283983E2B66208B6787747D72E2D8A5
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label4.Left.(.Top.H.Width.I..Height.!.AutoSize..Caption..Please select a setup type..WordWrap....TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):159671
                                  Entropy (8bit):1.9106205211543585
                                  Encrypted:false
                                  SSDEEP:192:mrRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4C/DEtdmpJ:m5I/SKi
                                  MD5:5773034B4AA211DB5CCCA92B4A346660
                                  SHA1:99948D4B79CFB184B076CC156F7656E4C3604438
                                  SHA-256:AF00C29E992E19D6DBE9D8DC5535BED62475F09B6E79EAE64B92E6B7CC801170
                                  SHA-512:E6B23477655045A65442E383748C6883AC0560CC3152DC8A5D19D8DAAE0BD5345B28392C804F3E1B0A3572410CB1AFCEB1EA2C195A976DD432CB0705B2398953
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..o..TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32908
                                  Entropy (8bit):3.3110543872756732
                                  Encrypted:false
                                  SSDEEP:768:qNHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfX1:q1XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5De
                                  MD5:5A8C8E081C329D3F53494AECEF81BD82
                                  SHA1:9F1037A2CF254FA932D2A642C4ABD84E0770E167
                                  SHA-256:FE73CBFCCECE99991601E653E816A1489425BC8701EEC2CF89724239316CC8CC
                                  SHA-512:9565DD95764D8B6E1761E323BD12420E84733CB6D35DDAADE755186E208C81308231C891CF00296E4F2FE7493D7E9DEE04A68DA7624D8F69C49A2DAC4B865B01
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.x...TPF0.TfrmDesign.frmDesign.Left.u..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):228
                                  Entropy (8bit):4.823487220355037
                                  Encrypted:false
                                  SSDEEP:6:aoqLYMtrk8LTqMtrkegurusdrHE8Pud2dusdrHEt:jOYMtgQeMtg1dsdrHEUxIsdrHEt
                                  MD5:8ED569EB90D7EC0791C65F696B85AA4B
                                  SHA1:AA48F7BD2BA3A2F5DD63D25DA56A1039A18E7FB0
                                  SHA-256:ABF9F1E255935EC3BA966B8CDA6D129F93F28F43F8C805523B4846769C90F788
                                  SHA-512:3BDBBDF37199E6FEB281867FFDE480782905E0C24DB729DBF78D6FA0D92A363AA0CABBE20303E06D1327A24C3142F0EF72F8B0AF1ED268652DB301407A4F5926
                                  Malicious:false
                                  Preview:IF (MenuGroup.Text <> ) THEN Next.Enabled := True;..IF (MenuGroup.Text = ) THEN Next.Enabled := False;..IF (ISNT.Caption = TRUE) THEN AllUsers.Enabled := True;..IF (ISNT.Caption <> TRUE) THEN AllUsers.Enabled := False;..
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):159591
                                  Entropy (8bit):1.9059323470293204
                                  Encrypted:false
                                  SSDEEP:192:26Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CBH1qw3cmrw:2QI/VnP
                                  MD5:C61886A33BF58C3BC38FA869019DA28E
                                  SHA1:C2E1B87CCBD13CBE8AFB4FC278A5BA0635C97279
                                  SHA-256:39056A7647F8135EDF8D8D80F81C53153CCE7E5BCC858ECC81BE6F0075692A26
                                  SHA-512:65EDBD0675A8282ECD0CCD74BDA2F458D222EAFA5BF29BE61F5F081D3FB53B38797B57BBF78C544771F362ED6F03929FEAB19C2E6928222AAD8BC1A53DF81263
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.So..TPF0.TfrmDesign.frmDesign.Left.+..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):31822
                                  Entropy (8bit):3.1036618557972493
                                  Encrypted:false
                                  SSDEEP:768:sHHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfU:snXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                                  MD5:01216764772CEB5308A494AFD9D73C37
                                  SHA1:88A301C9F21316D7AA3B909C3EF18A3F3EC164F7
                                  SHA-256:EC6130DCA3F4C1AF10559659024F6A5DC97D8B31E415715CF5C9D662BAC5743F
                                  SHA-512:6E3399DCD1A3EC38045FF360E53FBC836CDCBC763AABFFC9253F07F9A9683E2D605F088E885BE0254096430601F484740240D739110E557C458BE0851868E7BA
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.:|..TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):770560
                                  Entropy (8bit):6.315742525627603
                                  Encrypted:false
                                  SSDEEP:12288:0to4wBKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:0to4ql5BqPA2fc7wMz7
                                  MD5:345DD7F8B98628179CF1E01A15B4C502
                                  SHA1:DF616AC0649525B0C0023C73B6C2DA6BCEFC9A23
                                  SHA-256:52B3F0E622DCC2DF803503DE301F7BA917F602F9F26F033184B2AB6151006E7A
                                  SHA-512:484FFD76D39E1C2D785238A381266D594DD0EA0A1BC9EA28F04672B8398790BF87680F7B947FDBEF4F3BD01E2356E905FB6E5E1953531DAD76F04649A1488721
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32879
                                  Entropy (8bit):3.303772475257304
                                  Encrypted:false
                                  SSDEEP:768:VDHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfwE:VDXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DA
                                  MD5:7ABD6BD2B201E76EA624B72EC854E178
                                  SHA1:B74ECA13809A2439B0A8B769328247EED6ECA6CC
                                  SHA-256:B7E2337DDFE813C051D10B5CBBBBDC7FCD0EEF4B5B2621C3A77D6B91743C0F4D
                                  SHA-512:66AF2C8901D8B421C1BC1265CBC8495E19C2346BF8B97D280079E1200578D450B6DEA570B712D350D5BE0A8B88A2615BE4075008D85CCA3CCF5D28A4D9194A9E
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32756
                                  Entropy (8bit):3.2836876237576345
                                  Encrypted:false
                                  SSDEEP:768:XyHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfn:X6XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DU
                                  MD5:BF3263127CD771470559490ADB76647B
                                  SHA1:8971CB4959D1BCA4A0EC48F3186309B00E16261B
                                  SHA-256:4811574E264AEB0927806A9A953CEA2A903ED18C36A34A10B67E40B99CA1670F
                                  SHA-512:9AF82B1F3EB3E735E2434BA803C1FC6D13BC1866A73D9F0FF466A23A5761291DD00A6C0D57BD24CE6CC2DCD0ACC16E863A2F30A41FC4BBBD041578F85AF6AD27
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):161047
                                  Entropy (8bit):1.9896602276153565
                                  Encrypted:false
                                  SSDEEP:192:E3Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CWNux1uAw1Dmi:EtI/gWf
                                  MD5:5F7AE8AAAC7F8E1E811BE95B187ABB10
                                  SHA1:C34C69B5AE6B4B2EFAE3236C386F2B0388F815A8
                                  SHA-256:984A34337FC921BCCBA721B8361D3806459D2F37CBF117F5CC35D6BD0D6FEF6D
                                  SHA-512:0A6F8E499686102AD85DD411958B3417A4E758FAC61A1D883420490AABDEF0F6CECED358997F83AB84FF7DC2D01A3E90903C899ED382B97165CF019B8C213709
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..u..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1561
                                  Entropy (8bit):5.018115004625162
                                  Encrypted:false
                                  SSDEEP:24:UuikSi+nfi0ZiFuEai/pZSruicvSi+pipUivuNsIi/pEaiDatfi/pTvSgREii/pH:U5ExAGVPbu1ZRMfkf3faWYt
                                  MD5:2FE4E500443ECB1E27A767BEE9A18C63
                                  SHA1:887A5789CDAC46BEA2829870DF02AD6B87A92270
                                  SHA-256:6492FEB41031C64C70FA8FABAABCCDE4846F9438B017D152C68C4B356C6A167A
                                  SHA-512:9475EB0E7509493A23DEA491CFA0A9A1DB0D339C216F1E38512DF18A74D80C69B6C8CE9C10131047227FFA3E979D5D6F144748569CFD9209C47977D770D94DD4
                                  Malicious:false
                                  Preview:IF (checkSuccess.Caption = COMPLETE) THEN textComplete.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN textReboot.Visible := True;..IF (checkSuccess.Caption = CANCEL) THEN textCancelled.Visible := True;..IF (checkSuccess.Caption = ERROR) THEN textError.Visible := True;..IF (checkSuccess.Caption = COMPLETE) THEN RunNow.Visible := True;..IF (checkRemove.Caption = TRUE) THEN textRemove.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN RebootNow.Visible := True;..IF (checkSuccess.Caption <> COMPLETE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN textReboot.Visible := False;..IF (checkSuccess.Caption <> CANCEL) THEN textCancelled.Visible := False;..IF (checkSuccess.Caption <> ERROR) THEN textError.Visible := False;..IF (checkSuccess.Caption <> COMPLETE) THEN RunNow.Visible := False;..IF (checkRemove.Caption <> TRUE) THEN textRemove.Visible := False;..IF (checkRemove.Caption = TRUE) THEN textComplete.Visible := Fal
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32086
                                  Entropy (8bit):3.1568876532608567
                                  Encrypted:false
                                  SSDEEP:768:PGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfp:P+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DC
                                  MD5:D5DF18B96E3A0E9DA52766BDEB603E4B
                                  SHA1:A1D313F08A9B663F8DB7BCB258EFA616BB2618DB
                                  SHA-256:C1E2B73702BE7EA8E2BB9CEC1F9D210757D67EB950D8A22EA39E0E2C5F9AF6B0
                                  SHA-512:AB60CE2806739B62EC063FABA81A17CFEEA3CFCD546E9DD8F486DA3491DF3BB76C7020E35B5C2898A923736672E3AE9CA2400978DCBFBD8B75E76B579B85FED1
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.B}..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):128
                                  Entropy (8bit):4.596663476123045
                                  Encrypted:false
                                  SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                                  MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                                  SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                                  SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                                  SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                                  Malicious:false
                                  Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1316352
                                  Entropy (8bit):6.662123826541052
                                  Encrypted:false
                                  SSDEEP:24576:htJHEI7Kl/eZfZblU8u+noMRBqSPSUO9z8mF36X+huHcN2:rkl6PoMRMSSzy+hwcN2
                                  MD5:595209D10BD0EC1B01F8AC31195E7902
                                  SHA1:849F59A743DE094C7CF05C7F89B0ED22309B619C
                                  SHA-256:8D67E430AB5300BBA92B1D1B45D2E87C13E8B0D61A75D02A70BC203696430534
                                  SHA-512:3AA7C32A3BC9F0A1E5D4B67B657A216131FBDD62E5794403D01FBBCA663420D861460DAEA6ECEA6F2C4268E67B1E2A71DEDE6E6A57FF041E34BFD3F3130EC328
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...X..V.....................j.....................Q....................................................................O........5.......T.............................................................................H.......^....................text...h........................... ..`.itext..T........................... ..`.data....M.......N..................@....bss....TS... ...........................idata...5.......6..................@....didata.^............0..............@....edata..O............:..............@..@.rdata...............<..............@..@.reloc...............>..............@..B.rsrc....T.......T..................@..@....................................@..@........................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1448448
                                  Entropy (8bit):6.68350408954223
                                  Encrypted:false
                                  SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                                  MD5:18B85C5A139BAEAFD89C70B8C6561A52
                                  SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                                  SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                                  SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):160192
                                  Entropy (8bit):1.9416958546631025
                                  Encrypted:false
                                  SSDEEP:192:TdRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cdtq69wTEmC+:TvI/Lw76
                                  MD5:68E84CD5CA646B0204CD019CC6B63DCD
                                  SHA1:B00E7D577E350F96149E5C14C6DDA8B05994462D
                                  SHA-256:ECCE7B76CEE8E1C10D828DC932F1BFDC782F1B599C1BF13651C21B73A5AE1A4A
                                  SHA-512:E848350BD35C9DD7B7AFA741BD4089763EA990B7F27AF96C3067E308A9AF812D83DB5F48E2EF8A6CE3E221036B1C76F0802A87DF9FC16CEB8C3B8E03619A1C85
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32211
                                  Entropy (8bit):3.1826203678135156
                                  Encrypted:false
                                  SSDEEP:768:iVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfb:idXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Di
                                  MD5:1074D7C4D94AF399F1F6137AD183E70D
                                  SHA1:9C7BDC1EFDEC073746AD9B7478F113D9EBD403EB
                                  SHA-256:2AA0603ADAA5058A1C118C8F2FAACD333D31112EC4C75689F765E4BC3AF69473
                                  SHA-512:38C7A641A232F2A67F10904716D13C137F08A0A19F47D209994FF63BFB198D8BB89075CD78BD23FF26427CFB3BDC53585EC33735A6FFF5E76834278D958AD1ED
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left.D..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):370
                                  Entropy (8bit):4.959095954912026
                                  Encrypted:false
                                  SSDEEP:6:aG1uSLF2du6szW4Rl1Ac2duJRl1Ow0Ld2du4LRl1uSLju6szWAK1Ow0Lru4FK1AC:qITMDIb6UIJTc6S6jO
                                  MD5:D8BA1E1B3F547F94CB059C8ACEC89297
                                  SHA1:71A5043CA3BF89FECA070431985C232E28940AAB
                                  SHA-256:62EE20B127F44C2D91BBCC9A232689DD3F1BC3359E606257BF3B115D4CBBDD2C
                                  SHA-512:5DA1E4DEB8518CD7AF202E7169F181683C74A83F62D98A36DEB45A03E14F384410633017D16CCBB6E216904F40AC782D7BE97940EACAB7D60B2D54CB7DBAEDC9
                                  Malicious:false
                                  Preview:IF (checkWINST.Caption <> TRUE) THEN WINST.Visible := True;..IF (checkJS.Caption <> TRUE) THEN JS.Visible := True;..IF (checkDotNET.Caption <> TRUE) THEN dotNET.Visible := True;..IF (checkWINST.Caption = TRUE) THEN WINST.Visible := False;..IF (checkDotNET.Caption = TRUE) THEN dotNET.Visible := False;..IF (checkJS.Caption = TRUE) THEN JS.Visible := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):43052
                                  Entropy (8bit):4.120190601260142
                                  Encrypted:false
                                  SSDEEP:768:yJHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf9:yhXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dy
                                  MD5:57A89F49FD0EE39606E927B96B00CFE5
                                  SHA1:5D94926CAF2BE0284B0B4CB7E69ECFA7A9A63284
                                  SHA-256:8B4D56464B9F2050B89134F7BCC8CD0FAFE946CE062F320915B0404685BDA111
                                  SHA-512:186F50C78EBD96CB12E8F7D5DF249AFBBA3C71E5DF96AB4F293DB2AC99593459F634C0BFA3B1C2FF34063819894FB9F446000110069B1DE2DD63B47874956E7E
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):292
                                  Entropy (8bit):4.740550563860751
                                  Encrypted:false
                                  SSDEEP:6:a3jF2duukAiRcjjuukTDoRcjF2duukTDQTjjuukAh:csIrqar1sIroarg
                                  MD5:86B3EBFBD934B66842048F0AA241E5C5
                                  SHA1:F770786C29D12D8C33B975EF2BAAD6D59A90F7CF
                                  SHA-256:4AEDBF26E568E62B47517E91FBCC818A5B95BD7FDB8A7DC5B826C0BD194077A6
                                  SHA-512:FE37AD98EC8DE62CE6E6A46E284450BBE19B7D8EB8C7B3B81BD06BA22EEBA487C2CEE8C3B37CD84FEAA09F8F39BDF532371B57FCCC7788A2F54EDA3390E58FD3
                                  Malicious:false
                                  Preview:IF (TestRemove.Caption <> TRUE) THEN CaptionInstall.Visible := True;..IF (TestRemove.Caption = TRUE) THEN CaptionUninstall.Visible := True;..IF (TestRemove.Caption <> TRUE) THEN CaptionUninstall.Visible := False;..IF (TestRemove.Caption = TRUE) THEN CaptionInstall.Visible := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):42687
                                  Entropy (8bit):4.076635616143556
                                  Encrypted:false
                                  SSDEEP:768:PoHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf/i:PoXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DJ
                                  MD5:0379D6212582C3FFF4E2E205B9585151
                                  SHA1:72BCF5C26E8270EC72F53EDC69D970E65CEE7229
                                  SHA-256:9495AE09659EA231157D576BF325CF8A55C191A493CF9EA39979CBC3497B281B
                                  SHA-512:D65059609CF44FDEA5134CC542835B7CD1FCB0873854D6BDB6A15D53737CD090F65CA119D81A0D3DCA5E0289E666395E140564B457870BDFD5A6334EBE41BE0C
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.w.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):31936
                                  Entropy (8bit):3.1261873313705286
                                  Encrypted:false
                                  SSDEEP:768:KGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfjE:K+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Db
                                  MD5:92B2E967740B9A9566132617654F99CE
                                  SHA1:9E5CD494173A9BABFC520E085B66CAD832FA9263
                                  SHA-256:4CB5450E2366EB03855CB1890C84245BD21975B353807F820C461F56577E02D1
                                  SHA-512:233442A840DBCC4B37FF40CE8B97E2B4A157043A8B552236B2A24BA0DB18AA38CCA99B2F257272DA577793B129C047895D46A68214074D977E6930571974A3C4
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..|..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):128
                                  Entropy (8bit):4.596663476123045
                                  Encrypted:false
                                  SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                                  MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                                  SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                                  SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                                  SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                                  Malicious:false
                                  Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32180
                                  Entropy (8bit):3.176260859175472
                                  Encrypted:false
                                  SSDEEP:768:5UVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfA:5UdXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5F
                                  MD5:56BAD53F5F88A0340D5835A37CCC33C5
                                  SHA1:943A88F953CD36E9F79B6681BDB3949071F60188
                                  SHA-256:7BEB6D4F0AC884F33B9528E3C56BEE15E3D4BD33D16DE40F242B024CE68FC4B0
                                  SHA-512:79AD20CD678C8C3F9A6571BEBDAC570B7167813310C44BEC1D67EC881F9FFC843965FF0B047F31E154A616B2E917A291DD8765B217674A963A7FCD57C20737C5
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label5.Left.(.Top.H.Width.8.Height...Caption..&User Name:.FocusControl..Name...TLabel.Label6.Left.(.Top.x.Width.A.Height...Caption..&Organization:.FocusControl..Company...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!.
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):202
                                  Entropy (8bit):4.56478131967351
                                  Encrypted:false
                                  SSDEEP:6:aFiLYMtrk8FYMLYMtrk8W7qMtrkeqYRqMtrkt:+GYMtg+YMtgdmMtgpMtgt
                                  MD5:2FA9DDBED5C616D3838AD3934F3B2D7D
                                  SHA1:234B295897F4F8E6E991A5B362B5F5D8011EC24B
                                  SHA-256:4FB0948F1707CE29811F05CB06169D1360B08445AAA180EAB814EBADDF2BB101
                                  SHA-512:DAFE8B7BBF7BBFC6816707F131AB66924964576BD4BE5FD2986611212E7D7D436C71112CFCDD8EBF42F6C515700165D8305357DFA7030391E4B99E4998E91A70
                                  Malicious:false
                                  Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32912
                                  Entropy (8bit):3.310684742077839
                                  Encrypted:false
                                  SSDEEP:768:+tHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfMb:+VXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DP
                                  MD5:C44488F6F633D32EA08F480FC760607C
                                  SHA1:6979D51D6398EFFF9742D09E022534A05AB9271A
                                  SHA-256:95C6B4CF234F726DDE2F63F9B162817A6807B3F33CC513C6FAF5E8BA0FB2A79A
                                  SHA-512:1C8EA5B2C0898DB712D9027E1B2B8AB8B569B520CEFE755B62C648EA9EBB8C720357DD4DB9E6F03D4C8143C524942D22AE9FD83F89EF5553E5E88AFEA0235E53
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.|...TPF0.TfrmDesign.frmDesign.Left....Top.v.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):722
                                  Entropy (8bit):4.629672896174913
                                  Encrypted:false
                                  SSDEEP:12:+GYMtg+YMtgPt0YMtgPrYMtgP0ZYMtgPpDYMtgPuYMtgdmMtgpMtg6tkMtg63Mth:+ff7kkKSHFmBBApVeNF
                                  MD5:5D78380EBDAD86764F26B73474DF4900
                                  SHA1:D2574CD9FB599E81C6099738D9D7974CE4039AFD
                                  SHA-256:DAA5742D80E19668753D435DA0937A4409D22AF73FBAF9DF22EC4CBC34FF5D45
                                  SHA-512:3533A9D8F4B1D8BD703856B150B8CBA99CA8CF55EF2182EB7B7326BF742C2B4B5CEA896B818FB690E0678689A8B452F22F5F548124D0B8302D776E8B2335B26D
                                  Malicious:false
                                  Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Serial1.Text <> ) THEN Next.Enabled := True;..IF (Serial2.Text <> ) THEN Next.Enabled := True;..IF (Serial3.Text <> ) THEN Next.Enabled := True;..IF (Serial4.Text <> ) THEN Next.Enabled := True;..IF (Serial5.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Serial1.Text = ) THEN Next.Enabled := False;..IF (Serial2.Text = ) THEN Next.Enabled := False;..IF (Serial3.Text = ) THEN Next.Enabled := False;..IF (Serial4.Text = ) THEN Next.Enabled := False;..IF (Serial5.Text = ) THEN Next.Enabled := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):33198
                                  Entropy (8bit):3.359763390973846
                                  Encrypted:false
                                  SSDEEP:768:DIHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf7q:DIXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                                  MD5:EFB592762376173C651EC1755E26DD1F
                                  SHA1:3ECBFC3F6058E6F827A2FD91A7AB94EB7E60A045
                                  SHA-256:ED39514751D8C9913F0A3C222F29FFC85F0EE3D107A222BD668DB96125190A03
                                  SHA-512:062BBBBBEC95FA272D2F35EACAF2DE3D8BD3D04E027FB34059CD25D0E482D525393D81AA7DD575BDB5970DA298A87C916283983E2B66208B6787747D72E2D8A5
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label4.Left.(.Top.H.Width.I..Height.!.AutoSize..Caption..Please select a setup type..WordWrap....TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):159671
                                  Entropy (8bit):1.9106205211543585
                                  Encrypted:false
                                  SSDEEP:192:mrRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4C/DEtdmpJ:m5I/SKi
                                  MD5:5773034B4AA211DB5CCCA92B4A346660
                                  SHA1:99948D4B79CFB184B076CC156F7656E4C3604438
                                  SHA-256:AF00C29E992E19D6DBE9D8DC5535BED62475F09B6E79EAE64B92E6B7CC801170
                                  SHA-512:E6B23477655045A65442E383748C6883AC0560CC3152DC8A5D19D8DAAE0BD5345B28392C804F3E1B0A3572410CB1AFCEB1EA2C195A976DD432CB0705B2398953
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0..o..TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):32908
                                  Entropy (8bit):3.3110543872756732
                                  Encrypted:false
                                  SSDEEP:768:qNHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfX1:q1XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5De
                                  MD5:5A8C8E081C329D3F53494AECEF81BD82
                                  SHA1:9F1037A2CF254FA932D2A642C4ABD84E0770E167
                                  SHA-256:FE73CBFCCECE99991601E653E816A1489425BC8701EEC2CF89724239316CC8CC
                                  SHA-512:9565DD95764D8B6E1761E323BD12420E84733CB6D35DDAADE755186E208C81308231C891CF00296E4F2FE7493D7E9DEE04A68DA7624D8F69C49A2DAC4B865B01
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.x...TPF0.TfrmDesign.frmDesign.Left.u..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):228
                                  Entropy (8bit):4.823487220355037
                                  Encrypted:false
                                  SSDEEP:6:aoqLYMtrk8LTqMtrkegurusdrHE8Pud2dusdrHEt:jOYMtgQeMtg1dsdrHEUxIsdrHEt
                                  MD5:8ED569EB90D7EC0791C65F696B85AA4B
                                  SHA1:AA48F7BD2BA3A2F5DD63D25DA56A1039A18E7FB0
                                  SHA-256:ABF9F1E255935EC3BA966B8CDA6D129F93F28F43F8C805523B4846769C90F788
                                  SHA-512:3BDBBDF37199E6FEB281867FFDE480782905E0C24DB729DBF78D6FA0D92A363AA0CABBE20303E06D1327A24C3142F0EF72F8B0AF1ED268652DB301407A4F5926
                                  Malicious:false
                                  Preview:IF (MenuGroup.Text <> ) THEN Next.Enabled := True;..IF (MenuGroup.Text = ) THEN Next.Enabled := False;..IF (ISNT.Caption = TRUE) THEN AllUsers.Enabled := True;..IF (ISNT.Caption <> TRUE) THEN AllUsers.Enabled := False;..
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):159591
                                  Entropy (8bit):1.9059323470293204
                                  Encrypted:false
                                  SSDEEP:192:26Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CBH1qw3cmrw:2QI/VnP
                                  MD5:C61886A33BF58C3BC38FA869019DA28E
                                  SHA1:C2E1B87CCBD13CBE8AFB4FC278A5BA0635C97279
                                  SHA-256:39056A7647F8135EDF8D8D80F81C53153CCE7E5BCC858ECC81BE6F0075692A26
                                  SHA-512:65EDBD0675A8282ECD0CCD74BDA2F458D222EAFA5BF29BE61F5F081D3FB53B38797B57BBF78C544771F362ED6F03929FEAB19C2E6928222AAD8BC1A53DF81263
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.So..TPF0.TfrmDesign.frmDesign.Left.+..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:JPEG XL codestream
                                  Category:dropped
                                  Size (bytes):31822
                                  Entropy (8bit):3.1036618557972493
                                  Encrypted:false
                                  SSDEEP:768:sHHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfU:snXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                                  MD5:01216764772CEB5308A494AFD9D73C37
                                  SHA1:88A301C9F21316D7AA3B909C3EF18A3F3EC164F7
                                  SHA-256:EC6130DCA3F4C1AF10559659024F6A5DC97D8B31E415715CF5C9D662BAC5743F
                                  SHA-512:6E3399DCD1A3EC38045FF360E53FBC836CDCBC763AABFFC9253F07F9A9683E2D605F088E885BE0254096430601F484740240D739110E557C458BE0851868E7BA
                                  Malicious:false
                                  Preview:...TFRMDESIGN.0.:|..TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8061
                                  Entropy (8bit):5.468784701284559
                                  Encrypted:false
                                  SSDEEP:192:rZyVhFTzHjHP2CSIizfTQAkVxdUM47BjzFPaXp5MFrgLmtJ6XWFXQhjXT9lXAEju:dyVhFTzHjHP2CSIiz7QAkVxdUM47Bj5F
                                  MD5:506D3FB89B1AB5EFF5FC21DBE560D246
                                  SHA1:B7544CA6E08EDFEBC7A16D1BF63D2D304A772713
                                  SHA-256:33D5610347FBB0D923B18927E28E452D097C21B1B7CBD226E3BBECD3F98AEA8C
                                  SHA-512:CC7C15D759DE5DEF04C421C4C18E2DFB8E4F6E68E2DD51C059BA9DC9D34E398660C6C558EB18DF3B3F55B32050C87AA328FFEBD4576C83B31417D19FCA1E640F
                                  Malicious:false
                                  Preview:SourceDir..C:\PROGRA~3\{CDCC2~1\..$ex..MEDIAPACKAGEPATH..\PROGRA~3\..$ex..A76FCA102..FALSE..$ex..A150AC403..FALSE..$ex..A1ABF3862..FALSE..$ex..A502E833A..FALSE..$ex..ACE56FB43..FALSE..$ex..A52B152B3..FALSE..$ex..AC0AC9330..FALSE..$ex..AE09F5A5F..FALSE..$ex..AF2F92670..FALSE..$ex..A94312164..FALSE..$ex..A5809A5D8..FALSE..$ex..A56A7DD7A..FALSE..$ex..A1A9DA512..FALSE..$ex..A84FEA59D..FALSE..$ex..A849003A2..FALSE..$ex..A98500B5D..FALSE..$ex..A4F27760E..FALSE..$ex..A4D56F533..FALSE..$ex..A7AA455DC..FALSE..$ex..AE1318D92..FALSE..$ex..A66980B9F..FALSE..$ex..A9167C40A..FALSE..$ex..A15F69ECD..FALSE..$ex..AB06B5044..FALSE..$ex..A66E41FEB..FALSE..$ex..A9E7D6EA9..FALSE..$ex..AB258770..FALSE..$ex..AB5CD4D0..FALSE..$ex..A537BC2C1..FALSE..$ex..A5D1665DA..FALSE..$ex..A6EB99A04..FALSE..$ex..AF5C9AD93..FALSE..$ex..A21D6E643..FALSE..$ex..A63D6488F..FALSE..$ex..AF835DFEA..FALSE..$ex..A9115C352..FALSE..$ex..A76FCA102..TRUE..$ex..P76FCA102_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..$
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\mia595B.tmp\TDService.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):6205
                                  Entropy (8bit):5.452037061918955
                                  Encrypted:false
                                  SSDEEP:192:86NgV1xjau6XWFGkhjX39vXAT0iE9JLOV:tUa1XWFGkpqYiE9JyV
                                  MD5:1AE78E69FB2A29D9B2A7B40D6BB1C043
                                  SHA1:2B53F30E72C4A877434DD1DE4EC4D4DC613C1D22
                                  SHA-256:A62B45BB0DA159DCC5A117780F2CA6C01D5BC97C7A384F124AE8D3A8A10456E2
                                  SHA-512:F1B232C3D06148379F7A4104731530F253F5D77DFEA60D9BDFEFDC3514046ECFAFCB41AC7982537B947AA2960717FD476E0678321AE23B18C6B016B136E91B32
                                  Malicious:false
                                  Preview:SourceDir..C:\PROGRA~3\{C39D0~1\..$ex..MEDIAPACKAGEPATH..\PROGRA~3\..$ex..AEDD97940..FALSE..$ex..A3CE6DECE..FALSE..$ex..A34E6DE3C..FALSE..$ex..A25D64044..FALSE..$ex..A3476C065..FALSE..$ex..A8135F827..FALSE..$ex..A8808A0B2..FALSE..$ex..ACC3273D..FALSE..$ex..AA913E6AF..FALSE..$ex..ACECD985D..FALSE..$ex..AC5D9D236..FALSE..$ex..A1A2661C4..FALSE..$ex..AC64028C1..FALSE..$ex..A3CEB12CD..FALSE..$ex..A1872974D..FALSE..$ex..AD4D85249..FALSE..$ex..AEACB8D8..FALSE..$ex..A7C4CDFEC..FALSE..$ex..A95FFAA1..FALSE..$ex..AF0FC8706..FALSE..$ex..AD7FB24C5..FALSE..$ex..A86D611ED..FALSE..$ex..AEDD97940..TRUE..$ex..PEDD97940_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A3CE6DECE..TRUE..$ex..P3CE6DECE_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A34E6DE3C..TRUE..$ex..P34E6DE3C_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A25D64044..TRUE..$ex..P25D64044_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A3476C0
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):39898
                                  Entropy (8bit):3.7274967042685225
                                  Encrypted:false
                                  SSDEEP:384:6PS0ScS6VDZSlSNSddAMSBSpS9dToQSxS5SIlY0SWS+SIFwrS3S/SL9pzSUS8SG4:6rD0AhToiYGwwpbMVR
                                  MD5:0F90C61EC5C8E6C272951CFE5E23CEE7
                                  SHA1:5D5857C9832B39B2379B3D0837D3CB438DE0E800
                                  SHA-256:37270A5C180CCB2DA89F3BD135A1A32F27A6AB8359A0DDBD44A68349A1E0ADAF
                                  SHA-512:43385FF58CDAED342BBE39671465BE441ABB49BD9ACDA81525CFEA71D665DB4B7834F1405F56092BB7D53B91A6860AF652C87E6839E6B533D18DD3A81C950C72
                                  Malicious:false
                                  Preview:..I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .0.3./.1.4./.2.0.2.4. .1.2.:.1.3.:.5.5.....I.N.F.O.:. . . .P.r.o.d.u.c.t. .V.e.r.s.i.o.n. .2...1...0...0.......I.N.F.O.:. . . .V.e.r.s.i.o.n.:. .6...2...9.2.0.0. .....I.N.F.O.:. . . .P.l.a.t.f.o.r.m. .I.D.:. .2. .(.N.T.).....I.N.F.O.:. . . .S.e.r.v.i.c.e. .P.a.c.k.:. .0...0.....I.N.F.O.:. . . .S.u.i.t.e.:. .0.x.0.1.0.0.,. .P.r.o.d.u.c.t. .T.y.p.e.:. .1.....I.N.F.O.:. . . .A.r.c.h.i.t.e.c.t.u.r.e.:. .A.M.D.6.4.......I.N.F.O.:. . . .I.n.t.e.r.a.c.t.i.v.e. .W.i.n.d.o.w.s. .S.t.a.t.i.o.n.....I.N.F.O.:. . . .C.o.m.m.a.n.d. .L.i.n.e.:. .'.C.:.\.P.R.O.G.R.A.~.3.\.{.C.D.C.C.2.~.1.\.O.F.F.L.I.N.E.\.m.D.I.F.x.I.D.E...d.l.l.\.x.6.4.D.P.I.n.s.t...e.x.e. . ./.S.W. ./.S.E. ./.E.L. ./.P.A.T.H. .C.:.\.P.R.O.G.R.A.~.1.\.\.T.E.C.H.K.O.~.1.\.T.E.C.H.K.O.~.1.\.D.E.N.S. ./.D. ./.S.A. ./.L.M. ./.F.'.....I.N.F.O.:. . . .D.P.I.n.s.t. .i.s. .n.o.t. .m.u.l.t.i.-.l.i.n.g.u.a.l.......I.N.F.O.:. . .
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  File Type:Generic INItialization configuration [BeginLog]
                                  Category:dropped
                                  Size (bytes):114043
                                  Entropy (8bit):5.382364942247263
                                  Encrypted:false
                                  SSDEEP:1536:O+5cdyeoiwGeRAstj63xRFG2eaaOvpUc+jK1V1vo:O+5cgeotRAstj63xRFG2eaaOveX
                                  MD5:CF6265C752C72FCD62533A95AA6EA814
                                  SHA1:43FFB64D0D134FA6EBFD36AD2BB452922CEEE322
                                  SHA-256:39D3CCD0DA805BEEFF3BACE55055A874A1AD3394EB51470C6B0FD58F0B48F989
                                  SHA-512:B42A44C4859ECA0C950CC7F2DDD0F0A3CDE6A4810128ACC77F61C7B079F89DACCC6310A789A87B5228E151D7C4247103F6C3875F7AEB3FC36D0505F243E5B7E5
                                  Malicious:false
                                  Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):767488
                                  Entropy (8bit):6.309153147556162
                                  Encrypted:false
                                  SSDEEP:12288:RZTHM4uBKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:RFM48x5BqPA2fc7wMz7
                                  MD5:A9CDCC1CCE934430F30F66BAF6118459
                                  SHA1:C53F64C4027301E8E94FAA739E3D59E593950854
                                  SHA-256:4EAEB8F7750D12B3CB411BC20BFF8A3948D977919B65A200B6AA58FC83D268B7
                                  SHA-512:82C938F3E64C3C88A7508BD9F3519D1FD803101B4EA12474C692585460FEA561D1FD9BD267B63C4F24301854E82DA3462BD4E4969E43277FD7AF48706B882176
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):767488
                                  Entropy (8bit):6.309153147556162
                                  Encrypted:false
                                  SSDEEP:12288:RZTHM4uBKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:RFM48x5BqPA2fc7wMz7
                                  MD5:A9CDCC1CCE934430F30F66BAF6118459
                                  SHA1:C53F64C4027301E8E94FAA739E3D59E593950854
                                  SHA-256:4EAEB8F7750D12B3CB411BC20BFF8A3948D977919B65A200B6AA58FC83D268B7
                                  SHA-512:82C938F3E64C3C88A7508BD9F3519D1FD803101B4EA12474C692585460FEA561D1FD9BD267B63C4F24301854E82DA3462BD4E4969E43277FD7AF48706B882176
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):770560
                                  Entropy (8bit):6.315742525627603
                                  Encrypted:false
                                  SSDEEP:12288:0to4wBKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:0to4ql5BqPA2fc7wMz7
                                  MD5:345DD7F8B98628179CF1E01A15B4C502
                                  SHA1:DF616AC0649525B0C0023C73B6C2DA6BCEFC9A23
                                  SHA-256:52B3F0E622DCC2DF803503DE301F7BA917F602F9F26F033184B2AB6151006E7A
                                  SHA-512:484FFD76D39E1C2D785238A381266D594DD0EA0A1BC9EA28F04672B8398790BF87680F7B947FDBEF4F3BD01E2356E905FB6E5E1953531DAD76F04649A1488721
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                                  Category:dropped
                                  Size (bytes):770560
                                  Entropy (8bit):6.315742525627603
                                  Encrypted:false
                                  SSDEEP:12288:0to4wBKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:0to4ql5BqPA2fc7wMz7
                                  MD5:345DD7F8B98628179CF1E01A15B4C502
                                  SHA1:DF616AC0649525B0C0023C73B6C2DA6BCEFC9A23
                                  SHA-256:52B3F0E622DCC2DF803503DE301F7BA917F602F9F26F033184B2AB6151006E7A
                                  SHA-512:484FFD76D39E1C2D785238A381266D594DD0EA0A1BC9EA28F04672B8398790BF87680F7B947FDBEF4F3BD01E2356E905FB6E5E1953531DAD76F04649A1488721
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):389632
                                  Entropy (8bit):6.443465180760872
                                  Encrypted:false
                                  SSDEEP:6144:zgj8g8Sy2AoNSlkJAiL9svGFXFPvA2wKcWQwMYW7rmk:zQ8guBoN2KA2wKc7wMz7
                                  MD5:89B5903624F9CDED346676E88F918693
                                  SHA1:162201E4E31FB327E0B16531C81041DC574A04A4
                                  SHA-256:851BB0A420E47AF2F49518FAE86E4B9755BD5DAA6E9EB3B2F1FC4585B6F05163
                                  SHA-512:FD2587EF52E43EC131E4D06A34306E038B85B98E9EE2866FFD117E906B019FBA6972B794BEC2A9E0FEF357E199A0D13E64A89D4356EA8BF6CAFD6A289B1B48A7
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...>=xQ............................d........ ....@.....................................................................E............p...&.......................}...................................................................................text............................... ..`.itext..|........................... ..`.data....,... ......................@....bss.....P...P.......8...................idata...............8..............@....didata..............J..............@....edata..E............L..............@..@.reloc...}.......~...N..............@..B.rsrc....&...p...&..................@..@....................................@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):11785
                                  Entropy (8bit):5.789321257277549
                                  Encrypted:false
                                  SSDEEP:192:nHw9S/Q1WOcI8skxoCyRR3E0cqiZ1rFsI92uBYPiGjAeN4jWK:nHw9T1CyRRU0cqiZ1xh92UHWK
                                  MD5:D05B516141D15A015E647D9C7927AA8D
                                  SHA1:FD0221BD95ADF78EFCF43A7BD830093E2D0B5036
                                  SHA-256:4CDC680CB405BFF9139EEB2F07EA124BBDBDE31807AD516DF2E6272F7EAFBA30
                                  SHA-512:1531523EB8D7DF6538028C8AF914C7DC397970160FADF0965D1A07AE661789129D860637DCA408F309353B5AC6BDDA8F6A645B0178BE710C55A8766A5182D016
                                  Malicious:false
                                  Preview:...@IXOS.@.....@.anX.@.....@.....@.....@.....@.....@......&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}..TECHKON Device Service..TDService.msi.@.....@.....@.....@........\PROGRA~3\&.{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Service......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{CD0C69EF-2B12-47ED-87B7-5A1DB20CBCD9}N.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\defaultScan.tss.@.......@.....@.....@......&.{4D6F449F-FA68-42B5-A305-16C45F308B8F}N.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\defaultSpot.tss.@.......@.....@.....@......&.{96ED6BF5-4AA1-4668-AEEE-E5101CDF29BA}L.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe.@.......@.....@.....@......&.{672A692B-629D-4B2A-A63B-2E211EA7164C}N.C:\Program Files (x86)\TECHKON GmbH
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):389632
                                  Entropy (8bit):6.443465180760872
                                  Encrypted:false
                                  SSDEEP:6144:zgj8g8Sy2AoNSlkJAiL9svGFXFPvA2wKcWQwMYW7rmk:zQ8guBoN2KA2wKc7wMz7
                                  MD5:89B5903624F9CDED346676E88F918693
                                  SHA1:162201E4E31FB327E0B16531C81041DC574A04A4
                                  SHA-256:851BB0A420E47AF2F49518FAE86E4B9755BD5DAA6E9EB3B2F1FC4585B6F05163
                                  SHA-512:FD2587EF52E43EC131E4D06A34306E038B85B98E9EE2866FFD117E906B019FBA6972B794BEC2A9E0FEF357E199A0D13E64A89D4356EA8BF6CAFD6A289B1B48A7
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...>=xQ............................d........ ....@.....................................................................E............p...&.......................}...................................................................................text............................... ..`.itext..|........................... ..`.data....,... ......................@....bss.....P...P.......8...................idata...............8..............@....didata..............J..............@....edata..E............L..............@..@.reloc...}.......~...N..............@..B.rsrc....&...p...&..................@..@....................................@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):144384
                                  Entropy (8bit):6.043448081977129
                                  Encrypted:false
                                  SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                  MD5:6484BEE1546FEB56595EAACF5D019C55
                                  SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                  SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                  SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                  Malicious:true
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):16700
                                  Entropy (8bit):5.7232020073611025
                                  Encrypted:false
                                  SSDEEP:384:aeRHUzdHmO0GgJVAu6qMNv1oDZkXtQMDmDIzqZ1+CmC/jFz5G6ci40F1e3i0iwAz:a/zM3ygkTq
                                  MD5:8175BDCAF8C5BC35EE921664855BB10D
                                  SHA1:AEA339AC95308105030EA4AA0E4F549B16DE81A9
                                  SHA-256:077E7A9983CB3CAF712D61901748D68678E85D31C0C339353F72F4F8AF61F013
                                  SHA-512:585D8AA6DFCA760B4F8FB1AFEF7FD975FAAF1C4F888A2EAC200AB103E233CA6D7D5545A52F3FAEE4962153FF5F7A5323B8B792F878ED503AAC2AB41868C6D73E
                                  Malicious:false
                                  Preview:...@IXOS.@.....@.anX.@.....@.....@.....@.....@.....@......&.{55EA8940-B618-47BD-A642-20BFB2A64F78}..TECHKON Device Driver 64Bit..TechkonDriver64Bit.msi.@.....@.....@.....@........\PROGRA~3\&.{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Driver 64Bit......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@$....@.....@.]....&.{5702EAC5-033D-48B5-B83F-DEF9ECF4C262}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys.@.......@.....@.....@......&.{52B0046B-434A-4EA9-9AC7-766C93D4D3F6}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.inf.@.......@.....@.....@......&.{6D03A36D-9750-4B1E-8344-0CE7ACED2DE2}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.cat.@.......@.....@.....@......&.{2B8BCB22-4191-4BD5-817D-B0123E06B87F}T.C:
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.8075030516230908
                                  Encrypted:false
                                  SSDEEP:24:JhXIf908zkrC8HscELypUHOl050j9/ZVuNjJPUB//6FN:TS9zkrCP6UW052y6//6v
                                  MD5:906C4921E8117C2433F1E51D8850D403
                                  SHA1:50EB5DCA420A3090DBDA12011E076E12B95A05E4
                                  SHA-256:DAD112BD05F25FF3771F1E3076FB11A72B90B5284B2722D0EABF173C645E0A73
                                  SHA-512:1B91113DE86C58FCDB49B4776BB3DA3B6A21978476C2D6CF43A8072BC7003CF4C5B678E3E41AE9EBB9E733A1F3E0C9A4A53B806E248099DA857EBBAC99F6A076
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.6294569573473938
                                  Encrypted:false
                                  SSDEEP:24:JWwXmIsc0d+R79GiQs5hBFyTUksTQ+F/ymZU+/w/FD+utO7KvFN:5WxcJ7ImBITdsT2AKvv
                                  MD5:8302126105F23FC1255A7F28FB9B7DE2
                                  SHA1:314A25EBD4639750BB68B8419B64C86F26BFA02E
                                  SHA-256:BCB8C62677236E9D304C011E423E4354E8D220189DEFF880394107D161276227
                                  SHA-512:37F37728F9B2EA6964EA0957E9E286F2631FD83C6B7BDD2587C7589AA92C55C28FCB72D8EA483F2F4D236F93B6CAFCEADEBDBB8464C927C8E4F6C8157D1131FC
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.4840872150632558
                                  Encrypted:false
                                  SSDEEP:48:g8PhbuRc06WXJGjT5oI4kTn3tZ/1Cfq6Oe0ZPfKOy:Phb1djTckT3D/1CnfuP9
                                  MD5:5C87BBF9518BEA3CA784D43B77AE488F
                                  SHA1:A8237B993E84F2F2FFC9370D7B8FBCAFF3B51974
                                  SHA-256:9571DD7413AF61534916D5824F7A0B49352A5C296530472DA6B5900E46CACE3C
                                  SHA-512:4E84E78DC5CA7FC20FCCB8B15C80A8CB09EC280353E2105D1D06B35C140ECA03B1DFEA53405D8FE28877321C60B24A67CA970EE016DFAD9329F084C6BE8EB06D
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):364484
                                  Entropy (8bit):5.365498997702745
                                  Encrypted:false
                                  SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauZ:zTtbmkExhMJCIpE6
                                  MD5:DD91532C14704A55B2E7F42213322B87
                                  SHA1:126D52E58F03DD4D0D01C30140786D910C776DF5
                                  SHA-256:B145E57760E1B6B6283FA5E8EAF2DC0AE9BE9D313154132A5C4AC12023D7F1C0
                                  SHA-512:30E2ED1B67407F749A486FF52B2C6A4720431AFEAB2C736DB7671F684D269ECD7E15914BDA9E42BA9624CBBEF390CCC971B47F75FD98F4DEE9E106B5500C7580
                                  Malicious:false
                                  Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):124688
                                  Entropy (8bit):5.941729779329973
                                  Encrypted:false
                                  SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                                  MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                                  SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                                  SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                                  SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                                  Malicious:false
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):5.853209211745096
                                  Encrypted:false
                                  SSDEEP:1536:YxeYFH0dtYcPdtYc0F9J174KlwOAYQog4wBYo4IYo4N65xpUV:YTFXNxF9j7j65xpUV
                                  MD5:9AA2C7DEAF5B8DBED62A60F723553858
                                  SHA1:6BFE53D07A3970523DC8C796EE24F392D2686BF7
                                  SHA-256:28D0E73EE5616C2A76829A0A430F465B598987B4798F6BA46234393E40167BA9
                                  SHA-512:AF2C404702563143B3ED6FC26C45D4E1CBB074F006420FF04F963C1F13783CA141C13D08918AFA9537A2DAABABC631C18DBB6562BC50AA3CB49294CCD00714F3
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......UBq..#...#...#...?...#..^....#..'....#.......#..Rich.#..........PE..L...Y..J...........!.........@......(........................................@......"J..........................................(.......D....................0..............................................X... .......(............................text............................... ..`.data...H...........................@....rsrc...D........ ..................@..@.reloc.......0.......0..............@..B2..H............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):180224
                                  Entropy (8bit):6.031963137664287
                                  Encrypted:false
                                  SSDEEP:3072:LwlZ+P6imnm8mFmT73tgHnV53kAgcvzgRm1trohJkwh:cZ+6imnm8mFmT73krb6gonf
                                  MD5:CEC1791BEC45F9D86771AF4F24EAA3F4
                                  SHA1:1B806C9A7189C7801EF643C5AEA03CD6B0DEDCC4
                                  SHA-256:7878EB862C0A8AB0766236E6C2183FAC93A0C734276347A143B454E2FB8B4F58
                                  SHA-512:BF917BA4C20DB97685A4BFEA266ECE11C77286F9480E546007FC1D830E4DFBA0966F6B5B59D74AFC89713276BB899755DFABC8F3C42A8422E612401C761A9BE7
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%.v.v.v.Y.v.v.Y.v...v"..v.v"..v.v.vE..v.Y.v..v.Y.v...v.Y.v...v.Y.v...vRich.v........PE..L...Q..K...........!.....`...P...............p......................................[...............................0................0..................................................................@............p..l............................text...._.......`.................. ..`.rdata...x...p.......p..............@..@.data....9....... ..................@....rsrc........0......................@..@.reloc..V'.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):212992
                                  Entropy (8bit):6.4058590918443175
                                  Encrypted:false
                                  SSDEEP:6144:U+l+8gbiTF32Cw0oSGWhuLuGser+VbGrIQL:idbgFmJSGWhWuGseapkr
                                  MD5:05D89328C51E732DE076DA05239D1D79
                                  SHA1:C89B8500D13D540D9F6D8FA651F13E2F9990DECE
                                  SHA-256:EE0BC472EC26CE050315AAAE1D85AE51BAF17E8A2A548E3161DED665CF324DD1
                                  SHA-512:9EFE29F322A0A3049D0E5332C92A434B2F9797C0D3DB09414FCF8D6F5A01C4157716D5D252B38879312D5675712AD875B2A8D7E9407849CE1B992B94D5E50FF3
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9K!3}*O`}*O`}*O`.5D`|*O`.6A``*O`.5E`.*O`.5\`x*O`}*N`3*O`{.E`i*O`.,I`|*O`..K`|*O`Rich}*O`........................PE..L......B...........!.....p..........w...................................................................................W.......<....`.......................p.......................................................................................text....k.......p.................. ..`.rdata...(.......0..................@..@.data...X........`..................@....rsrc........`......................@..@.reloc.......p... ... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.160287296745998
                                  Encrypted:false
                                  SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                                  MD5:F9A900E64BE138468DBACBC488511E8F
                                  SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                                  SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                                  SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.199812485547983
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                                  MD5:04ACD4E8BFA9089D2120AE8872190CB3
                                  SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                                  SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                                  SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):9576
                                  Entropy (8bit):7.214945113432049
                                  Encrypted:false
                                  SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                                  MD5:F4F90EDFE025F3C918A7D4992F103A48
                                  SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                                  SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                                  SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                                  Malicious:false
                                  Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.201512481427886
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                                  MD5:9232DCCBA703DBE10F07D17480D831F9
                                  SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                                  SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                                  SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155823358156326
                                  Encrypted:false
                                  SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                                  MD5:78FE95788DB8E3332DA03D9B86943407
                                  SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                                  SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                                  SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.203938700783149
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                                  MD5:7FBD82746CF38DA2A8728A7C47112124
                                  SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                                  SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                                  SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7532
                                  Entropy (8bit):7.163912217919972
                                  Encrypted:false
                                  SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                                  MD5:EC1239127DC978757B0B9CC27D35128E
                                  SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                                  SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                                  SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                                  Malicious:false
                                  Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9758
                                  Entropy (8bit):5.200481985878872
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                                  MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                                  SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                                  SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                                  SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7500
                                  Entropy (8bit):7.16354760210281
                                  Encrypted:false
                                  SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                                  MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                                  SHA1:6884659420A4A904975BE363B8B71197F35DF423
                                  SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                                  SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                                  Malicious:false
                                  Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9694
                                  Entropy (8bit):5.199518545726912
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                                  MD5:1CA510E30084F95389EF4EEB6D44398D
                                  SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                                  SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                                  SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7524
                                  Entropy (8bit):7.155292171931641
                                  Encrypted:false
                                  SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                                  MD5:9C27BFE6E80B05E7DADB26DAD826984A
                                  SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                                  SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                                  SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                                  Malicious:false
                                  Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9742
                                  Entropy (8bit):5.19974129042694
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                                  MD5:54604542F5A3385064DE1524F57D21E0
                                  SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                                  SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                                  SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7528
                                  Entropy (8bit):7.161254074300881
                                  Encrypted:false
                                  SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                                  MD5:5C737957A4385512FD021458107C0CE6
                                  SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                                  SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                                  SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                                  Malicious:false
                                  Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9750
                                  Entropy (8bit):5.199048245781225
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                                  MD5:5BE543804F4C61874D3CA9F979F78AD7
                                  SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                                  SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                                  SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7540
                                  Entropy (8bit):7.156208031117259
                                  Encrypted:false
                                  SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                                  MD5:16AC4FA94C22381E7A4A50141307A54D
                                  SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                                  SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                                  SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                                  Malicious:false
                                  Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:Windows setup INFormation
                                  Category:dropped
                                  Size (bytes):9774
                                  Entropy (8bit):5.200356426579818
                                  Encrypted:false
                                  SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                                  MD5:2AF89E9CB43E93768CA169CB76756123
                                  SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                                  SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                                  SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                                  Malicious:false
                                  Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):48488
                                  Entropy (8bit):6.440221003074469
                                  Encrypted:false
                                  SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                                  MD5:8E049EC67A13CB855C0717D88CB75C25
                                  SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                                  SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                                  SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\drvinst.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):4597
                                  Entropy (8bit):5.319787503082901
                                  Encrypted:false
                                  SSDEEP:96:QO00eO00erMwUgWUg0B1kE3ZhpJp8ZpkRepk3YpgpNbG6SlEEN:QO00eO00erMwmkB1kAhG6SlEEN
                                  MD5:8F14070C9D76778BF5F7BB9223541D82
                                  SHA1:78CA05131AC8EB5F58C458FBCCD1FE8117644F80
                                  SHA-256:738461F8030D91A0F8494732DAAED78DEAD04F9256A784EADA07D4575ED675D1
                                  SHA-512:21767BD1D5D0CED358FDA28925078E9DBC7130CD5505A90E3C75AFEB19A3A0C585FF51A439ECB3897A6337969D91667EBE6039C0424EE6637030C15BD71EAD81
                                  Malicious:false
                                  Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.7880233224595616
                                  Encrypted:false
                                  SSDEEP:192:YMX6O1BgkSnuYb/jg5Bt+iSbjDXc4jKDZ4K/pYo:YCxB+nuabg5BZIDXSDZF/
                                  MD5:985A37D448C9CBF0DDC0D3C6D276B7EE
                                  SHA1:09FC53269B72A27449D703B54E9AD49D8B06EA19
                                  SHA-256:F3F8403C84BCCC32699E805DFF7623AA74453F0555B3F4523DF3B16507086E0C
                                  SHA-512:81B795F60E1B443D506F09E9F80F98C3DB7A822A343073DE7DBCBD6BD3EA0C82212BA8DF04F44B98E728EA4CF2EADF8E0FAFF1B225F163CF710BC705DF63F9C0
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.4840872150632558
                                  Encrypted:false
                                  SSDEEP:48:g8PhbuRc06WXJGjT5oI4kTn3tZ/1Cfq6Oe0ZPfKOy:Phb1djTckT3D/1CnfuP9
                                  MD5:5C87BBF9518BEA3CA784D43B77AE488F
                                  SHA1:A8237B993E84F2F2FFC9370D7B8FBCAFF3B51974
                                  SHA-256:9571DD7413AF61534916D5824F7A0B49352A5C296530472DA6B5900E46CACE3C
                                  SHA-512:4E84E78DC5CA7FC20FCCB8B15C80A8CB09EC280353E2105D1D06B35C140ECA03B1DFEA53405D8FE28877321C60B24A67CA970EE016DFAD9329F084C6BE8EB06D
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):0.5374529133758259
                                  Encrypted:false
                                  SSDEEP:24:/bF0mlrC8HscELypUHOl050j9/ZVuNjJPUB//:/bamlrCP6UW052y6//
                                  MD5:5FB0A0CADAE94A002BDD67702FF5BB9A
                                  SHA1:165DB6CFF72B876FDA0B60F2009F614048103EE3
                                  SHA-256:76B485E997A84F2DD9CEAA87099EBD6A7C545C8C89BD194389B5CCD1B2679854
                                  SHA-512:4641709FCE466F043C385617AD6A750D139799E6B0B8F73D1FC9F4B86AD4AD919FBCE9A2AF3824FF5E7A13AA8E4AC908ADC84DBA255FBB0325232AE7EA3318EB
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):0.7394886096731401
                                  Encrypted:false
                                  SSDEEP:192:0xnuYT1BgkL/jg5Bt+iSbjDXc4jKDZ4K/pY:WnueBPbg5BZIDXSDZF/
                                  MD5:8096ECE3C7ECB94E6FA1930C532FB976
                                  SHA1:F346919BE5549FF5EF9E56CE6C70875D812E673C
                                  SHA-256:53412674F309EA3D605338808AE526803858CDEEDC363B57D2A54244EF23008B
                                  SHA-512:15A6C8E2731E7013697250D28AFB1CF52D9F5C9CEEAEA046CA5487A328E3443A98C5FED55776FF294C6AC784ABD09919C2D8F62BBF81EE26EAD732568DDFAF9F
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):2.0099810753974103
                                  Encrypted:false
                                  SSDEEP:192:OiJS9OqGg5Bt+7SsoDi7BYhEsDo1SAlmo/+Y7UYXmcMAcAYAiAbAOAAsjqpSjwli:OSeOFg5BEKDiEDo1SA7/TzZFXkzsQx
                                  MD5:392CD1A81780603990767B17C3FE5ED6
                                  SHA1:6AB3C88D8016160DC5E908D30A50D064C9707940
                                  SHA-256:09B7C63D9872309F48C036E5053F6D9DF0468C9AEB118B59C51BB3BD849829E0
                                  SHA-512:20F4523D5BC749DB253847D62AF50ACFB6EA4D883A11A3613EE083576FDD74EFF8E4F57CD8A89E5EE9DCB5676BE5B6E8938E8344E64906EA55782CD621CD2509
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):77824
                                  Entropy (8bit):0.868868234902423
                                  Encrypted:false
                                  SSDEEP:192:suOYXmcMAcAYAiAbAOAAsjqpSjwlJy/Aa8BAx3ZqGg5Bt+7SsoDi7BYhEsDo1SAp:sezZFXkzsQxpFg5BEKDiEDo1SA7/
                                  MD5:F869EF87EC219C6A0E2F1CA6272EDFD8
                                  SHA1:59F66F675CB116E235986C3A1D582AAE619FA9A9
                                  SHA-256:91C6AD28303F0B8A0073B843A37A50A15456DED6390325CAF05CE31AE08FE14D
                                  SHA-512:7559539B32D0CEC366B4C00FF6334F6FF99B17477A96CB7ED93C3A5E688FDE7F9C6EF5915FE544C056B0DEA65BA604191554EC13DBAF96D4CC20C0130C4E607D
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):2.0099810753974103
                                  Encrypted:false
                                  SSDEEP:192:OiJS9OqGg5Bt+7SsoDi7BYhEsDo1SAlmo/+Y7UYXmcMAcAYAiAbAOAAsjqpSjwli:OSeOFg5BEKDiEDo1SA7/TzZFXkzsQx
                                  MD5:392CD1A81780603990767B17C3FE5ED6
                                  SHA1:6AB3C88D8016160DC5E908D30A50D064C9707940
                                  SHA-256:09B7C63D9872309F48C036E5053F6D9DF0468C9AEB118B59C51BB3BD849829E0
                                  SHA-512:20F4523D5BC749DB253847D62AF50ACFB6EA4D883A11A3613EE083576FDD74EFF8E4F57CD8A89E5EE9DCB5676BE5B6E8938E8344E64906EA55782CD621CD2509
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):0.40614039489726417
                                  Encrypted:false
                                  SSDEEP:24:/jF0ml79GiQs5hBFyTUksTQ+F/ymZU+/w/FD+utO7K:/jaml7ImBITdsT2AK
                                  MD5:FC8A5270080D9CE42A504303951AC7D6
                                  SHA1:042616BBCE125331BA037AF6AD345ED31AF599CD
                                  SHA-256:9B0E261C997EB0E1575311939243823559870468E9FA260D749B611047F7B0D2
                                  SHA-512:698C6396D746722CFDEFC0F5195ACB377FB5FD417C9F0963C28775FDBC1CC49DD08AA36A900E0BB05DCC2E74E3D54086C342773B2A614E5416CBC8401FAFD675
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.7880233224595616
                                  Encrypted:false
                                  SSDEEP:192:YMX6O1BgkSnuYb/jg5Bt+iSbjDXc4jKDZ4K/pYo:YCxB+nuabg5BZIDXSDZF/
                                  MD5:985A37D448C9CBF0DDC0D3C6D276B7EE
                                  SHA1:09FC53269B72A27449D703B54E9AD49D8B06EA19
                                  SHA-256:F3F8403C84BCCC32699E805DFF7623AA74453F0555B3F4523DF3B16507086E0C
                                  SHA-512:81B795F60E1B443D506F09E9F80F98C3DB7A822A343073DE7DBCBD6BD3EA0C82212BA8DF04F44B98E728EA4CF2EADF8E0FAFF1B225F163CF710BC705DF63F9C0
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):2.3505636063378956
                                  Encrypted:false
                                  SSDEEP:192:f1z+1BgkSnuYb/jg5Bt+iSbjDXc4jKDZ4K/pYo:fpSB+nuabg5BZIDXSDZF/
                                  MD5:65220081FEAB63472C30B955AB889C98
                                  SHA1:6C36BEE649EFCFB77BBAFA7FA002BBE24EB66E6F
                                  SHA-256:B86D3F66C5064C209808E80C8B32A65968600DCEBCF113D9863C33600774B0DC
                                  SHA-512:CD8BC624F81E2FBFA612286A6D5F0A2EFCE3404F41360CDA7726B681477E124F4B80EE53FD7C53F11DB2858894B9F7C9559EA10260F28276232C3E6C7F16B477
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):2.3505636063378956
                                  Encrypted:false
                                  SSDEEP:192:f1z+1BgkSnuYb/jg5Bt+iSbjDXc4jKDZ4K/pYo:fpSB+nuabg5BZIDXSDZF/
                                  MD5:65220081FEAB63472C30B955AB889C98
                                  SHA1:6C36BEE649EFCFB77BBAFA7FA002BBE24EB66E6F
                                  SHA-256:B86D3F66C5064C209808E80C8B32A65968600DCEBCF113D9863C33600774B0DC
                                  SHA-512:CD8BC624F81E2FBFA612286A6D5F0A2EFCE3404F41360CDA7726B681477E124F4B80EE53FD7C53F11DB2858894B9F7C9559EA10260F28276232C3E6C7F16B477
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.4840872150632558
                                  Encrypted:false
                                  SSDEEP:48:g8PhbuRc06WXJGjT5oI4kTn3tZ/1Cfq6Oe0ZPfKOy:Phb1djTckT3D/1CnfuP9
                                  MD5:5C87BBF9518BEA3CA784D43B77AE488F
                                  SHA1:A8237B993E84F2F2FFC9370D7B8FBCAFF3B51974
                                  SHA-256:9571DD7413AF61534916D5824F7A0B49352A5C296530472DA6B5900E46CACE3C
                                  SHA-512:4E84E78DC5CA7FC20FCCB8B15C80A8CB09EC280353E2105D1D06B35C140ECA03B1DFEA53405D8FE28877321C60B24A67CA970EE016DFAD9329F084C6BE8EB06D
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.7880233224595616
                                  Encrypted:false
                                  SSDEEP:192:YMX6O1BgkSnuYb/jg5Bt+iSbjDXc4jKDZ4K/pYo:YCxB+nuabg5BZIDXSDZF/
                                  MD5:985A37D448C9CBF0DDC0D3C6D276B7EE
                                  SHA1:09FC53269B72A27449D703B54E9AD49D8B06EA19
                                  SHA-256:F3F8403C84BCCC32699E805DFF7623AA74453F0555B3F4523DF3B16507086E0C
                                  SHA-512:81B795F60E1B443D506F09E9F80F98C3DB7A822A343073DE7DBCBD6BD3EA0C82212BA8DF04F44B98E728EA4CF2EADF8E0FAFF1B225F163CF710BC705DF63F9C0
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):2.0099810753974103
                                  Encrypted:false
                                  SSDEEP:192:OiJS9OqGg5Bt+7SsoDi7BYhEsDo1SAlmo/+Y7UYXmcMAcAYAiAbAOAAsjqpSjwli:OSeOFg5BEKDiEDo1SA7/TzZFXkzsQx
                                  MD5:392CD1A81780603990767B17C3FE5ED6
                                  SHA1:6AB3C88D8016160DC5E908D30A50D064C9707940
                                  SHA-256:09B7C63D9872309F48C036E5053F6D9DF0468C9AEB118B59C51BB3BD849829E0
                                  SHA-512:20F4523D5BC749DB253847D62AF50ACFB6EA4D883A11A3613EE083576FDD74EFF8E4F57CD8A89E5EE9DCB5676BE5B6E8938E8344E64906EA55782CD621CD2509
                                  Malicious:false
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.992773034922727
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:8ue90oYkrv.exe
                                  File size:13'453'632 bytes
                                  MD5:5a0d2bc66c17c640e81233cf6a200e07
                                  SHA1:65ab84dc66feb7b7034ec5713b68fd39a6cd1a01
                                  SHA256:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
                                  SHA512:702c862e10b31a7c14fa1c9d63d42b5710d5a7392b5acbb0ebb4605d8c92f77dd08b69234eea99a5fc7031fa337173e3c7f45547e0cc1e0e17465a6fbd110743
                                  SSDEEP:196608:uv/Ubmek67xSg9uXs1MAsG3UiKC0NWzqi3aumj37RtXuC9/RyXBNQeGvcGqR3q8H:g8aejfucanjC0NNtp37RdZeBNKvcGkfz
                                  TLSH:8DD63322F3EE8271FCB36EB859B18BAA462778119F35D6DF6348095D5E322C05A74313
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U...
                                  Icon Hash:3e5bec56762e350b
                                  Entrypoint:0x421bd6
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                  Time Stamp:0x55EF5AD2 [Tue Sep 8 22:01:54 2015 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:0
                                  File Version Major:5
                                  File Version Minor:0
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:0
                                  Import Hash:eaefd1169420dcee9fef7c65aa268740
                                  Signature Valid:true
                                  Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                                  Signature Validation Error:The operation completed successfully
                                  Error Number:0
                                  Not Before, Not After
                                  • 04/03/2014 01:00:00 03/06/2017 01:59:59
                                  Subject Chain
                                  • CN=TECHKON GmbH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TECHKON GmbH, L=Koenigstein, S=Hessen, C=DE
                                  Version:3
                                  Thumbprint MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                                  Thumbprint SHA-1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                                  Thumbprint SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                                  Serial:2C68B7C967BB304C0C911BB4D3311D95
                                  Instruction
                                  call 00007F7ED52CE2C6h
                                  jmp 00007F7ED52CAC5Dh
                                  mov edi, edi
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 00000328h
                                  mov dword ptr [004393B8h], eax
                                  mov dword ptr [004393B4h], ecx
                                  mov dword ptr [004393B0h], edx
                                  mov dword ptr [004393ACh], ebx
                                  mov dword ptr [004393A8h], esi
                                  mov dword ptr [004393A4h], edi
                                  mov word ptr [004393D0h], ss
                                  mov word ptr [004393C4h], cs
                                  mov word ptr [004393A0h], ds
                                  mov word ptr [0043939Ch], es
                                  mov word ptr [00439398h], fs
                                  mov word ptr [00439394h], gs
                                  pushfd
                                  pop dword ptr [004393C8h]
                                  mov eax, dword ptr [ebp+00h]
                                  mov dword ptr [004393BCh], eax
                                  mov eax, dword ptr [ebp+04h]
                                  mov dword ptr [004393C0h], eax
                                  lea eax, dword ptr [ebp+08h]
                                  mov dword ptr [004393CCh], eax
                                  mov eax, dword ptr [ebp-00000320h]
                                  mov dword ptr [00439308h], 00010001h
                                  mov eax, dword ptr [004393C0h]
                                  mov dword ptr [004392BCh], eax
                                  mov dword ptr [004392B0h], C0000409h
                                  mov dword ptr [004392B4h], 00000001h
                                  mov eax, dword ptr [00437024h]
                                  mov dword ptr [ebp-00000328h], eax
                                  mov eax, dword ptr [00437028h]
                                  mov dword ptr [ebp-00000324h], eax
                                  call dword ptr [00000098h]
                                  Programming Language:
                                  • [C++] VS2008 SP1 build 30729
                                  • [ASM] VS2008 SP1 build 30729
                                  • [ C ] VS2008 SP1 build 30729
                                  • [ C ] VS2005 build 50727
                                  • [IMP] VS2005 build 50727
                                  • [RES] VS2008 build 21022
                                  • [LNK] VS2008 SP1 build 30729
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x360e80xa0.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x1b0c8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xcd30200x1920
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x30e100x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x2e0000x264.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x2cb9d0x2cc0008b1425d0c235f73ec2fd58abfe6486dFalse0.5150412447625698data6.487113973217182IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x2e0000x8e280x90002493c37a97f6e172b3dd001b1af0d594False0.3415256076388889data4.651109246510969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x370000x83000x24005b956e9eb3e2cde75a854ea16ed7c543False0.2583550347222222data4.183030383074928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x400000x1b0c80x1b2000776982004dfe8682cdafdb0e01c538bFalse0.2710883496543779data4.541515290825601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x40d140xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.35261194029850745
                                  RT_ICON0x41bbc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.36236462093862815
                                  RT_ICON0x424640x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3302023121387283
                                  RT_ICON0x429cc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27842323651452283
                                  RT_ICON0x44f740x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3557692307692308
                                  RT_ICON0x4601c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4512411347517731
                                  RT_DIALOG0x464840x1d8data0.5720338983050848
                                  RT_DIALOG0x4665c0x1bedata0.5605381165919282
                                  RT_DIALOG0x4681c0x54data0.7619047619047619
                                  RT_STRING0x468700x478Matlab v4 mat-file (little endian) D\006'\006 , numeric, rows 0, columns 0ArabicSaudi Arabia0.2972027972027972
                                  RT_STRING0x46ce80x5baMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CatalanSpain0.252387448840382
                                  RT_STRING0x472a40x1caMatlab v4 mat-file (little endian) !q\325luR\372^\207e\366N>Y , numeric, rows 0, columns 0ChineseTaiwan0.5131004366812227
                                  RT_STRING0x474700x4eaMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CzechCzech Republic0.2845786963434022
                                  RT_STRING0x4795c0x4d6Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0DanishDenmark0.2689822294022617
                                  RT_STRING0x47e340x6b6Matlab v4 mat-file (little endian) O, numeric, rows 0, columns 0GermanGermany0.2409778812572759
                                  RT_STRING0x484ec0x596Matlab v4 mat-file (little endian) \224\003\265\003\275\003 , numeric, rows 0, columns 0GreekGreece0.2853146853146853
                                  RT_STRING0x48a840x48cMatlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.27405498281786944
                                  RT_STRING0x48f100x57cMatlab v4 mat-file (little endian) E, numeric, rows 0, columns 0FinnishFinland0.24287749287749288
                                  RT_STRING0x4948c0x63cMatlab v4 mat-file (little endian) I, numeric, rows 0, columns 0FrenchFrance0.22807017543859648
                                  RT_STRING0x49ac80x370Matlab v4 mat-file (little endian) ', numeric, rows 0, columns 0HebrewIsrael0.33636363636363636
                                  RT_STRING0x49e380x4c6Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HungarianHungary0.29705400981996727
                                  RT_STRING0x4a3000x528Matlab v4 mat-file (little endian) I, numeric, rows 0, columns 0ItalianItaly0.25227272727272726
                                  RT_STRING0x4a8280x2c6Matlab v4 mat-file (little endian) \3250\2510\3530\3000 , numeric, rows 0, columns 0JapaneseJapan0.4295774647887324
                                  RT_STRING0x4aaf00x290Matlab v4 mat-file (little endian) \364\323T\263|\271 , numeric, rows 0, columns 0KoreanNorth Korea0.4634146341463415
                                  RT_STRING0x4aaf00x290Matlab v4 mat-file (little endian) \364\323T\263|\271 , numeric, rows 0, columns 0KoreanSouth Korea0.4634146341463415
                                  RT_STRING0x4ad800x5b2Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0DutchNetherlands0.2496570644718793
                                  RT_STRING0x4b3340x496Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0NorwegianNorway0.2632027257240204
                                  RT_STRING0x4b7cc0x4bcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PolishPoland0.2838283828382838
                                  RT_STRING0x4bc880x5a6Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortugueseBrazil0.25311203319502074
                                  RT_STRING0x4c2300x582Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0RomanianRomania0.2581560283687943
                                  RT_STRING0x4c7b40x52cdataRussianRussia0.2809667673716012
                                  RT_STRING0x4cce00x47aMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CroatianCroatia0.27486910994764396
                                  RT_STRING0x4d15c0x506Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovakSlovakia0.2690513219284603
                                  RT_STRING0x4d6640x4beMatlab v4 mat-file (little endian) K, numeric, rows 0, columns 0SwedishSweden0.25617792421746294
                                  RT_STRING0x4db240x458Matlab v4 mat-file (little endian) D\016!\016H\016*\0162\016!\0162\016#\016\026\016*\016#\016I\0162\016\007\016B\016\037\016%\016@\016\024\016-\016#\016L\016D\016\024\016I\016 , numeric, rows 0, columns 0ThaiThailand0.3255395683453237
                                  RT_STRING0x4df7c0x3fcMatlab v4 mat-file (little endian) ', numeric, rows 0, columns 0TurkishTurkey0.31862745098039214
                                  RT_STRING0x4e3780x5b6Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0SlovenianSlovenia0.25239398084815323
                                  RT_STRING0x4e9300x4eaMatlab v4 mat-file (little endian) E, numeric, rows 0, columns 0EstonianEstonia0.2599364069952305
                                  RT_STRING0x4ee1c0x578Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0LatvianLativa0.25642857142857145
                                  RT_STRING0x4f3940x4b8Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0LithuanianLithuania0.2814569536423841
                                  RT_STRING0x4f84c0x484Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0VietnameseVietnam0.24567474048442905
                                  RT_STRING0x4fcd00x590Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0BasqueFrance0.25280898876404495
                                  RT_STRING0x4fcd00x590Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0BasqueSpain0.25280898876404495
                                  RT_STRING0x502600x1caMatlab v4 mat-file (little endian) \340e\325l\033R\372^\207e\366N9Y , numeric, rows 0, columns 0ChineseChina0.5131004366812227
                                  RT_STRING0x5042c0x61cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortuguesePortugal0.2289002557544757
                                  RT_STRING0x50a480x5fcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 00.24216710182767623
                                  RT_STRING0x510440x27edataArabicSaudi Arabia0.46551724137931033
                                  RT_STRING0x512c40x39edataCatalanSpain0.3941684665226782
                                  RT_STRING0x516640xeadataChineseTaiwan0.8333333333333334
                                  RT_STRING0x517500x302dataCzechCzech Republic0.4701298701298701
                                  RT_STRING0x51a540x326dataDanishDenmark0.413151364764268
                                  RT_STRING0x51d7c0x442dataGermanGermany0.38073394495412843
                                  RT_STRING0x521c00x376dataGreekGreece0.43115124153498874
                                  RT_STRING0x525380x2f2dataEnglishUnited States0.42572944297082227
                                  RT_STRING0x5282c0x31cdataFinnishFinland0.4258793969849246
                                  RT_STRING0x52b480x3deAmigaOS bitmap font "r", fc_YSize 29184, 17664 elements, 2nd "u", 3rd "'"FrenchFrance0.36666666666666664
                                  RT_STRING0x52f280x24cdataHebrewIsrael0.4574829931972789
                                  RT_STRING0x531740x342AmigaOS bitmap font "s", fc_YSize 24832, 18688 elements, 2nd "b", 3rd "n"HungarianHungary0.42206235011990406
                                  RT_STRING0x534b80x3aadataItalianItaly0.3699360341151386
                                  RT_STRING0x538640x1ccdataJapaneseJapan0.6804347826086956
                                  RT_STRING0x53a300x1a4dataKoreanNorth Korea0.7452380952380953
                                  RT_STRING0x53a300x1a4dataKoreanSouth Korea0.7452380952380953
                                  RT_STRING0x53bd40x37cAmigaOS bitmap font "n", fc_YSize 29184, 20224 elements, 2nd ".", 3rd "*"DutchNetherlands0.40358744394618834
                                  RT_STRING0x53f500x324dataNorwegianNorway0.4166666666666667
                                  RT_STRING0x542740x372dataPolishPoland0.42063492063492064
                                  RT_STRING0x545e80x38edataPortugueseBrazil0.38461538461538464
                                  RT_STRING0x549780x39edataRomanianRomania0.4136069114470842
                                  RT_STRING0x54d180x35adataRussianRussia0.42424242424242425
                                  RT_STRING0x550740x2dedataCroatianCroatia0.4223433242506812
                                  RT_STRING0x553540x340dataSlovakSlovakia0.4338942307692308
                                  RT_STRING0x556940x310dataSwedishSweden0.42346938775510207
                                  RT_STRING0x559a40x2bedataThaiThailand0.47293447293447294
                                  RT_STRING0x55c640x2a6AmigaOS bitmap font "i", fc_YSize 30208, 16896 elements, 2nd "z", 3rd " "TurkishTurkey0.46607669616519176
                                  RT_STRING0x55f0c0x380dataSlovenianSlovenia0.39285714285714285
                                  RT_STRING0x5628c0x33adataEstonianEstonia0.4067796610169492
                                  RT_STRING0x565c80x374dataLatvianLativa0.4117647058823529
                                  RT_STRING0x5693c0x31aAmigaOS bitmap font "e", fc_YSize 25600, 19968 elements, 2nd "p", 3rd "o"LithuanianLithuania0.43828715365239296
                                  RT_STRING0x56c580x2badataVietnameseVietnam0.39111747851002865
                                  RT_STRING0x56f140x36adataBasqueFrance0.41533180778032036
                                  RT_STRING0x56f140x36adataBasqueSpain0.41533180778032036
                                  RT_STRING0x572800xe8dataChineseChina0.8362068965517241
                                  RT_STRING0x573680x3d2dataPortuguesePortugal0.3834355828220859
                                  RT_STRING0x5773c0x3aedata0.37579617834394907
                                  RT_STRING0x57aec0xeedataArabicSaudi Arabia0.592436974789916
                                  RT_STRING0x57bdc0x12cdataCatalanSpain0.5133333333333333
                                  RT_STRING0x57d080x92dataChineseTaiwan0.678082191780822
                                  RT_STRING0x57d9c0xf8dataCzechCzech Republic0.5604838709677419
                                  RT_STRING0x57e940xf4dataDanishDenmark0.5450819672131147
                                  RT_STRING0x57f880x10edataGermanGermany0.5
                                  RT_STRING0x580980x10cdataGreekGreece0.5970149253731343
                                  RT_STRING0x581a40x106dataEnglishUnited States0.5076335877862596
                                  RT_STRING0x582ac0xe4dataFinnishFinland0.5175438596491229
                                  RT_STRING0x583900x144dataFrenchFrance0.48148148148148145
                                  RT_STRING0x584d40xd4dataHebrewIsrael0.6084905660377359
                                  RT_STRING0x585a80xfedataHungarianHungary0.531496062992126
                                  RT_STRING0x586a80x122dataItalianItaly0.503448275862069
                                  RT_STRING0x587cc0xa6dataJapaneseJapan0.6807228915662651
                                  RT_STRING0x588740xaadataKoreanNorth Korea0.7352941176470589
                                  RT_STRING0x588740xaadataKoreanSouth Korea0.7352941176470589
                                  RT_STRING0x589200xf4dataDutchNetherlands0.5122950819672131
                                  RT_STRING0x58a140x106dataNorwegianNorway0.5114503816793893
                                  RT_STRING0x58b1c0xeadataPolishPoland0.5341880341880342
                                  RT_STRING0x58c080x10adataPortugueseBrazil0.49624060150375937
                                  RT_STRING0x58d140x12cdataRomanianRomania0.49
                                  RT_STRING0x58e400x114dataRussianRussia0.5398550724637681
                                  RT_STRING0x58f540xf2dataCroatianCroatia0.5743801652892562
                                  RT_STRING0x590480xf8dataSlovakSlovakia0.5483870967741935
                                  RT_STRING0x591400x134dataSwedishSweden0.4318181818181818
                                  RT_STRING0x592740x118dataThaiThailand0.5285714285714286
                                  RT_STRING0x5938c0xf2dataTurkishTurkey0.5619834710743802
                                  RT_STRING0x594800x11edataSlovenianSlovenia0.5104895104895105
                                  RT_STRING0x595a00xeedataEstonianEstonia0.542016806722689
                                  RT_STRING0x596900x110dataLatvianLativa0.5257352941176471
                                  RT_STRING0x597a00xecdataLithuanianLithuania0.5720338983050848
                                  RT_STRING0x5988c0x10adataVietnameseVietnam0.5037593984962406
                                  RT_STRING0x599980x138dataBasqueFrance0.46794871794871795
                                  RT_STRING0x599980x138dataBasqueSpain0.46794871794871795
                                  RT_STRING0x59ad00x92dataChineseChina0.6575342465753424
                                  RT_STRING0x59b640x122dataPortuguesePortugal0.49310344827586206
                                  RT_STRING0x59c880x132data0.48366013071895425
                                  RT_GROUP_ICON0x59dbc0x5adataEnglishUnited States0.7
                                  RT_VERSION0x59e180xe40dataEnglishUnited States0.11677631578947369
                                  RT_MANIFEST0x5ac580x470XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4507042253521127
                                  DLLImport
                                  KERNEL32.dllGetLastError, ResetEvent, CreateEventW, CloseHandle, MultiByteToWideChar, WideCharToMultiByte, GetModuleFileNameW, FormatMessageW, LocalFree, GetWindowsDirectoryW, CreateFileW, SetFileTime, SetFileAttributesW, RemoveDirectoryW, CreateDirectoryW, DeleteFileW, GetShortPathNameW, GetFullPathNameW, lstrlenW, GetCurrentDirectoryW, GetTempFileNameW, FindClose, FindFirstFileW, FindNextFileW, GetFileSize, SetFilePointer, ReadFile, WriteFile, SetEndOfFile, DeleteCriticalSection, GetStdHandle, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GetCurrentProcessId, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, Sleep, LocalAlloc, SetCurrentDirectoryW, GetVersion, GetCommandLineW, CreateProcessW, GetExitCodeProcess, FlushFileBuffers, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, LCMapStringW, LCMapStringA, GetStringTypeW, GetStringTypeA, GetConsoleMode, GetConsoleCP, GetLocaleInfoA, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, LoadLibraryA, RaiseException, RtlUnwind, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, WaitForSingleObject, SetEvent, GetVersionExW, VirtualAlloc, WaitForMultipleObjects, VirtualFree, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, HeapSize, InterlockedDecrement, SetLastError, InterlockedIncrement, TlsFree, TlsSetValue, HeapFree, HeapAlloc, ExitThread, CreateThread, HeapReAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, GetModuleHandleW, GetProcAddress, ExitProcess, GetModuleFileNameA, TlsGetValue, TlsAlloc
                                  USER32.dllSetForegroundWindow, CharUpperW, DestroyWindow, RegisterWindowMessageW, AdjustWindowRect, LoadImageW, KillTimer, SetTimer, PostMessageW, EndDialog, IsDlgButtonChecked, SetDlgItemTextW, GetDlgItem, SetWindowTextW, GetWindowTextW, GetWindowTextLengthW, LoadStringW, DialogBoxParamW, CreateDialogParamW, SystemParametersInfoW, PeekMessageW, GetDesktopWindow, MessageBoxW, SendMessageW, GetWindowLongW, SetWindowLongW, ShowWindow, MoveWindow, GetWindowRect, LoadIconW
                                  GDI32.dllGetObjectW
                                  ADVAPI32.dllRegSetValueExW, RegCreateKeyExW, RegCloseKey
                                  SHELL32.dllShellExecuteExW, SHGetFolderPathW
                                  ole32.dllCoInitialize, CoCreateInstance
                                  OLEAUT32.dllSysAllocStringLen, SysFreeString, VariantClear, SysAllocString
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  ArabicSaudi Arabia
                                  CatalanSpain
                                  ChineseTaiwan
                                  CzechCzech Republic
                                  DanishDenmark
                                  GermanGermany
                                  GreekGreece
                                  FinnishFinland
                                  FrenchFrance
                                  HebrewIsrael
                                  HungarianHungary
                                  ItalianItaly
                                  JapaneseJapan
                                  KoreanNorth Korea
                                  KoreanSouth Korea
                                  DutchNetherlands
                                  NorwegianNorway
                                  PolishPoland
                                  PortugueseBrazil
                                  RomanianRomania
                                  RussianRussia
                                  CroatianCroatia
                                  SlovakSlovakia
                                  SwedishSweden
                                  ThaiThailand
                                  TurkishTurkey
                                  SlovenianSlovenia
                                  EstonianEstonia
                                  LatvianLativa
                                  LithuanianLithuania
                                  VietnameseVietnam
                                  ChineseChina
                                  PortuguesePortugal
                                  No network behavior found

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:13:41
                                  Start date:14/03/2024
                                  Path:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\8ue90oYkrv.exe
                                  Imagebase:0x400000
                                  File size:13'453'632 bytes
                                  MD5 hash:5A0D2BC66C17C640E81233CF6A200E07
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:12:13:43
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\mia595B.tmp\TDService.exe
                                  Wow64 process (32bit):true
                                  Commandline:.\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""
                                  Imagebase:0x400000
                                  File size:5'295'078 bytes
                                  MD5 hash:A94A3D60FA8A54AB71ABED39D5883D86
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Yara matches:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000002.00000000.2039012583.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia595B.tmp\TDService.exe, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 0%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:3
                                  Start time:12:13:45
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\msiexec.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                  Imagebase:0x7ff77fc80000
                                  File size:69'632 bytes
                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:4
                                  Start time:12:13:46
                                  Start date:14/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding F1FA5532D1DD3919F4D531B46B734EEE
                                  Imagebase:0x40000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:12:13:47
                                  Start date:14/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll
                                  Imagebase:0x40000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:12:13:47
                                  Start date:14/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx
                                  Imagebase:0x40000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:12:13:47
                                  Start date:14/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX
                                  Imagebase:0x40000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:12:13:47
                                  Start date:14/03/2024
                                  Path:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe"
                                  Imagebase:0x440000
                                  File size:1'150'976 bytes
                                  MD5 hash:F00223A56D3F89627CC88625DBCB0C42
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 2%, ReversingLabs
                                  • Detection: 6%, Virustotal, Browse
                                  Reputation:low
                                  Has exited:false

                                  Target ID:9
                                  Start time:12:13:50
                                  Start date:14/03/2024
                                  Path:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s
                                  Imagebase:0x400000
                                  File size:2'902'256 bytes
                                  MD5 hash:F6CD94DEAEA55BB414650D6A9CB7DD6C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  • Detection: 0%, Virustotal, Browse
                                  Reputation:low
                                  Has exited:true

                                  Target ID:10
                                  Start time:12:13:51
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe
                                  Wow64 process (32bit):true
                                  Commandline:.\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""
                                  Imagebase:0x400000
                                  File size:5'299'123 bytes
                                  MD5 hash:5A3DA2206BD35C381B826FF748093684
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Yara matches:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia7B89.tmp\TechkonDriver64Bit.exe, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:11
                                  Start time:12:13:53
                                  Start date:14/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 12FD986294DFC1E2D717A71E276F9E78
                                  Imagebase:0x40000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:12:13:55
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
                                  Imagebase:0x7ff7d5b50000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:13
                                  Start time:12:13:55
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:12:13:55
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\certutil.exe
                                  Wow64 process (32bit):false
                                  Commandline:certutil -f -addstore TrustedPublisher TK1.cer
                                  Imagebase:0x7ff78ce10000
                                  File size:1'651'712 bytes
                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:15
                                  Start time:12:13:55
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\certutil.exe
                                  Wow64 process (32bit):false
                                  Commandline:certutil -f -addstore TrustedPublisher TK2.cer
                                  Imagebase:0x7ff78ce10000
                                  File size:1'651'712 bytes
                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:16
                                  Start time:12:13:55
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:17
                                  Start time:12:13:57
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\svchost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                  Imagebase:0x7ff7e52b0000
                                  File size:55'320 bytes
                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:18
                                  Start time:12:13:58
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{b34befef-0730-8143-9c9e-bd61c1fc2db9}\dens_x64.inf" "9" "439f12f93" "0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\progra~1\techko~1\techko~1\dens"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:20
                                  Start time:12:14:01
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
                                  Imagebase:0x7ff6068e0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:21
                                  Start time:12:14:01
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9630329f-d9c6-6243-aa02-e362d79d9ca7}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "00000000000000D8" "WinSta0\Default" "0000000000000174" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:22
                                  Start time:12:14:04
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:23
                                  Start time:12:14:05
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8a8e45a5-1c7a-604c-af2d-fe38b7597964}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000198" "WinSta0\Default" "00000000000001A4" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:24
                                  Start time:12:14:08
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:25
                                  Start time:12:14:09
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{ae3c78da-2a5f-274d-ae4f-4f019a7a5302}\spectrojet_x64.inf" "9" "4b5792527" "00000000000001A8" "WinSta0\Default" "00000000000001A0" "208" "c:\progra~1\techko~1\techko~1\spectr~4"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:26
                                  Start time:12:14:14
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:27
                                  Start time:12:14:15
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{72e5b6f5-f69f-0142-8f2c-556a7103e2ee}\spectrodrive_x64.inf" "9" "40b9ce367" "00000000000001C8" "WinSta0\Default" "00000000000001CC" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:28
                                  Start time:12:14:21
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:29
                                  Start time:12:14:26
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{78e370a8-7136-544f-b75e-5eaa32269898}\spectrodrive_x64.inf" "9" "48bc6c0e7" "00000000000001CC" "WinSta0\Default" "0000000000000198" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:31
                                  Start time:12:14:29
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:32
                                  Start time:12:14:30
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{47a5f254-7bab-2941-8d2e-a29701fe3f6f}\spectrodens_x64.inf" "9" "46d73562f" "00000000000001E8" "WinSta0\Default" "00000000000001EC" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:33
                                  Start time:12:14:35
                                  Start date:14/03/2024
                                  Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
                                  Imagebase:0x7ff7081d0000
                                  File size:1'050'104 bytes
                                  MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:34
                                  Start time:12:14:36
                                  Start date:14/03/2024
                                  Path:C:\Windows\System32\drvinst.exe
                                  Wow64 process (32bit):false
                                  Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da5ba1e1-0bf2-3b4a-965e-04d24b476102}\spectrojet_x64.inf" "9" "4c691d78b" "00000000000001D4" "WinSta0\Default" "00000000000001D8" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
                                  Imagebase:0x7ff6b8fc0000
                                  File size:337'920 bytes
                                  MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:12.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:8.8%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:155
                                    execution_graph 18562 41d880 18567 41d750 18562->18567 18564 41d888 18566 41d895 18564->18566 18586 420dfe 18564->18586 18568 41d7a5 DestroyWindow 18567->18568 18569 41d7b1 18567->18569 18568->18569 18570 41d7c2 DestroyWindow 18569->18570 18571 41d7ce 18569->18571 18570->18571 18572 420dfe type_info::_Type_info_dtor 67 API calls 18571->18572 18573 41d7e1 18572->18573 18574 420dfe type_info::_Type_info_dtor 67 API calls 18573->18574 18575 41d7ed 18574->18575 18599 41d370 DeleteCriticalSection 18575->18599 18578 420dfe type_info::_Type_info_dtor 67 API calls 18579 41d811 18578->18579 18580 420dfe type_info::_Type_info_dtor 67 API calls 18579->18580 18581 41d836 18580->18581 18582 420dfe type_info::_Type_info_dtor 67 API calls 18581->18582 18583 41d844 18582->18583 18584 420dfe type_info::_Type_info_dtor 67 API calls 18583->18584 18585 41d852 18584->18585 18585->18564 18588 420e0a __lseeki64 18586->18588 18587 420e83 _realloc __lseeki64 18587->18566 18588->18587 18589 420e49 18588->18589 18605 421f1d 18588->18605 18589->18587 18590 420e5e RtlFreeHeap 18589->18590 18590->18587 18592 420e70 18590->18592 18622 421d28 18592->18622 18594 420e21 ___sbh_find_block 18596 420e3b 18594->18596 18612 421f80 18594->18612 18619 420e54 18596->18619 18600 41d3c1 18599->18600 18601 41d3ae CloseHandle 18599->18601 18603 420dfe type_info::_Type_info_dtor 67 API calls 18600->18603 18601->18600 18602 41d3b9 GetLastError 18601->18602 18602->18600 18604 41d3d6 18603->18604 18604->18578 18606 421f32 18605->18606 18607 421f45 EnterCriticalSection 18605->18607 18625 421e5a 18606->18625 18607->18594 18609 421f38 18609->18607 18651 422c2c 18609->18651 18613 421fbf 18612->18613 18618 422261 18612->18618 18614 4221ab VirtualFree 18613->18614 18613->18618 18615 42220f 18614->18615 18616 42221e VirtualFree HeapFree 18615->18616 18615->18618 18880 4211b0 18616->18880 18618->18596 18884 421e43 LeaveCriticalSection 18619->18884 18621 420e5b 18621->18589 18885 4233da GetLastError 18622->18885 18624 420e75 GetLastError 18624->18587 18626 421e66 __lseeki64 18625->18626 18627 421e8c 18626->18627 18658 4230df 18626->18658 18636 421e9c __lseeki64 18627->18636 18704 423a4e 18627->18704 18631 421ea7 18634 421eae 18631->18634 18635 421ebd 18631->18635 18633 421e82 18701 422c80 18633->18701 18638 421d28 __lseeki64 67 API calls 18634->18638 18639 421f1d __lock 67 API calls 18635->18639 18636->18609 18638->18636 18640 421ec4 18639->18640 18641 421ef8 18640->18641 18642 421ecc 18640->18642 18643 420dfe type_info::_Type_info_dtor 67 API calls 18641->18643 18709 425169 18642->18709 18646 421ee9 18643->18646 18645 421ed7 18645->18646 18647 420dfe type_info::_Type_info_dtor 67 API calls 18645->18647 18713 421f14 18646->18713 18649 421ee3 18647->18649 18650 421d28 __lseeki64 67 API calls 18649->18650 18650->18646 18652 4230df __FF_MSGBANNER 67 API calls 18651->18652 18653 422c36 18652->18653 18654 422f34 __NMSG_WRITE 67 API calls 18653->18654 18655 422c3e 18654->18655 18656 4231ca __decode_pointer 6 API calls 18655->18656 18657 421f44 18656->18657 18657->18607 18716 4258f3 18658->18716 18661 4258f3 __set_error_mode 67 API calls 18664 4230f3 18661->18664 18662 422f34 __NMSG_WRITE 67 API calls 18663 42310b 18662->18663 18665 422f34 __NMSG_WRITE 67 API calls 18663->18665 18664->18662 18666 421e7b 18664->18666 18665->18666 18667 422f34 18666->18667 18668 422f48 18667->18668 18669 4258f3 __set_error_mode 64 API calls 18668->18669 18700 4230a3 18668->18700 18670 422f6a 18669->18670 18671 4230a8 GetStdHandle 18670->18671 18673 4258f3 __set_error_mode 64 API calls 18670->18673 18672 4230b6 _strlen 18671->18672 18671->18700 18676 4230cf WriteFile 18672->18676 18672->18700 18674 422f7b 18673->18674 18674->18671 18675 422f8d 18674->18675 18675->18700 18739 42588b 18675->18739 18676->18700 18679 422fc3 GetModuleFileNameA 18681 422fe1 18679->18681 18685 423004 _strlen 18679->18685 18683 42588b _strcpy_s 64 API calls 18681->18683 18684 422ff1 18683->18684 18684->18685 18686 423b3c __invoke_watson 10 API calls 18684->18686 18696 423047 18685->18696 18755 42573e 18685->18755 18686->18685 18691 423b3c __invoke_watson 10 API calls 18694 42306b 18691->18694 18692 4256ca _strcat_s 64 API calls 18695 42307f 18692->18695 18693 423b3c __invoke_watson 10 API calls 18693->18696 18694->18692 18697 423090 18695->18697 18699 423b3c __invoke_watson 10 API calls 18695->18699 18764 4256ca 18696->18764 18773 425561 18697->18773 18699->18697 18700->18633 18824 422c55 GetModuleHandleW 18701->18824 18706 423a57 18704->18706 18707 423a8d 18706->18707 18708 423a6e Sleep 18706->18708 18828 420edb 18706->18828 18707->18631 18708->18706 18878 422a14 18709->18878 18711 425175 InitializeCriticalSectionAndSpinCount 18712 4251b9 __lseeki64 18711->18712 18712->18645 18879 421e43 LeaveCriticalSection 18713->18879 18715 421f1b 18715->18636 18717 425902 18716->18717 18718 4230e6 18717->18718 18719 421d28 __lseeki64 67 API calls 18717->18719 18718->18661 18718->18664 18720 425925 18719->18720 18722 423c64 18720->18722 18725 4231ca TlsGetValue 18722->18725 18724 423c74 __invoke_watson 18726 4231e2 18725->18726 18727 423203 GetModuleHandleW 18725->18727 18726->18727 18728 4231ec TlsGetValue 18726->18728 18729 423213 18727->18729 18730 42321e GetProcAddress 18727->18730 18734 4231f7 18728->18734 18735 422bfc 18729->18735 18731 4231fb 18730->18731 18731->18724 18734->18727 18734->18731 18736 422c07 Sleep GetModuleHandleW 18735->18736 18737 422c25 18736->18737 18738 422c29 18736->18738 18737->18736 18737->18738 18738->18730 18738->18731 18740 4258a3 18739->18740 18741 42589c 18739->18741 18742 421d28 __lseeki64 67 API calls 18740->18742 18741->18740 18746 4258c9 18741->18746 18743 4258a8 18742->18743 18744 423c64 __lseeki64 6 API calls 18743->18744 18745 422faf 18744->18745 18745->18679 18748 423b3c 18745->18748 18746->18745 18747 421d28 __lseeki64 67 API calls 18746->18747 18747->18743 18800 426470 18748->18800 18750 423b69 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18751 423c45 GetCurrentProcess TerminateProcess 18750->18751 18752 423c39 __invoke_watson 18750->18752 18802 420def 18751->18802 18752->18751 18754 422fc0 18754->18679 18757 425750 18755->18757 18756 423034 18756->18693 18756->18696 18757->18756 18760 425754 18757->18760 18762 42579a 18757->18762 18758 421d28 __lseeki64 67 API calls 18759 425770 18758->18759 18761 423c64 __lseeki64 6 API calls 18759->18761 18760->18756 18760->18758 18761->18756 18762->18756 18763 421d28 __lseeki64 67 API calls 18762->18763 18763->18759 18765 4256e2 18764->18765 18767 4256db 18764->18767 18766 421d28 __lseeki64 67 API calls 18765->18766 18772 4256e7 18766->18772 18767->18765 18769 425716 18767->18769 18768 423c64 __lseeki64 6 API calls 18770 42305a 18768->18770 18769->18770 18771 421d28 __lseeki64 67 API calls 18769->18771 18770->18691 18770->18694 18771->18772 18772->18768 18811 4231c1 18773->18811 18801 42647c __VEC_memzero 18800->18801 18801->18750 18803 420df7 18802->18803 18804 420df9 IsDebuggerPresent 18802->18804 18803->18754 18810 425152 18804->18810 18807 421cad SetUnhandledExceptionFilter UnhandledExceptionFilter 18808 421cd2 GetCurrentProcess TerminateProcess 18807->18808 18809 421cca __invoke_watson 18807->18809 18808->18754 18809->18808 18810->18807 18825 422c69 GetProcAddress 18824->18825 18826 422c7e ExitProcess 18824->18826 18825->18826 18827 422c79 18825->18827 18827->18826 18829 420f8e 18828->18829 18840 420eed 18828->18840 18830 423127 _realloc 6 API calls 18829->18830 18831 420f94 18830->18831 18833 421d28 __lseeki64 66 API calls 18831->18833 18832 4230df __FF_MSGBANNER 66 API calls 18838 420efe 18832->18838 18834 420f86 18833->18834 18834->18706 18836 422f34 __NMSG_WRITE 66 API calls 18836->18838 18837 420f4a RtlAllocateHeap 18837->18840 18838->18832 18838->18836 18839 422c80 __mtinitlocknum 3 API calls 18838->18839 18838->18840 18839->18838 18840->18834 18840->18837 18840->18838 18841 420f7a 18840->18841 18844 420f7f 18840->18844 18846 420e8c 18840->18846 18854 423127 18840->18854 18843 421d28 __lseeki64 66 API calls 18841->18843 18843->18844 18845 421d28 __lseeki64 66 API calls 18844->18845 18845->18834 18847 420e98 __lseeki64 18846->18847 18848 420ec9 __lseeki64 18847->18848 18849 421f1d __lock 67 API calls 18847->18849 18848->18840 18850 420eae 18849->18850 18857 42272f 18850->18857 18855 4231ca __decode_pointer 6 API calls 18854->18855 18856 423137 18855->18856 18856->18840 18860 42275d 18857->18860 18858 4227f6 18862 420eb9 18858->18862 18873 422346 18858->18873 18860->18858 18860->18862 18866 422296 18860->18866 18863 420ed2 18862->18863 18877 421e43 LeaveCriticalSection 18863->18877 18865 420ed9 18865->18848 18867 4222a9 HeapReAlloc 18866->18867 18868 4222dd HeapAlloc 18866->18868 18869 4222c7 18867->18869 18870 4222cb 18867->18870 18868->18869 18871 422300 VirtualAlloc 18868->18871 18869->18858 18870->18868 18871->18869 18872 42231a HeapFree 18871->18872 18872->18869 18874 42235d VirtualAlloc 18873->18874 18876 4223a4 18874->18876 18876->18862 18877->18865 18878->18711 18879->18715 18881 4211c8 18880->18881 18882 4211ef __VEC_memcpy 18881->18882 18883 4211f7 18881->18883 18882->18883 18883->18618 18884->18621 18900 423265 TlsGetValue 18885->18900 18888 423447 SetLastError 18888->18624 18890 423405 18890->18888 18891 42340d 18890->18891 18892 4231ca __decode_pointer 6 API calls 18891->18892 18893 42341f 18892->18893 18894 423426 18893->18894 18895 42343e 18893->18895 18911 4232f3 18894->18911 18897 420dfe type_info::_Type_info_dtor 64 API calls 18895->18897 18899 423444 18897->18899 18899->18888 18901 423295 18900->18901 18902 42327a 18900->18902 18901->18888 18905 423a93 18901->18905 18903 4231ca __decode_pointer 6 API calls 18902->18903 18904 423285 TlsSetValue 18903->18904 18904->18901 18907 423a9c 18905->18907 18908 423ad9 18907->18908 18909 423aba Sleep 18907->18909 18930 426346 18907->18930 18908->18890 18910 423acf 18909->18910 18910->18907 18910->18908 18947 422a14 18911->18947 18913 4232ff GetModuleHandleW 18914 423316 18913->18914 18915 42330f 18913->18915 18917 423351 18914->18917 18918 42332d GetProcAddress GetProcAddress 18914->18918 18916 422bfc __crt_waiting_on_module_handle 2 API calls 18915->18916 18919 423315 18916->18919 18920 421f1d __lock 63 API calls 18917->18920 18918->18917 18919->18914 18921 423370 InterlockedIncrement 18920->18921 18948 4233c8 18921->18948 18924 421f1d __lock 63 API calls 18925 423391 18924->18925 18951 425a87 InterlockedIncrement 18925->18951 18927 4233af 18931 426352 __lseeki64 18930->18931 18932 42636a 18931->18932 18942 426389 _memset 18931->18942 18933 421d28 __lseeki64 66 API calls 18932->18933 18934 42636f 18933->18934 18935 423c64 __lseeki64 6 API calls 18934->18935 18938 42637f __lseeki64 18935->18938 18936 4263fb HeapAlloc 18936->18942 18937 421f1d __lock 66 API calls 18937->18942 18938->18907 18939 423127 _realloc 6 API calls 18939->18942 18940 42272f ___sbh_alloc_block 5 API calls 18940->18942 18942->18936 18942->18937 18942->18938 18942->18939 18942->18940 18943 426442 18942->18943 18946 421e43 LeaveCriticalSection 18943->18946 18945 426449 18945->18942 18946->18945 18947->18913 18966 421e43 LeaveCriticalSection 18948->18966 18950 42338a 18950->18924 18952 425aa5 InterlockedIncrement 18951->18952 18953 425aa8 18951->18953 18952->18953 18954 425ab2 InterlockedIncrement 18953->18954 18955 425ab5 18953->18955 18954->18955 18956 425ac2 18955->18956 18957 425abf InterlockedIncrement 18955->18957 18958 425acc InterlockedIncrement 18956->18958 18959 425acf 18956->18959 18957->18956 18958->18959 18960 425ae8 InterlockedIncrement 18959->18960 18961 425af8 InterlockedIncrement 18959->18961 18962 425b03 InterlockedIncrement 18959->18962 18960->18959 18961->18959 18962->18927 18966->18950 18968 416340 18973 416370 18968->18973 18971 416355 18972 420dfe type_info::_Type_info_dtor 67 API calls 18972->18971 18974 4163d8 18973->18974 18975 420dfe type_info::_Type_info_dtor 67 API calls 18974->18975 18976 416348 18975->18976 18976->18971 18976->18972 18977 416d40 18979 416d5d 18977->18979 18978 416d69 18979->18978 18982 416cf0 18979->18982 18983 416cf7 18982->18983 18984 420dfe type_info::_Type_info_dtor 67 API calls 18983->18984 18986 416d1e 18983->18986 18985 416d0b 18984->18985 18985->18986 18987 420edb _malloc 67 API calls 18985->18987 18987->18986 18988 41bb00 EnterCriticalSection LeaveCriticalSection 18989 41bb30 18988->18989 18997 41bb9a __aulldiv 18988->18997 18990 41bb35 PostMessageW 18989->18990 18991 41bb4b EnterCriticalSection LeaveCriticalSection 18989->18991 18990->18991 18992 41bb82 18991->18992 18993 41bb7d 18991->18993 19002 41ba30 18992->19002 18993->18992 18994 41bb89 18993->18994 18998 41ba80 18994->18998 19001 41ba95 18998->19001 18999 41bad5 SendMessageW 19000 41baeb 18999->19000 19000->18997 19001->18999 19001->19000 19003 41ba56 19002->19003 19004 41ba62 SendMessageW 19003->19004 19004->18994 19005 4139c0 19006 4139d0 WriteFile 19005->19006 19007 4139cb 19005->19007 19008 413a0d 19006->19008 19007->19006 19009 413a13 19008->19009 19010 413a18 GetLastError 19008->19010 19011 413a22 19010->19011 19012 415180 19013 41518d CreateEventW 19012->19013 19014 4151af 19012->19014 19013->19014 19015 41519e GetLastError 19013->19015 19016 4151b5 CreateEventW 19014->19016 19017 4151c6 ResetEvent 19014->19017 19018 4151a8 19015->19018 19016->19015 19016->19017 19019 4151dd GetLastError 19017->19019 19020 4151df ResetEvent 19017->19020 19019->19020 19021 4151e9 GetLastError 19020->19021 19022 4151eb 19020->19022 19021->19022 19023 4151f9 19022->19023 19025 4150e0 19022->19025 19031 4210a6 19025->19031 19028 415105 GetLastError 19030 41510f 19028->19030 19029 4150ff 19029->19018 19030->19018 19032 4210d6 19031->19032 19033 4210ba 19031->19033 19035 423265 ___set_flsgetvalue 8 API calls 19032->19035 19034 421d28 __lseeki64 67 API calls 19033->19034 19037 4210bf 19034->19037 19036 4210dc 19035->19036 19038 423a93 __calloc_crt 67 API calls 19036->19038 19039 423c64 __lseeki64 6 API calls 19037->19039 19040 4210e8 19038->19040 19047 4150f2 19039->19047 19041 42113a 19040->19041 19052 423453 19040->19052 19043 420dfe type_info::_Type_info_dtor 67 API calls 19041->19043 19045 421140 19043->19045 19045->19047 19057 421d4e 19045->19057 19046 4232f3 __initptd 67 API calls 19050 4210fe CreateThread 19046->19050 19047->19028 19047->19029 19050->19047 19051 421131 GetLastError 19050->19051 19065 421023 19050->19065 19051->19041 19053 4233da __getptd_noexit 67 API calls 19052->19053 19054 42345b 19053->19054 19055 4210f5 19054->19055 19056 422c2c __amsg_exit 67 API calls 19054->19056 19055->19046 19056->19055 19062 421d3b 19057->19062 19059 421d59 _realloc 19060 421d28 __lseeki64 67 API calls 19059->19060 19061 421d6c 19060->19061 19061->19047 19063 4233da __getptd_noexit 67 API calls 19062->19063 19064 421d40 19063->19064 19064->19059 19066 423265 ___set_flsgetvalue 8 API calls 19065->19066 19067 42102e 19066->19067 19080 423245 TlsGetValue 19067->19080 19070 421067 19093 42346d 19070->19093 19071 42103d 19090 423299 19071->19090 19074 421082 __IsNonwritableInCurrentImage 19082 420fe2 19074->19082 19078 421050 GetLastError ExitThread 19079 42105d GetCurrentThreadId 19079->19074 19081 421039 19080->19081 19081->19070 19081->19071 19083 420fee __lseeki64 19082->19083 19084 423453 __getptd 67 API calls 19083->19084 19085 420ff3 19084->19085 19129 420fa5 19085->19129 19091 4231ca __decode_pointer 6 API calls 19090->19091 19092 42104c 19091->19092 19092->19078 19092->19079 19095 423479 __lseeki64 19093->19095 19094 423491 19097 42349f 19094->19097 19099 420dfe type_info::_Type_info_dtor 67 API calls 19094->19099 19095->19094 19096 420dfe type_info::_Type_info_dtor 67 API calls 19095->19096 19098 42357b __lseeki64 19095->19098 19096->19094 19100 4234ad 19097->19100 19101 420dfe type_info::_Type_info_dtor 67 API calls 19097->19101 19098->19074 19099->19097 19102 4234bb 19100->19102 19104 420dfe type_info::_Type_info_dtor 67 API calls 19100->19104 19101->19100 19103 4234c9 19102->19103 19105 420dfe type_info::_Type_info_dtor 67 API calls 19102->19105 19106 420dfe type_info::_Type_info_dtor 67 API calls 19103->19106 19107 4234d7 19103->19107 19104->19102 19105->19103 19106->19107 19108 420dfe type_info::_Type_info_dtor 67 API calls 19107->19108 19109 4234e5 19107->19109 19108->19109 19110 4234f6 19109->19110 19112 420dfe type_info::_Type_info_dtor 67 API calls 19109->19112 19111 421f1d __lock 67 API calls 19110->19111 19113 4234fe 19111->19113 19112->19110 19114 423523 19113->19114 19115 42350a InterlockedDecrement 19113->19115 19147 423587 19114->19147 19115->19114 19116 423515 19115->19116 19116->19114 19119 420dfe type_info::_Type_info_dtor 67 API calls 19116->19119 19119->19114 19120 421f1d __lock 67 API calls 19121 423537 19120->19121 19122 423568 19121->19122 19150 425b16 19121->19150 19194 423593 19122->19194 19126 420dfe type_info::_Type_info_dtor 67 API calls 19126->19098 19132 420fb3 __IsNonwritableInCurrentImage 19129->19132 19130 4233da __getptd_noexit 67 API calls 19131 420fcd 19130->19131 19133 420fd8 ExitThread 19131->19133 19136 42359c 19131->19136 19132->19130 19137 4235f5 19136->19137 19138 4235aa 19136->19138 19139 420fd7 19137->19139 19140 4235ff TlsSetValue 19137->19140 19141 4235b0 TlsGetValue 19138->19141 19142 4235d3 19138->19142 19139->19133 19140->19139 19141->19142 19144 4235c3 TlsGetValue 19141->19144 19143 4231ca __decode_pointer 6 API calls 19142->19143 19145 4235ea 19143->19145 19144->19142 19146 42346d __freefls@4 76 API calls 19145->19146 19146->19137 19197 421e43 LeaveCriticalSection 19147->19197 19149 423530 19149->19120 19151 425b27 InterlockedDecrement 19150->19151 19152 42354c 19150->19152 19153 425b3f 19151->19153 19154 425b3c InterlockedDecrement 19151->19154 19152->19122 19164 42593e 19152->19164 19155 425b49 InterlockedDecrement 19153->19155 19156 425b4c 19153->19156 19154->19153 19155->19156 19157 425b56 InterlockedDecrement 19156->19157 19158 425b59 19156->19158 19157->19158 19159 425b63 InterlockedDecrement 19158->19159 19161 425b66 19158->19161 19159->19161 19160 425b7f InterlockedDecrement 19160->19161 19161->19160 19162 425b8f InterlockedDecrement 19161->19162 19163 425b9a InterlockedDecrement 19161->19163 19162->19161 19163->19152 19165 4259c2 19164->19165 19166 425955 19164->19166 19167 425a0f 19165->19167 19168 420dfe type_info::_Type_info_dtor 67 API calls 19165->19168 19166->19165 19173 425989 19166->19173 19178 420dfe type_info::_Type_info_dtor 67 API calls 19166->19178 19174 425a36 19167->19174 19222 4282f8 19167->19222 19170 4259e3 19168->19170 19171 420dfe type_info::_Type_info_dtor 67 API calls 19170->19171 19175 4259f6 19171->19175 19180 420dfe type_info::_Type_info_dtor 67 API calls 19173->19180 19193 4259aa 19173->19193 19177 425a7b 19174->19177 19187 420dfe 67 API calls type_info::_Type_info_dtor 19174->19187 19181 420dfe type_info::_Type_info_dtor 67 API calls 19175->19181 19176 420dfe type_info::_Type_info_dtor 67 API calls 19182 4259b7 19176->19182 19183 420dfe type_info::_Type_info_dtor 67 API calls 19177->19183 19184 42597e 19178->19184 19179 420dfe type_info::_Type_info_dtor 67 API calls 19179->19174 19185 42599f 19180->19185 19186 425a04 19181->19186 19188 420dfe type_info::_Type_info_dtor 67 API calls 19182->19188 19189 425a81 19183->19189 19198 4284d2 19184->19198 19214 42848d 19185->19214 19192 420dfe type_info::_Type_info_dtor 67 API calls 19186->19192 19187->19174 19188->19165 19189->19122 19192->19167 19193->19176 19310 421e43 LeaveCriticalSection 19194->19310 19196 423575 19196->19126 19197->19149 19199 4284df 19198->19199 19213 42855c 19198->19213 19200 4284f0 19199->19200 19201 420dfe type_info::_Type_info_dtor 67 API calls 19199->19201 19202 420dfe type_info::_Type_info_dtor 67 API calls 19200->19202 19203 428502 19200->19203 19201->19200 19202->19203 19204 420dfe type_info::_Type_info_dtor 67 API calls 19203->19204 19208 428514 19203->19208 19204->19208 19205 420dfe type_info::_Type_info_dtor 67 API calls 19206 428526 19205->19206 19207 428538 19206->19207 19209 420dfe type_info::_Type_info_dtor 67 API calls 19206->19209 19210 42854a 19207->19210 19211 420dfe type_info::_Type_info_dtor 67 API calls 19207->19211 19208->19205 19208->19206 19209->19207 19212 420dfe type_info::_Type_info_dtor 67 API calls 19210->19212 19210->19213 19211->19210 19212->19213 19213->19173 19215 42849a 19214->19215 19221 4284ce 19214->19221 19216 420dfe type_info::_Type_info_dtor 67 API calls 19215->19216 19217 4284aa 19215->19217 19216->19217 19218 4284bc 19217->19218 19219 420dfe type_info::_Type_info_dtor 67 API calls 19217->19219 19220 420dfe type_info::_Type_info_dtor 67 API calls 19218->19220 19218->19221 19219->19218 19220->19221 19221->19193 19223 425a2f 19222->19223 19224 428309 19222->19224 19223->19179 19225 420dfe type_info::_Type_info_dtor 67 API calls 19224->19225 19226 428311 19225->19226 19227 420dfe type_info::_Type_info_dtor 67 API calls 19226->19227 19228 428319 19227->19228 19229 420dfe type_info::_Type_info_dtor 67 API calls 19228->19229 19230 428321 19229->19230 19231 420dfe type_info::_Type_info_dtor 67 API calls 19230->19231 19232 428329 19231->19232 19310->19196 19311 419c8f 19312 419c9a 19311->19312 19315 419cf9 19311->19315 19314 420dfe type_info::_Type_info_dtor 67 API calls 19312->19314 19313 419e12 19318 420dfe type_info::_Type_info_dtor 67 API calls 19313->19318 19316 419cbc 19314->19316 19315->19313 19321 419e89 19315->19321 19329 419ee7 19315->19329 19330 419f58 19315->19330 19381 413890 19315->19381 19389 40ce90 19315->19389 19417 40ceb0 19315->19417 19317 420dfe type_info::_Type_info_dtor 67 API calls 19316->19317 19319 419cda 19317->19319 19320 419e38 19318->19320 19322 420dfe type_info::_Type_info_dtor 67 API calls 19319->19322 19323 420dfe type_info::_Type_info_dtor 67 API calls 19320->19323 19325 420dfe type_info::_Type_info_dtor 67 API calls 19321->19325 19377 419cef 19322->19377 19324 419e56 19323->19324 19326 420dfe type_info::_Type_info_dtor 67 API calls 19324->19326 19327 419eb0 19325->19327 19326->19377 19328 420dfe type_info::_Type_info_dtor 67 API calls 19327->19328 19331 419ece 19328->19331 19335 420dfe type_info::_Type_info_dtor 67 API calls 19329->19335 19332 419f5c 19330->19332 19336 419fca 19330->19336 19333 420dfe type_info::_Type_info_dtor 67 API calls 19331->19333 19341 420dfe type_info::_Type_info_dtor 67 API calls 19332->19341 19333->19377 19334 41a017 19449 408530 19334->19449 19338 419f1b 19335->19338 19336->19334 19445 406510 19336->19445 19342 420dfe type_info::_Type_info_dtor 67 API calls 19338->19342 19340 41a027 19349 41a0eb 19340->19349 19350 41a05f 19340->19350 19344 419f90 19341->19344 19343 419f39 19342->19343 19345 420dfe type_info::_Type_info_dtor 67 API calls 19343->19345 19346 420dfe type_info::_Type_info_dtor 67 API calls 19344->19346 19345->19377 19347 419fae 19346->19347 19348 420dfe type_info::_Type_info_dtor 67 API calls 19347->19348 19348->19377 19470 419780 19349->19470 19453 404b30 19350->19453 19355 404b30 68 API calls 19357 41a07b 19355->19357 19356 418aa0 70 API calls 19358 41a115 19356->19358 19457 418aa0 19357->19457 19360 404be0 68 API calls 19358->19360 19362 41a12b 19360->19362 19364 420dfe type_info::_Type_info_dtor 67 API calls 19362->19364 19371 41a0e4 19364->19371 19366 420dfe type_info::_Type_info_dtor 67 API calls 19367 41a0c0 19366->19367 19368 420dfe type_info::_Type_info_dtor 67 API calls 19367->19368 19369 41a0d2 19368->19369 19370 420dfe type_info::_Type_info_dtor 67 API calls 19369->19370 19370->19371 19372 420dfe type_info::_Type_info_dtor 67 API calls 19371->19372 19373 41a171 19372->19373 19374 420dfe type_info::_Type_info_dtor 67 API calls 19373->19374 19375 41a18e 19374->19375 19376 420dfe type_info::_Type_info_dtor 67 API calls 19375->19376 19376->19377 19382 4138b0 SetFilePointer 19381->19382 19383 4138a3 19381->19383 19384 4138e1 GetLastError 19382->19384 19385 4138eb 19382->19385 19383->19315 19384->19385 19386 413905 19385->19386 19387 41390f GetLastError 19385->19387 19386->19315 19388 413915 19387->19388 19388->19315 19390 40ceb0 19389->19390 19474 40e370 19390->19474 19393 40cf63 19490 40d0d0 19393->19490 19394 40cf9d 19480 404e60 19394->19480 19400 40cfd5 19402 420dfe type_info::_Type_info_dtor 67 API calls 19400->19402 19401 40d00f 19493 4110c0 19401->19493 19404 40cfe2 19402->19404 19407 40d0d0 67 API calls 19404->19407 19406 420def __invoke_watson 5 API calls 19409 40d0c4 19406->19409 19416 40cf70 19407->19416 19409->19315 19413 420dfe type_info::_Type_info_dtor 67 API calls 19414 40d04f 19413->19414 19415 40d0d0 67 API calls 19414->19415 19415->19416 19416->19406 19418 40cefd 19417->19418 19419 40e370 71 API calls 19418->19419 19420 40cf5b 19419->19420 19421 40cf63 19420->19421 19422 40cf9d 19420->19422 19423 40d0d0 67 API calls 19421->19423 19424 404e60 68 API calls 19422->19424 19444 40cf70 19423->19444 19425 40cfb9 19424->19425 19426 411760 97 API calls 19425->19426 19427 40cfcf 19426->19427 19428 40cfd5 19427->19428 19429 40d00f 19427->19429 19430 420dfe type_info::_Type_info_dtor 67 API calls 19428->19430 19431 4110c0 68 API calls 19429->19431 19432 40cfe2 19430->19432 19433 40d015 19431->19433 19435 40d0d0 67 API calls 19432->19435 19436 411160 68 API calls 19433->19436 19434 420def __invoke_watson 5 API calls 19437 40d0c4 19434->19437 19435->19444 19438 40d01b 19436->19438 19437->19315 19439 411210 68 API calls 19438->19439 19440 40d021 19439->19440 19441 420dfe type_info::_Type_info_dtor 67 API calls 19440->19441 19442 40d04f 19441->19442 19443 40d0d0 67 API calls 19442->19443 19443->19444 19444->19434 19446 406529 19445->19446 19447 406545 19446->19447 19448 404e60 68 API calls 19446->19448 19447->19334 19448->19447 19450 408555 VariantClear 19449->19450 19451 40853b 19449->19451 19450->19340 19451->19450 19452 408549 19451->19452 19452->19340 19454 404b4f 19453->19454 19455 404b65 19454->19455 19456 404e60 68 API calls 19454->19456 19455->19355 19456->19455 20238 418930 19457->20238 19464 420dfe type_info::_Type_info_dtor 67 API calls 19465 418b13 19464->19465 19466 404be0 19465->19466 19467 404c04 19466->19467 19468 404be7 19466->19468 19467->19366 19468->19467 19469 404e60 68 API calls 19468->19469 19469->19467 19471 419788 19470->19471 19473 4197a3 19470->19473 19472 405130 2 API calls 19471->19472 19471->19473 19472->19471 19473->19356 19475 40e38a 19474->19475 19479 413890 3 API calls 19475->19479 19476 40e3aa 19478 40cf5b 19476->19478 19516 40e0f0 19476->19516 19478->19393 19478->19394 19479->19476 19481 420edb _malloc 67 API calls 19480->19481 19482 404e7e 19481->19482 19483 42a355 __CxxThrowException@8 RaiseException 19482->19483 19485 404e9c 19482->19485 19483->19485 19484 404ec8 19487 411760 19484->19487 19485->19484 19485->19485 19486 420dfe type_info::_Type_info_dtor 67 API calls 19485->19486 19486->19484 19535 4113f0 19487->19535 19489 40cfcf 19489->19400 19489->19401 20234 40d550 19490->20234 19494 4110e4 19493->19494 19495 4051e0 68 API calls 19494->19495 19496 4110ec 19495->19496 19497 40d015 19496->19497 19498 4051e0 68 API calls 19496->19498 19499 411160 19497->19499 19498->19496 19500 41118c 19499->19500 19501 4051e0 68 API calls 19500->19501 19503 411194 19501->19503 19502 40d01b 19505 411210 19502->19505 19503->19502 19504 4051e0 68 API calls 19503->19504 19504->19503 19506 411237 19505->19506 19507 4051e0 68 API calls 19506->19507 19508 411241 19507->19508 19509 4051e0 68 API calls 19508->19509 19510 41126b 19509->19510 19511 4113e0 19510->19511 19512 40d021 19510->19512 19515 4051e0 68 API calls 19510->19515 19513 40ddc0 RaiseException 19511->19513 19512->19413 19514 4113e5 19513->19514 19515->19510 19518 40e137 19516->19518 19517 40e15b 19517->19478 19518->19517 19519 420edb _malloc 67 API calls 19518->19519 19520 40e180 19519->19520 19521 40e19e 19520->19521 19532 42a355 19520->19532 19523 420dfe type_info::_Type_info_dtor 67 API calls 19521->19523 19529 40e1a4 19523->19529 19524 40e2ea 19525 420dfe type_info::_Type_info_dtor 67 API calls 19524->19525 19525->19517 19526 40e33f 19527 420dfe type_info::_Type_info_dtor 67 API calls 19526->19527 19527->19517 19528 4211b0 ___sbh_free_block __VEC_memcpy 19528->19529 19529->19524 19529->19526 19529->19528 19530 40e2ff 19529->19530 19531 413890 3 API calls 19530->19531 19531->19526 19533 42a38a RaiseException 19532->19533 19534 42a37e 19532->19534 19533->19521 19534->19533 19536 411426 19535->19536 19537 411456 19536->19537 19578 40ddc0 19536->19578 19539 40ddc0 RaiseException 19537->19539 19541 411496 19537->19541 19539->19541 19540 4114cc 19540->19489 19541->19540 19577 413890 3 API calls 19541->19577 19542 411509 19543 411742 19542->19543 19581 40a260 19542->19581 19543->19489 19545 41152e 19547 411599 19545->19547 19548 40ddc0 RaiseException 19545->19548 19563 411637 19545->19563 19546 420dfe type_info::_Type_info_dtor 67 API calls 19546->19543 19591 40de20 19547->19591 19548->19547 19552 4115df 19553 4116eb 19552->19553 19554 4115fa 19552->19554 19555 40ddc0 RaiseException 19552->19555 19657 4102d0 19553->19657 19599 40fa80 19554->19599 19555->19554 19560 411ad0 67 API calls 19560->19563 19563->19546 19577->19542 19579 42a355 __CxxThrowException@8 RaiseException 19578->19579 19580 40ddd6 19579->19580 19582 40a2b7 19581->19582 19583 40a266 19581->19583 19582->19545 19584 420edb _malloc 67 API calls 19583->19584 19590 40a2a7 19583->19590 19586 40a271 19584->19586 19585 420dfe type_info::_Type_info_dtor 67 API calls 19585->19582 19587 42a355 __CxxThrowException@8 RaiseException 19586->19587 19588 40a28d 19586->19588 19587->19588 19589 4211b0 ___sbh_free_block __VEC_memcpy 19588->19589 19588->19590 19589->19590 19590->19585 19592 40de2f 19591->19592 19715 411a50 19592->19715 19595 40df40 19597 40df53 19595->19597 19596 40ddc0 RaiseException 19596->19597 19597->19596 19598 40dfae 19597->19598 19598->19552 19866 40f750 19599->19866 19601 40fe94 19895 40a700 19601->19895 19606 420dfe 67 API calls type_info::_Type_info_dtor 19625 40fc06 19606->19625 19609 420dfe type_info::_Type_info_dtor 67 API calls 19610 4100b2 19612 40ddc0 RaiseException 19610->19612 19613 4100b7 19612->19613 19614 42a355 __CxxThrowException@8 RaiseException 19613->19614 19616 4100cc 19614->19616 19615 420edb 67 API calls _malloc 19615->19625 19618 42a355 __CxxThrowException@8 RaiseException 19616->19618 19620 4100e1 19618->19620 19909 40b810 19620->19909 19625->19601 19625->19606 19625->19610 19625->19613 19625->19615 19625->19616 19625->19620 19626 4211b0 ___sbh_free_block __VEC_memcpy 19625->19626 19739 408dd0 19625->19739 19876 411b60 19625->19876 19889 40ad10 19625->19889 19626->19625 19629 420dfe type_info::_Type_info_dtor 67 API calls 19631 410133 19629->19631 19634 420dfe type_info::_Type_info_dtor 67 API calls 19631->19634 19636 410168 19634->19636 19638 420dfe type_info::_Type_info_dtor 67 API calls 19636->19638 19639 41019d 19638->19639 19658 40df40 RaiseException 19657->19658 19659 410314 19658->19659 19660 410336 19659->19660 20203 40e3e0 19659->20203 19662 40fa80 94 API calls 19660->19662 19678 4103f3 19660->19678 19667 4103b0 19662->19667 19663 410460 19665 40f750 68 API calls 19663->19665 19668 41049a 19665->19668 19666 40df40 RaiseException 19666->19660 19669 4103d9 19667->19669 19670 4103b8 19667->19670 19672 40df40 RaiseException 19668->19672 19675 40df40 RaiseException 19669->19675 19673 411ad0 67 API calls 19670->19673 19671 4104c0 19674 41066b 19671->19674 19707 41070f 19671->19707 19672->19671 19677 4103d0 19673->19677 19680 420dfe type_info::_Type_info_dtor 67 API calls 19674->19680 19675->19678 19676 40ad10 RaiseException 19682 4104cd 19676->19682 19677->19560 19678->19663 19678->19682 19679 40ddc0 RaiseException 19679->19707 19681 410696 19680->19681 19685 420dfe type_info::_Type_info_dtor 67 API calls 19681->19685 19682->19671 19682->19676 19684 4051e0 68 API calls 19682->19684 19683 4051e0 68 API calls 19683->19707 19684->19682 19686 4106cb 19685->19686 19688 420dfe type_info::_Type_info_dtor 67 API calls 19686->19688 19687 404e60 68 API calls 19687->19707 19689 4106ff 19688->19689 19692 411ad0 67 API calls 19689->19692 19691 420dfe 67 API calls type_info::_Type_info_dtor 19691->19707 19692->19677 19693 410ed2 19694 420dfe type_info::_Type_info_dtor 67 API calls 19693->19694 19695 410f09 19694->19695 19700 420dfe type_info::_Type_info_dtor 67 API calls 19695->19700 19696 40f8b0 68 API calls 19696->19707 19697 40f940 68 API calls 19697->19707 19698 410dab 19698->19693 19701 4051e0 68 API calls 19698->19701 19699 40f800 68 API calls 19699->19707 19704 410f53 19700->19704 19701->19698 19702 40dea0 68 API calls 19702->19707 19703 40df40 RaiseException 19703->19707 19708 420dfe type_info::_Type_info_dtor 67 API calls 19704->19708 19706 40d890 68 API calls 19706->19707 19707->19679 19707->19683 19707->19687 19707->19691 19707->19696 19707->19697 19707->19698 19707->19699 19707->19702 19707->19703 19707->19706 20211 411960 19707->20211 20220 40dff0 19707->20220 19709 410f9d 19708->19709 19710 420dfe type_info::_Type_info_dtor 67 API calls 19709->19710 19711 410fdb 19710->19711 19716 420edb _malloc 67 API calls 19715->19716 19717 411a5f 19716->19717 19718 42a355 __CxxThrowException@8 RaiseException 19717->19718 19720 411a7d 19717->19720 19718->19720 19719 40de6e 19719->19595 19720->19719 19722 4051e0 19720->19722 19723 4051ea 19722->19723 19724 405283 19722->19724 19725 405209 19723->19725 19726 42a355 __CxxThrowException@8 RaiseException 19723->19726 19724->19719 19727 405233 19725->19727 19729 42a355 __CxxThrowException@8 RaiseException 19725->19729 19726->19725 19728 40525d _realloc 19727->19728 19734 405340 19727->19734 19731 420dfe type_info::_Type_info_dtor 67 API calls 19728->19731 19729->19727 19731->19724 19733 42a355 __CxxThrowException@8 RaiseException 19733->19728 19735 420edb _malloc 67 API calls 19734->19735 19736 405347 19735->19736 19737 405240 19736->19737 19738 42a355 __CxxThrowException@8 RaiseException 19736->19738 19737->19728 19737->19733 19738->19737 19914 40d900 19739->19914 19742 409606 19742->19625 19744 408e4d 19745 420edb 67 API calls _malloc 19744->19745 19747 4090f3 19744->19747 19749 409108 19744->19749 19795 408f8f 19744->19795 19934 40a790 19744->19934 19745->19744 19748 42a355 __CxxThrowException@8 RaiseException 19747->19748 19748->19749 19751 42a355 __CxxThrowException@8 RaiseException 19749->19751 19756 40911d 19751->19756 19755 40916d 19760 408d50 67 API calls 19755->19760 19756->19755 19817 4091da 19756->19817 19758 409359 19956 40a1c0 19758->19956 19763 409182 DeleteCriticalSection 19760->19763 19775 4094fe 19781 409623 19788 408d50 67 API calls 19781->19788 19787 40959b 19799 408d50 67 API calls 19787->19799 19941 4089c0 19795->19941 19803 40a790 68 API calls 19803->19817 19809 4127c0 77 API calls 19809->19817 19817->19758 19817->19775 19817->19781 19817->19787 19817->19803 19817->19809 19953 413650 19817->19953 19867 40df40 RaiseException 19866->19867 19874 40f763 19867->19874 19868 40f7cc 19869 40ddc0 RaiseException 19868->19869 19870 40f7d1 19869->19870 19870->19625 19874->19868 19874->19870 19875 40df40 RaiseException 19874->19875 20005 40ea10 19874->20005 20030 40ebc0 19874->20030 20046 40eff0 19874->20046 19875->19874 19877 420edb _malloc 67 API calls 19876->19877 19878 411b8b 19877->19878 19879 411bab 19878->19879 19880 42a355 __CxxThrowException@8 RaiseException 19878->19880 19881 420dfe type_info::_Type_info_dtor 67 API calls 19879->19881 19880->19879 19882 411bc6 19881->19882 19884 40a260 68 API calls 19882->19884 19888 411bf6 19882->19888 19883 411c2e 19883->19625 19885 411be1 19884->19885 19886 4211b0 ___sbh_free_block __VEC_memcpy 19885->19886 19886->19888 19887 4051e0 68 API calls 19887->19883 19888->19883 19888->19887 19890 40ad18 19889->19890 19891 40ad1c 19889->19891 19890->19625 19892 42a355 __CxxThrowException@8 RaiseException 19891->19892 19893 40ad3f 19891->19893 19894 40ad6c 19892->19894 19893->19625 19894->19625 19894->19894 19896 40a73f 19895->19896 19897 420dfe type_info::_Type_info_dtor 67 API calls 19896->19897 19898 40a763 19897->19898 19899 408d50 19898->19899 19900 408d93 19899->19900 19901 420dfe type_info::_Type_info_dtor 67 API calls 19900->19901 19902 408d9c 19901->19902 19903 408860 67 API calls 19902->19903 19904 408db6 19903->19904 19904->19609 19910 40a700 67 API calls 19909->19910 19911 40b846 19910->19911 19912 408d50 67 API calls 19911->19912 19913 40b86b 19912->19913 19913->19629 19915 40d940 19914->19915 19930 408e0d 19914->19930 19915->19930 19981 40d890 19915->19981 19917 40db9f 19921 420dfe type_info::_Type_info_dtor 67 API calls 19917->19921 19919 40d890 68 API calls 19922 40d9f8 19919->19922 19920 40da2d 19923 420dfe type_info::_Type_info_dtor 67 API calls 19920->19923 19921->19930 19922->19917 19922->19920 19930->19742 19931 40a060 19930->19931 19987 4047c0 InitializeCriticalSection 19931->19987 19933 40a09c 19933->19744 19935 420edb _malloc 67 API calls 19934->19935 19936 40a7bd 19935->19936 19937 42a355 __CxxThrowException@8 RaiseException 19936->19937 19939 40a7db 19936->19939 19937->19939 19938 40a82e 19938->19744 19939->19938 19940 4051e0 68 API calls 19939->19940 19940->19938 19944 4089d2 19941->19944 19942 408be7 19943 408b8f 19943->19942 19946 4051e0 68 API calls 19943->19946 19945 4051e0 68 API calls 19944->19945 19947 408a3e 19944->19947 19945->19944 19946->19943 19947->19943 19948 4051e0 68 API calls 19947->19948 19948->19947 19982 40d8a5 19981->19982 19983 4051e0 68 API calls 19982->19983 19985 40d8aa 19983->19985 19984 40d8ee 19984->19917 19984->19919 19985->19984 19986 4051e0 68 API calls 19985->19986 19986->19985 19987->19933 20006 40df40 RaiseException 20005->20006 20007 40ea26 20006->20007 20008 40df40 RaiseException 20007->20008 20009 40ea34 20008->20009 20010 40ea4b 20009->20010 20011 40ddc0 RaiseException 20009->20011 20064 40e8f0 20010->20064 20011->20010 20014 4051e0 68 API calls 20020 40ea69 20014->20020 20015 40df40 RaiseException 20016 40ead7 20015->20016 20017 40df40 RaiseException 20017->20020 20020->20017 20022 40eaca 20020->20022 20025 4051e0 68 API calls 20020->20025 20022->20015 20025->20020 20031 40e8f0 RaiseException 20030->20031 20032 40ec06 20031->20032 20033 40df40 RaiseException 20032->20033 20041 40ec0f 20033->20041 20034 40ddc0 RaiseException 20034->20041 20036 40e8f0 RaiseException 20036->20041 20039 40df40 RaiseException 20039->20041 20041->20034 20041->20036 20041->20039 20042 4051e0 68 API calls 20041->20042 20043 40efc9 20041->20043 20044 40e960 68 API calls 20041->20044 20045 420dfe 67 API calls type_info::_Type_info_dtor 20041->20045 20113 40dea0 20041->20113 20120 4118a0 20041->20120 20129 40d710 20041->20129 20139 40e440 20041->20139 20042->20041 20043->19874 20044->20041 20045->20041 20047 40f03b 20046->20047 20048 4051e0 68 API calls 20047->20048 20050 40f04a 20048->20050 20049 40df40 RaiseException 20049->20050 20050->20049 20058 4051e0 68 API calls 20050->20058 20062 40f177 20050->20062 20051 40df40 RaiseException 20051->20062 20052 40ddc0 RaiseException 20052->20062 20053 40ad10 RaiseException 20053->20062 20054 40f6bb 20055 40f72b 20054->20055 20057 40d890 68 API calls 20054->20057 20055->19874 20056 40e960 68 API calls 20056->20062 20059 40f6c9 20057->20059 20058->20050 20059->20055 20063 4051e0 68 API calls 20059->20063 20060 4051e0 68 API calls 20060->20062 20061 420dfe 67 API calls type_info::_Type_info_dtor 20061->20062 20062->20051 20062->20052 20062->20053 20062->20054 20062->20056 20062->20060 20062->20061 20063->20059 20065 40df40 RaiseException 20064->20065 20070 40e901 20065->20070 20066 40e94b 20066->20014 20067 40e952 20068 40ddc0 RaiseException 20067->20068 20069 40e957 20068->20069 20070->20066 20070->20067 20071 40df40 RaiseException 20070->20071 20071->20070 20116 40deb1 20113->20116 20114 40ddc0 RaiseException 20114->20116 20115 40df35 20115->20041 20116->20114 20116->20115 20117 40df40 RaiseException 20116->20117 20118 40df21 20116->20118 20117->20116 20119 40de20 68 API calls 20118->20119 20119->20115 20121 420edb _malloc 67 API calls 20120->20121 20122 4118cd 20121->20122 20123 4118e9 20122->20123 20124 42a355 __CxxThrowException@8 RaiseException 20122->20124 20153 411db0 20123->20153 20124->20123 20130 40d757 20129->20130 20131 420dfe type_info::_Type_info_dtor 67 API calls 20130->20131 20132 40d760 20131->20132 20133 420dfe type_info::_Type_info_dtor 67 API calls 20132->20133 20134 40d790 20133->20134 20135 420dfe type_info::_Type_info_dtor 67 API calls 20134->20135 20136 40d7bf 20135->20136 20183 40d1b0 20136->20183 20140 40df40 RaiseException 20139->20140 20151 40e48c 20140->20151 20141 40ddc0 RaiseException 20141->20151 20143 4051e0 68 API calls 20143->20151 20144 420dfe 67 API calls type_info::_Type_info_dtor 20144->20151 20145 40e8ce 20146 420def __invoke_watson 5 API calls 20145->20146 20147 40e8e9 20146->20147 20147->20041 20148 40df40 RaiseException 20148->20151 20149 420edb _malloc 67 API calls 20149->20151 20150 42a355 __CxxThrowException@8 RaiseException 20150->20151 20151->20141 20151->20143 20151->20144 20151->20145 20151->20148 20151->20149 20151->20150 20152 4211b0 ___sbh_free_block __VEC_memcpy 20151->20152 20187 4117e0 20151->20187 20152->20151 20162 411f40 20153->20162 20163 411f8b 20162->20163 20178 412020 20163->20178 20179 4051e0 68 API calls 20178->20179 20188 420edb _malloc 67 API calls 20187->20188 20189 41180d 20188->20189 20190 411829 20189->20190 20191 42a355 __CxxThrowException@8 RaiseException 20189->20191 20196 411cf0 20190->20196 20191->20190 20197 420dfe type_info::_Type_info_dtor 67 API calls 20196->20197 20198 411d19 20197->20198 20204 40df40 RaiseException 20203->20204 20210 40e3f1 20204->20210 20205 40e424 20205->19666 20206 40e42b 20207 40ddc0 RaiseException 20206->20207 20209 40e430 20207->20209 20208 40df40 RaiseException 20208->20210 20210->20205 20210->20206 20210->20208 20212 420edb _malloc 67 API calls 20211->20212 20213 411991 20212->20213 20214 4119af 20213->20214 20215 42a355 __CxxThrowException@8 RaiseException 20213->20215 20230 404b90 20214->20230 20215->20214 20217 411a26 20217->19707 20219 4051e0 68 API calls 20219->20217 20221 40e012 20220->20221 20222 40e02f 20221->20222 20223 40ddc0 RaiseException 20221->20223 20224 40e08b 20222->20224 20225 40e03d 20222->20225 20223->20222 20226 40ddc0 RaiseException 20224->20226 20227 40e051 20225->20227 20229 404e60 68 API calls 20225->20229 20228 40e090 20226->20228 20227->19707 20229->20227 20231 404bb5 20230->20231 20232 404baf 20230->20232 20231->20217 20231->20219 20233 404e60 68 API calls 20232->20233 20233->20231 20235 40d58f 20234->20235 20236 420dfe type_info::_Type_info_dtor 67 API calls 20235->20236 20237 40d106 20236->20237 20237->19416 20239 418975 20238->20239 20249 4189f7 20238->20249 20239->20249 20278 404ca0 20239->20278 20240 418a5e 20241 418a75 20240->20241 20242 418a68 20240->20242 20246 407940 68 API calls 20241->20246 20294 4082a0 20242->20294 20244 418a25 20248 404de0 68 API calls 20244->20248 20260 4189ef 20246->20260 20252 418a32 20248->20252 20249->20240 20249->20244 20251 4189a0 20253 420dfe type_info::_Type_info_dtor 67 API calls 20251->20253 20254 407940 68 API calls 20252->20254 20255 4189b1 20253->20255 20256 418a47 20254->20256 20255->20249 20257 4189bb 20255->20257 20258 420dfe type_info::_Type_info_dtor 67 API calls 20256->20258 20286 404de0 20257->20286 20258->20260 20265 405070 20260->20265 20264 420dfe type_info::_Type_info_dtor 67 API calls 20264->20260 20266 404e60 68 API calls 20265->20266 20267 4050b0 20266->20267 20320 404c30 20267->20320 20270 404c30 68 API calls 20271 4050ce 20270->20271 20272 404c30 68 API calls 20271->20272 20273 4050d7 20272->20273 20274 404fd0 20273->20274 20275 40505a 20274->20275 20276 404fe5 20274->20276 20275->19464 20276->20275 20277 4211b0 ___sbh_free_block __VEC_memcpy 20276->20277 20277->20275 20299 404cc0 20278->20299 20281 405130 20282 405140 20281->20282 20283 405161 CharUpperW CharUpperW 20282->20283 20285 40517f 20282->20285 20283->20282 20284 405188 20283->20284 20284->20251 20285->20251 20287 404cc0 68 API calls 20286->20287 20288 404df2 20287->20288 20289 407940 20288->20289 20290 404b90 68 API calls 20289->20290 20291 40797d 20290->20291 20312 4060e0 20291->20312 20295 404b90 68 API calls 20294->20295 20296 4082dd 20295->20296 20316 408310 20296->20316 20300 404d01 20299->20300 20301 404d1f 20300->20301 20303 404d0d 20300->20303 20302 404e60 68 API calls 20301->20302 20305 404d36 20302->20305 20304 404b90 68 API calls 20303->20304 20306 404cb6 20304->20306 20307 404e60 68 API calls 20305->20307 20308 404d49 20305->20308 20306->20281 20307->20308 20309 404d98 20308->20309 20310 404e60 68 API calls 20308->20310 20311 420dfe type_info::_Type_info_dtor 67 API calls 20309->20311 20310->20309 20311->20306 20313 406130 20312->20313 20314 4060fa 20312->20314 20313->20264 20314->20313 20315 404e60 68 API calls 20314->20315 20315->20313 20318 408322 20316->20318 20317 4082f9 20317->20260 20318->20317 20319 404e60 68 API calls 20318->20319 20319->20317 20321 404c7c 20320->20321 20322 404c42 20320->20322 20321->20270 20322->20321 20323 404e60 68 API calls 20322->20323 20323->20321 20324 416bd0 20325 416bd8 20324->20325 20326 416bdb 20324->20326 20327 420edb _malloc 67 API calls 20326->20327 20328 416be1 20327->20328 20329 421a58 20368 422a14 20329->20368 20331 421a64 GetStartupInfoA 20333 421a87 20331->20333 20369 421d71 HeapCreate 20333->20369 20335 421ad7 20371 42360a GetModuleHandleW 20335->20371 20339 421ae8 __RTC_Initialize 20405 424e1c 20339->20405 20340 421a2f _fast_error_exit 67 API calls 20340->20339 20342 421af6 20343 421b02 GetCommandLineA 20342->20343 20344 422c2c __amsg_exit 67 API calls 20342->20344 20420 424ce5 20343->20420 20346 421b01 20344->20346 20346->20343 20350 421b27 20459 4249b2 20350->20459 20352 422c2c __amsg_exit 67 API calls 20352->20350 20354 421b38 20474 422ceb 20354->20474 20355 422c2c __amsg_exit 67 API calls 20355->20354 20357 421b3f 20358 421b4a 20357->20358 20359 422c2c __amsg_exit 67 API calls 20357->20359 20480 424953 20358->20480 20359->20358 20368->20331 20370 421acb 20369->20370 20370->20335 21150 421a2f 20370->21150 20372 423625 20371->20372 20373 42361e 20371->20373 20374 42362f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 20372->20374 20375 42378d 20372->20375 20376 422bfc __crt_waiting_on_module_handle 2 API calls 20373->20376 20377 423678 TlsAlloc 20374->20377 21172 4232b6 20375->21172 20379 423624 20376->20379 20381 421add 20377->20381 20382 4236c6 TlsSetValue 20377->20382 20379->20372 20381->20339 20381->20340 20382->20381 20383 4236d7 20382->20383 21161 422ee6 20383->21161 20386 42314f __encode_pointer 6 API calls 20387 4236e7 20386->20387 20388 42314f __encode_pointer 6 API calls 20387->20388 20389 4236f7 20388->20389 20390 42314f __encode_pointer 6 API calls 20389->20390 20391 423707 20390->20391 20392 42314f __encode_pointer 6 API calls 20391->20392 20393 423717 20392->20393 21168 421da1 20393->21168 20396 4231ca __decode_pointer 6 API calls 20397 423738 20396->20397 20397->20375 20398 423a93 __calloc_crt 67 API calls 20397->20398 20399 423751 20398->20399 20399->20375 20400 4231ca __decode_pointer 6 API calls 20399->20400 20401 42376b 20400->20401 20401->20375 20402 423772 20401->20402 20403 4232f3 __initptd 67 API calls 20402->20403 20404 42377a GetCurrentThreadId 20403->20404 20404->20381 21181 422a14 20405->21181 20407 424e28 GetStartupInfoA 20408 423a93 __calloc_crt 67 API calls 20407->20408 20416 424e49 20408->20416 20409 425067 __lseeki64 20409->20342 20410 424fe4 GetStdHandle 20415 424fae 20410->20415 20411 423a93 __calloc_crt 67 API calls 20411->20416 20412 425049 SetHandleCount 20412->20409 20413 424ff6 GetFileType 20413->20415 20414 424f31 20414->20409 20414->20415 20417 424f5a GetFileType 20414->20417 20419 425169 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20414->20419 20415->20409 20415->20410 20415->20412 20415->20413 20418 425169 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20415->20418 20416->20409 20416->20411 20416->20414 20416->20415 20417->20414 20418->20415 20419->20414 20421 424d03 GetEnvironmentStringsW 20420->20421 20422 424d22 20420->20422 20423 424d17 GetLastError 20421->20423 20424 424d0b 20421->20424 20422->20424 20425 424dbb 20422->20425 20423->20422 20426 424d3e GetEnvironmentStringsW 20424->20426 20427 424d4d WideCharToMultiByte 20424->20427 20428 424dc4 GetEnvironmentStrings 20425->20428 20429 421b12 20425->20429 20426->20427 20426->20429 20433 424db0 FreeEnvironmentStringsW 20427->20433 20434 424d81 20427->20434 20428->20429 20430 424dd4 20428->20430 20446 424c2a 20429->20446 20435 423a4e __malloc_crt 67 API calls 20430->20435 20433->20429 20436 423a4e __malloc_crt 67 API calls 20434->20436 20437 424dee 20435->20437 20438 424d87 20436->20438 20439 424e01 _realloc 20437->20439 20440 424df5 FreeEnvironmentStringsA 20437->20440 20438->20433 20441 424d8f WideCharToMultiByte 20438->20441 20443 424e0b FreeEnvironmentStringsA 20439->20443 20440->20429 20442 424da1 20441->20442 20445 424da9 20441->20445 20444 420dfe type_info::_Type_info_dtor 67 API calls 20442->20444 20443->20429 20444->20445 20445->20433 20447 424c44 GetModuleFileNameA 20446->20447 20448 424c3f 20446->20448 20450 424c6b 20447->20450 21188 426328 20448->21188 21182 424a90 20450->21182 20453 421b1c 20453->20350 20453->20352 20454 424ca7 20455 423a4e __malloc_crt 67 API calls 20454->20455 20456 424cad 20455->20456 20456->20453 20457 424a90 _parse_cmdline 77 API calls 20456->20457 20458 424cc7 20457->20458 20458->20453 20460 4249bb 20459->20460 20463 4249c0 _strlen 20459->20463 20461 426328 ___initmbctable 111 API calls 20460->20461 20461->20463 20462 421b2d 20462->20354 20462->20355 20463->20462 20464 423a93 __calloc_crt 67 API calls 20463->20464 20468 4249f5 _strlen 20464->20468 20465 424a53 20466 420dfe type_info::_Type_info_dtor 67 API calls 20465->20466 20466->20462 20467 423a93 __calloc_crt 67 API calls 20467->20468 20468->20462 20468->20465 20468->20467 20469 424a79 20468->20469 20471 42588b _strcpy_s 67 API calls 20468->20471 20472 424a3a 20468->20472 20470 420dfe type_info::_Type_info_dtor 67 API calls 20469->20470 20470->20462 20471->20468 20472->20468 20473 423b3c __invoke_watson 10 API calls 20472->20473 20473->20472 20475 422cf9 __IsNonwritableInCurrentImage 20474->20475 21438 42531f 20475->21438 20477 422d17 __initterm_e 20479 422d36 __IsNonwritableInCurrentImage __initterm 20477->20479 21442 42163c 20477->21442 20479->20357 20481 424961 20480->20481 20483 424966 20480->20483 20482 426328 ___initmbctable 111 API calls 20481->20482 20482->20483 20484 421b50 20483->20484 20485 4281a0 __wincmdln 77 API calls 20483->20485 20486 41f2d0 20484->20486 20485->20483 21542 41e5c0 GetVersionExW 20486->21542 20488 41f300 21151 421a42 21150->21151 21152 421a3d 21150->21152 21154 422f34 __NMSG_WRITE 67 API calls 21151->21154 21153 4230df __FF_MSGBANNER 67 API calls 21152->21153 21153->21151 21155 421a4a 21154->21155 21156 422c80 __mtinitlocknum 3 API calls 21155->21156 21157 421a54 21156->21157 21157->20335 21162 4231c1 FindHandlerForForeignException 6 API calls 21161->21162 21163 422eee __init_pointers __initp_misc_winsig 21162->21163 21178 423d0e 21163->21178 21166 42314f __encode_pointer 6 API calls 21167 422f2a 21166->21167 21167->20386 21169 421dac 21168->21169 21170 425169 __mtinitlocknum InitializeCriticalSectionAndSpinCount 21169->21170 21171 421dda 21169->21171 21170->21169 21171->20375 21171->20396 21173 4232c0 21172->21173 21177 4232cc 21172->21177 21174 4231ca __decode_pointer 6 API calls 21173->21174 21174->21177 21175 4232e0 TlsFree 21176 4232ee 21175->21176 21176->21176 21177->21175 21177->21176 21179 42314f __encode_pointer 6 API calls 21178->21179 21180 422f20 21179->21180 21180->21166 21181->20407 21185 424aaf 21182->21185 21184 424b1c 21186 424c1a 21184->21186 21187 4281a0 77 API calls __wincmdln 21184->21187 21185->21184 21192 4281a0 21185->21192 21186->20453 21186->20454 21187->21184 21189 426338 21188->21189 21190 426331 21188->21190 21189->20447 21253 42618e 21190->21253 21195 42814d 21192->21195 21198 4246f9 21195->21198 21199 42470c 21198->21199 21205 424759 21198->21205 21200 423453 __getptd 67 API calls 21199->21200 21201 424711 21200->21201 21202 424739 21201->21202 21206 425bed 21201->21206 21202->21205 21221 425e89 21202->21221 21205->21185 21207 425bf9 __lseeki64 21206->21207 21208 423453 __getptd 67 API calls 21207->21208 21209 425bfe 21208->21209 21210 425c2c 21209->21210 21211 425c10 21209->21211 21212 421f1d __lock 67 API calls 21210->21212 21213 423453 __getptd 67 API calls 21211->21213 21214 425c33 21212->21214 21216 425c15 21213->21216 21237 425baf 21214->21237 21219 425c23 __lseeki64 21216->21219 21220 422c2c __amsg_exit 67 API calls 21216->21220 21219->21202 21220->21219 21222 425e95 __lseeki64 21221->21222 21223 423453 __getptd 67 API calls 21222->21223 21224 425e9a 21223->21224 21225 421f1d __lock 67 API calls 21224->21225 21226 425eac 21224->21226 21227 425eca 21225->21227 21229 425eba __lseeki64 21226->21229 21233 422c2c __amsg_exit 67 API calls 21226->21233 21228 425f13 21227->21228 21230 425ee1 InterlockedDecrement 21227->21230 21231 425efb InterlockedIncrement 21227->21231 21249 425f24 21228->21249 21229->21205 21230->21231 21234 425eec 21230->21234 21231->21228 21233->21229 21234->21231 21235 420dfe type_info::_Type_info_dtor 67 API calls 21234->21235 21236 425efa 21235->21236 21236->21231 21238 425bb3 21237->21238 21239 425be5 21237->21239 21238->21239 21240 425a87 ___addlocaleref 8 API calls 21238->21240 21245 425c57 21239->21245 21241 425bc6 21240->21241 21241->21239 21242 425b16 ___removelocaleref 8 API calls 21241->21242 21243 425bd1 21242->21243 21243->21239 21244 42593e ___freetlocinfo 67 API calls 21243->21244 21244->21239 21248 421e43 LeaveCriticalSection 21245->21248 21247 425c5e 21247->21216 21248->21247 21252 421e43 LeaveCriticalSection 21249->21252 21251 425f2b 21251->21226 21252->21251 21254 42619a __lseeki64 21253->21254 21255 423453 __getptd 67 API calls 21254->21255 21256 4261a3 21255->21256 21257 425e89 _LocaleUpdate::_LocaleUpdate 69 API calls 21256->21257 21258 4261ad 21257->21258 21284 425f2d 21258->21284 21261 423a4e __malloc_crt 67 API calls 21262 4261ce 21261->21262 21263 4262ed __lseeki64 21262->21263 21291 425fa9 21262->21291 21263->21189 21266 4262fa 21266->21263 21271 42630d 21266->21271 21272 420dfe type_info::_Type_info_dtor 67 API calls 21266->21272 21267 4261fe InterlockedDecrement 21268 42620e 21267->21268 21269 42621f InterlockedIncrement 21267->21269 21268->21269 21274 420dfe type_info::_Type_info_dtor 67 API calls 21268->21274 21269->21263 21270 426235 21269->21270 21270->21263 21276 421f1d __lock 67 API calls 21270->21276 21273 421d28 __lseeki64 67 API calls 21271->21273 21272->21271 21273->21263 21275 42621e 21274->21275 21275->21269 21278 426249 InterlockedDecrement 21276->21278 21279 4262c5 21278->21279 21280 4262d8 InterlockedIncrement 21278->21280 21279->21280 21282 420dfe type_info::_Type_info_dtor 67 API calls 21279->21282 21301 4262ef 21280->21301 21283 4262d7 21282->21283 21283->21280 21285 4246f9 _LocaleUpdate::_LocaleUpdate 77 API calls 21284->21285 21286 425f41 21285->21286 21287 425f6a 21286->21287 21288 425f4c GetOEMCP 21286->21288 21289 425f6f GetACP 21287->21289 21290 425f5c 21287->21290 21288->21290 21289->21290 21290->21261 21290->21263 21292 425f2d getSystemCP 79 API calls 21291->21292 21293 425fc9 21292->21293 21294 425fd4 setSBCS 21293->21294 21297 426018 IsValidCodePage 21293->21297 21300 42603d _memset __setmbcp_nolock 21293->21300 21295 420def __invoke_watson 5 API calls 21294->21295 21296 42618c 21295->21296 21296->21266 21296->21267 21297->21294 21298 42602a GetCPInfo 21297->21298 21298->21294 21298->21300 21304 425cf6 GetCPInfo 21300->21304 21437 421e43 LeaveCriticalSection 21301->21437 21307 425d2a _memset 21304->21307 21313 425ddc 21304->21313 21314 428760 21307->21314 21309 420def __invoke_watson 5 API calls 21311 425e87 21309->21311 21311->21300 21313->21309 21315 4246f9 _LocaleUpdate::_LocaleUpdate 77 API calls 21314->21315 21316 428773 21315->21316 21324 4285a6 21316->21324 21325 4285f2 21324->21325 21326 4285c7 GetStringTypeW 21324->21326 21328 4285df 21325->21328 21329 4286d9 21325->21329 21327 4285e7 GetLastError 21326->21327 21326->21328 21327->21325 21330 42862b MultiByteToWideChar 21328->21330 21340 4286d3 21328->21340 21352 4295ea GetLocaleInfoA 21329->21352 21331 428658 21330->21331 21330->21340 21333 420def __invoke_watson 5 API calls 21340->21333 21353 42961d 21352->21353 21354 429618 21352->21354 21439 425325 21438->21439 21440 42314f __encode_pointer 6 API calls 21439->21440 21441 42533d 21439->21441 21440->21439 21441->20477 21445 421600 21442->21445 21446 42160c __lseeki64 21445->21446 21453 422c98 21446->21453 21454 421f1d __lock 67 API calls 21453->21454 21455 421611 21454->21455 21456 421515 21455->21456 21457 4231ca __decode_pointer 6 API calls 21456->21457 21458 421529 21457->21458 21459 4231ca __decode_pointer 6 API calls 21458->21459 21460 421539 21459->21460 21461 4215bc 21460->21461 21476 424041 21460->21476 21543 41e60b 21542->21543 21544 41e5ea 21542->21544 21545 420def __invoke_watson 5 API calls 21543->21545 21544->21543 21546 41e5f1 21544->21546 21547 41e61b 21545->21547 21548 420def __invoke_watson 5 API calls 21546->21548 21547->20488 21549 41e604 21548->21549 21549->20488 23056 40b75d 23077 40b240 23056->23077 23057 40b2b8 23058 40b268 23061 40a700 67 API calls 23058->23061 23059 40b2d7 23062 40b810 67 API calls 23059->23062 23060 420edb _malloc 67 API calls 23060->23077 23063 40b288 23061->23063 23064 40b2fa 23062->23064 23065 408d50 67 API calls 23063->23065 23068 40b880 67 API calls 23064->23068 23069 40b2ab 23065->23069 23066 42a355 __CxxThrowException@8 RaiseException 23066->23077 23068->23057 23102 40b880 23069->23102 23072 40b405 23073 40b810 67 API calls 23072->23073 23075 40b434 23073->23075 23074 408dd0 94 API calls 23074->23077 23076 40b880 67 API calls 23075->23076 23076->23057 23077->23057 23077->23058 23077->23059 23077->23060 23077->23066 23077->23072 23077->23074 23078 40c180 73 API calls 23077->23078 23079 40b5d6 23077->23079 23080 40b533 23077->23080 23088 414c20 23077->23088 23093 40bd00 23077->23093 23098 40bf90 23077->23098 23078->23077 23081 40b810 67 API calls 23079->23081 23082 40b810 67 API calls 23080->23082 23083 40b611 23081->23083 23084 40b56e 23082->23084 23085 40b880 67 API calls 23083->23085 23086 40b880 67 API calls 23084->23086 23085->23057 23086->23057 23089 414c50 23088->23089 23090 414cd1 23089->23090 23106 41c1d0 EnterCriticalSection 23089->23106 23090->23077 23091 414cca 23091->23077 23094 420edb _malloc 67 API calls 23093->23094 23095 40bd57 23094->23095 23096 40bd73 23095->23096 23097 42a355 __CxxThrowException@8 RaiseException 23095->23097 23096->23077 23097->23096 23099 40c03e 23098->23099 23101 40bfa1 23098->23101 23099->23077 23101->23099 23109 40bdc0 23101->23109 23103 40b8bf 23102->23103 23104 420dfe type_info::_Type_info_dtor 67 API calls 23103->23104 23105 40b8e3 23104->23105 23105->23057 23107 41c222 23106->23107 23108 41c278 LeaveCriticalSection 23106->23108 23107->23108 23108->23091 23110 40bdf8 23109->23110 23112 407be0 73 API calls 23110->23112 23111 40be2f 23111->23101 23112->23111 23113 40aee0 23124 40af2b 23113->23124 23114 40b119 23160 41c100 EnterCriticalSection 23114->23160 23115 40b129 23117 40b14f 23115->23117 23118 40b12f 23115->23118 23121 420edb _malloc 67 API calls 23117->23121 23120 40b880 67 API calls 23118->23120 23119 40b910 68 API calls 23119->23124 23157 40af56 23120->23157 23122 40b198 23121->23122 23125 42a355 __CxxThrowException@8 RaiseException 23122->23125 23146 40b1b4 23122->23146 23123 420dfe 67 API calls type_info::_Type_info_dtor 23123->23124 23124->23114 23124->23119 23124->23123 23126 4051e0 68 API calls 23124->23126 23127 40ad10 RaiseException 23124->23127 23124->23157 23163 40ae30 23124->23163 23125->23146 23126->23124 23127->23124 23128 40b268 23131 40a700 67 API calls 23128->23131 23129 40b2d7 23132 40b810 67 API calls 23129->23132 23130 420edb _malloc 67 API calls 23130->23146 23133 40b288 23131->23133 23134 40b2fa 23132->23134 23135 408d50 67 API calls 23133->23135 23138 40b880 67 API calls 23134->23138 23139 40b2ab 23135->23139 23136 42a355 __CxxThrowException@8 RaiseException 23136->23146 23137 40bd00 68 API calls 23137->23146 23138->23157 23140 40b880 67 API calls 23139->23140 23140->23157 23141 40bf90 73 API calls 23141->23146 23142 40b405 23143 40b810 67 API calls 23142->23143 23145 40b434 23143->23145 23144 408dd0 94 API calls 23144->23146 23147 40b880 67 API calls 23145->23147 23146->23128 23146->23129 23146->23130 23146->23136 23146->23137 23146->23141 23146->23142 23146->23144 23148 40c180 73 API calls 23146->23148 23149 40b5d6 23146->23149 23150 40b533 23146->23150 23146->23157 23158 414c20 2 API calls 23146->23158 23147->23157 23148->23146 23151 40b810 67 API calls 23149->23151 23152 40b810 67 API calls 23150->23152 23153 40b611 23151->23153 23154 40b56e 23152->23154 23155 40b880 67 API calls 23153->23155 23156 40b880 67 API calls 23154->23156 23155->23157 23156->23157 23158->23146 23161 41c1a6 LeaveCriticalSection 23160->23161 23162 41c156 23160->23162 23161->23115 23162->23161 23164 40aebb 23163->23164 23165 40ae8b 23163->23165 23164->23124 23166 4051e0 68 API calls 23165->23166 23167 40ae93 23166->23167 23167->23164 23168 4051e0 68 API calls 23167->23168 23168->23164 23169 41c6e0 EnterCriticalSection LeaveCriticalSection 23170 41c720 23169->23170 23171 41c72e 23169->23171 23172 41c89b 23171->23172 23173 404e60 68 API calls 23171->23173 23174 408530 VariantClear 23172->23174 23175 41c787 23173->23175 23176 41c8a7 23174->23176 23177 41c791 23175->23177 23178 41c79d 23175->23178 23179 404be0 68 API calls 23177->23179 23180 41c92a 23178->23180 23182 406510 68 API calls 23178->23182 23181 41c79b 23179->23181 23183 420dfe type_info::_Type_info_dtor 67 API calls 23180->23183 23184 404be0 68 API calls 23181->23184 23182->23181 23185 41c934 23183->23185 23198 41c7c3 23184->23198 23186 408530 VariantClear 23185->23186 23187 41c940 23186->23187 23188 420dfe type_info::_Type_info_dtor 67 API calls 23190 41cc5e 23188->23190 23189 41c888 23191 408530 VariantClear 23189->23191 23192 408530 VariantClear 23190->23192 23193 41c840 23191->23193 23195 41cc6a 23192->23195 23197 420dfe type_info::_Type_info_dtor 67 API calls 23193->23197 23194 41c99f 23196 408530 VariantClear 23194->23196 23196->23180 23197->23172 23198->23189 23198->23194 23199 41c847 23198->23199 23200 41c837 23198->23200 23264 41ca5b 23198->23264 23202 41c8b2 23199->23202 23203 41c87f 23199->23203 23201 408530 VariantClear 23200->23201 23201->23193 23205 408530 VariantClear 23202->23205 23204 408530 VariantClear 23203->23204 23204->23189 23206 41c8ce 23205->23206 23207 41c913 23206->23207 23208 41c8e9 23206->23208 23210 41c94e 23207->23210 23212 41c921 23207->23212 23209 408530 VariantClear 23208->23209 23211 41c8f2 23209->23211 23283 405fa0 23210->23283 23213 420dfe type_info::_Type_info_dtor 67 API calls 23211->23213 23215 408530 VariantClear 23212->23215 23216 41c8fc 23213->23216 23215->23180 23218 408530 VariantClear 23216->23218 23221 41c908 23218->23221 23219 41c997 23222 404920 67 API calls 23219->23222 23220 41c9af 23223 404b90 68 API calls 23220->23223 23222->23194 23225 41c9bc 23223->23225 23224 41c9f1 23226 407940 68 API calls 23224->23226 23225->23224 23306 41c5d0 23225->23306 23228 41ca03 23226->23228 23229 41ca65 23228->23229 23230 41ca09 23228->23230 23315 406db0 23229->23315 23231 404be0 68 API calls 23230->23231 23233 41ca17 23231->23233 23235 41ca20 23233->23235 23236 41ca28 23233->23236 23238 406870 71 API calls 23235->23238 23294 406690 CreateFileW 23236->23294 23237 407be0 73 API calls 23239 41ca7a 23237->23239 23241 41ca26 23238->23241 23242 41cb2c 23239->23242 23244 406de0 73 API calls 23239->23244 23243 420dfe type_info::_Type_info_dtor 67 API calls 23241->23243 23247 405340 68 API calls 23242->23247 23267 41cbc0 23242->23267 23245 41ca38 23243->23245 23248 41ca8c 23244->23248 23250 420dfe type_info::_Type_info_dtor 67 API calls 23245->23250 23246 404be0 68 API calls 23251 41cc0c 23246->23251 23252 41cb41 23247->23252 23248->23242 23249 41ca94 23248->23249 23255 404be0 68 API calls 23249->23255 23276 41caac 23249->23276 23253 41ca45 23250->23253 23254 420dfe type_info::_Type_info_dtor 67 API calls 23251->23254 23260 408050 72 API calls 23252->23260 23256 404920 67 API calls 23253->23256 23257 41cc19 23254->23257 23255->23276 23258 41ca52 23256->23258 23259 420dfe type_info::_Type_info_dtor 67 API calls 23257->23259 23261 408530 VariantClear 23258->23261 23262 41cc26 23259->23262 23263 41cb8c 23260->23263 23261->23264 23265 420dfe type_info::_Type_info_dtor 67 API calls 23262->23265 23263->23267 23268 41cb9b 23263->23268 23264->23188 23269 41cc33 23265->23269 23266 420dfe type_info::_Type_info_dtor 67 API calls 23270 41caf2 23266->23270 23267->23246 23271 404be0 68 API calls 23268->23271 23272 404920 67 API calls 23269->23272 23273 420dfe type_info::_Type_info_dtor 67 API calls 23270->23273 23271->23276 23274 41cc40 23272->23274 23275 41caff 23273->23275 23277 408530 VariantClear 23274->23277 23278 420dfe type_info::_Type_info_dtor 67 API calls 23275->23278 23276->23266 23277->23264 23279 41cb0c 23278->23279 23280 404920 67 API calls 23279->23280 23281 41cb19 23280->23281 23282 408530 VariantClear 23281->23282 23282->23180 23284 405fda 23283->23284 23285 404e60 68 API calls 23284->23285 23286 405ff1 23285->23286 23287 405ffc 23286->23287 23288 406052 23286->23288 23292 4049b0 68 API calls 23286->23292 23293 404c30 68 API calls 23286->23293 23290 420dfe type_info::_Type_info_dtor 67 API calls 23287->23290 23289 4049b0 68 API calls 23288->23289 23289->23287 23291 406070 23290->23291 23291->23219 23291->23220 23292->23286 23293->23286 23295 40673c 23294->23295 23296 4066db 23294->23296 23298 406764 23295->23298 23299 406748 SetFileTime FindCloseChangeNotification 23295->23299 23297 404e60 68 API calls 23296->23297 23300 4066f2 23297->23300 23298->23241 23299->23298 23301 407e60 69 API calls 23300->23301 23302 406703 23301->23302 23303 40672e 23302->23303 23304 406717 CreateFileW 23302->23304 23305 420dfe type_info::_Type_info_dtor 67 API calls 23303->23305 23304->23303 23305->23295 23307 404b90 68 API calls 23306->23307 23313 41c605 23307->23313 23308 41c6b0 23310 420dfe type_info::_Type_info_dtor 67 API calls 23308->23310 23309 4060e0 68 API calls 23309->23313 23311 41c6c4 23310->23311 23311->23224 23312 406930 72 API calls 23312->23313 23313->23308 23313->23309 23313->23312 23314 404e60 68 API calls 23313->23314 23314->23313 23316 404e60 68 API calls 23315->23316 23317 406dc5 23316->23317 23317->23237 23318 41cca0 23319 41cda3 23318->23319 23324 41ccb2 23318->23324 23320 41cdb0 SetFileTime 23319->23320 23322 41cdde 23319->23322 23321 41cdd3 FindCloseChangeNotification 23320->23321 23320->23322 23321->23322 23323 41cde6 GetLastError 23321->23323 23325 41ce31 23322->23325 23326 406780 71 API calls 23322->23326 23323->23322 23328 41cdf0 23323->23328 23329 41cd09 23324->23329 23331 41ccd4 23324->23331 23326->23325 23327 404be0 68 API calls 23332 41cd19 23327->23332 23330 404be0 68 API calls 23329->23330 23330->23332 23331->23327 23331->23332 23333 411960 23334 420edb _malloc 67 API calls 23333->23334 23335 411991 23334->23335 23336 4119af 23335->23336 23337 42a355 __CxxThrowException@8 RaiseException 23335->23337 23338 404b90 68 API calls 23336->23338 23337->23336 23340 4119d9 23338->23340 23339 411a26 23340->23339 23341 4051e0 68 API calls 23340->23341 23341->23339 23342 415560 23343 41557a 23342->23343 23344 41556e 23342->23344 23348 415590 23344->23348 23347 420dfe type_info::_Type_info_dtor 67 API calls 23347->23343 23359 415390 23348->23359 23353 415310 VirtualFree 23354 4155e5 23353->23354 23355 415310 VirtualFree 23354->23355 23356 4155f3 23355->23356 23357 415310 VirtualFree 23356->23357 23358 415574 23357->23358 23358->23347 23360 4153d1 23359->23360 23361 4153c3 VirtualFree 23359->23361 23362 415310 23360->23362 23361->23360 23363 415352 23362->23363 23364 415344 VirtualFree 23362->23364 23363->23353 23364->23363 23365 41bbe0 23366 41bbf0 KillTimer 23365->23366 23367 41bc0b 23365->23367 23366->23367 23368 41bc26 KiUserCallbackDispatcher 23366->23368 23371 406250 23367->23371 23370 41bc21 23372 406262 23371->23372 23373 4062ef 23371->23373 23375 406290 23372->23375 23376 40626e 23372->23376 23378 4062be 23372->23378 23374 4063f0 SetEvent 23373->23374 23373->23376 23374->23370 23381 4062b6 23375->23381 23382 406296 GetDesktopWindow SetForegroundWindow 23375->23382 23379 40636c 23376->23379 23380 40631e ShowWindow 23376->23380 23383 406277 23376->23383 23378->23370 23385 406371 ShowWindow 23379->23385 23386 4063b5 23379->23386 23384 406330 PeekMessageW 23380->23384 23381->23370 23382->23370 23383->23370 23384->23384 23388 406342 DialogBoxParamW SetEvent 23384->23388 23387 406380 PeekMessageW 23385->23387 23386->23370 23387->23387 23389 406392 MessageBoxW SetEvent 23387->23389 23388->23379 23389->23386 23390 41bda0 GetDlgItem SendMessageW 23391 40a664 23392 40a678 23391->23392 23393 40a6b7 23392->23393 23397 420dfe type_info::_Type_info_dtor 67 API calls 23392->23397 23398 40a9f0 23392->23398 23394 40a6ec 23393->23394 23396 4211b0 ___sbh_free_block __VEC_memcpy 23393->23396 23396->23394 23397->23392 23399 40aa3a 23398->23399 23400 420dfe type_info::_Type_info_dtor 67 API calls 23399->23400 23401 40aa43 23400->23401 23402 420dfe type_info::_Type_info_dtor 67 API calls 23401->23402 23403 40aa76 23402->23403 23412 40a410 23403->23412 23406 40a2d0 67 API calls 23407 40aaa1 23406->23407 23416 415210 23407->23416 23409 40aaab 23431 40aae0 23409->23431 23413 40a44f 23412->23413 23414 420dfe type_info::_Type_info_dtor 67 API calls 23413->23414 23415 40a473 23414->23415 23415->23406 23417 415251 SetEvent 23416->23417 23418 415262 23416->23418 23417->23418 23419 41525c GetLastError 23417->23419 23420 415272 23418->23420 23421 415269 WaitForSingleObject 23418->23421 23419->23418 23422 415283 CloseHandle 23420->23422 23423 415294 23420->23423 23421->23420 23422->23423 23424 41528a GetLastError 23422->23424 23425 4152ad CloseHandle 23423->23425 23427 4152b8 23423->23427 23424->23423 23426 4152b4 GetLastError 23425->23426 23425->23427 23426->23427 23428 4152ec 23427->23428 23429 4152ce CloseHandle 23427->23429 23428->23409 23429->23428 23430 4152d5 GetLastError 23429->23430 23430->23409 23432 40ab27 23431->23432 23433 420dfe type_info::_Type_info_dtor 67 API calls 23432->23433 23434 40ab30 23433->23434 23435 420dfe type_info::_Type_info_dtor 67 API calls 23434->23435 23436 40ab60 23435->23436 23437 420dfe type_info::_Type_info_dtor 67 API calls 23436->23437 23438 40ab90 23437->23438 23439 420dfe type_info::_Type_info_dtor 67 API calls 23438->23439 23440 40aabc 23439->23440 23440->23392 23441 416364 23442 420dfe type_info::_Type_info_dtor 67 API calls 23441->23442 23443 41636a 23442->23443 23444 4123a9 23445 4123b0 23444->23445 23446 41241e 23445->23446 23449 4051e0 68 API calls 23445->23449 23447 412452 23446->23447 23448 41242d 23446->23448 23467 415c80 23447->23467 23454 413820 23448->23454 23461 4148c0 EnterCriticalSection 23448->23461 23449->23445 23450 412450 23455 413830 ReadFile 23454->23455 23456 41382b 23454->23456 23457 413860 23455->23457 23456->23455 23458 41386a 23457->23458 23459 41386f GetLastError 23457->23459 23458->23450 23460 413879 23459->23460 23460->23450 23466 413890 3 API calls 23461->23466 23462 414914 23463 414938 LeaveCriticalSection 23462->23463 23464 41491a LeaveCriticalSection 23462->23464 23463->23450 23464->23450 23466->23462 23470 415740 23467->23470 23469 415ccf 23469->23450 23471 415776 23470->23471 23472 415c5d 23470->23472 23471->23472 23503 414740 23471->23503 23472->23469 23474 415791 23475 415795 23474->23475 23476 414740 2 API calls 23474->23476 23475->23469 23477 4157bd 23476->23477 23477->23475 23478 414740 2 API calls 23477->23478 23479 4157cf 23478->23479 23479->23475 23480 414740 2 API calls 23479->23480 23481 4157e1 23480->23481 23481->23475 23510 4149d0 23481->23510 23484 4157f8 23484->23475 23517 415410 23484->23517 23485 4147d0 RaiseException 23491 4158e1 23485->23491 23489 415b9f 23490 415bba 23489->23490 23535 414a70 23489->23535 23490->23469 23491->23485 23491->23489 23492 415b7b 23491->23492 23493 414a70 __VEC_memcpy 23491->23493 23494 415c11 23491->23494 23496 415c24 23491->23496 23497 415c37 23491->23497 23500 415c4a 23491->23500 23502 414c20 2 API calls 23491->23502 23521 414b00 23491->23521 23528 415d40 23491->23528 23492->23469 23493->23491 23495 42a355 __CxxThrowException@8 RaiseException 23494->23495 23495->23496 23498 42a355 __CxxThrowException@8 RaiseException 23496->23498 23499 42a355 __CxxThrowException@8 RaiseException 23497->23499 23498->23497 23499->23500 23501 42a355 __CxxThrowException@8 RaiseException 23500->23501 23501->23472 23502->23491 23504 414748 23503->23504 23505 41476f 23504->23505 23508 414759 23504->23508 23509 414761 VirtualFree 23504->23509 23506 41478d VirtualAlloc 23505->23506 23507 41477d 23505->23507 23506->23474 23507->23474 23508->23474 23509->23505 23511 4149d8 23510->23511 23512 4149fe 23511->23512 23513 4149e8 23511->23513 23516 4149f0 VirtualFree 23511->23516 23514 414a0b 23512->23514 23515 414a1a VirtualAlloc 23512->23515 23513->23484 23514->23484 23515->23484 23516->23512 23520 415435 23517->23520 23519 41546a 23519->23491 23520->23519 23539 4147d0 23520->23539 23522 414b21 23521->23522 23524 414b0c 23521->23524 23522->23491 23523 414a70 __VEC_memcpy 23523->23524 23524->23522 23524->23523 23525 414b24 23524->23525 23526 42a355 __CxxThrowException@8 RaiseException 23525->23526 23527 414b37 23526->23527 23527->23491 23529 415d55 23528->23529 23530 415dab 23528->23530 23532 4147d0 RaiseException 23529->23532 23534 415d7d 23529->23534 23531 4147d0 RaiseException 23530->23531 23533 415dd5 23530->23533 23531->23533 23532->23534 23533->23491 23534->23491 23536 414a7e 23535->23536 23537 4211b0 ___sbh_free_block __VEC_memcpy 23536->23537 23538 414a9b 23536->23538 23537->23538 23538->23489 23540 4147d9 23539->23540 23541 4147df 23539->23541 23540->23520 23542 41481b 23541->23542 23543 42a355 __CxxThrowException@8 RaiseException 23541->23543 23542->23520 23543->23542 23544 40a930 23545 40a972 FindCloseChangeNotification 23544->23545 23546 40a97d 23544->23546 23545->23546 23547 40a979 GetLastError 23545->23547 23548 40a990 CloseHandle 23546->23548 23549 40a99b 23546->23549 23547->23546 23548->23549 23550 40a997 GetLastError 23548->23550 23551 40a9b0 CloseHandle 23549->23551 23552 40a9ce 23549->23552 23550->23549 23551->23552 23553 40a9b7 GetLastError 23551->23553 23554 416430 23555 416437 23554->23555 23556 41643f 23554->23556 23561 4024a0 23556->23561 23558 416460 23559 416454 23559->23558 23560 420edb _malloc 67 API calls 23559->23560 23560->23558 23562 40251a 23561->23562 23565 4024b9 23561->23565 23563 420def __invoke_watson 5 API calls 23562->23563 23564 40252b 23563->23564 23564->23559 23566 420def __invoke_watson 5 API calls 23565->23566 23567 402514 23566->23567 23567->23559 23568 41b730 GetDlgItem 23569 41b787 LoadIconW SendMessageW 23568->23569 23570 41b7ae SetTimer SetWindowTextW 23568->23570 23569->23570 23571 41b7d3 PostMessageW 23570->23571 23572 41b7e7 23570->23572 23571->23572 23573 404e60 68 API calls 23572->23573 23574 41b7fe 23573->23574 23575 41af50 69 API calls 23574->23575 23576 41b810 23575->23576 23577 404be0 68 API calls 23576->23577 23578 41b81e 23577->23578 23579 420dfe type_info::_Type_info_dtor 67 API calls 23578->23579 23580 41b82c SetDlgItemTextW 23579->23580 23581 404e60 68 API calls 23580->23581 23582 41b85a 23581->23582 23583 41af50 69 API calls 23582->23583 23584 41b86d 23583->23584 23585 404be0 68 API calls 23584->23585 23586 41b87b 23585->23586 23587 420dfe type_info::_Type_info_dtor 67 API calls 23586->23587 23588 41b88a SetDlgItemTextW SendMessageW SetEvent 23587->23588 23589 41b8c5 GetLastError 23588->23589 23590 41b8cb 23588->23590 23589->23590 23591 41b8d6 GetWindowRect GetWindowRect SystemParametersInfoW 23590->23591 23592 41b9be 23590->23592 23593 41b98a MoveWindow 23591->23593 23594 420dfe type_info::_Type_info_dtor 67 API calls 23592->23594 23593->23592 23595 41b9cc 23594->23595 23597 420dfe type_info::_Type_info_dtor 67 API calls 23595->23597 23598 41b9de 23597->23598 23599 41dbb0 23602 41dae0 23599->23602 23601 41dbba 23603 41db25 23602->23603 23605 41db2b WaitForSingleObject 23602->23605 23604 41d8c0 89 API calls 23603->23604 23604->23605 23607 41db63 PostMessageW 23605->23607 23608 41db88 23605->23608 23607->23601 23608->23601 23618 40fe37 23636 40fca6 23618->23636 23619 40fe94 23621 40a700 67 API calls 23619->23621 23620 411b60 68 API calls 23620->23636 23622 40feab 23621->23622 23624 408d50 67 API calls 23622->23624 23623 40ad10 RaiseException 23623->23636 23625 40fedb 23624->23625 23628 420dfe type_info::_Type_info_dtor 67 API calls 23625->23628 23626 4100b2 23627 40ddc0 RaiseException 23626->23627 23629 4100b7 23627->23629 23631 40ff06 23628->23631 23630 42a355 __CxxThrowException@8 RaiseException 23629->23630 23633 4100cc 23630->23633 23638 420dfe type_info::_Type_info_dtor 67 API calls 23631->23638 23632 420edb 67 API calls _malloc 23632->23636 23635 42a355 __CxxThrowException@8 RaiseException 23633->23635 23634 420dfe 67 API calls type_info::_Type_info_dtor 23634->23636 23637 4100e1 23635->23637 23636->23619 23636->23620 23636->23623 23636->23626 23636->23629 23636->23632 23636->23633 23636->23634 23636->23637 23640 408dd0 94 API calls 23636->23640 23642 4211b0 ___sbh_free_block __VEC_memcpy 23636->23642 23641 40b810 67 API calls 23637->23641 23639 40ff3b 23638->23639 23644 420dfe type_info::_Type_info_dtor 67 API calls 23639->23644 23640->23636 23643 410106 23641->23643 23642->23636 23646 420dfe type_info::_Type_info_dtor 67 API calls 23643->23646 23645 40ff70 23644->23645 23648 420dfe type_info::_Type_info_dtor 67 API calls 23645->23648 23647 410133 23646->23647 23651 420dfe type_info::_Type_info_dtor 67 API calls 23647->23651 23649 40ffb1 23648->23649 23650 40d2f0 67 API calls 23649->23650 23652 40ffde 23650->23652 23653 410168 23651->23653 23654 420dfe type_info::_Type_info_dtor 67 API calls 23652->23654 23655 420dfe type_info::_Type_info_dtor 67 API calls 23653->23655 23656 410010 23654->23656 23657 41019d 23655->23657 23658 420dfe type_info::_Type_info_dtor 67 API calls 23656->23658 23659 420dfe type_info::_Type_info_dtor 67 API calls 23657->23659 23660 41004d 23658->23660 23661 4101de 23659->23661 23664 420dfe type_info::_Type_info_dtor 67 API calls 23660->23664 23662 40d2f0 67 API calls 23661->23662 23663 41020b 23662->23663 23665 420dfe type_info::_Type_info_dtor 67 API calls 23663->23665 23670 410091 23664->23670 23666 41023d 23665->23666 23667 420dfe type_info::_Type_info_dtor 67 API calls 23666->23667 23668 41027b 23667->23668 23669 420dfe type_info::_Type_info_dtor 67 API calls 23668->23669 23669->23670

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 41f2d0-41f302 call 41e5c0 3 41f304-41f34c call 41af50 MessageBoxW call 420dfe call 420def 0->3 4 41f34f-41f399 CoInitialize call 41e6a0 call 426470 GetVersionExW 0->4 13 41f3c1 4->13 14 41f39b-41f3a2 4->14 18 41f3c3 call 41ea60 13->18 19 41f3c8-41f5db call 404e60 * 4 GetCommandLineW call 404b30 call 404850 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 420edb 13->19 16 41f3b5-41f3bd 14->16 17 41f3a4-41f3b3 call 41e9b0 14->17 16->18 22 41f3bf 16->22 17->13 17->16 18->19 95 41f5f2-41f632 call 404b30 call 404e60 call 421951 19->95 96 41f5dd-41f5ed call 42a355 19->96 22->19 104 41f634-41f639 95->104 105 41f63b-41f64b call 421951 95->105 96->95 106 41f67b-41f67d 104->106 115 41f654-41f664 call 421951 105->115 116 41f64d-41f652 105->116 108 41f6a5-41f6ac 106->108 109 41f67f-41f681 106->109 113 41f6d3-41f6e3 call 421951 108->113 114 41f6ae-41f6d1 call 4218b6 call 406510 108->114 111 41f683-41f690 109->111 112 41f692-41f69a 109->112 119 41f69f-41f6a0 call 41e830 111->119 112->119 128 41f6e5-41f6f5 call 421951 113->128 129 41f71f 113->129 114->113 126 41f666-41f676 call 421951 115->126 127 41f678 115->127 116->106 119->108 126->108 126->127 127->106 128->129 138 41f6f7-41f707 call 421951 128->138 130 41f721-41f7d7 call 404e60 call 406490 call 405070 call 404fd0 call 420dfe call 405070 call 404f50 call 420dfe call 404b30 call 404de0 call 405130 129->130 165 41f817 130->165 166 41f7d9-41f815 call 404b30 call 404de0 call 405130 130->166 138->129 144 41f709-41f719 call 421951 138->144 144->129 150 41f71b-41f71d 144->150 150->130 168 41f81c-41f823 165->168 166->165 166->168 169 41f835-41f838 168->169 170 41f825-41f832 call 420dfe 168->170 173 41f84a-41f84d 169->173 174 41f83a-41f847 call 420dfe 169->174 170->169 178 41f862-41f865 173->178 179 41f84f-41f85f call 420dfe 173->179 174->173 183 41f877-41f87c 178->183 184 41f867-41f874 call 420dfe 178->184 179->178 186 41f8b6-41f8ed call 405390 call 41eb70 183->186 187 41f87e-41f8b1 call 404ca0 call 404be0 call 420dfe call 404e00 183->187 184->183 201 41f8f3-41f8f7 186->201 202 41f98e-41f9c1 call 404b30 call 404e60 186->202 187->186 205 41f905-41f98b call 420dfe * 8 call 420def 201->205 206 41f8f9-41f900 call 41e630 201->206 216 41f9c7-41fa09 call 405510 202->216 217 41fddd-41fe10 call 404e60 202->217 206->205 227 41fad0-41fb74 call 404b30 call 405db0 call 420dfe call 404b30 call 405db0 call 420dfe call 404b30 call 405db0 call 420dfe call 405130 216->227 228 41fa0f-41fa13 216->228 224 41fe12-41fe1f call 406f70 217->224 225 41fe26-41fe3b call 407800 217->225 224->225 242 41fe41-41fe45 225->242 243 41ff0a-41ff1e call 420edb 225->243 346 41fb76 227->346 347 41fb7a-41fbaa call 404b30 call 405d40 call 420dfe 227->347 233 41fa20-41facd call 420c70 call 420dfe * 10 call 420def 228->233 234 41fa15-41fa1b call 41e630 228->234 234->233 248 41fe53-41ff07 call 41e550 call 420dfe * 10 call 420def 242->248 249 41fe47-41fe4e call 41e630 242->249 259 41ff20-41ff30 call 42a355 243->259 260 41ff35-41ff66 call 418ec0 243->260 249->248 259->260 288 42003e-4200a3 call 404b90 call 404e60 call 41dbc0 260->288 289 41ff6c-41ff71 260->289 321 42024b-420277 call 420dfe call 41f260 SetCurrentDirectoryW 288->321 322 4200a9-4200ae 288->322 290 41ff73-41ff7a call 41e630 289->290 291 41ff7f-42003b call 41e550 call 420dfe * 10 call 420def 289->291 290->291 365 4202b0-4202b5 321->365 366 420279-4202ab SetCurrentDirectoryW call 420dfe * 2 321->366 328 4200b4-4200b7 322->328 329 42016f-420248 call 420dfe * 2 call 41e550 call 420dfe * 10 call 420def 322->329 335 4200c0-4200eb call 41af50 call 404be0 call 420dfe 328->335 336 4200b9-4200be 328->336 358 4200f5-42010c call 41af50 335->358 336->335 343 4200ed-4200f3 336->343 343->329 343->358 346->347 413 41fbc9-41fbd2 347->413 414 41fbac-41fbc2 call 404be0 347->414 381 420124-420166 call 41e480 MessageBoxW call 41e450 358->381 382 42010e-420122 MessageBoxW 358->382 373 4202bb-4202fd call 404b90 365->373 374 42047c-420481 365->374 366->365 407 4202ff-420308 call 4060e0 373->407 408 42030d-420360 call 404b90 ShellExecuteExW 373->408 385 420587-4205a3 call 404b10 call 4071b0 374->385 386 420487-4204a1 call 406510 call 407c50 374->386 394 420167-42016c call 420dfe 381->394 382->394 434 4205a5-4205db call 404b10 call 4071b0 call 404be0 call 420dfe 385->434 435 4205de-4205f2 call 421951 385->435 386->385 441 4204a7-4204ab 386->441 394->329 407->408 432 420366-42036b 408->432 433 42045d-420477 call 420dfe * 2 408->433 428 41fbd8-41fbdd 413->428 429 41fcaf-41fddb call 404b30 call 405db0 call 404be0 call 420dfe * 2 call 404b30 call 405db0 call 404be0 call 420dfe * 2 call 404b30 call 405db0 call 407940 call 404be0 call 420dfe * 6 call 420c70 413->429 414->413 428->429 440 41fbe3-41fbf6 MessageBoxW 428->440 429->217 442 420379-420457 call 420dfe * 2 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 432->442 443 42036d-420374 call 41e630 432->443 490 4208db-4208e0 433->490 434->435 472 420667-42066c 435->472 473 4205f4-420665 call 404be0 call 4083a0 call 404b30 * 2 call 41b120 call 420dfe * 2 435->473 440->429 449 41fbfc-41fcaa call 420dfe * 3 call 420c70 call 420dfe * 9 440->449 451 4204b9-420581 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 441->451 452 4204ad-4204b4 call 41e630 441->452 442->433 443->442 683 420acc-420aea call 420dfe call 420def 449->683 451->385 452->451 482 420677-4206dc call 404b30 call 404b90 call 41ee70 call 404be0 call 420dfe * 2 472->482 483 42066e-420672 call 4083a0 472->483 473->482 603 4206f7-420878 call 407940 call 404b30 * 3 call 407940 * 5 call 420dfe * 8 CreateProcessW 482->603 604 4206de-4206f2 call 404c30 call 4060e0 482->604 483->482 498 4208e6-420928 WaitForSingleObject GetExitCodeProcess FindCloseChangeNotification call 4065e0 SetCurrentDirectoryW call 420dfe 490->498 499 4209fc-420acb call 4065e0 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 490->499 542 42092d-4209f9 call 420dfe call 41e550 call 420dfe * 10 call 420def 498->542 499->683 747 42087a-42087e 603->747 748 4208ab-4208d7 CloseHandle call 420dfe * 2 603->748 604->603 749 420880-420887 GetLastError call 41af70 747->749 750 42088c-4208a3 call 420dfe * 2 747->750 748->490 749->750 750->748
                                    APIs
                                      • Part of subcall function 0041E5C0: GetVersionExW.KERNEL32 ref: 0041E5E0
                                    • MessageBoxW.USER32(00000000,022B1500,?,00012010), ref: 0041F322
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    • CoInitialize.OLE32(00000000), ref: 0041F350
                                    • _memset.LIBCMT ref: 0041F36E
                                    • GetVersionExW.KERNEL32 ref: 0041F389
                                    • GetCommandLineW.KERNEL32(00000004,00000004,00000004,00000004), ref: 0041F436
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Version$CommandErrorFreeHeapInitializeLastLineMessage___sbh_find_block___sbh_free_block__lock_memset
                                    • String ID: $ $ /m="$"$" /k="$"-k=$"/k=$%%T$%%T\$-k=$/k=$<$@KA$BeginPrompt$D$Directory$ExecuteFile$ExecuteParameters$Progress$RunProgram$Title$mia.lib$setup.exe$y`
                                    • API String ID: 169006075-424830153
                                    • Opcode ID: 175f0996da08e8afa2cb0c4591892a040b1c3996568e1093f4379ad1261dcea9
                                    • Instruction ID: 8ae80e7e1ea0a5da9484d0cc992cac7dbaeb8ea33a9bedbd46246e47c3c2bf24
                                    • Opcode Fuzzy Hash: 175f0996da08e8afa2cb0c4591892a040b1c3996568e1093f4379ad1261dcea9
                                    • Instruction Fuzzy Hash: 09D2E6B06143409BD220EB75E842B9FB3E5AFC4308F40892EF58957252DB78F559CB9B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1232 40aee0-40af29 1233 40af33-40af47 1232->1233 1234 40af2b-40af30 1232->1234 1235 40af52-40af54 1233->1235 1236 40af49-40af4f 1233->1236 1234->1233 1237 40af56-40af5c 1235->1237 1238 40af6d-40af8d 1235->1238 1236->1235 1239 40af66-40af68 1237->1239 1240 40af5e-40af63 1237->1240 1241 40af90-40af92 1238->1241 1242 40b7b2-40b7c6 1239->1242 1240->1239 1243 40af98-40af9a 1241->1243 1244 40b119-40b12d call 41c100 1241->1244 1245 40afa2-40afb4 1243->1245 1246 40af9c-40af9f 1243->1246 1253 40b14f-40b19f call 408ce0 call 420edb 1244->1253 1254 40b12f-40b14a call 40b880 1244->1254 1247 40afb6-40aff3 call 40ae30 call 40b910 call 420dfe 1245->1247 1248 40b00a-40b00e 1245->1248 1246->1245 1268 40aff6-40b008 1247->1268 1250 40b020-40b09e call 40b910 call 420dfe call 40ad10 1248->1250 1251 40b010-40b01a 1248->1251 1256 40b0a1-40b0bd 1250->1256 1251->1250 1251->1256 1276 40b1a1-40b1af call 42a355 1253->1276 1277 40b1b4-40b1f6 1253->1277 1254->1242 1264 40b0c0-40b0ca 1256->1264 1267 40b0d0-40b0dc 1264->1267 1264->1268 1269 40b101-40b117 1267->1269 1270 40b0de-40b0e6 1267->1270 1268->1241 1269->1264 1274 40b0e8-40b0ed 1270->1274 1275 40b0ef-40b0f2 1270->1275 1280 40b0f9-40b0fc call 4051e0 1274->1280 1275->1280 1281 40b0f4 1275->1281 1276->1277 1289 40b202-40b212 1277->1289 1290 40b1f8-40b200 1277->1290 1280->1269 1281->1280 1294 40b214-40b219 1289->1294 1295 40b21c-40b238 1289->1295 1290->1289 1294->1295 1297 40b240-40b266 call 414c20 1295->1297 1299 40b2d2-40b2d5 1297->1299 1300 40b268-40b271 1297->1300 1301 40b321-40b347 call 420edb 1299->1301 1302 40b2d7-40b2e0 1299->1302 1303 40b273-40b278 1300->1303 1304 40b27b-40b291 call 40a700 1300->1304 1312 40b349-40b357 call 42a355 1301->1312 1313 40b35c-40b377 call 40bd00 1301->1313 1306 40b2e2-40b2e7 1302->1306 1307 40b2ea-40b310 call 40b810 call 40b880 1302->1307 1303->1304 1315 40b293-40b298 1304->1315 1316 40b29b-40b2c1 call 408d50 call 40b880 1304->1316 1306->1307 1324 40b312-40b315 1307->1324 1325 40b31a-40b31c 1307->1325 1312->1313 1327 40b381-40b390 1313->1327 1328 40b379-40b37e 1313->1328 1315->1316 1334 40b2c3-40b2c6 1316->1334 1335 40b2cb-40b2cd 1316->1335 1324->1325 1325->1242 1330 40b392-40b39b 1327->1330 1331 40b39e-40b3c0 1327->1331 1328->1327 1330->1331 1332 40b3c2-40b3c8 1331->1332 1333 40b3cd-40b3d2 1331->1333 1332->1333 1336 40b3d4-40b3d9 1333->1336 1337 40b3dc-40b403 call 40bf90 1333->1337 1334->1335 1335->1242 1336->1337 1340 40b405-40b41a 1337->1340 1341 40b45c-40b45f 1337->1341 1348 40b424-40b44a call 40b810 call 40b880 1340->1348 1349 40b41c-40b41f 1340->1349 1342 40b461-40b46d 1341->1342 1343 40b472-40b4ca call 40ad70 1341->1343 1350 40b77f-40b7a2 1342->1350 1351 40b4cc-40b4dc 1343->1351 1352 40b4df-40b50f call 408dd0 1343->1352 1362 40b454-40b457 1348->1362 1363 40b44c-40b451 1348->1363 1349->1348 1350->1242 1350->1297 1351->1352 1356 40b514-40b519 1352->1356 1358 40b5b6-40b5bc 1356->1358 1359 40b51f-40b531 call 40c180 1356->1359 1364 40b5c2-40b5d4 call 40c180 1358->1364 1365 40b659-40b65b 1358->1365 1370 40b533-40b535 1359->1370 1371 40b595-40b597 1359->1371 1362->1242 1363->1362 1372 40b5d6-40b5d8 1364->1372 1383 40b638-40b63a 1364->1383 1367 40b669-40b672 1365->1367 1368 40b65d-40b664 1365->1368 1373 40b674-40b686 call 40c180 1367->1373 1374 40b6ad-40b6b9 1367->1374 1368->1372 1378 40b537-40b53c 1370->1378 1379 40b53f-40b554 1370->1379 1380 40b5a1-40b5b1 1371->1380 1381 40b599-40b59e 1371->1381 1384 40b5e2-40b5f7 1372->1384 1385 40b5da-40b5dd 1372->1385 1373->1372 1393 40b68c-40b68e 1373->1393 1376 40b6c3-40b77a 1374->1376 1377 40b6bb-40b6be 1374->1377 1376->1350 1377->1376 1378->1379 1397 40b556-40b559 1379->1397 1398 40b55e-40b584 call 40b810 call 40b880 1379->1398 1380->1350 1381->1380 1388 40b644-40b654 1383->1388 1389 40b63c-40b641 1383->1389 1395 40b601-40b627 call 40b810 call 40b880 1384->1395 1396 40b5f9-40b5fe 1384->1396 1385->1384 1388->1350 1389->1388 1399 40b690-40b695 1393->1399 1400 40b698-40b6a8 1393->1400 1412 40b631-40b633 1395->1412 1413 40b629-40b62c 1395->1413 1396->1395 1397->1398 1410 40b586-40b58b 1398->1410 1411 40b58e-40b590 1398->1411 1399->1400 1400->1350 1410->1411 1411->1242 1412->1242 1413->1412
                                    APIs
                                      • Part of subcall function 004051E0: __CxxThrowException@8.LIBCMT ref: 00405204
                                      • Part of subcall function 004051E0: __CxxThrowException@8.LIBCMT ref: 0040522E
                                      • Part of subcall function 004051E0: __CxxThrowException@8.LIBCMT ref: 00405258
                                    • _malloc.LIBCMT ref: 0040B193
                                    • __CxxThrowException@8.LIBCMT ref: 0040B1AF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID:
                                    • API String ID: 175252994-0
                                    • Opcode ID: 37256b94bb60d5af6bc0b7cc110bb3124668dd40debc1630c3715b466050bab0
                                    • Instruction ID: a73d485eed2c0f547a0b7567924c6c7deb504bae5797be35f8c618b3fbe3f811
                                    • Opcode Fuzzy Hash: 37256b94bb60d5af6bc0b7cc110bb3124668dd40debc1630c3715b466050bab0
                                    • Instruction Fuzzy Hash: 49625E71600248DFCB10DF68C880A9EBBF5EF89304F24859EE849AB391C779ED45CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(?,6210C9B9,?,?), ref: 00407B10
                                    • FindFirstFileW.KERNELBASE(?,?,6210C9B9,?,?), ref: 00407B2A
                                    • FindFirstFileW.KERNELBASE(?,?), ref: 00407B7E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Find$FileFirst$Close
                                    • String ID:
                                    • API String ID: 2810966245-0
                                    • Opcode ID: e3b150c79052ad27782232c84f3a52fc6a62a57a2177f983f14b6e4624e5d615
                                    • Instruction ID: 560bba3c12bb28fd588b29f65aec3029f033ad3fe931a3478cb76b2749ea814c
                                    • Opcode Fuzzy Hash: e3b150c79052ad27782232c84f3a52fc6a62a57a2177f983f14b6e4624e5d615
                                    • Instruction Fuzzy Hash: E5318F7190C3029FC720DF34D845B5BB7E4EB44724F100B2AE4A5933D1DB38A906CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateInstanceVersion
                                    • String ID:
                                    • API String ID: 1462612201-0
                                    • Opcode ID: 2cdb6139d6d9018f19570d7e36b6b22097f60c5826a9e3d961c17cac6fa76371
                                    • Instruction ID: 51c3d68f6bde5c068a399ea07d0c0e700ec6cb6b10fcc9f3be2698376900635b
                                    • Opcode Fuzzy Hash: 2cdb6139d6d9018f19570d7e36b6b22097f60c5826a9e3d961c17cac6fa76371
                                    • Instruction Fuzzy Hash: DC010C74344201AFD310DB96D885F5B77F9AF88B44F50882DF858C72A0E7B8E8498B56
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetDlgItem.USER32(?,000003E8), ref: 0041B774
                                    • LoadIconW.USER32(00400000,?), ref: 0041B796
                                    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B7A8
                                    • SetTimer.USER32(?,00000003,00000064,00000000), ref: 0041B7B7
                                    • SetWindowTextW.USER32(?,?), ref: 0041B7C8
                                    • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041B7DE
                                    • SetDlgItemTextW.USER32(?,000003E7,?), ref: 0041B83D
                                    • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041B898
                                    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B8AD
                                    • SetEvent.KERNEL32 ref: 0041B8BB
                                    • GetLastError.KERNEL32 ref: 0041B8C5
                                    • GetWindowRect.USER32(?,?), ref: 0041B8F4
                                    • GetWindowRect.USER32(?,?), ref: 0041B911
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041B946
                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041B9B8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Window$ItemMessageText$RectSend$ErrorEventIconInfoLastLoadMoveParametersPostSystemTimer
                                    • String ID:
                                    • API String ID: 4208242464-0
                                    • Opcode ID: 8212f1b92ac8d9662513c723b768a45af60c9ba66733e5d3f47eddca9276ea67
                                    • Instruction ID: 6367b0c4eee05ecfc1dfa8353564df2870d360439f43c4ec88678ed8d53926e9
                                    • Opcode Fuzzy Hash: 8212f1b92ac8d9662513c723b768a45af60c9ba66733e5d3f47eddca9276ea67
                                    • Instruction Fuzzy Hash: 219145B1608344AFD310DF69C884A5BBBE9EB88704F404A2EF999D7391D774D940CBA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 0041EA8C
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0041EAA3
                                    • _memset.LIBCMT ref: 0041EABB
                                    • _wcsrchr.LIBCMT ref: 0041EADE
                                    • RegCreateKeyExW.KERNELBASE ref: 0041EB1F
                                    • RegSetValueExW.KERNELBASE(00000000,IsHostApp,00000000,00000001,00000000,00000002), ref: 0041EB3F
                                    • RegCloseKey.ADVAPI32 ref: 0041EB49
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: _memset$CloseCreateFileModuleNameValue_wcsrchr
                                    • String ID: Applications\$IsHostApp
                                    • API String ID: 1474337858-1667566961
                                    • Opcode ID: 5cec257a012e9a1e1d57e1157371452729b30d6bfd67cdf483cdb0fb9429fb01
                                    • Instruction ID: 4aa4451f33cd243bcb97ec5c147c50c0ddf720af96767f8ac43c9fc97424fe1f
                                    • Opcode Fuzzy Hash: 5cec257a012e9a1e1d57e1157371452729b30d6bfd67cdf483cdb0fb9429fb01
                                    • Instruction Fuzzy Hash: 7121A7B17943007BE224EB61DC4BFAB73E4AF98B04F40491DB385961C1DAB4A544C79B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_00006160,?), ref: 0041D4F4
                                    • ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D535
                                    • DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_00006160,?), ref: 0041D57B
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D590
                                    • SetWindowTextW.USER32(?,?), ref: 0041D5A7
                                    • ShowWindow.USER32(?,00000001), ref: 0041D5C0
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D5CB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Window$DialogObjectParamShowSingleWait$CreateText
                                    • String ID: setup.bmp
                                    • API String ID: 2497262453-2262724209
                                    • Opcode ID: 72b3b40019be3ca3750d4009480d7b4b18c2004af0f88731a6715918442dda41
                                    • Instruction ID: 1d5dabd48a9213cc4ee5c15c04374f547c5cd17aedaa24753aeb20be2184952a
                                    • Opcode Fuzzy Hash: 72b3b40019be3ca3750d4009480d7b4b18c2004af0f88731a6715918442dda41
                                    • Instruction Fuzzy Hash: 2A31F175740305ABC720DF25DC41FDB37A8EB48314F500629FA556B281CA34F806CBA9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00008010), ref: 0041BDE8
                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0041BE15
                                    • SendMessageW.USER32(?,00000172,00000000,?), ref: 0041BE2A
                                    • MoveWindow.USER32(?,00000000,00000000,?,?,00000001), ref: 0041BE4A
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041BE67
                                    • GetWindowLongW.USER32(?,000000F0), ref: 0041BECD
                                    • AdjustWindowRect.USER32(?,00000000), ref: 0041BED9
                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041BEFD
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Window$Move$AdjustErrorFreeHeapImageInfoLastLoadLongMessageObjectParametersRectSendSystem___sbh_find_block___sbh_free_block__lock
                                    • String ID:
                                    • API String ID: 3689589546-0
                                    • Opcode ID: 9d7f9e0890f737e2ba4dd122624acd51a10f9590b6e1cac4c65fd5ed4c9739be
                                    • Instruction ID: 03af98d0d0ffadcbe7ba7a864b7898debb76d72cbabd0c032310ea64956284ab
                                    • Opcode Fuzzy Hash: 9d7f9e0890f737e2ba4dd122624acd51a10f9590b6e1cac4c65fd5ed4c9739be
                                    • Instruction Fuzzy Hash: 8941F8B1604300AFD354CF39DC85F6BBBE9EBC8710F444A2DF98AC6290D671E9458B66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 00421029
                                      • Part of subcall function 00423265: TlsGetValue.KERNEL32(?,0042102E), ref: 0042326E
                                      • Part of subcall function 00423265: __decode_pointer.LIBCMT ref: 00423280
                                      • Part of subcall function 00423265: TlsSetValue.KERNEL32(00000000,0042102E), ref: 0042328F
                                    • ___fls_getvalue@4.LIBCMT ref: 00421034
                                      • Part of subcall function 00423245: TlsGetValue.KERNEL32(?,?,00421039,00000000), ref: 00423253
                                    • ___fls_setvalue@8.LIBCMT ref: 00421047
                                      • Part of subcall function 00423299: __decode_pointer.LIBCMT ref: 004232AA
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00421050
                                    • ExitThread.KERNEL32 ref: 00421057
                                    • GetCurrentThreadId.KERNEL32 ref: 0042105D
                                    • __freefls@4.LIBCMT ref: 0042107D
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00421090
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                    • String ID:
                                    • API String ID: 1925773019-0
                                    • Opcode ID: c00acaf4266d19e5d9d4bfebc160deac36d2b180b2bae20bb46cd11b0c97e720
                                    • Instruction ID: ac458970b274fa377b2d346be178e4a5aabec80b7a813b2af96a27a2eaab62bb
                                    • Opcode Fuzzy Hash: c00acaf4266d19e5d9d4bfebc160deac36d2b180b2bae20bb46cd11b0c97e720
                                    • Instruction Fuzzy Hash: 4101AC70700260EBC714BF62F90990E37B8AF553497A040ABF50587222DB3CD943CA6D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 856 41dbc0-41dd1a call 41e0c0 call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 404be0 * 2 call 420edb 889 41dd1c-41dd2a call 42a355 856->889 890 41dd2f-41dd50 call 41d5e0 856->890 889->890 894 41dd52-41dd57 890->894 895 41dd5a-41dd60 890->895 894->895 896 41dd62-41dd67 895->896 897 41dd6a-41dda6 call 404be0 895->897 896->897 900 41dfbc-41dfc3 897->900 901 41ddac-41ddbd call 41d8c0 897->901 903 41dfc5-41dfd6 call 41d8c0 900->903 904 41dfd8-41dff7 900->904 909 41ddc3-41ddec 901->909 910 41dffe-41e00e 901->910 903->904 903->910 904->910 919 41ded0-41ded7 909->919 920 41ddf2-41de16 call 4083e0 909->920 911 41e051-41e054 910->911 912 41e010-41e025 910->912 916 41e067-41e085 911->916 917 41e056-41e062 call 404be0 911->917 914 41e027-41e028 call 404e60 912->914 915 41e02d-41e034 912->915 914->915 922 41e036-41e045 915->922 918 41e086-41e0b1 call 41e180 916->918 917->916 919->910 925 41dedd-41df0b call 4210a6 919->925 928 41de18-41de3a call 404b30 920->928 922->922 926 41e047-41e04e 922->926 933 41df28-41dfb2 call 404e60 call 41af50 call 404be0 call 420dfe call 41d4d0 call 420dfe FindCloseChangeNotification 925->933 934 41df0d-41df17 GetLastError 925->934 926->911 936 41de57-41de5a 928->936 937 41de3c 928->937 933->910 967 41dfb4-41dfba GetLastError 933->967 938 41df19 934->938 939 41df1e-41df23 934->939 942 41de65-41de79 call 420dfe 936->942 941 41de3f 937->941 938->939 939->918 944 41de41-41de44 941->944 945 41de5c-41de61 941->945 951 41dea0-41dec9 call 408530 942->951 952 41de7b-41de98 call 408530 942->952 948 41de63 944->948 949 41de46-41de55 944->949 945->942 948->942 949->936 949->941 962 41dece 951->962 952->920 959 41de9e 952->959 959->962 962->919 967->910
                                    APIs
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    • _malloc.LIBCMT ref: 0041DD10
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 0041DD2A
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,00000004,?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DFAA
                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DFB4
                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DF0D
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 0041D4D0: CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_00006160,?), ref: 0041D4F4
                                      • Part of subcall function 0041D4D0: ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D535
                                      • Part of subcall function 0041D4D0: DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_00006160,?), ref: 0041D57B
                                      • Part of subcall function 0041D4D0: WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D590
                                      • Part of subcall function 0041D4D0: SetWindowTextW.USER32(?,?), ref: 0041D5A7
                                      • Part of subcall function 0041D4D0: ShowWindow.USER32(?,00000001), ref: 0041D5C0
                                      • Part of subcall function 0041D4D0: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D5CB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorLastWindow$DialogException@8HeapObjectParamShowSingleThrowWait_malloc$AllocateChangeCloseCreateExceptionFindFreeNotificationRaiseText___sbh_find_block___sbh_free_block__lock
                                    • String ID: etup.bmp
                                    • API String ID: 466410089-3436927654
                                    • Opcode ID: 51248fe61525d921019bc7784e8c2f4ce7418bc3d4169d9d94d46c807291a52d
                                    • Instruction ID: 14b6864db79aa0758f53e4780a0cfdcd85dd8687eaec00fb5cd2c2bcdf21938c
                                    • Opcode Fuzzy Hash: 51248fe61525d921019bc7784e8c2f4ce7418bc3d4169d9d94d46c807291a52d
                                    • Instruction Fuzzy Hash: 95D17FB55083808FD320EF65C880B9BB7E5AF98304F14892EF59987351D778E94ACB5B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 969 41eb70-41ebe7 call 429090 call 408050 974 41ec06-41ec10 969->974 975 41ebe9-41ebf6 969->975 978 41ec12-41ec1a 974->978 979 41ec1c-41ec28 974->979 976 41ebf8-41ebf9 CloseHandle 975->976 977 41ebff-41ec01 975->977 976->977 980 41ee3e-41ee65 call 420def 977->980 978->978 978->979 981 41ec2a 979->981 982 41ec3e-41ec4b 979->982 984 41ec30-41ec38 981->984 985 41ec53-41ec6f call 4081c0 982->985 984->984 988 41ec3a 984->988 985->975 990 41ec75-41ec7b 985->990 988->982 991 41ec81-41ec8d 990->991 992 41edef-41edfc 990->992 993 41ec90-41ec9b 991->993 994 41ee33 992->994 995 41eca1-41eca9 993->995 996 41ed2b-41ed2f 993->996 997 41ee35-41ee36 FindCloseChangeNotification 994->997 998 41ee3c 994->998 1000 41ed8d-41edb5 call 4211b0 995->1000 1001 41ecaf-41ecb9 995->1001 999 41ed31-41ed3d 996->999 996->1000 997->998 998->980 1003 41ed54-41ed56 999->1003 1004 41ed3f 999->1004 1014 41edc5-41ede2 1000->1014 1015 41edb7-41edbf 1000->1015 1005 41ecd4-41ecd6 1001->1005 1006 41ecbb 1001->1006 1010 41ed58-41ed5c 1003->1010 1011 41ed7f-41ed88 1003->1011 1008 41ed40-41ed44 1004->1008 1012 41ee21-41ee30 1005->1012 1013 41ecdc-41ece0 1005->1013 1009 41ecc0-41ecc4 1006->1009 1016 41ed46-41ed52 1008->1016 1017 41ed78-41ed7a 1008->1017 1018 41ecc6-41ecd2 1009->1018 1019 41ed08-41ed10 1009->1019 1010->1017 1020 41ed5e-41ed61 1010->1020 1011->993 1012->994 1013->1019 1021 41ece2-41ece5 1013->1021 1025 41ede4-41ede5 CloseHandle 1014->1025 1026 41edeb-41eded 1014->1026 1015->1014 1024 41ec50 1015->1024 1016->1003 1016->1008 1017->993 1018->1005 1018->1009 1022 41ed16-41ed26 call 405e00 1019->1022 1023 41edfe-41ee10 1019->1023 1020->1011 1027 41ed63-41ed69 1020->1027 1021->1012 1028 41eceb-41ecf1 1021->1028 1022->993 1023->977 1030 41ee16-41ee1f CloseHandle 1023->1030 1024->985 1025->1026 1026->980 1027->1017 1031 41ed6b-41ed6e 1027->1031 1028->1019 1032 41ecf3-41ecf6 1028->1032 1030->980 1031->1011 1034 41ed70-41ed76 1031->1034 1032->1012 1035 41ecfc-41ed02 1032->1035 1034->1011 1034->1017 1035->1012 1035->1019
                                    APIs
                                      • Part of subcall function 00408050: CloseHandle.KERNEL32(?,6210C9B9,00000000,?,80000000,00000001,00000000), ref: 0040807D
                                      • Part of subcall function 00408050: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,6210C9B9,00000000,?,80000000,00000001,00000000), ref: 004080B0
                                      • Part of subcall function 00408050: CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040810E
                                    • CloseHandle.KERNEL32(?,?,00001000,?,80000000,00000001,6210C9B9,?,?,?,00000004,00000000,0042D21B,000000FF,0041F8EB,?), ref: 0041EBF9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CloseCreateFileHandle
                                    • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                    • API String ID: 3498533004-372238525
                                    • Opcode ID: afc51a853e801afb9757ed0c4be47186c9cb9a67f59d5721a3fd60e810a4cbc9
                                    • Instruction ID: 951928544ea1403c87551abc08aa41bf64b6ac2c57d2d5833b4dbc2ae828a00e
                                    • Opcode Fuzzy Hash: afc51a853e801afb9757ed0c4be47186c9cb9a67f59d5721a3fd60e810a4cbc9
                                    • Instruction Fuzzy Hash: AD8109795083818BD330CF26D8847EBBBE1AB55314F540A5EE9D587381D739D8C6CB4A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1036 4210a6-4210b8 1037 4210d6-4210ee call 423265 call 423a93 1036->1037 1038 4210ba-4210d4 call 421d28 call 423c64 1036->1038 1047 4210f0-421112 call 423453 call 4232f3 1037->1047 1048 42113a-421144 call 420dfe 1037->1048 1049 421152-421155 1038->1049 1061 421117-42112f CreateThread 1047->1061 1062 421114 1047->1062 1055 421146-42114e call 421d4e 1048->1055 1056 42114f 1048->1056 1055->1056 1057 421151 1056->1057 1057->1049 1061->1057 1063 421131-421137 GetLastError 1061->1063 1062->1061 1063->1048
                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 004210D7
                                    • __calloc_crt.LIBCMT ref: 004210E3
                                    • __getptd.LIBCMT ref: 004210F0
                                    • __initptd.LIBCMT ref: 004210F9
                                    • CreateThread.KERNELBASE(?,?,00421023,00000000,?,?), ref: 00421127
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00421131
                                    • __dosmaperr.LIBCMT ref: 00421149
                                      • Part of subcall function 00421D28: __getptd_noexit.LIBCMT ref: 00421D28
                                      • Part of subcall function 00423C64: __decode_pointer.LIBCMT ref: 00423C6F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit__initptd
                                    • String ID:
                                    • API String ID: 3358092440-0
                                    • Opcode ID: f836f3a5612b81b6d242fef6bf68f0a3a6f628dcc52a2b413912adf7304544da
                                    • Instruction ID: e962943f56dbf5af09c7da81f0f6a5c3264a404381241de3fbf0b3df6231d336
                                    • Opcode Fuzzy Hash: f836f3a5612b81b6d242fef6bf68f0a3a6f628dcc52a2b413912adf7304544da
                                    • Instruction Fuzzy Hash: BA11E672700225EFDB10BFA5FC428AF77A5EF14328B90403FF20597161DB799A518668
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1064 40a930-40a970 1065 40a972-40a977 FindCloseChangeNotification 1064->1065 1066 40a97d 1064->1066 1065->1066 1068 40a979-40a97b GetLastError 1065->1068 1067 40a984-40a98e 1066->1067 1069 40a990-40a995 CloseHandle 1067->1069 1070 40a99b 1067->1070 1068->1067 1069->1070 1071 40a997-40a999 GetLastError 1069->1071 1072 40a9a2-40a9ae 1070->1072 1071->1072 1073 40a9b0-40a9b5 CloseHandle 1072->1073 1074 40a9ce-40a9e6 1072->1074 1073->1074 1075 40a9b7-40a9cb GetLastError 1073->1075
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A973
                                    • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A979
                                    • CloseHandle.KERNEL32(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A991
                                    • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A997
                                    • CloseHandle.KERNEL32(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B1
                                    • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CloseErrorLast$Handle$ChangeFindNotification
                                    • String ID:
                                    • API String ID: 499975219-0
                                    • Opcode ID: 5ca849f9e80f7cf6a4f2ccd92f1cca5e306e245aee22a54abe53d0d2476e70a3
                                    • Instruction ID: b8afac3a52eb0e78b9d4f59a748d0347e24904ef526753f53a3bde94e43bcd0c
                                    • Opcode Fuzzy Hash: 5ca849f9e80f7cf6a4f2ccd92f1cca5e306e245aee22a54abe53d0d2476e70a3
                                    • Instruction Fuzzy Hash: 3D1181F23087418BD320DF29D800B27B7D8EB90B60F110D3EE89593780D73AE414CAAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1076 420dfe-420e0f call 422a14 1079 420e11-420e18 1076->1079 1080 420e86-420e8b call 422a59 1076->1080 1082 420e1a-420e32 call 421f1d call 421f50 1079->1082 1083 420e5d 1079->1083 1093 420e34-420e3c call 421f80 1082->1093 1094 420e3d-420e4d call 420e54 1082->1094 1085 420e5e-420e6e RtlFreeHeap 1083->1085 1085->1080 1087 420e70-420e85 call 421d28 GetLastError call 421ce6 1085->1087 1087->1080 1093->1094 1094->1080 1101 420e4f-420e52 1094->1101 1101->1085
                                    APIs
                                    • __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00421F1D: __mtinitlocknum.LIBCMT ref: 00421F33
                                      • Part of subcall function 00421F1D: __amsg_exit.LIBCMT ref: 00421F3F
                                      • Part of subcall function 00421F1D: EnterCriticalSection.KERNEL32(?,?,?,004234FE,0000000D,00433868,00000008,00421082,?,00000000), ref: 00421F47
                                    • ___sbh_find_block.LIBCMT ref: 00420E27
                                    • ___sbh_free_block.LIBCMT ref: 00420E36
                                    • RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                    • GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 2714421763-0
                                    • Opcode ID: 7e3986139b8b67c31b0f88678f7bfd5cf2d99dd6cd2fd27712303bc26acdf7ba
                                    • Instruction ID: 4a3575ee672623f86528ee1a37db317970acd7e0053c85b255a08892b49a06f0
                                    • Opcode Fuzzy Hash: 7e3986139b8b67c31b0f88678f7bfd5cf2d99dd6cd2fd27712303bc26acdf7ba
                                    • Instruction Fuzzy Hash: E9018471B04331AADB306FB2BD06B5F7AA09F107A5F91091BF114661E2CB7C8981CA9C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1102 41ee70-41ef23 call 404e60 call 4079b0 call 404b90 call 420dfe call 407d60 1113 41f114-41f143 call 404b30 call 420dfe 1102->1113 1114 41ef29 1102->1114 1136 41f145-41f146 FindClose 1113->1136 1137 41f14c 1113->1137 1116 41ef30-41ef52 1114->1116 1118 41ef54 1116->1118 1119 41ef7d-41ef94 1116->1119 1118->1119 1123 41ef56-41ef59 1118->1123 1120 41ef96 1119->1120 1121 41efbf-41efc9 1119->1121 1120->1121 1126 41ef98-41ef9b 1120->1126 1127 41f0ff-41f10e call 407d60 1121->1127 1128 41efcf-41f036 call 407940 call 4079b0 call 420dfe 1121->1128 1124 41ef5b-41ef6a 1123->1124 1125 41ef6e-41ef77 1123->1125 1124->1118 1130 41ef6c 1124->1130 1125->1119 1131 41f19a-41f1cb call 404b90 call 420dfe 1125->1131 1133 41efb0-41efb9 1126->1133 1134 41ef9d-41efac 1126->1134 1127->1113 1127->1116 1156 41f038-41f039 call 404e60 1128->1156 1157 41f03e-41f042 1128->1157 1130->1119 1154 41f1d4-41f1fb call 420dfe 1131->1154 1155 41f1cd-41f1ce FindClose 1131->1155 1133->1121 1133->1131 1134->1120 1140 41efae 1134->1140 1136->1137 1142 41f154-41f173 call 420dfe 1137->1142 1140->1121 1149 41f174-41f197 call 420dfe 1142->1149 1154->1149 1155->1154 1156->1157 1161 41f044-41f053 1157->1161 1161->1161 1163 41f055-41f081 call 41ee70 1161->1163 1166 41f083-41f098 1163->1166 1167 41f0c8-41f0e4 call 420dfe 1163->1167 1168 41f0a2-41f0a8 1166->1168 1169 41f09a-41f09d call 404e60 1166->1169 1174 41f200-41f243 call 404b90 call 420dfe * 2 1167->1174 1175 41f0ea-41f0fc call 420dfe 1167->1175 1173 41f0b0-41f0bf 1168->1173 1169->1168 1173->1173 1176 41f0c1-41f0c4 1173->1176 1185 41f245-41f246 FindClose 1174->1185 1186 41f24c-41f253 1174->1186 1175->1127 1176->1167 1185->1186 1186->1142
                                    APIs
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                      • Part of subcall function 00407D60: FindNextFileW.KERNELBASE(6210C9B9,?,?,00000000), ref: 00407D8D
                                    • FindClose.KERNELBASE(?,?,mia.lib), ref: 0041F146
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Find$CloseErrorException@8FileFreeHeapLastNextThrow___sbh_find_block___sbh_free_block__lock_malloc
                                    • String ID: mia.lib
                                    • API String ID: 2885634111-3926378727
                                    • Opcode ID: 106c9770c868863ecd1b176a45e11baaaa2e39fe68dba10e270c5d4592b9eba8
                                    • Instruction ID: acefb76dbfd321258123378c1413fdf74a6f6d2c8bb5f67a3714b289b7daedea
                                    • Opcode Fuzzy Hash: 106c9770c868863ecd1b176a45e11baaaa2e39fe68dba10e270c5d4592b9eba8
                                    • Instruction Fuzzy Hash: A1B18F755083809FC330DB29C44079BB7E1AF85318F444A2EF9D957391D739A98AC79B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1187 41cca0-41ccac 1188 41cda3-41cdae 1187->1188 1189 41ccb2-41ccb7 1187->1189 1190 41cdb0-41cdd1 SetFileTime 1188->1190 1191 41ce0a-41ce0f 1188->1191 1192 41ccb9-41ccc1 1189->1192 1193 41ccc8-41cccd 1189->1193 1190->1191 1194 41cdd3-41cddc FindCloseChangeNotification 1190->1194 1197 41ce11-41ce19 1191->1197 1198 41ce20-41ce24 1191->1198 1192->1193 1195 41cd22 1193->1195 1196 41cccf-41ccd2 1193->1196 1200 41cde6-41cdee GetLastError 1194->1200 1201 41cdde-41cde4 1194->1201 1199 41cd27-41cd2d call 404be0 1195->1199 1203 41ccf0-41ccf7 1196->1203 1204 41ccd4-41ccd7 1196->1204 1197->1198 1205 41ce31 1198->1205 1206 41ce26-41ce2c call 406780 1198->1206 1212 41cd32-41cd39 1199->1212 1210 41cdf0-41cdf7 1200->1210 1211 41cdfa 1200->1211 1201->1191 1214 41cd09-41cd14 call 404be0 1203->1214 1215 41ccf9-41cd00 1203->1215 1204->1212 1213 41ccd9-41ccdf 1204->1213 1208 41ce33-41ce35 1205->1208 1206->1205 1220 41ce06-41ce08 1211->1220 1221 41cdfc-41ce01 1211->1221 1218 41cd42-41cd49 1212->1218 1219 41cd3b 1212->1219 1222 41cce1-41cce7 1213->1222 1223 41cd19-41cd20 1213->1223 1214->1223 1215->1214 1224 41cd02-41cd07 1215->1224 1225 41cd99-41cda0 1218->1225 1226 41cd4b-41cd52 1218->1226 1219->1218 1220->1191 1220->1208 1221->1220 1222->1223 1227 41cce9-41ccee 1222->1227 1223->1212 1224->1199 1228 41cd65-41cd86 1226->1228 1229 41cd54-41cd60 1226->1229 1227->1199 1228->1225 1231 41cd88-41cd94 1228->1231 1229->1228 1231->1225
                                    APIs
                                    • SetFileTime.KERNELBASE(?,00000000,00000000,?), ref: 0041CDBF
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0041CDD4
                                    • GetLastError.KERNEL32 ref: 0041CDE6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ChangeCloseErrorFileFindLastNotificationTime
                                    • String ID: y`
                                    • API String ID: 3673273941-1467889531
                                    • Opcode ID: c825ca507cc76167d5b05d5c4b29e77f4d476bc3e0454580608a0aaad5d88e34
                                    • Instruction ID: 7b2998dd1cb06f6e771dfa2e92566308564360dd9503c26fc9d92f09fd085f74
                                    • Opcode Fuzzy Hash: c825ca507cc76167d5b05d5c4b29e77f4d476bc3e0454580608a0aaad5d88e34
                                    • Instruction Fuzzy Hash: 50417E756447418BE330CB79DC84BD3BBE5AB88314F184A2ED19A8B390C779E886C759
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1416 40fa80-40fc87 call 40f750 call 408ce0 1421 40fe96-40febc call 40a700 1416->1421 1422 40fc8d-40fc9b 1416->1422 1427 40fec6-410094 call 408d50 call 420dfe * 4 call 40d2f0 call 420dfe * 3 1421->1427 1428 40febe-40fec3 1421->1428 1424 40fca6-40fd02 call 411b60 call 420dfe call 40ad10 1422->1424 1438 4100b2 call 40ddc0 1424->1438 1439 40fd08-40fd0a 1424->1439 1516 410096-4100af 1427->1516 1428->1427 1445 4100b7-4100c7 call 42a355 1438->1445 1439->1438 1441 40fd10-40fd13 1439->1441 1443 40fd15-40fd17 1441->1443 1444 40fd5d-40fd6d call 420edb 1441->1444 1449 40fd49 1443->1449 1450 40fd19-40fd24 call 420edb 1443->1450 1451 4100cc-4100dc call 42a355 1444->1451 1459 40fd73-40fd82 1444->1459 1445->1451 1455 40fd4b-40fd5a call 420dfe 1449->1455 1450->1445 1463 40fd2a-40fd31 1450->1463 1462 4100e1-4102c9 call 40b810 call 420dfe * 4 call 40d2f0 call 420dfe * 3 1451->1462 1455->1444 1465 40fd8b-40fde5 call 408dd0 1459->1465 1462->1516 1463->1455 1466 40fd33-40fd35 1463->1466 1474 40fdea-40fdf3 1465->1474 1470 40fd37 1466->1470 1471 40fd39-40fd47 call 4211b0 1466->1471 1470->1471 1471->1455 1474->1462 1477 40fdf9-40fe00 1474->1477 1480 40fe02-40fe24 1477->1480 1481 40fe2a-40fe33 1477->1481 1480->1438 1480->1481 1484 40fe35 1481->1484 1485 40fe6e-40fe8e 1481->1485 1486 40fe40-40fe65 1484->1486 1485->1424 1494 40fe94 1485->1494 1486->1486 1490 40fe67 1486->1490 1490->1485 1494->1421
                                    APIs
                                      • Part of subcall function 00411B60: _malloc.LIBCMT ref: 00411B86
                                      • Part of subcall function 00411B60: __CxxThrowException@8.LIBCMT ref: 00411BA6
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    • _malloc.LIBCMT ref: 0040FD1A
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • _malloc.LIBCMT ref: 0040FD5F
                                    • __CxxThrowException@8.LIBCMT ref: 004100C7
                                    • __CxxThrowException@8.LIBCMT ref: 004100DC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc$Heap$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock
                                    • String ID:
                                    • API String ID: 692529005-0
                                    • Opcode ID: e6788c5630468db929ac9c789b04f3530ce030de1b07d9ee88f7a53e50e23083
                                    • Instruction ID: d51cafb1edd20d86beab4533d3b2c9328e12bc559a924313115bd2a42a8a9446
                                    • Opcode Fuzzy Hash: e6788c5630468db929ac9c789b04f3530ce030de1b07d9ee88f7a53e50e23083
                                    • Instruction Fuzzy Hash: C732E1B19083809FD330CF6AC480B9BFBE9BF99304F50892EE58987251DB75A549CB57
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bfaaab99611489309fe5c89a1719dda8871662554a4d2a74ab80e3c51eccb09
                                    • Instruction ID: da1b94ef7b8f146f3bbba7bbd3545de285c411d90d7974845ba9398da385a6a1
                                    • Opcode Fuzzy Hash: 8bfaaab99611489309fe5c89a1719dda8871662554a4d2a74ab80e3c51eccb09
                                    • Instruction Fuzzy Hash: FC028075604741CFCB10DF29C48069AB7E1FFC5364F148A5EE89A8B346D738E885CB99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,6210C9B9,00000004,?,?,?), ref: 004066D2
                                    • CreateFileW.KERNEL32(6210C9B9,40000000,00000003,00000000,00000003,02000000,00000000,?,00000000,00000004), ref: 0040672A
                                    • SetFileTime.KERNELBASE(00000000,00000000,00000000,?,?,40000000,00000003,00000000,00000003,02000000,00000000,6210C9B9,00000004,?,?,?), ref: 00406750
                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,6210C9B9,00000004,?,?,?), ref: 0040675C
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 00407E60: GetCurrentDirectoryW.KERNEL32(00000105,6210C9B9), ref: 00407F53
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: File$Create$ChangeCloseCurrentDirectoryException@8FindNotificationThrowTime_malloc
                                    • String ID:
                                    • API String ID: 185400808-0
                                    • Opcode ID: 4019fdf441a4c4eb5f69e1d984c632c07fca8aefb080f6855eb8301330c79c31
                                    • Instruction ID: ac6c79c5a0dc6e211d532a3be32971133362d4db447b27be0444ece16f4d2a22
                                    • Opcode Fuzzy Hash: 4019fdf441a4c4eb5f69e1d984c632c07fca8aefb080f6855eb8301330c79c31
                                    • Instruction Fuzzy Hash: E02125712443207BE2209F25DC45F5B7BDCEB85B64F50062AF654A72C1C778A905CAEA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00420FB8
                                      • Part of subcall function 00423830: __FindPESection.LIBCMT ref: 0042388B
                                    • __getptd_noexit.LIBCMT ref: 00420FC8
                                    • __freeptd.LIBCMT ref: 00420FD2
                                    • ExitThread.KERNEL32 ref: 00420FDB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                    • String ID:
                                    • API String ID: 3182216644-0
                                    • Opcode ID: 80a01ca7609d5c989842f362529a1f62e76a78053e1eadb625ad7ffcc62f00cd
                                    • Instruction ID: e4d375fbbcc4364e754cd5714ee3cf852806fdbcd81a02de693fee1c1a3a24a8
                                    • Opcode Fuzzy Hash: 80a01ca7609d5c989842f362529a1f62e76a78053e1eadb625ad7ffcc62f00cd
                                    • Instruction Fuzzy Hash: 6CD0C2307412A05ADB203B22FE0E61736A84F04306FD11036F401C45E2CEBCC941C91C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DestroyWindow.USER32(?,6210C9B9,?,?,?,?,0042C782,000000FF), ref: 0041D7A6
                                    • DestroyWindow.USER32(?,6210C9B9,?,?,?,?,0042C782,000000FF), ref: 0041D7C3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: DestroyWindow
                                    • String ID: A
                                    • API String ID: 3375834691-2078354741
                                    • Opcode ID: 5586f43cb49ad24856759286fed33058e7b89fb5ff18b7701b6384f671d7b546
                                    • Instruction ID: 7c98b1cd013b058fd397e9c972b29c14f6c4b2c3c95b67cdc02f0fa2510ff33a
                                    • Opcode Fuzzy Hash: 5586f43cb49ad24856759286fed33058e7b89fb5ff18b7701b6384f671d7b546
                                    • Instruction Fuzzy Hash: 3931E2B1A04B408BC720DF79C848B87B7E8AF48314F04490EF59987392D779F844CB99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SysAllocString.OLEAUT32(?), ref: 00408406
                                    • __CxxThrowException@8.LIBCMT ref: 00408429
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AllocException@8StringThrow
                                    • String ID: out of memory
                                    • API String ID: 1617264723-2599737071
                                    • Opcode ID: 13725d636b88ff8fd5f4f3596f44767d9b62ef17f027a52fb81a274580c37290
                                    • Instruction ID: aec7c54f5a2f0369ed48fcd6afc8c6432b74e5c3ee15c3e0c9f0bed6091b2591
                                    • Opcode Fuzzy Hash: 13725d636b88ff8fd5f4f3596f44767d9b62ef17f027a52fb81a274580c37290
                                    • Instruction Fuzzy Hash: 44F03074314B4256D7149F2A9A10617F2E4EF98744F60C43EE8C9C3691FF38D841831E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(?,6210C9B9,00000000,?,80000000,00000001,00000000), ref: 0040807D
                                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,6210C9B9,00000000,?,80000000,00000001,00000000), ref: 004080B0
                                    • CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040810E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateFile$CloseHandle
                                    • String ID:
                                    • API String ID: 1443461169-0
                                    • Opcode ID: 4b125d2712671a8b9b856184b240ac5c30ea288019e4421a8eb221e93ca9e89b
                                    • Instruction ID: eaacea67b0cf3e73bad7505eea8c61148c2237cac8ae426234bba4b99fc82f96
                                    • Opcode Fuzzy Hash: 4b125d2712671a8b9b856184b240ac5c30ea288019e4421a8eb221e93ca9e89b
                                    • Instruction Fuzzy Hash: 44316E716083119BD210DF24CC45B5BBBE8EB84774F104B2DF5A4A72D0D734A905CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,6210C9B9,?,?,?,?,?,0042BEA8,000000FF,0041C57E,?,?), ref: 0041C12C
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042BEA8,000000FF,0041C57E,?,?), ref: 0041C1A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave
                                    • String ID: y`
                                    • API String ID: 3168844106-1467889531
                                    • Opcode ID: 9cbe4fff46b69963bc134ad39493b898461fb08ad28b906b1cb4e27107f027dc
                                    • Instruction ID: 256898e5de4089b529f01b85fbd61eb56f82475c3371ccf47f2285002a5edf27
                                    • Opcode Fuzzy Hash: 9cbe4fff46b69963bc134ad39493b898461fb08ad28b906b1cb4e27107f027dc
                                    • Instruction Fuzzy Hash: 582125B6204B009FC364DF19DA80A6BB3F9FB8C710B514A1EF55A93B10C734B805CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,6210C9B9,?,?,?,?,?,0042BEA8,000000FF,0041C5BF,?,?), ref: 0041C1FC
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,0042BEA8,000000FF,0041C5BF,?,?), ref: 0041C279
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave
                                    • String ID: y`
                                    • API String ID: 3168844106-1467889531
                                    • Opcode ID: 8965e7820ab05e143a14055c6ca1c15ace38de8a3e8155362b1ceca85fd9a237
                                    • Instruction ID: de78da07c04899c8c77929c97aee399886044714f0d20352497b2a5157ff95ff
                                    • Opcode Fuzzy Hash: 8965e7820ab05e143a14055c6ca1c15ace38de8a3e8155362b1ceca85fd9a237
                                    • Instruction Fuzzy Hash: 8F2105BA200B009FD350DF59DAC0A6BB3F9FB88710F544A1DF65A93B50C774B8068BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000,6210C9B9,?,?,00000000,6210C9B9,?,?,?), ref: 00406965
                                    • GetLastError.KERNEL32(?,?), ref: 0040696F
                                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000004,?,?), ref: 004069B5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$ErrorLast
                                    • String ID:
                                    • API String ID: 2485089472-0
                                    • Opcode ID: 09fedd525c91c46e77d549ea5cb71cab928228c9b59ed4ab44ca6ba5e70dc188
                                    • Instruction ID: 07c36081a8cf2dc79f657bfda38f72f695a10e805b8cff717bcdba199a8b3ed4
                                    • Opcode Fuzzy Hash: 09fedd525c91c46e77d549ea5cb71cab928228c9b59ed4ab44ca6ba5e70dc188
                                    • Instruction Fuzzy Hash: D611F3B25083149FC210EF259C81A1BB7D8FB85764F410A3EF595A73C1C739E905CBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNELBASE(?,?,?,?), ref: 004138CC
                                    • GetLastError.KERNEL32 ref: 004138E1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastPointer
                                    • String ID:
                                    • API String ID: 2976181284-0
                                    • Opcode ID: 6c661a8d229cc777c08ed75c1f6bd61d8eaa686054be378eced9a4eb92950332
                                    • Instruction ID: d5bed59300834c27db51d3e3e8804af017eb22c56735c72e24745968a0aac8e0
                                    • Opcode Fuzzy Hash: 6c661a8d229cc777c08ed75c1f6bd61d8eaa686054be378eced9a4eb92950332
                                    • Instruction Fuzzy Hash: CE11E1B661120A8B8310DF2DE8409EB77D8AB85321F10822BFD18C7310D236D95A97F9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,6210C9B9,?,?,?,?,?,0042BEA8,000000FF), ref: 004148EE
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042BEA8,000000FF), ref: 0041491B
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,0042BEA8,000000FF), ref: 00414954
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID:
                                    • API String ID: 2978645861-0
                                    • Opcode ID: 8e528e502c537d0b69e499d11ca13bb5c5ec1de1f9027612ed72021158fe6829
                                    • Instruction ID: 625b76eddf601073e9c329e31110d9aa6d4444885a5d27fa199e2bc448fd388d
                                    • Opcode Fuzzy Hash: 8e528e502c537d0b69e499d11ca13bb5c5ec1de1f9027612ed72021158fe6829
                                    • Instruction Fuzzy Hash: CB1117B6208650AFD300CF59D980F6BB7E8FBC8B20F60452EF615D3350D775A9068BA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetTempFileNameW.KERNELBASE(00000000,mia,00000000,?,00000000,6210C9B9,00407773,6210C9B9,00000004,6210C9B9,00000000,?,?,00000000,?), ref: 0040766E
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8FileNameTempThrow_malloc
                                    • String ID: mia
                                    • API String ID: 739282062-834928705
                                    • Opcode ID: 91ff85b098e991700fcb46d4f0a7d15549d180b965abfbab977b0fb5837ae3f1
                                    • Instruction ID: fab8d13fb08992a67c48349e1e354a0264bd0400b9f99db237117d7352dc61b1
                                    • Opcode Fuzzy Hash: 91ff85b098e991700fcb46d4f0a7d15549d180b965abfbab977b0fb5837ae3f1
                                    • Instruction Fuzzy Hash: 2AF08971A04A115BE760DB2DC801757B3E5EF94710F258C3BE181E32D0E7F8A8D58B59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc
                                    • String ID:
                                    • API String ID: 3476970888-0
                                    • Opcode ID: 40e95080ede214d91f859a98a27c19e464cd825c37e2768df82e68517a21b14b
                                    • Instruction ID: ca0a71d6df97ee7a203ef8ceaf52b13062fa548b68773200f7937252f8f4250c
                                    • Opcode Fuzzy Hash: 40e95080ede214d91f859a98a27c19e464cd825c37e2768df82e68517a21b14b
                                    • Instruction Fuzzy Hash: 9161A2716083048FD724DF29C880B2BB7E5BB89314F040E6EF995A7381D739E8558B9A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                      • Part of subcall function 00407D60: FindNextFileW.KERNELBASE(6210C9B9,?,?,00000000), ref: 00407D8D
                                    • FindClose.KERNELBASE(?), ref: 004070A7
                                    • FindClose.KERNEL32(?), ref: 00407130
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Find$Close$ErrorException@8FileFreeHeapLastNextThrow___sbh_find_block___sbh_free_block__lock_malloc
                                    • String ID:
                                    • API String ID: 2803430302-0
                                    • Opcode ID: 146458d03b0ddfb7acac76936b528f83ff8088b17ca806f1c30c1053e68c23bb
                                    • Instruction ID: cc9cac371736834354910bd5cd1b867e14824cd5f17210572d58679627a67666
                                    • Opcode Fuzzy Hash: 146458d03b0ddfb7acac76936b528f83ff8088b17ca806f1c30c1053e68c23bb
                                    • Instruction Fuzzy Hash: F151A2B15083809BC320DF39D881B5BB7E4BF84314F508A2EF5D997391DA39E8498B57
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFileAttributesW.KERNELBASE(?,00000000,6210C9B9,?,?,00000000,0042B6B8,000000FF,004070B9), ref: 004067B0
                                    • SetFileAttributesW.KERNEL32(6210C9B9,00000000), ref: 0040680B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 5b3868d93b943efae48f880093a7dcf00f7b0866e36bf908cbcae1e608109585
                                    • Instruction ID: 3abfe7707c06ebe879871dbe4fe9751a5188b692b2e6d43a4f0365353a145ddf
                                    • Opcode Fuzzy Hash: 5b3868d93b943efae48f880093a7dcf00f7b0866e36bf908cbcae1e608109585
                                    • Instruction Fuzzy Hash: C62128B25083118FD310EF24AC01B5BB7D4EB85720F440A2FF955933C0D739A909CBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 0041198C
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 004119AA
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: ef25ea0bcd1512a68ba3dd87a71a0f8a8ce9e7d625a653c7ad326eb0292e3784
                                    • Instruction ID: e2d3d0c5bc6528f75844e64501d0e84db827bd379db6147b3cb7c4b05506265c
                                    • Opcode Fuzzy Hash: ef25ea0bcd1512a68ba3dd87a71a0f8a8ce9e7d625a653c7ad326eb0292e3784
                                    • Instruction Fuzzy Hash: 09319175208385CFCB14CF15D480A97BBE1EF89314F04896EED999B392D638EA45CB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041DB58
                                    • PostMessageW.USER32(00000001,00008000,00000000,00000000), ref: 0041DB6E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: MessageObjectPostSingleWait
                                    • String ID:
                                    • API String ID: 1869837590-0
                                    • Opcode ID: 627ec1fdba6808bbe801e4296038a541cf8789fabb4638545bf7f397b6626cea
                                    • Instruction ID: f70689f1fa0990ff4c806b016051adae220c096d235ed575134d8d770105b2d3
                                    • Opcode Fuzzy Hash: 627ec1fdba6808bbe801e4296038a541cf8789fabb4638545bf7f397b6626cea
                                    • Instruction Fuzzy Hash: 2B2190B2A08748AFD720CF59D980B9AF7E8FB59324F10426EE55193780C735BD00CB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00406780: SetFileAttributesW.KERNELBASE(?,00000000,6210C9B9,?,?,00000000,0042B6B8,000000FF,004070B9), ref: 004067B0
                                    • DeleteFileW.KERNELBASE(?,6210C9B9,?,?,?,00000000,6210C9B9,?,00000000), ref: 00406E1F
                                    • DeleteFileW.KERNEL32(?,?,?,00000004,?,?,00000000,6210C9B9,?,00000000), ref: 00406E63
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: File$Delete$Attributes
                                    • String ID:
                                    • API String ID: 890995776-0
                                    • Opcode ID: a4c654311a422871e41f01ebf7195a200fc4afce3709328d9ae48f9f955de1fa
                                    • Instruction ID: da23887d15a8d6a19aae8d093848008d0c976a6323084b2f47239b9cdeb27970
                                    • Opcode Fuzzy Hash: a4c654311a422871e41f01ebf7195a200fc4afce3709328d9ae48f9f955de1fa
                                    • Instruction Fuzzy Hash: 9411D1B25083449BC200EF25DC41A5BB7D8FF85364F410A3EF596673C1D739A80A8BAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RemoveDirectoryW.KERNELBASE(?,6210C9B9,00000000,?,?,00000000,000000FF,004070C5,00000000), ref: 004068A2
                                    • RemoveDirectoryW.KERNELBASE(?,?,?,00000004,?,00000000,000000FF,004070C5,00000000), ref: 004068E6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: DirectoryRemove
                                    • String ID:
                                    • API String ID: 597925465-0
                                    • Opcode ID: 621f523769aaef9b58c8a91ef20634b5231e089e51fc69d7aa2af418621f3536
                                    • Instruction ID: 6976d5837b81d7e19e2d9c0b6484c5b3c993c74492be7e520881c874ba3be3b1
                                    • Opcode Fuzzy Hash: 621f523769aaef9b58c8a91ef20634b5231e089e51fc69d7aa2af418621f3536
                                    • Instruction Fuzzy Hash: C21103B25083049FD200EF259C81A5BB7D8FB85764F540A3EF595673C1C339A91ACBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: ca639b7b2fc2fd054ff0c6da6038be7c35fdfa58db31256aa2283b9134561a5c
                                    • Instruction ID: d774bae47193ae241e059782f28f58bf7092e3c5f54c83e8547326cb30e146d3
                                    • Opcode Fuzzy Hash: ca639b7b2fc2fd054ff0c6da6038be7c35fdfa58db31256aa2283b9134561a5c
                                    • Instruction Fuzzy Hash: F20171B16107019BC720DF69D402627F3E5AFD8700F50883EE59AC3391EA39F565C756
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 004139EE
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00413A18
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID:
                                    • API String ID: 442123175-0
                                    • Opcode ID: a78a2efdd5613b01d2b79f02f39425878d4e99252d466dafbcb7c97e419e4ac0
                                    • Instruction ID: e1ab2209f1384d4f2fa4e66112dcc239a9f12346fb3dde1c493d98484847d039
                                    • Opcode Fuzzy Hash: a78a2efdd5613b01d2b79f02f39425878d4e99252d466dafbcb7c97e419e4ac0
                                    • Instruction Fuzzy Hash: AC016D752043029FD320CF18D840BA777E8AF84741F40892EE485D7290D3B8DD858BAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 0041384D
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0041386F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastRead
                                    • String ID:
                                    • API String ID: 1948546556-0
                                    • Opcode ID: 6407f021dffc35e2c3c1c4773c865c1866bb2cf9022ef79f00685affb8ef31de
                                    • Instruction ID: f641d7c6c31ab4fa61280dfe541440687991b8de954b03818c422660b77a6340
                                    • Opcode Fuzzy Hash: 6407f021dffc35e2c3c1c4773c865c1866bb2cf9022ef79f00685affb8ef31de
                                    • Instruction Fuzzy Hash: 22F044B56142029BE314DF18C844B6B73E4BB84706F50C92EF889CB290D778DA46DB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KillTimer.USER32(?,?), ref: 0041BBF8
                                    • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0041BC2C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherKillTimerUser
                                    • String ID:
                                    • API String ID: 45433635-0
                                    • Opcode ID: d033354e10069cd3944b8f72e8f620b563b4be52a86df29c28ef20a6ecc5271c
                                    • Instruction ID: 3a79594e2e4ba89a1939e98a1d4e93963408e146f71aaaaec97657f73b39a7ed
                                    • Opcode Fuzzy Hash: d033354e10069cd3944b8f72e8f620b563b4be52a86df29c28ef20a6ecc5271c
                                    • Instruction Fuzzy Hash: 46F09A762047009BD324EB19D844FABF7E9EBE4714F00481EF48647280C7B4EC82CBA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 00420FEE
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                      • Part of subcall function 00420FA5: __IsNonwritableInCurrentImage.LIBCMT ref: 00420FB8
                                      • Part of subcall function 00420FA5: __getptd_noexit.LIBCMT ref: 00420FC8
                                      • Part of subcall function 00420FA5: __freeptd.LIBCMT ref: 00420FD2
                                      • Part of subcall function 00420FA5: ExitThread.KERNEL32 ref: 00420FDB
                                    • __XcptFilter.LIBCMT ref: 0042100F
                                      • Part of subcall function 004238EE: __getptd_noexit.LIBCMT ref: 004238F6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadXcpt__amsg_exit__freeptd__getptd
                                    • String ID:
                                    • API String ID: 393088965-0
                                    • Opcode ID: f435e4da68bb4e7e700f978ae033a954263995bd9a67b8f0c0d73825983e7ee8
                                    • Instruction ID: 6b71dbe97c78e0c738289ef996a6cfdb4d609f2d90db79a34b196bfb3e35cf41
                                    • Opcode Fuzzy Hash: f435e4da68bb4e7e700f978ae033a954263995bd9a67b8f0c0d73825983e7ee8
                                    • Instruction Fuzzy Hash: 59E0E6B1A40614AFD718BFA1D906F3D77759F44716F60405EF1016B2A2CA7D9940DA24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDlgItem.USER32(?,000003E8), ref: 0041BDAC
                                    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041BDC2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ItemMessageSend
                                    • String ID:
                                    • API String ID: 3015471070-0
                                    • Opcode ID: 2441c42c4b6f22e1cf8c1fee51e8d6bf5436049b2f025d8a7968970b928ded5b
                                    • Instruction ID: 60cb442689e21d02718789498e37ea817ec3b23390f51a8d278c0a99377a07cd
                                    • Opcode Fuzzy Hash: 2441c42c4b6f22e1cf8c1fee51e8d6bf5436049b2f025d8a7968970b928ded5b
                                    • Instruction Fuzzy Hash: 02D0A771780310A7DA344B64FC4AF8273DCAB0CB01F004A5AF24BDB1C0CAB0A4418B18
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___crtCorExitProcess.LIBCMT ref: 00422C88
                                      • Part of subcall function 00422C55: GetModuleHandleW.KERNEL32(mscoree.dll,?,00422C8D,?,?,00420F14,000000FF,0000001E,?,00423A5F,?,00000001,?,?,00421EA7,00000018), ref: 00422C5F
                                      • Part of subcall function 00422C55: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00422C6F
                                    • ExitProcess.KERNEL32 ref: 00422C91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                    • String ID:
                                    • API String ID: 2427264223-0
                                    • Opcode ID: fc79cb4a7c75e363490d362e0a29c1fa0792ec12669b4d022235d3ed5050525d
                                    • Instruction ID: e8b23ca0be1445246cfa665b12da37794814825febd1767cce8e84558c35c2c0
                                    • Opcode Fuzzy Hash: fc79cb4a7c75e363490d362e0a29c1fa0792ec12669b4d022235d3ed5050525d
                                    • Instruction Fuzzy Hash: 69B04831100108BBAB112B13ED0A8693E2AEA802A0B904025B809091219AB2A9A3AA88
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00415791,6210C9B9), ref: 00414769
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00415791,6210C9B9), ref: 00414797
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 0e4be479701c683b50c260801d2e880a7be25350149d4d5141acb3b6feb9e411
                                    • Instruction ID: 542480b1d8eb3a287b7ca1102c7a40aaead071fd07a36395327ad36d3e90ae7b
                                    • Opcode Fuzzy Hash: 0e4be479701c683b50c260801d2e880a7be25350149d4d5141acb3b6feb9e411
                                    • Instruction Fuzzy Hash: 4CF0F631A4072267EB605F26EC857D6A7986B42760F118436F474DB2C0C774D8D28BD4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,004157F8,6210C9B9), ref: 004149F8
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,004157F8,6210C9B9), ref: 00414A24
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: b942ac331d50b9ed078247248d033226dec88fd113c0506c2f77df4ba4ab23b1
                                    • Instruction ID: 5a3fa2ac8ef23217d4891ebed1f32e095f862d02ae69871e60c5b41101f2b08d
                                    • Opcode Fuzzy Hash: b942ac331d50b9ed078247248d033226dec88fd113c0506c2f77df4ba4ab23b1
                                    • Instruction Fuzzy Hash: 59F090B17513235BEB604F39AC057D767D86B45BA0F110136F891DB2C0D77498D28BA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindNextFileW.KERNELBASE(6210C9B9,?,?,00000000), ref: 00407D8D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: FileFindNext
                                    • String ID:
                                    • API String ID: 2029273394-0
                                    • Opcode ID: d6102d2f79556fb804bc3cdef158af67678b0c0b9c80ec8252fa7e3b88ae394d
                                    • Instruction ID: db1d632e28ba83ce996c61ce977e882cbc98f0db580175ffcd9fbd943c47ada1
                                    • Opcode Fuzzy Hash: d6102d2f79556fb804bc3cdef158af67678b0c0b9c80ec8252fa7e3b88ae394d
                                    • Instruction Fuzzy Hash: A4216D706097409FC724DF25D881A6BB7E0BF88304F40896EE59997381D739F90ACB9A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0041BADF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 9ff0bd8df8b3e03792c25fa20b94eef2b4d4b427d93619a6059a71ce3b869d11
                                    • Instruction ID: 3e7fcfab807292a2e376bda8b89e87e695560b0a2a75ea0193b5ac30183f4faa
                                    • Opcode Fuzzy Hash: 9ff0bd8df8b3e03792c25fa20b94eef2b4d4b427d93619a6059a71ce3b869d11
                                    • Instruction Fuzzy Hash: 8E017C71704726ABCB14AE65C9C0A9EF795FF84790B44852AE20587A40C77AF890C7EC
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 00414B32
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID:
                                    • API String ID: 2005118841-0
                                    • Opcode ID: a8faccb54ebb9ceab76936568196aecc1d1d68a9e48b3df4d26a509061b660e9
                                    • Instruction ID: 8c66ba52448962c8d7c79d11f1aabf96f24d692aa692154038ef1fbb5c3a6cbf
                                    • Opcode Fuzzy Hash: a8faccb54ebb9ceab76936568196aecc1d1d68a9e48b3df4d26a509061b660e9
                                    • Instruction Fuzzy Hash: 3DF03C752042009F8320DB65D851E9BB3E5AFC4751F51C92EE959C7A50E738FC50CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000,00000000,?,00000000,0041EC6D,?,00001000,?,80000000,00000001,6210C9B9,?), ref: 004081FC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 7172b6f68366401be356630bd6221e0c059fe72a1489c2c52d4b235dd23c16c7
                                    • Instruction ID: 344882e4de680020cf4ff848e1b13181e4dbf44253f8dd695d1efe681d569fc8
                                    • Opcode Fuzzy Hash: 7172b6f68366401be356630bd6221e0c059fe72a1489c2c52d4b235dd23c16c7
                                    • Instruction Fuzzy Hash: 6FF090722443065BCB54DE89E980B2BF3E8ABE8310F14443FF184DB280DB75A84AC739
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetShortPathNameW.KERNELBASE(?,?,00000105), ref: 004071DC
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8NamePathShortThrow_malloc
                                    • String ID:
                                    • API String ID: 2966644318-0
                                    • Opcode ID: a34fcc026e5eddb0abd216ec2ac06cbd66b9c2a377ebd18c04affc28681fd9f6
                                    • Instruction ID: bb03d8354c47a3f1518cb96bd69e0356edef982ec88e3c7f4cbd0e2162754a91
                                    • Opcode Fuzzy Hash: a34fcc026e5eddb0abd216ec2ac06cbd66b9c2a377ebd18c04affc28681fd9f6
                                    • Instruction Fuzzy Hash: 70F09071A146104AE324CB6CD805957B3E6EF98710F24843EE086EB3C1F6B4A8D28755
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1037bae27302ff77d988e6066afcceb1518cd850dd9b0d29756ce5bd2e125e86
                                    • Instruction ID: 1e506bf11d9229f6d0cf5c4ad581d819fbbd1b83de968f370b1ea6f3ac2e092d
                                    • Opcode Fuzzy Hash: 1037bae27302ff77d988e6066afcceb1518cd850dd9b0d29756ce5bd2e125e86
                                    • Instruction Fuzzy Hash: 30F09072108211DAD760DB1DA800FCBB3E09BA0320F02882FF5898A250D239DDD1CB9D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,?,00000004,00407731,00000004,6210C9B9,00000000,?,?,00000000,?,?,00000000), ref: 00407609
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8FolderPathThrow_malloc
                                    • String ID:
                                    • API String ID: 2862337592-0
                                    • Opcode ID: ce42f76a6e4a08daa65f762c9b60fd1b6d081efab45241d6b49ae351743e7067
                                    • Instruction ID: 68fae374c04cf999103e7eb2464c69c75c241746d07472e689ce900bf412340b
                                    • Opcode Fuzzy Hash: ce42f76a6e4a08daa65f762c9b60fd1b6d081efab45241d6b49ae351743e7067
                                    • Instruction Fuzzy Hash: 84F082306046105BE7749F28EC42BA733E1EB48710F24487AE586DB2D0D6F468C28759
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00407AC0: FindClose.KERNEL32(?,6210C9B9,?,?), ref: 00407B10
                                      • Part of subcall function 00407AC0: FindFirstFileW.KERNELBASE(?,?,6210C9B9,?,?), ref: 00407B2A
                                      • Part of subcall function 00407AC0: FindFirstFileW.KERNELBASE(?,?), ref: 00407B7E
                                    • FindClose.KERNEL32(FFFFFFFF,?,6210C9B9,00000000,?,?,0042CDA8,000000FF,004185F5,?), ref: 00407C2E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: 6c08d5d5c73984ff19fc94b1beb69e089bece98d3ab973c1c2cb81dc39aa8a1f
                                    • Instruction ID: 82d1cd481473c7c660dfbb2f871a6913d5477604bf1c6d76b04acfc675b75649
                                    • Opcode Fuzzy Hash: 6c08d5d5c73984ff19fc94b1beb69e089bece98d3ab973c1c2cb81dc39aa8a1f
                                    • Instruction Fuzzy Hash: 49F012B5648640AFD314CF14C885B5BB7E4EB55730F508B2EF865837D0D738A5058A55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: _malloc
                                    • String ID:
                                    • API String ID: 1579825452-0
                                    • Opcode ID: 58483f906696b6ac3209093b8a20b46d522fc4fe5e9056bc24cbee1589159d37
                                    • Instruction ID: 6f280a188e360d4d97a7a4235c3c97e8fe715452bcfdc8feba48839c7927b4f3
                                    • Opcode Fuzzy Hash: 58483f906696b6ac3209093b8a20b46d522fc4fe5e9056bc24cbee1589159d37
                                    • Instruction Fuzzy Hash: F1E0EDB070070187EB30CA75A841B9373DABF40304F55892ED89EC7219EB38F884C61A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00421D86
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateHeap
                                    • String ID:
                                    • API String ID: 10892065-0
                                    • Opcode ID: 0cda041672ff756b0c41609eb62c40a4d8100e3eb3300feebbfe4dd53f538022
                                    • Instruction ID: 474048e3887c1b198e73afb4c75b232851880925ce40373f535b8a9ed00aa635
                                    • Opcode Fuzzy Hash: 0cda041672ff756b0c41609eb62c40a4d8100e3eb3300feebbfe4dd53f538022
                                    • Instruction Fuzzy Hash: 92D05E32A60345AEDB105F71BC087727BDC9384395F444436B91DC61D0E674D9518608
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _doexit.LIBCMT ref: 00422EA8
                                      • Part of subcall function 00422D70: __lock.LIBCMT ref: 00422D7E
                                      • Part of subcall function 00422D70: __decode_pointer.LIBCMT ref: 00422DB5
                                      • Part of subcall function 00422D70: __decode_pointer.LIBCMT ref: 00422DCA
                                      • Part of subcall function 00422D70: __decode_pointer.LIBCMT ref: 00422DF4
                                      • Part of subcall function 00422D70: __decode_pointer.LIBCMT ref: 00422E0A
                                      • Part of subcall function 00422D70: __decode_pointer.LIBCMT ref: 00422E17
                                      • Part of subcall function 00422D70: __initterm.LIBCMT ref: 00422E46
                                      • Part of subcall function 00422D70: __initterm.LIBCMT ref: 00422E56
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __decode_pointer$__initterm$__lock_doexit
                                    • String ID:
                                    • API String ID: 1597249276-0
                                    • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                    • Instruction ID: 5f6728dbdd02ca0f82008ea286e92dcf27527213ebec36ad61b6cbe6c0ff3923
                                    • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                    • Instruction Fuzzy Hash: 7BB0123268030C33DA212543FC03F063F0D87C1B68FA40061FA0C1D1E2A9E7B96180CD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: _malloc
                                    • String ID:
                                    • API String ID: 1579825452-0
                                    • Opcode ID: 9745679567038125a86f7f9b362c0e0dc38fd11c17bcbc025e12de3b0b86a31c
                                    • Instruction ID: b6e4ae063e169a73b64fe1504f4d741089b249f3922f98b11971f443ccffe2ea
                                    • Opcode Fuzzy Hash: 9745679567038125a86f7f9b362c0e0dc38fd11c17bcbc025e12de3b0b86a31c
                                    • Instruction Fuzzy Hash: 62B012FAB0462152E560F521A881D57B2DC7BB0788B85882BB484D1211F228F4ACC22A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,6210C9B9,?,?,0042B74B,000000FF), ref: 0041534C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 64b23c1747a59f00b3a7cb71c49a0bb61e7895e5ecc26e207c38e6798bb42fa8
                                    • Instruction ID: 45228e7dd2016b5ef2fd0bc3b159d9bd00e66ae215068ebcedc432afdcfb51ae
                                    • Opcode Fuzzy Hash: 64b23c1747a59f00b3a7cb71c49a0bb61e7895e5ecc26e207c38e6798bb42fa8
                                    • Instruction Fuzzy Hash: 13F0F675604B419BD320CF15C840B57B7E8FB88760F148A29E5A6877E0D779E844CA95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,6210C9B9,?,?,0042B71B,000000FF), ref: 004153CB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 9e23df7032f1c1c763019a4865475cb3fd46ef146c702e0662e34135316dac18
                                    • Instruction ID: 20b1c5693166b8bca95178b271d56a26094c7afef8293269c8dfa1a5887baf42
                                    • Opcode Fuzzy Hash: 9e23df7032f1c1c763019a4865475cb3fd46ef146c702e0662e34135316dac18
                                    • Instruction Fuzzy Hash: 58F01975604B419FD320CF18D840B57B7E8FB88B60F104A29E9A5877D0D779E844CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID:
                                    • API String ID: 1452528299-0
                                    • Opcode ID: 91e7c122242a59b9ccdf0bc7cab8ba7e8ce12b952b763bfd60d325ca9c1f4047
                                    • Instruction ID: 0420e787cb9a86eed4a7b4d6ef3617ecd3e0c8e4f838007923f70c7bb3aee507
                                    • Opcode Fuzzy Hash: 91e7c122242a59b9ccdf0bc7cab8ba7e8ce12b952b763bfd60d325ca9c1f4047
                                    • Instruction Fuzzy Hash: FBE0C2B13142016BF3259B748C46FA7339C9B90704F20403FB106CE2C0EBA5D950823D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: _malloc$Exception@8Throw$CriticalDeleteSection
                                    • String ID: @KA$@KA
                                    • API String ID: 4184010672-2499244848
                                    • Opcode ID: 2173faeb293dca02ee19f3e9e51af43ddb57dbe41030808bd3abe99407723cfe
                                    • Instruction ID: 101a39299099d8b7fbc73b7120cb9860c9e9d9b4841921f6e0cd10bc3771a624
                                    • Opcode Fuzzy Hash: 2173faeb293dca02ee19f3e9e51af43ddb57dbe41030808bd3abe99407723cfe
                                    • Instruction Fuzzy Hash: B0C25A716083818FC320DF69C480B9BBBE4BFC9304F14896EE58997392DB75A945CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 00405ED0: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,?,?,00000000,?,004055CC,?,00000000), ref: 00405EF6
                                      • Part of subcall function 00405ED0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,00000000,?,00000000,?,004055CC,?,00000000), ref: 00405F25
                                    • _malloc.LIBCMT ref: 0040563F
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • _malloc.LIBCMT ref: 00405711
                                    • _malloc.LIBCMT ref: 004057B0
                                    • _malloc.LIBCMT ref: 0040584F
                                    • _malloc.LIBCMT ref: 004058EF
                                    • _malloc.LIBCMT ref: 0040598F
                                    • _malloc.LIBCMT ref: 00405A2D
                                    • _malloc.LIBCMT ref: 00405AD2
                                    • __CxxThrowException@8.LIBCMT ref: 00405BF8
                                    • __CxxThrowException@8.LIBCMT ref: 00405C48
                                    • __CxxThrowException@8.LIBCMT ref: 00405C5D
                                    • __CxxThrowException@8.LIBCMT ref: 00405C72
                                    • __CxxThrowException@8.LIBCMT ref: 00405C87
                                    • __CxxThrowException@8.LIBCMT ref: 00405C9C
                                    • __CxxThrowException@8.LIBCMT ref: 00405CB1
                                    • __CxxThrowException@8.LIBCMT ref: 00405CC6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc$ByteCharMultiWide$AllocateHeap
                                    • String ID:
                                    • API String ID: 3927172719-0
                                    • Opcode ID: 46391849c57e93a8729d2033434e9fb67e9fe17df0031d36261b6a635283fe9f
                                    • Instruction ID: 94e795bf1a0c9910044c3c2dd5c4af4e6959a853943c1580eb38ed7d93358e0f
                                    • Opcode Fuzzy Hash: 46391849c57e93a8729d2033434e9fb67e9fe17df0031d36261b6a635283fe9f
                                    • Instruction Fuzzy Hash: FD222871608B908FC7219F39858466BBBD5EF95304F484A2EF8C5A7382D27CE905CF96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 00412B41
                                    • __CxxThrowException@8.LIBCMT ref: 00412B58
                                      • Part of subcall function 0040A790: _malloc.LIBCMT ref: 0040A7B8
                                      • Part of subcall function 0040A790: __CxxThrowException@8.LIBCMT ref: 0040A7D6
                                    • __CxxThrowException@8.LIBCMT ref: 00412BD6
                                    • __CxxThrowException@8.LIBCMT ref: 00412C3F
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    • SetEvent.KERNEL32(?,00000000,?,?,?,?,?,?,?,00433B9C), ref: 00412CDB
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 00412CE1
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,00433B9C), ref: 00412D24
                                      • Part of subcall function 00415180: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 00415195
                                      • Part of subcall function 00415180: GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 0041519E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ErrorEventLast$CreateExceptionObjectRaiseSingleWait_malloc
                                    • String ID:
                                    • API String ID: 2637030848-0
                                    • Opcode ID: 4d39b91e3f8c64d9e1cd22e97cb076a47efb473c21de60c66e173e9c86d92202
                                    • Instruction ID: 0a967a9db4ba4e0fb76a007f6e616d88927016828e0849af8afb68f1a4c9ab52
                                    • Opcode Fuzzy Hash: 4d39b91e3f8c64d9e1cd22e97cb076a47efb473c21de60c66e173e9c86d92202
                                    • Instruction Fuzzy Hash: B8028F746047029FC764DF28C580AAAB3E1FF88304F248A1EE595C7351D774F8A6CB99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 00421C9B
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421CB0
                                    • UnhandledExceptionFilter.KERNEL32(0042E368), ref: 00421CBB
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421CD7
                                    • TerminateProcess.KERNEL32(00000000), ref: 00421CDE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: 6dce4c989cf31f9a2636c4ce92163af802b09ed08417ef6bccfbb8f4d1c3d290
                                    • Instruction ID: e4562c502b537d5cccca84f566efa76d5afb76e5238d3ce5c2676c7199ec694f
                                    • Opcode Fuzzy Hash: 6dce4c989cf31f9a2636c4ce92163af802b09ed08417ef6bccfbb8f4d1c3d290
                                    • Instruction Fuzzy Hash: 9C21BAB9A04200AFDB10DF6AF8496953BF0BB0C710F80607AEA09873A1E7B45D91CF0D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 0040E641
                                    • __CxxThrowException@8.LIBCMT ref: 0040E784
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 1621474382-3916222277
                                    • Opcode ID: 48082f854bff1add32f48e4266824b0ab221c14decb41c0ecf9b5038d6d03464
                                    • Instruction ID: 4905a2555361d4b40396e2ad8604d136661ad17ace758740d79296136a4cd9e7
                                    • Opcode Fuzzy Hash: 48082f854bff1add32f48e4266824b0ab221c14decb41c0ecf9b5038d6d03464
                                    • Instruction Fuzzy Hash: B5E191716043018FC714DF2AC48052BB7E5EF89328F548D3FE895A7391DA39E865CB8A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b24e76e97f088ff2340df07ce6d8eaf1190ca0a9df6fc331afb225c23a03e0c0
                                    • Instruction ID: 6ec0d9b20c51930400a28b2cf4c630a1cacc779d3f08c7b5f658bb3cc2d65df3
                                    • Opcode Fuzzy Hash: b24e76e97f088ff2340df07ce6d8eaf1190ca0a9df6fc331afb225c23a03e0c0
                                    • Instruction Fuzzy Hash: 74511A31B106204AF30CCF769C842A67BD3DBC9386B44D63DE295DA6D8DABDC017C698
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c170e2161206dc0ced38249dd021522e111bee97a1422566ba6a8047c7c9086
                                    • Instruction ID: 8fa4896d0c32512dfa3da576777b2c050686be6e2d8f2528dbc2fa637e1ff780
                                    • Opcode Fuzzy Hash: 2c170e2161206dc0ced38249dd021522e111bee97a1422566ba6a8047c7c9086
                                    • Instruction Fuzzy Hash: BB510731B106200AF308CF369C842A67BD3DBC9386B44D23DD695DA6E8DABDC017C698
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00024903), ref: 0042494A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 24524984a58f72cb7fe12606cdfcc85d318e1795a0ded427764ce3f430ceae39
                                    • Instruction ID: 02c8abee07370e7cb003beee7d17bd52556d1210545f2270e595cfdec49312d0
                                    • Opcode Fuzzy Hash: 24524984a58f72cb7fe12606cdfcc85d318e1795a0ded427764ce3f430ceae39
                                    • Instruction Fuzzy Hash: F69002B03551154A662017716D4A71A29909AA86027D114716205C415CDAA44052551F
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02f1eac608253b4fa400cd88ccec21fbfb64af6ca787b348a66882f4047c332a
                                    • Instruction ID: 01a91eeea2aff737d0b365e6c57a033e2f99f4b8156a15c0193d14d1a608853e
                                    • Opcode Fuzzy Hash: 02f1eac608253b4fa400cd88ccec21fbfb64af6ca787b348a66882f4047c332a
                                    • Instruction Fuzzy Hash: 1D9228B1508381CFC734DF59C480A9BBBE1BF89304F14892EE59A97351D7B8A885CF96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID:
                                    • API String ID: 2005118841-0
                                    • Opcode ID: 58cd1e4bd61910ee9209f8ab130cbb053367805de08f4fd01a039497d7822f7e
                                    • Instruction ID: e349e95833274217d244d427187e591f8dca3494776eda759b979b6953068a50
                                    • Opcode Fuzzy Hash: 58cd1e4bd61910ee9209f8ab130cbb053367805de08f4fd01a039497d7822f7e
                                    • Instruction Fuzzy Hash: 0C223774504341DFC724DF15C480A6AB7E1FB88314F14897EE899AB792DB39EC4ACB86
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                                    • Instruction ID: c2d97246fd2aafeb022947b6bb86a1446f9da4e42c3c7867536164bb694cac53
                                    • Opcode Fuzzy Hash: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                                    • Instruction Fuzzy Hash: 80024C72A042114BD708CE18C580279BFE6FBC5346F114A3FE496A77C4D778DA88CB99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 375dd9bf2b93ec9fd52bb82df78b016270cadd8972f0c5003f6c71272566d0b8
                                    • Instruction ID: e10f0c9767169ad6ca306e4759b4dee7f78dd904dd151e380c46861b78301315
                                    • Opcode Fuzzy Hash: 375dd9bf2b93ec9fd52bb82df78b016270cadd8972f0c5003f6c71272566d0b8
                                    • Instruction Fuzzy Hash: 1CE133B09083808FD764DF68C480B6BBBE1FF89304F51492EE999A7391D774A849CF46
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0a52f6b36d15c3f10d6125d052433a857e5dbc77148c06f91a25cd1f24f5737b
                                    • Instruction ID: 1e9a4df9b44ad6f4c50e22b14f2fef7b674a283b03798b1cf1174821231ddd43
                                    • Opcode Fuzzy Hash: 0a52f6b36d15c3f10d6125d052433a857e5dbc77148c06f91a25cd1f24f5737b
                                    • Instruction Fuzzy Hash: 4BD1BD728446A64FE318DF5DDC80235B772EF88310F6A457DC7981B3A2CA34BA21DB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7e26577fba095136f5744b22ad2f39cb0c53c06d26df2648a4839c972093248a
                                    • Instruction ID: a133422d40a656bc7bcaeb9e216c34e50bde69e37971f087a7cef11d5dbccbab
                                    • Opcode Fuzzy Hash: 7e26577fba095136f5744b22ad2f39cb0c53c06d26df2648a4839c972093248a
                                    • Instruction Fuzzy Hash: 8AD1CC328546A64FE318DF59DC9033577A3EFC8350F2E0279CB950B692CB38A611DB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                                    • Instruction ID: 57494768f0b92b70c1e5fb60671f8c0904b92fa69cceb7a89f96e62002fbccdf
                                    • Opcode Fuzzy Hash: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                                    • Instruction Fuzzy Hash: 7E61F4112197D29FD311CE3D488026CFFE1EFA71047588B6ED8D287B86C668E56AC7E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd3729e50029bc6c3d4b5788440f5fe005dccf0ff45094f581cd922932bb4b71
                                    • Instruction ID: bfe1c4857090628bc31f33145390d4079553c539c8f45b3f89973d2b226e20e8
                                    • Opcode Fuzzy Hash: dd3729e50029bc6c3d4b5788440f5fe005dccf0ff45094f581cd922932bb4b71
                                    • Instruction Fuzzy Hash: B6613A725087118FC318DF49D48494AF3E1FFC8318F1A8A6DEA885B361D771E959CB86
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 51fc0aad63f55b9cb06e14c9a54f79600626f447b6889b17ae8838990c2708ce
                                    • Instruction ID: 40e91ebcbfae1216bfcaa19984515f511dc88b32e75e61ccbef25afa7c8177b3
                                    • Opcode Fuzzy Hash: 51fc0aad63f55b9cb06e14c9a54f79600626f447b6889b17ae8838990c2708ce
                                    • Instruction Fuzzy Hash: FB317F71A0437607E3249E2E8C80126FBE39FD1301F19C27EE69C8B75AD839954A8254
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d56deecd46ef8ef1f69f9754baeca6b831613f74d6383f3ce14ec95c9c5be60
                                    • Instruction ID: c5ec1d2ed9afae8cad4480c0fdb6b25e0a32306f29324575231a0c6ad83db5c9
                                    • Opcode Fuzzy Hash: 6d56deecd46ef8ef1f69f9754baeca6b831613f74d6383f3ce14ec95c9c5be60
                                    • Instruction Fuzzy Hash: 81110A3E370D0607E71C8769AD73AB921C1E384309B88A13DF68BC96D1EE6D9894C20D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                                    • Instruction ID: 745e0ab5a1f4135cb869288e75bb92ef0094498d29e0feb23aae1f7a6adb8ed7
                                    • Opcode Fuzzy Hash: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                                    • Instruction Fuzzy Hash: 0111CE37A54A270BD324A96CDC80B777392EB8A354F1A4271DF449F392D538A94282E8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,6210C9B9,?,?,?,?,?,?,0042C340,000000FF), ref: 0041D255
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041D28C
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D29E
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041D2A8
                                    • PostMessageW.USER32(?,?,?,?), ref: 0041D2C3
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D2CF
                                    • CloseHandle.KERNEL32(?), ref: 0041D2D5
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041D2EE
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041D317
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeaveObjectSingleWait$CloseCreateEventHandleMessagePost
                                    • String ID: y`
                                    • API String ID: 3292403733-1467889531
                                    • Opcode ID: b9247c5f70dafe7bfc19e6b92135a0c60dfd878217866a3eae6bc9666be4be80
                                    • Instruction ID: ad018f8797b644248f86de4a6b73993a128294163a90829cbb7abac7b6748e62
                                    • Opcode Fuzzy Hash: b9247c5f70dafe7bfc19e6b92135a0c60dfd878217866a3eae6bc9666be4be80
                                    • Instruction Fuzzy Hash: FA3117B16047409FD320CB69CC84B67B7E8BB89724F104A1DE5A993790CB74A8068B69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDesktopWindow.USER32 ref: 004062A1
                                    • SetForegroundWindow.USER32(00000000), ref: 004062A8
                                    • ShowWindow.USER32(?,00000005), ref: 00406324
                                    • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 0040633C
                                    • DialogBoxParamW.USER32(00400000,?,?,Function_00006160,?), ref: 00406359
                                    • SetEvent.KERNEL32(?), ref: 00406366
                                    • ShowWindow.USER32(?,00000005), ref: 00406377
                                    • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 0040638C
                                    • MessageBoxW.USER32(?,?,?,?), ref: 004063A2
                                    • SetEvent.KERNEL32(?), ref: 004063AF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Window$Message$EventPeekShow$DesktopDialogForegroundParam
                                    • String ID:
                                    • API String ID: 1049595212-0
                                    • Opcode ID: b861efee7c899d3e4e1076c67bf2fbbf407496ad3a32fa7bdceb73dce1f1e3b2
                                    • Instruction ID: 5797e6bae45bfa39f825304b1f8ed8a4465e7a28c84138b089b3a73a73e676b4
                                    • Opcode Fuzzy Hash: b861efee7c899d3e4e1076c67bf2fbbf407496ad3a32fa7bdceb73dce1f1e3b2
                                    • Instruction Fuzzy Hash: EA517D763002019FD224DF59E888F6BB3A9EBD8711F11852EF64687391C631EC56CBB8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,6210C9B9,?,?,?,00000000,?,?,0042C7C9,000000FF,0041D69D,?,00000004), ref: 0041D142
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000), ref: 0041D152
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000), ref: 0041D15C
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 004047C0: InitializeCriticalSection.KERNEL32(?,6210C9B9), ref: 004047FE
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9), ref: 0041D1DF
                                    • GetLastError.KERNEL32(?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000,0042CB29), ref: 0041D1E8
                                    • __CxxThrowException@8.LIBCMT ref: 0041D200
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Strings
                                    • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041D14A
                                    • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041D154
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CreateEventException@8MessageRegisterThrowWindow$CriticalErrorExceptionInitializeLastRaiseSection_malloc
                                    • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                                    • API String ID: 2475960406-1515309323
                                    • Opcode ID: 8c3c6d63b363685cc27f5696b87a2b9263a8d1f6cc3ee763bcd4ecdd4307727f
                                    • Instruction ID: e389b8cf96f7ef14453b2a34cd2d1995612044cb35cd3128fd44df0df899afb7
                                    • Opcode Fuzzy Hash: 8c3c6d63b363685cc27f5696b87a2b9263a8d1f6cc3ee763bcd4ecdd4307727f
                                    • Instruction Fuzzy Hash: 173170B1604B86AFD314CF29C881B86FFE8FB19354F54462EE16883641C774B554CF99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetEvent.KERNEL32(?,6210C9B9,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 00415252
                                    • GetLastError.KERNEL32 ref: 0041525C
                                    • WaitForSingleObject.KERNEL32(?,000000FF,6210C9B9,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 0041526C
                                    • CloseHandle.KERNEL32(?,6210C9B9,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 00415284
                                    • GetLastError.KERNEL32 ref: 00415290
                                    • CloseHandle.KERNEL32(?,6210C9B9,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 004152AE
                                    • GetLastError.KERNEL32 ref: 004152B4
                                    • CloseHandle.KERNEL32(?,6210C9B9,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 004152CF
                                    • GetLastError.KERNEL32 ref: 004152D5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                                    • String ID:
                                    • API String ID: 2212007442-0
                                    • Opcode ID: 2777ae7e726d2c839fa65e51c23003c870152c2d6633ec8b2ef1ac72c44a5693
                                    • Instruction ID: bbc22d7d5e4264d147577bd93a02f4c94613573c8b2e1379b6dd7e4c8a38e6fc
                                    • Opcode Fuzzy Hash: 2777ae7e726d2c839fa65e51c23003c870152c2d6633ec8b2ef1ac72c44a5693
                                    • Instruction Fuzzy Hash: 0F218FB2304B42CBD720CF25DC44B97B7E8EB94760F144A2AE895C7390D739E845CEA9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,6210C9B9), ref: 0041BC7D
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041BC87
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041BC95
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041BCC6
                                    • MessageBoxW.USER32(?,?,?,00000024), ref: 0041BCF5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$Message
                                    • String ID: y`
                                    • API String ID: 850481049-1467889531
                                    • Opcode ID: 97fca20e87f4d19e08f54edf18e8893c9510420802b076d91891b32d89d837be
                                    • Instruction ID: 0a8a3c5dcc9595394f3e91466f479760a0ffc0d599377708b9fa38c2404fa1f7
                                    • Opcode Fuzzy Hash: 97fca20e87f4d19e08f54edf18e8893c9510420802b076d91891b32d89d837be
                                    • Instruction Fuzzy Hash: 6441AFB1204341AFD324DF28D844B6BBBE4FB89714F100619F56A83391C738E946CBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000,00000000,00420153), ref: 0041E4A3
                                    • lstrlenW.KERNEL32(00000000), ref: 0041E4B0
                                    • LocalAlloc.KERNEL32(00000000,00000040), ref: 0041E4E7
                                    • swprintf.LIBCMT ref: 0041E51E
                                    • swprintf.LIBCMT ref: 0041E533
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: swprintf$AllocFormatLocalMessagelstrlen
                                    • String ID: IDispatch error #%d$Unknown error 0x%0lX
                                    • API String ID: 1134423501-2934499512
                                    • Opcode ID: 027266e23a27e927a6ece381ce4c76f82ce2e5e9c148b84658b8c9045bea832f
                                    • Instruction ID: 1d15befb501128dd820a01fae309b8b03904db938a5df1f253dafdad90b1e791
                                    • Opcode Fuzzy Hash: 027266e23a27e927a6ece381ce4c76f82ce2e5e9c148b84658b8c9045bea832f
                                    • Instruction Fuzzy Hash: 2C21A570200221EBE730EB59ED46FE673A6EF54308F604559F5449B2C2F7B9B982C758
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 0041E9D4
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00002000,?,?,?), ref: 0041E9E8
                                    • RegCreateKeyExW.ADVAPI32 ref: 0041EA14
                                    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000004,00000000,00000004), ref: 0041EA36
                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000000,00000004,00000000,00000004), ref: 0041EA40
                                    Strings
                                    • Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted, xrefs: 0041EA02
                                    • , xrefs: 0041EA2E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CloseCreateFileModuleNameValue_memset
                                    • String ID: $Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
                                    • API String ID: 2280741871-2837994659
                                    • Opcode ID: 9ef6a000b2af350e772483fbf86137953c4e018e4428102ed8f1a798441201ee
                                    • Instruction ID: 0e3c631b592d9466001b2de6060d7075d7ffc32f5526a3d9b253da112b9fda37
                                    • Opcode Fuzzy Hash: 9ef6a000b2af350e772483fbf86137953c4e018e4428102ed8f1a798441201ee
                                    • Instruction Fuzzy Hash: 960152B0754300BFF220DB51DC4AF6A77E8EB48B04F80481DF7889A1C2D6B4A405CB5B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 0041B2E2
                                    • SetWindowTextW.USER32(00000000,?), ref: 0041B2F0
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 00420DFE: __lock.LIBCMT ref: 00420E1C
                                      • Part of subcall function 00420DFE: ___sbh_find_block.LIBCMT ref: 00420E27
                                      • Part of subcall function 00420DFE: ___sbh_free_block.LIBCMT ref: 00420E36
                                      • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                      • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                    • SetWindowTextW.USER32(?,?), ref: 0041B347
                                    • SetDlgItemTextW.USER32(?,000003E8,?), ref: 0041B3A3
                                    • SetDlgItemTextW.USER32(?,00000001,?), ref: 0041B3FC
                                    • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041B455
                                    • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B467
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Text$Item$Window$ErrorException@8FreeHeapLastMessageSendThrow___sbh_find_block___sbh_free_block__lock_malloc
                                    • String ID:
                                    • API String ID: 1891682577-0
                                    • Opcode ID: 8616607771760b40af6b41e3cf6a6b38da392e2d415f46127b7d0b13a612a390
                                    • Instruction ID: 9124571f9925069902d80d9bec0a2e382c050e0a1f5ab6a584098a3f445e3558
                                    • Opcode Fuzzy Hash: 8616607771760b40af6b41e3cf6a6b38da392e2d415f46127b7d0b13a612a390
                                    • Instruction Fuzzy Hash: 8C5166B15083809FD700EF69D885B4BBBE8AF88354F40095DF68997292C7B8E545CB67
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                      • Part of subcall function 0041D100: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,6210C9B9,?,?,?,00000000,?,?,0042C7C9,000000FF,0041D69D,?,00000004), ref: 0041D142
                                      • Part of subcall function 0041D100: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000), ref: 0041D152
                                      • Part of subcall function 0041D100: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000), ref: 0041D15C
                                      • Part of subcall function 0041D100: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9), ref: 0041D1DF
                                      • Part of subcall function 0041D100: GetLastError.KERNEL32(?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000,0042CB29), ref: 0041D1E8
                                      • Part of subcall function 0041D100: __CxxThrowException@8.LIBCMT ref: 0041D200
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000004,00000004,00000004,00000004,6210C9B9,?,?,00000000,00000000,0042CB29,000000FF), ref: 0041D6BD
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG), ref: 0041D6D4
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX), ref: 0041D6E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: MessageRegisterWindow$CreateEvent$Exception@8Throw$ErrorLast_malloc
                                    • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG$A
                                    • API String ID: 1053270758-1326287800
                                    • Opcode ID: e89d548d165c6ccd7a082492aa9f76ceb39d4a342e0e30b07f374673c9fb6d41
                                    • Instruction ID: 4717a6013c7829877e93234c158fbe75f12066bf988c191e84262ef118b64ff5
                                    • Opcode Fuzzy Hash: e89d548d165c6ccd7a082492aa9f76ceb39d4a342e0e30b07f374673c9fb6d41
                                    • Instruction Fuzzy Hash: AA412AF1904B86EFC314CF26C881782FBE4BB58704F508A2EE2A957641C378A558CBD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 00415195
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 0041519E
                                    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 004151BD
                                    • ResetEvent.KERNEL32(00000000,?,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 004151D1
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 004151DD
                                    • ResetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,00433B9C), ref: 004151E3
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 004151E9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Event$ErrorLast$CreateReset
                                    • String ID:
                                    • API String ID: 2684445861-0
                                    • Opcode ID: 670938e640ea1e4db209150584b68df53bc7c1080c9c0f0405a21129e5743fbd
                                    • Instruction ID: 068eba8924103465b4b96f194371cc6e05a3aa6795ab0b5abca74ce5f4d4681e
                                    • Opcode Fuzzy Hash: 670938e640ea1e4db209150584b68df53bc7c1080c9c0f0405a21129e5743fbd
                                    • Instruction Fuzzy Hash: E9118431700B01EAE7319B6AEC40BD7B3D89FD4744F60852AE115DA2D4D7B8F8828A2C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 00425E95
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                    • __amsg_exit.LIBCMT ref: 00425EB5
                                    • __lock.LIBCMT ref: 00425EC5
                                    • InterlockedDecrement.KERNEL32(?), ref: 00425EE2
                                    • InterlockedIncrement.KERNEL32(022B1670), ref: 00425F0D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                    • String ID: (uC
                                    • API String ID: 4271482742-1954698195
                                    • Opcode ID: 53b6455aa11515e4d592943908821254474665f41ed4d2ddcc9aa7fdd670bcc6
                                    • Instruction ID: 2ef626678910c1dd51139d3e05b6160cda8dcc3cebfc1a95911fe8bb1d646cc3
                                    • Opcode Fuzzy Hash: 53b6455aa11515e4d592943908821254474665f41ed4d2ddcc9aa7fdd670bcc6
                                    • Instruction Fuzzy Hash: ED01C271B05A32A7D731AB69B40975A7760BF04711F82401BE40067680CB7C6A418BCD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID:
                                    • API String ID: 175252994-0
                                    • Opcode ID: fc412f1c494a58773bb3e593c3a84f722e1a01ff57f4bbf55a0f85afdee95d6c
                                    • Instruction ID: 2541870f856653ccb823f565e64bb9a0428d8288f86274e3c318cf1eb10770f2
                                    • Opcode Fuzzy Hash: fc412f1c494a58773bb3e593c3a84f722e1a01ff57f4bbf55a0f85afdee95d6c
                                    • Instruction Fuzzy Hash: C1B11871608F948BD7215E3D418472BBAD5EB95300F490A7FDCC6AB386D27DE8058F8A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041BB19
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041BB22
                                    • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041BB42
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041BB4F
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041BB72
                                    • __aulldiv.LIBCMT ref: 0041BBBC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$MessagePost__aulldiv
                                    • String ID:
                                    • API String ID: 3743465594-0
                                    • Opcode ID: e829717b7742392a5d7cac33a0f9957d49dedec6ac4da5b3686c1d9b361c6041
                                    • Instruction ID: d581ea35383060334206f5fcdd51a0bd68e0bee2ddb56b36f4aad4860aba5ccc
                                    • Opcode Fuzzy Hash: e829717b7742392a5d7cac33a0f9957d49dedec6ac4da5b3686c1d9b361c6041
                                    • Instruction Fuzzy Hash: 68219C71244704ABD220EF759C80B6BF7E8EF55B04F04081EF69643B41CB75B84687A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF99
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041BFBB
                                    • SendMessageW.USER32(00000000,?,00000000,?), ref: 0041BFD3
                                    • CloseHandle.KERNEL32(?), ref: 0041BFDD
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BFE9
                                    • MessageBoxW.USER32(00000000,?,?,?), ref: 0041C00C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: MessageObjectSingleWait$CloseCreateEventHandleSend
                                    • String ID:
                                    • API String ID: 3833482109-0
                                    • Opcode ID: 0b788cf7af48f74d30c4f0ea5c33d9a8adc3578a1e0daadd6c1318ae98fe1c94
                                    • Instruction ID: f91b4b6455c39529ea0f93616aee9c7d89bd0d9653428511fc5c91251fe49f37
                                    • Opcode Fuzzy Hash: 0b788cf7af48f74d30c4f0ea5c33d9a8adc3578a1e0daadd6c1318ae98fe1c94
                                    • Instruction Fuzzy Hash: 42110475604301AFD224DF19DC85F5BB7E8EB88B10F108A1DF59693290D670E80ACBA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CreateFrameInfo.LIBCMT ref: 0042A7C0
                                      • Part of subcall function 0042A250: __getptd.LIBCMT ref: 0042A25E
                                      • Part of subcall function 0042A250: __getptd.LIBCMT ref: 0042A26C
                                    • __getptd.LIBCMT ref: 0042A7CA
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                    • __getptd.LIBCMT ref: 0042A7D8
                                    • __getptd.LIBCMT ref: 0042A7E6
                                    • __getptd.LIBCMT ref: 0042A7F1
                                    • _CallCatchBlock2.LIBCMT ref: 0042A817
                                      • Part of subcall function 0042A2F5: __CallSettingFrame@12.LIBCMT ref: 0042A341
                                      • Part of subcall function 0042A8BE: __getptd.LIBCMT ref: 0042A8CD
                                      • Part of subcall function 0042A8BE: __getptd.LIBCMT ref: 0042A8DB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                    • String ID:
                                    • API String ID: 1602911419-0
                                    • Opcode ID: c7e7ad533ae3627070de73a8c96b375c480b9e549fa1ae8810a74d308af93d28
                                    • Instruction ID: 3cc8a83238399075c8bf7f55cda3e9e413e54d6c728d6c92a07a975ed0d10dd3
                                    • Opcode Fuzzy Hash: c7e7ad533ae3627070de73a8c96b375c480b9e549fa1ae8810a74d308af93d28
                                    • Instruction Fuzzy Hash: A1113771E00219EFDB00EFA5E446BAD7BB0FF08319F5080AAF814A7251DB7C8A119F58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,6210C9B9,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF6A
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF7E
                                    • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF88
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                    Strings
                                    • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041CF76
                                    • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041CF80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: MessageRegisterWindow$CreateEventException@8Throw_malloc
                                    • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                                    • API String ID: 1188034692-1515309323
                                    • Opcode ID: 7fa1a575ea346de8f28e5e3722ceb1a3217c4de9ee22338078f5ffbbcd47b5eb
                                    • Instruction ID: e1c83e00d976b7b479650104844ec0f6e79c37c59f4d0df13700cc8b20bf3eca
                                    • Opcode Fuzzy Hash: 7fa1a575ea346de8f28e5e3722ceb1a3217c4de9ee22338078f5ffbbcd47b5eb
                                    • Instruction Fuzzy Hash: 58118BB1A04746AFD300CF26C880B12FBE8FB48760F504A2FE55893A80C378B814CF98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,0041C5A8), ref: 0041B6CE
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,0041C5A8), ref: 0041B6DE
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041B6E8
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041B6F2
                                    • Sleep.KERNEL32(00000064), ref: 0041B6FD
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041B704
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041B70E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$Sleep
                                    • String ID:
                                    • API String ID: 2348874005-0
                                    • Opcode ID: f8c0275f32117be734c0b8a6040b515ae9982e18d29e130f81fb3d05d829968e
                                    • Instruction ID: 7d0ab2ec63e2e510b595603aed5c06e49eb38fb67e82f02a5ca42a647926e9c3
                                    • Opcode Fuzzy Hash: f8c0275f32117be734c0b8a6040b515ae9982e18d29e130f81fb3d05d829968e
                                    • Instruction Fuzzy Hash: 4FF0F96210E3E17DE31197B99C80BEBFFC8AF4A114F48044AF38542642CB64E499D3EE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 00425BF9
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                    • __getptd.LIBCMT ref: 00425C10
                                    • __amsg_exit.LIBCMT ref: 00425C1E
                                    • __lock.LIBCMT ref: 00425C2E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                    • String ID: @tC
                                    • API String ID: 3521780317-727578634
                                    • Opcode ID: 145753e285c5e819699dd0d52c40f939310fd69faf0bf32d7e85385b5de77921
                                    • Instruction ID: 30e58af24ec6dc2494b6d2a1ee9744a6ddf721026bf7940203965d5c325c8976
                                    • Opcode Fuzzy Hash: 145753e285c5e819699dd0d52c40f939310fd69faf0bf32d7e85385b5de77921
                                    • Instruction Fuzzy Hash: EEF0F632F04B309BC730BB76B80274D72A06F00768F80855FE450AB2D1DF7C99419A9D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 0042A501
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                    • __getptd.LIBCMT ref: 0042A512
                                    • __getptd.LIBCMT ref: 0042A520
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: MOC$csm
                                    • API String ID: 803148776-1389381023
                                    • Opcode ID: 4d840f31e8c3b6747dcaf74e30ba91531bc5c6d2a8011580871252e01c7f1ca9
                                    • Instruction ID: b5e6c7ade125d5cab53eb7e1327d900a84a9449078cb73c0769f20bf7913c8cb
                                    • Opcode Fuzzy Hash: 4d840f31e8c3b6747dcaf74e30ba91531bc5c6d2a8011580871252e01c7f1ca9
                                    • Instruction Fuzzy Hash: D0E04F76B001289FD710AF65E446B2A33A4EB5435DF9940E7E80DC7323CB3CDA90995B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00412E00: _malloc.LIBCMT ref: 00412E03
                                      • Part of subcall function 00412E00: __CxxThrowException@8.LIBCMT ref: 00412E21
                                      • Part of subcall function 0040A930: FindCloseChangeNotification.KERNELBASE(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A973
                                      • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A979
                                      • Part of subcall function 0040A930: CloseHandle.KERNEL32(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A991
                                      • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A997
                                      • Part of subcall function 0040A930: CloseHandle.KERNEL32(?,6210C9B9,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B1
                                      • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B7
                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 0041271E
                                    • GetLastError.KERNEL32 ref: 0041272A
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412740
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412752
                                    • GetLastError.KERNEL32 ref: 0041275F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorLast$CloseCreateEvent$Handle$ChangeException@8FindNotificationThrow_malloc
                                    • String ID:
                                    • API String ID: 3827169974-0
                                    • Opcode ID: 516182abb57a05b54fca2bc3085f438cd3bdaa9ed7492599c5cdafcbb9abd9f7
                                    • Instruction ID: 8ace0b9d7f818b423eaf7a3375f85a0c12461cedc0be4e9cb63852f0f41e943e
                                    • Opcode Fuzzy Hash: 516182abb57a05b54fca2bc3085f438cd3bdaa9ed7492599c5cdafcbb9abd9f7
                                    • Instruction Fuzzy Hash: DA317A716083009FC720DF1AD984E5BBBF5EBD8710F104A2EF955C7290D7B5A881CAAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ResetEvent.KERNEL32(?), ref: 00414F26
                                    • GetLastError.KERNEL32 ref: 00414F36
                                    • SetEvent.KERNEL32(?), ref: 00414F3C
                                    • GetLastError.KERNEL32 ref: 00414F46
                                    • WaitForMultipleObjects.KERNEL32(00000002,00000000,00000000,000000FF), ref: 00414F60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorEventLast$MultipleObjectsResetWait
                                    • String ID:
                                    • API String ID: 234195192-0
                                    • Opcode ID: c0e4b5393c150b2b1d41074350501775be6a1a9ae23a0de58fb55b33defacd65
                                    • Instruction ID: 8f6e04e233e7f0ecea5ba5d329dc9ff630179ca758a6f2b2f67ed5664254b869
                                    • Opcode Fuzzy Hash: c0e4b5393c150b2b1d41074350501775be6a1a9ae23a0de58fb55b33defacd65
                                    • Instruction Fuzzy Hash: DA017C752003018BD320DF69DC80A67B7E4FBD8711F40892EE994C7390EB75E94ACB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF30
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041BF3A
                                    • PostMessageW.USER32(?,?,?,?), ref: 0041BF55
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF61
                                    • CloseHandle.KERNEL32(?), ref: 0041BF67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ObjectSingleWait$CloseCreateEventHandleMessagePost
                                    • String ID:
                                    • API String ID: 1259710111-0
                                    • Opcode ID: 806b293743ddfa5fc6b1ad8d583cf7613af39d7d78647ed7c97bbd4295f491a7
                                    • Instruction ID: ea334cb5308d7a0064a28a168c68656027542afff3d651ce4ab8b114c3d9b8ee
                                    • Opcode Fuzzy Hash: 806b293743ddfa5fc6b1ad8d583cf7613af39d7d78647ed7c97bbd4295f491a7
                                    • Instruction Fuzzy Hash: 25F0F475204710ABC230DB59EC44F57B7F8EB88B20F108A19B6A6936D0CAB0F8068B65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00422EB2: _doexit.LIBCMT ref: 00422EBE
                                    • ___set_flsgetvalue.LIBCMT ref: 00421029
                                      • Part of subcall function 00423265: TlsGetValue.KERNEL32(?,0042102E), ref: 0042326E
                                      • Part of subcall function 00423265: __decode_pointer.LIBCMT ref: 00423280
                                      • Part of subcall function 00423265: TlsSetValue.KERNEL32(00000000,0042102E), ref: 0042328F
                                    • ___fls_getvalue@4.LIBCMT ref: 00421034
                                      • Part of subcall function 00423245: TlsGetValue.KERNEL32(?,?,00421039,00000000), ref: 00423253
                                    • ___fls_setvalue@8.LIBCMT ref: 00421047
                                      • Part of subcall function 00423299: __decode_pointer.LIBCMT ref: 004232AA
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00421050
                                    • ExitThread.KERNEL32 ref: 00421057
                                    • GetCurrentThreadId.KERNEL32 ref: 0042105D
                                    • __freefls@4.LIBCMT ref: 0042107D
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00421090
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                    • String ID:
                                    • API String ID: 132634196-0
                                    • Opcode ID: bc891c8cc3a9ed2b47b42c33089eae5230942977b4943d2a676965e3f78bf5e9
                                    • Instruction ID: 83bb7702ffc322df95131e4f038506dbf831791f9a049fe5e58ed36b667dd280
                                    • Opcode Fuzzy Hash: bc891c8cc3a9ed2b47b42c33089eae5230942977b4943d2a676965e3f78bf5e9
                                    • Instruction Fuzzy Hash: 53E01A61A00265B78A103FB3A80A99F363C9E52749BD00096BA10A3526DA7D9A5246BE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __calloc_crt
                                    • String ID: PzC$`zC
                                    • API String ID: 3494438863-1456556264
                                    • Opcode ID: 32c63129b1e8f2c28b3341d94d13e4b0a4d7567ff4f6f6cd765ea066401786c0
                                    • Instruction ID: dd3374fb07d57d5fef9b73be00fb61b026adc5eecfbbd3b9a5eabc426370d495
                                    • Opcode Fuzzy Hash: 32c63129b1e8f2c28b3341d94d13e4b0a4d7567ff4f6f6cd765ea066401786c0
                                    • Instruction Fuzzy Hash: 2B11067170832157EF248A2EBD406662795EB89738BA6523BF512DB3D0E738C841564C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 0042AB58
                                      • Part of subcall function 0042AAB3: ___BuildCatchObjectHelper.LIBCMT ref: 0042AAE9
                                    • _UnwindNestedFrames.LIBCMT ref: 0042AB6F
                                    • ___FrameUnwindToState.LIBCMT ref: 0042AB7D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                    • String ID: csm
                                    • API String ID: 2163707966-1018135373
                                    • Opcode ID: a1cdc47254b0d1e876ebf16cdfd679722edd35116a1de451e27b255c7f3a5f87
                                    • Instruction ID: 352b65d85e3f361666db549a6aa94732db8901d912654677eb1acc1d955f8a35
                                    • Opcode Fuzzy Hash: a1cdc47254b0d1e876ebf16cdfd679722edd35116a1de451e27b255c7f3a5f87
                                    • Instruction Fuzzy Hash: FA016D31600129BBCF126F52ED45EEB7F6AEF08344F844016FD1815121D73AE9B1DBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___addlocaleref.LIBCMT ref: 00425BC1
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425A99
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425AA6
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425AB3
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425AC0
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425ACD
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425AE9
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(00000000), ref: 00425AF9
                                      • Part of subcall function 00425A87: InterlockedIncrement.KERNEL32(?), ref: 00425B0F
                                    • ___removelocaleref.LIBCMT ref: 00425BCC
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B30
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B3D
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B4A
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B57
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B64
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425B80
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(00000000), ref: 00425B90
                                      • Part of subcall function 00425B16: InterlockedDecrement.KERNEL32(?), ref: 00425BA6
                                    • ___freetlocinfo.LIBCMT ref: 00425BE0
                                      • Part of subcall function 0042593E: ___free_lconv_mon.LIBCMT ref: 00425984
                                      • Part of subcall function 0042593E: ___free_lconv_num.LIBCMT ref: 004259A5
                                      • Part of subcall function 0042593E: ___free_lc_time.LIBCMT ref: 00425A2A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                    • String ID: @tC
                                    • API String ID: 467427115-727578634
                                    • Opcode ID: 848e212ff2aad06d733f0349b9acfcde226f86cbb15630d170823ae0e6abffb7
                                    • Instruction ID: b5ba1389b25c91b46fd07a028c6ca5296a478f30e276532976cf798ea397e946
                                    • Opcode Fuzzy Hash: 848e212ff2aad06d733f0349b9acfcde226f86cbb15630d170823ae0e6abffb7
                                    • Instruction Fuzzy Hash: 87E04F72B0DC31568A312D297400A6B9A980F92729BED015BF854AF255DB3C7C80C1AD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 0041C702
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0041C713
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave
                                    • String ID: @N@$y`
                                    • API String ID: 3168844106-1306932553
                                    • Opcode ID: 8acf8df9a3d0fdefd6065d42bdf7b300d5136280e86f815acb5728404d03b38b
                                    • Instruction ID: 7b22e8e9bfa59ed91af09dfebfb28f908978085d459430ebb598829989cac8c5
                                    • Opcode Fuzzy Hash: 8acf8df9a3d0fdefd6065d42bdf7b300d5136280e86f815acb5728404d03b38b
                                    • Instruction Fuzzy Hash: 5C02AE716143009BC714EF65D880A9BB3E5BFC8304F40492EF9899B391DB78ED49CB9A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042731C
                                    • __isleadbyte_l.LIBCMT ref: 00427350
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,0042483B,?,00000000,00000000,?,?,?,?,0042483B,00000000,?), ref: 00427381
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,0042483B,00000001,00000000,00000000,?,?,?,?,0042483B,00000000,?), ref: 004273EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 503fc64783cdc75aa604b72b50f3a0e1d00f111cbe2dfcd2591cf5f7725bb183
                                    • Instruction ID: 30f3a3cf3d7bded6c2365c7307b84cf2c415d4f83ec559ad1e5e2fe5da1fc46e
                                    • Opcode Fuzzy Hash: 503fc64783cdc75aa604b72b50f3a0e1d00f111cbe2dfcd2591cf5f7725bb183
                                    • Instruction Fuzzy Hash: B131F331B08266EFDB20DF64E8809AF3BA0BF01310F94496AEC519B291D734DD41EB58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 00414DF5
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 00414E13
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    • _malloc.LIBCMT ref: 00414E3C
                                    • __CxxThrowException@8.LIBCMT ref: 00414E58
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc$AllocateExceptionHeapRaise
                                    • String ID:
                                    • API String ID: 82271797-0
                                    • Opcode ID: 1b4761a27853a6d515ded4f4d5083617d20ee02b90ed2da3791ae6e4941ba561
                                    • Instruction ID: 2ffd3e263cceee234fdb73287dd7cd2a62e354bdd83d4882af6582ef0a5dfc93
                                    • Opcode Fuzzy Hash: 1b4761a27853a6d515ded4f4d5083617d20ee02b90ed2da3791ae6e4941ba561
                                    • Instruction Fuzzy Hash: DF218EB1604751DFC310DF1AC481A4AFBE4FF8C714F508A6EE9A997340D339A945CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowTextLengthW.USER32 ref: 004086B5
                                    • GetLastError.KERNEL32 ref: 004086C1
                                    • GetWindowTextW.USER32(?,?,00000001), ref: 004086EB
                                    • GetLastError.KERNEL32 ref: 00408717
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorLastTextWindow$Length
                                    • String ID:
                                    • API String ID: 3440162706-0
                                    • Opcode ID: c0ddd3581b0e531c08e679f2064eb4f7fc4116aa240d8e2fe6827b0531aec1fd
                                    • Instruction ID: 07fccb4b5a50a5a39ac797d7d7c016af7ded2db5039dfe4e2d7ff4f9233aebd5
                                    • Opcode Fuzzy Hash: c0ddd3581b0e531c08e679f2064eb4f7fc4116aa240d8e2fe6827b0531aec1fd
                                    • Instruction Fuzzy Hash: 6B11A1752145128BD724DF79E94491B73E5EFD4310711457EE086C7394EB35D8428BA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415132
                                    • SetEvent.KERNEL32(?), ref: 00415154
                                    • GetLastError.KERNEL32 ref: 0041515A
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415162
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ObjectSingleWait$ErrorEventLast
                                    • String ID:
                                    • API String ID: 3117263442-0
                                    • Opcode ID: 58b0573d5ea3f526ce09629d59f4af3ae64b585e59b04b0ade2fd1c9e074ec63
                                    • Instruction ID: feaf804519cf69de200bc99c0c312eed2e15eb9b6703e4fc041637bf795a50c3
                                    • Opcode Fuzzy Hash: 58b0573d5ea3f526ce09629d59f4af3ae64b585e59b04b0ade2fd1c9e074ec63
                                    • Instruction Fuzzy Hash: E3F0B476604715AFD721DF69DC40AA7B3E8BB89330B104B29E1A183390CB74FC828768
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: ErrorEventLastReset
                                    • String ID:
                                    • API String ID: 1621066496-0
                                    • Opcode ID: fb3bcf7261792f35598a1087b45479a14e7556373594df7cd1b80a5989da819f
                                    • Instruction ID: 8222d6231367c2f95b5b8b75f07a3969ecdbb72d7db14b241ba787fa5bd73eff
                                    • Opcode Fuzzy Hash: fb3bcf7261792f35598a1087b45479a14e7556373594df7cd1b80a5989da819f
                                    • Instruction Fuzzy Hash: A9F05E76600315CF8730AFAADD80457B7E8EF88651301497AD945CB211D7B1E9929BA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __aulldvrm
                                    • String ID: @$@
                                    • API String ID: 1302938615-149943524
                                    • Opcode ID: 5adcdd753ec2b723029b06486653012a5a54ee49c1a7e7cef00a8d7ede8f7d62
                                    • Instruction ID: f2cc8ee446808ae59cef878a6a88defbe21501969489561079c956f54066fcd4
                                    • Opcode Fuzzy Hash: 5adcdd753ec2b723029b06486653012a5a54ee49c1a7e7cef00a8d7ede8f7d62
                                    • Instruction Fuzzy Hash: D52193F0B082388BDB248A15DD843AAB7B1AB50304F5584EED749A7241D7784EC68F6C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 0040BD52
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 0040BD6E
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID: @KA
                                    • API String ID: 2732643326-2643309338
                                    • Opcode ID: c643aa32da839dd5923294ee2737ce9db97ee4e9dfd504c2a1349e5d4e27d444
                                    • Instruction ID: c9530b6c2466bd8b8310afa81e3857d106ad429d7d1c9ee626c047d2608ca099
                                    • Opcode Fuzzy Hash: c643aa32da839dd5923294ee2737ce9db97ee4e9dfd504c2a1349e5d4e27d444
                                    • Instruction Fuzzy Hash: B4214AB1604B01AFC314CF1AD880A06FBE8FF48710F508A2EE15997740D379A945CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00404E60: _malloc.LIBCMT ref: 00404E79
                                      • Part of subcall function 00404E60: __CxxThrowException@8.LIBCMT ref: 00404E97
                                    • FormatMessageW.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,00000004,6210C9B9,00000000,?, /m="), ref: 0041AEF0
                                    • LocalFree.KERNEL32(?), ref: 0041AF0A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: Exception@8FormatFreeLocalMessageThrow_malloc
                                    • String ID: /m="
                                    • API String ID: 2713084418-3487320
                                    • Opcode ID: 695fc31bdaacbd9ee0ee099f19c2e04b9b79b9a2f59bf99be6fb8de6d3772c06
                                    • Instruction ID: 0f6c590e0b8d9d0c3bb6e6ee73bddb7d9bdabd2836573f11952a495bd2579edb
                                    • Opcode Fuzzy Hash: 695fc31bdaacbd9ee0ee099f19c2e04b9b79b9a2f59bf99be6fb8de6d3772c06
                                    • Instruction Fuzzy Hash: A11148B2208340AFD210CF0AD944F5BFBE8EBC8B50F004A2EF18593290C374A805CB66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 00417A2A
                                      • Part of subcall function 00420EDB: __FF_MSGBANNER.LIBCMT ref: 00420EFE
                                      • Part of subcall function 00420EDB: __NMSG_WRITE.LIBCMT ref: 00420F05
                                      • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                    • __CxxThrowException@8.LIBCMT ref: 00417A48
                                      • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID: P!@
                                    • API String ID: 2732643326-1774101457
                                    • Opcode ID: b074ee54cf392ed619f1c446642dba3e17fe1378a77f7c51f056ead93905ddcd
                                    • Instruction ID: 93b110ce856f9f77dc8d651a0d17805c1ef403e66c2c9fa0dc688d9785415849
                                    • Opcode Fuzzy Hash: b074ee54cf392ed619f1c446642dba3e17fe1378a77f7c51f056ead93905ddcd
                                    • Instruction Fuzzy Hash: 1D01B5726017009FC324CF69D844A57B7E4EF49750B04DA1FE46687791D778E901CB98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0042A2A3: __getptd.LIBCMT ref: 0042A2A9
                                      • Part of subcall function 0042A2A3: __getptd.LIBCMT ref: 0042A2B9
                                    • __getptd.LIBCMT ref: 0042A8CD
                                      • Part of subcall function 00423453: __getptd_noexit.LIBCMT ref: 00423456
                                      • Part of subcall function 00423453: __amsg_exit.LIBCMT ref: 00423463
                                    • __getptd.LIBCMT ref: 0042A8DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2622172604.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2622119041.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622209940.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622243943.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2622295767.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_8ue90oYkrv.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: csm
                                    • API String ID: 803148776-1018135373
                                    • Opcode ID: 26f5b4ee94be2f9113aeb72c9edffe32651a80864b1a22db6be04ae8b8d7f983
                                    • Instruction ID: 8c5aa1a117a409ff434ae2770331204e203b5b6a1d8a62d67ab1246687778dcf
                                    • Opcode Fuzzy Hash: 26f5b4ee94be2f9113aeb72c9edffe32651a80864b1a22db6be04ae8b8d7f983
                                    • Instruction Fuzzy Hash: A4018F74A012248BCF349F26F44076FB3B4AF60315F95489FE88256361CB388AE1CB5A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:8.5%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0.9%
                                    Total number of Nodes:992
                                    Total number of Limit Nodes:20
                                    execution_graph 22794 6cc519c0 22795 6cc519d2 ReadFile 22794->22795 22796 6cc519cd 22794->22796 22797 6cc519fd 22795->22797 22796->22795 22798 6cc51a06 22797->22798 22799 6cc51a0c GetLastError 22797->22799 22800 6cc51a16 22799->22800 22801 6cc518e0 22802 6cc518ef 22801->22802 22803 6cc518f8 22801->22803 22805 6cc51950 22802->22805 22806 6cc51976 22805->22806 22807 6cc5196b FindCloseChangeNotification 22805->22807 22809 6cc51989 22806->22809 22810 6cc75ff4 67 API calls 7 library calls 22806->22810 22807->22806 22809->22803 22810->22809 22811 6cc57350 22812 6cc57516 22811->22812 22817 6cc57389 22811->22817 22813 6cc57462 22813->22812 22815 6cc57491 22813->22815 22834 6cc563a0 22813->22834 22816 6cc574eb 22815->22816 22826 6cc61060 SetFileAttributesW 22815->22826 22817->22812 22817->22813 22818 6cc5742b SetFileTime 22817->22818 22821 6cc51be0 22818->22821 22822 6cc51be8 FindCloseChangeNotification 22821->22822 22823 6cc51bf3 22821->22823 22822->22823 22824 6cc51bfd GetLastError 22822->22824 22823->22813 22825 6cc51c07 22824->22825 22825->22813 22827 6cc610ad 22826->22827 22828 6cc61099 22826->22828 22844 6cc628a0 22827->22844 22828->22816 22830 6cc610d6 22831 6cc61115 22830->22831 22832 6cc610e8 SetFileAttributesW 22830->22832 22831->22816 22833 6cc610fb 22832->22833 22833->22816 22835 6cc563f7 22834->22835 22836 6cc563fd 22835->22836 22837 6cc56419 22835->22837 22848 6cc62e40 22836->22848 22842 6cc56435 22837->22842 22852 6cc62f70 RaiseException __CxxThrowException@8 22837->22852 22840 6cc62e40 VariantClear 22843 6cc5644a 22840->22843 22841 6cc56406 22841->22815 22842->22840 22843->22815 22846 6cc628e4 22844->22846 22845 6cc6298b GetCurrentDirectoryW 22847 6cc629a4 22845->22847 22846->22845 22846->22847 22847->22830 22849 6cc62e65 VariantClear 22848->22849 22850 6cc62e4b 22848->22850 22849->22841 22850->22849 22851 6cc62e59 22850->22851 22851->22841 22852->22842 22853 6cc56460 22854 6cc564a0 22853->22854 22941 6cc5abe0 22854->22941 22856 6cc56522 22857 6cc56528 22856->22857 22963 6cc5ab10 22856->22963 22859 6cc56565 22860 6cc5655c 22860->22859 22861 6cc565e7 22860->22861 22862 6cc565bd 22860->22862 22864 6cc56623 22861->22864 22867 6cc565f6 22861->22867 22863 6cc62e40 VariantClear 22862->22863 22866 6cc565c5 22863->22866 22865 6cc62e40 VariantClear 22864->22865 22868 6cc5663f 22865->22868 22869 6cc62e40 VariantClear 22867->22869 22870 6cc5ab10 VariantClear 22868->22870 22938 6cc565fe 22869->22938 22871 6cc56651 22870->22871 22872 6cc5665a 22871->22872 22873 6cc563a0 2 API calls 22871->22873 22874 6cc56683 22873->22874 22875 6cc56689 22874->22875 22876 6cc566c4 22874->22876 23019 6cc6e770 72 API calls 22874->23019 22878 6cc5673c 22876->22878 22879 6cc566ec 22876->22879 22936 6cc56fdb 22876->22936 22882 6cc56767 22878->22882 22883 6cc56791 22878->22883 23020 6cc609e0 22879->23020 22880 6cc609e0 68 API calls 22897 6cc570cd 22880->22897 22884 6cc62e40 VariantClear 22882->22884 22885 6cc5679b 22883->22885 22887 6cc5716a 22883->22887 22886 6cc5676f 22884->22886 22890 6cc62e40 VariantClear 22885->22890 22889 6cc62e40 VariantClear 22887->22889 22888 6cc566f3 22903 6cc5688e 22889->22903 22891 6cc567bf 22890->22891 22975 6cc562b0 22891->22975 22893 6cc567d5 22894 6cc567db 22893->22894 22895 6cc562b0 VariantClear 22893->22895 22896 6cc56810 22895->22896 22896->22866 22898 6cc562b0 VariantClear 22896->22898 22899 6cc5682d 22898->22899 22899->22859 22900 6cc5ab10 VariantClear 22899->22900 22901 6cc56850 22900->22901 22901->22859 22987 6cc6df80 22901->22987 22904 6cc568ad 22993 6cc54dd0 22904->22993 22909 6cc56884 22909->22903 22909->22904 23026 6cc607d0 CharUpperW CharUpperW 22909->23026 22910 6cc568c9 22917 6cc569f7 22910->22917 23025 6cc56250 CreateDirectoryW GetLastError CreateDirectoryW GetCurrentDirectoryW 22910->23025 22912 6cc56a86 22918 6cc56c89 22912->22918 23004 6cc625a0 22912->23004 22913 6cc56a28 22937 6cc56a42 22913->22937 23028 6cc61140 RemoveDirectoryW RemoveDirectoryW GetCurrentDirectoryW 22913->23028 22914 6cc609e0 68 API calls 22935 6cc56e99 22914->22935 22917->22912 22917->22913 22918->22914 22918->22936 22918->22938 22920 6cc56931 22920->22917 22921 6cc569db 22920->22921 23027 6cc60f70 CreateFileW CreateFileW SetFileTime CloseHandle GetCurrentDirectoryW 22921->23027 22922 6cc56d35 22925 6cc56ebf 22922->22925 22926 6cc56d3e 22922->22926 22923 6cc56c81 23029 6cc510e0 10 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 22923->23029 23032 6cc617b0 SetFileAttributesW SetFileAttributesW DeleteFileW DeleteFileW GetCurrentDirectoryW 22925->23032 23030 6cc510e0 10 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 22926->23030 22929 6cc569f4 22929->22917 22931 6cc56d55 22932 6cc56dc8 22931->22932 22931->22938 23031 6cc61210 MoveFileW MoveFileW GetCurrentDirectoryW 22932->23031 22934 6cc56aaa 22934->22918 22934->22922 22934->22923 22934->22935 22934->22937 23009 6cc62a70 22935->23009 22936->22880 22936->22897 22939 6cc56ecb 22939->22935 22939->22937 22940 6cc56dd5 22940->22918 22940->22939 22942 6cc5ac34 22941->22942 22943 6cc5ac3a 22942->22943 22947 6cc5ac59 22942->22947 22944 6cc62e40 VariantClear 22943->22944 22946 6cc5ac43 22944->22946 22945 6cc5ad61 22948 6cc62e40 VariantClear 22945->22948 22946->22856 22947->22945 22949 6cc62e40 VariantClear 22947->22949 22950 6cc5ad6a 22948->22950 22952 6cc5ac9a 22949->22952 22950->22856 22951 6cc5ad4b 22951->22856 22952->22951 22953 6cc5acdf 22952->22953 22954 6cc5acfe 22952->22954 22955 6cc62e40 VariantClear 22953->22955 22956 6cc5ad3d 22954->22956 22960 6cc5ad09 22954->22960 22958 6cc5ace8 22955->22958 22956->22945 22957 6cc5ad42 22956->22957 22959 6cc62e40 VariantClear 22957->22959 22958->22856 22959->22951 22961 6cc62e40 VariantClear 22960->22961 22962 6cc5ad27 22961->22962 22962->22856 22964 6cc5ab66 22963->22964 22965 6cc5ab6c 22964->22965 22966 6cc5ab88 22964->22966 22967 6cc62e40 VariantClear 22965->22967 22969 6cc5ab93 22966->22969 22970 6cc5abbf 22966->22970 22968 6cc5ab75 22967->22968 22968->22860 22972 6cc62e40 VariantClear 22969->22972 22971 6cc62e40 VariantClear 22970->22971 22973 6cc5abc8 22971->22973 22974 6cc5aba7 22972->22974 22973->22860 22974->22860 22976 6cc56309 22975->22976 22977 6cc5632d 22976->22977 22978 6cc5630f 22976->22978 22980 6cc56338 22977->22980 22982 6cc5637b 22977->22982 22979 6cc62e40 VariantClear 22978->22979 22981 6cc56318 22979->22981 22983 6cc62e40 VariantClear 22980->22983 22981->22893 22984 6cc62e40 VariantClear 22982->22984 22985 6cc56361 22983->22985 22986 6cc56384 22984->22986 22985->22893 22986->22893 22992 6cc6dfb7 22987->22992 22988 6cc6e021 23034 6cc54d10 68 API calls 2 library calls 22988->23034 22991 6cc6dfda 22991->22909 22992->22988 22992->22991 23033 6cc54d10 68 API calls 2 library calls 22992->23033 22997 6cc54de9 22993->22997 22994 6cc54e2a 22995 6cc54e60 22994->22995 23036 6cc755f0 __VEC_memcpy 22994->23036 22999 6cc5a360 22995->22999 22997->22994 23035 6cc75ff4 67 API calls 7 library calls 22997->23035 23000 6cc5a51c 22999->23000 23002 6cc5a399 22999->23002 23000->22910 23002->23000 23037 6cc5a2f0 23002->23037 23042 6cc5a240 23002->23042 23057 6cc62470 23004->23057 23007 6cc625f0 23007->22934 23008 6cc625e9 FindClose 23008->23007 23010 6cc62ab3 CreateFileW 23009->23010 23011 6cc62a9e CloseHandle 23009->23011 23012 6cc62b33 23010->23012 23013 6cc62ad9 23010->23013 23014 6cc62b57 23011->23014 23015 6cc62aad 23011->23015 23012->22936 23016 6cc628a0 GetCurrentDirectoryW 23013->23016 23014->22936 23015->23010 23017 6cc62b00 23016->23017 23017->23012 23018 6cc62b15 CreateFileW 23017->23018 23018->23012 23019->22876 23077 6cc75f2a 23020->23077 23023 6cc60a07 23023->22888 23025->22920 23026->22909 23027->22929 23028->22937 23029->22918 23030->22931 23031->22940 23032->22940 23033->22992 23034->22991 23035->22997 23036->22995 23039 6cc5a310 23037->23039 23038 6cc5a338 23038->23002 23039->23038 23052 6cc59ff0 __VEC_memcpy ___sbh_free_block 23039->23052 23041 6cc5a32c 23041->23002 23044 6cc5a250 23042->23044 23043 6cc5a2b7 23055 6cc5a1c0 CharUpperW CharUpperW __VEC_memcpy 23043->23055 23044->23043 23047 6cc5a2e1 23044->23047 23053 6cc607d0 CharUpperW CharUpperW 23044->23053 23054 6cc5a110 __VEC_memcpy 23044->23054 23047->23002 23048 6cc5a2c5 23048->23047 23056 6cc5a1c0 CharUpperW CharUpperW __VEC_memcpy 23048->23056 23050 6cc5a2d7 23050->23002 23052->23041 23053->23044 23054->23044 23055->23048 23056->23050 23058 6cc624c3 FindClose 23057->23058 23059 6cc624d8 FindFirstFileW 23057->23059 23060 6cc624d2 23058->23060 23062 6cc62542 23058->23062 23061 6cc624eb 23059->23061 23059->23062 23060->23059 23064 6cc628a0 GetCurrentDirectoryW 23061->23064 23068 6cc751c7 23062->23068 23066 6cc6251d 23064->23066 23065 6cc62589 23065->23007 23065->23008 23066->23062 23067 6cc62534 FindFirstFileW 23066->23067 23067->23062 23069 6cc751d1 IsDebuggerPresent 23068->23069 23070 6cc751cf 23068->23070 23076 6cc784c5 23069->23076 23070->23065 23073 6cc76ba3 SetUnhandledExceptionFilter UnhandledExceptionFilter 23074 6cc76bc0 __invoke_watson 23073->23074 23075 6cc76bc8 GetCurrentProcess TerminateProcess 23073->23075 23074->23075 23075->23065 23076->23073 23078 6cc75fdd 23077->23078 23088 6cc75f3c 23077->23088 23103 6cc79494 6 API calls __decode_pointer 23078->23103 23080 6cc75fe3 23104 6cc77f70 67 API calls __getptd_noexit 23080->23104 23085 6cc75f99 RtlAllocateHeap 23085->23088 23086 6cc75f4d 23086->23088 23096 6cc76fbb 67 API calls 2 library calls 23086->23096 23097 6cc76e10 67 API calls 7 library calls 23086->23097 23098 6cc77814 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 23086->23098 23088->23085 23088->23086 23089 6cc75fc9 23088->23089 23092 6cc75fce 23088->23092 23094 6cc609ed 23088->23094 23099 6cc75edb 67 API calls 4 library calls 23088->23099 23100 6cc79494 6 API calls __decode_pointer 23088->23100 23101 6cc77f70 67 API calls __getptd_noexit 23089->23101 23102 6cc77f70 67 API calls __getptd_noexit 23092->23102 23094->23023 23095 6cc7663b RaiseException 23094->23095 23095->23023 23096->23086 23097->23086 23099->23088 23100->23088 23101->23092 23102->23094 23103->23080 23104->23094 23105 6cc51c20 23106 6cc51c32 WriteFile 23105->23106 23107 6cc51c2d 23105->23107 23108 6cc51c69 23106->23108 23107->23106 23109 6cc51c75 GetLastError 23108->23109 23110 6cc51c6f 23108->23110 23111 6cc51c7f 23109->23111 23112 6cc73ef0 23120 6cc73f2d 23112->23120 23113 6cc75f2a _malloc 67 API calls 23114 6cc74333 23113->23114 23116 6cc7434d 23114->23116 23240 6cc7663b RaiseException 23114->23240 23115 6cc740d3 23130 6cc71230 23116->23130 23120->23113 23120->23115 23122 6cc7437e 23241 6cc71a40 68 API calls 23122->23241 23124 6cc7439e 23124->23115 23125 6cc743d5 23124->23125 23242 6cc75bd8 6 API calls __fileno 23124->23242 23128 6cc743e0 23125->23128 23243 6cc75bd8 6 API calls __fileno 23125->23243 23128->23115 23244 6cc75bd8 6 API calls __fileno 23128->23244 23131 6cc75f2a _malloc 67 API calls 23130->23131 23132 6cc7125d 23131->23132 23133 6cc71277 23132->23133 23245 6cc7663b RaiseException 23132->23245 23135 6cc682b0 23133->23135 23246 6cc5f940 23135->23246 23137 6cc68305 23138 6cc68329 23137->23138 23404 6cc7663b RaiseException 23137->23404 23140 6cc54dd0 67 API calls 23138->23140 23141 6cc68334 23140->23141 23254 6cc67df0 23141->23254 23143 6cc68340 23258 6cc53be0 23143->23258 23146 6cc68395 23273 6cc542e0 23146->23273 23150 6cc75f2a _malloc 67 API calls 23151 6cc683b6 23150->23151 23153 6cc683d0 23151->23153 23406 6cc7663b RaiseException 23151->23406 23319 6cc66cc0 23153->23319 23157 6cc6846d 23338 6cc672f0 23157->23338 23160 6cc68498 23183 6cc684b7 23160->23183 23409 6cc7663b RaiseException 23160->23409 23161 6cc6841b 23161->23157 23408 6cc7663b RaiseException 23161->23408 23163 6cc68834 23164 6cc609e0 68 API calls 23163->23164 23193 6cc6883b 23164->23193 23165 6cc68c70 23380 6cc64c00 23165->23380 23167 6cc68819 23422 6cc7663b RaiseException 23167->23422 23168 6cc68cfe 23434 6cc7663b RaiseException 23168->23434 23169 6cc68d65 23436 6cc7663b RaiseException 23169->23436 23171 6cc68cb4 23171->23168 23172 6cc68ce9 23171->23172 23175 6cc68d19 23171->23175 23432 6cc7663b RaiseException 23171->23432 23433 6cc7663b RaiseException 23172->23433 23175->23169 23178 6cc68d4a 23175->23178 23224 6cc68af7 23175->23224 23176 6cc68d80 23437 6cc7663b RaiseException 23176->23437 23435 6cc7663b RaiseException 23178->23435 23182 6cc68d9d 23438 6cc7663b RaiseException 23182->23438 23183->23163 23183->23165 23183->23167 23410 6cc7e5ce 68 API calls 6 library calls 23183->23410 23186 6cc68531 23198 6cc6854a 23186->23198 23411 6cc693a0 68 API calls ___crtGetEnvironmentStringsA 23186->23411 23187 6cc68db8 23439 6cc7663b RaiseException 23187->23439 23190 6cc68dd3 23192 6cc68b71 23192->23122 23343 6cc60880 23193->23343 23195 6cc689c1 23196 6cc689eb 23195->23196 23423 6cc55290 68 API calls 2 library calls 23195->23423 23351 6cc58ab0 23196->23351 23412 6cc6a7b0 CharUpperW CharUpperW 23198->23412 23201 6cc6866d 23202 6cc68671 23201->23202 23203 6cc6868c 23201->23203 23413 6cc7663b RaiseException 23202->23413 23414 6cc6b9c0 147 API calls __CxxThrowException@8 23203->23414 23204 6cc68aa3 23208 6cc68c55 23204->23208 23209 6cc68aae 23204->23209 23205 6cc68a88 23426 6cc7663b RaiseException 23205->23426 23431 6cc7663b RaiseException 23208->23431 23215 6cc68b95 23209->23215 23218 6cc68ad8 23209->23218 23210 6cc68a3e 23210->23204 23210->23205 23210->23209 23211 6cc68a6d 23210->23211 23424 6cc7663b RaiseException 23210->23424 23425 6cc7663b RaiseException 23211->23425 23234 6cc68bb4 23215->23234 23429 6cc7663b RaiseException 23215->23429 23217 6cc68728 23219 6cc68733 23217->23219 23220 6cc687fe 23217->23220 23218->23224 23427 6cc7663b RaiseException 23218->23427 23226 6cc68752 23219->23226 23418 6cc7663b RaiseException 23219->23418 23421 6cc7663b RaiseException 23220->23421 23221 6cc686b2 23221->23217 23221->23219 23222 6cc6870d 23221->23222 23227 6cc686f2 23221->23227 23415 6cc7663b RaiseException 23221->23415 23417 6cc7663b RaiseException 23222->23417 23428 6cc68de0 67 API calls 23224->23428 23419 6cc68270 EnterCriticalSection LeaveCriticalSection 23226->23419 23416 6cc7663b RaiseException 23227->23416 23430 6cc68de0 67 API calls 23234->23430 23236 6cc68c2e 23236->23122 23237 6cc68796 23420 6cc68de0 67 API calls 23237->23420 23239 6cc687da 23239->23122 23240->23116 23241->23124 23242->23125 23243->23128 23244->23115 23245->23133 23247 6cc5f97d 23246->23247 23440 6cc58180 23247->23440 23249 6cc5f9be 23444 6cc602c0 23249->23444 23252 6cc5f9de 23253 6cc5fb0c 23252->23253 23448 6cc54d10 68 API calls 2 library calls 23252->23448 23253->23137 23255 6cc67e4b 23254->23255 23451 6cc67c10 23255->23451 23257 6cc67ecb 23257->23143 23455 6cc5fc80 23258->23455 23260 6cc53c1c 23460 6cc753fe 23260->23460 23264 6cc53c2d 23265 6cc753fe __fileno 67 API calls 23264->23265 23266 6cc53c43 23265->23266 23267 6cc7539a __write_nolock 67 API calls 23266->23267 23268 6cc53c49 23267->23268 23269 6cc753fe __fileno 67 API calls 23268->23269 23270 6cc53c5f 23269->23270 23271 6cc7539a __write_nolock 67 API calls 23270->23271 23272 6cc53c65 23271->23272 23272->23146 23405 6cc7663b RaiseException 23272->23405 23279 6cc5431b 23273->23279 23275 6cc52670 RaiseException 23275->23279 23276 6cc53cf0 CharUpperW RaiseException 23276->23279 23277 6cc52d80 99 API calls 23277->23279 23279->23275 23279->23276 23279->23277 23280 6cc54579 23279->23280 23282 6cc5474d 23279->23282 23283 6cc54583 23279->23283 23299 6cc54936 CharUpperW 23279->23299 23318 6cc546c7 23279->23318 23482 6cc526e0 23279->23482 23516 6cc52940 87 API calls __CxxThrowException@8 23279->23516 23517 6cc52670 RaiseException __CxxThrowException@8 23280->23517 23525 6cc53750 75 API calls 23282->23525 23285 6cc545c8 23283->23285 23518 6cc52d80 99 API calls 23283->23518 23287 6cc545f1 23285->23287 23519 6cc52d80 99 API calls 23285->23519 23291 6cc5460d 23287->23291 23520 6cc6e950 70 API calls __CxxThrowException@8 23287->23520 23288 6cc5475f 23526 6cc539a0 68 API calls 23288->23526 23486 6cc53250 23291->23486 23294 6cc6ed50 70 API calls 23296 6cc54a74 23294->23296 23296->23150 23299->23279 23300 6cc54623 23521 6cc54d10 68 API calls 2 library calls 23300->23521 23301 6cc5466f 23494 6cc53e70 23301->23494 23302 6cc5487b 23307 6cc53250 75 API calls 23302->23307 23304 6cc54814 23304->23302 23305 6cc5485a 23304->23305 23528 6cc7663b RaiseException 23304->23528 23305->23302 23529 6cc7663b RaiseException 23305->23529 23307->23318 23308 6cc5476c 23308->23304 23527 6cc54b20 __VEC_memcpy ___sbh_free_block 23308->23527 23310 6cc5464e 23522 6cc54d10 68 API calls 2 library calls 23310->23522 23315 6cc5465b 23315->23318 23523 6cc539a0 68 API calls 23315->23523 23316 6cc5469b 23316->23318 23524 6cc7663b RaiseException 23316->23524 23318->23294 23333 6cc66d1e 23319->23333 23320 6cc66fe8 23321 6cc66ff5 23320->23321 23322 6cc67001 23320->23322 23644 6cc669e0 23321->23644 23663 6cc65c80 16 API calls 23322->23663 23325 6cc6700b 23328 6cc669e0 79 API calls 23325->23328 23326 6cc751c7 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23327 6cc67139 23326->23327 23327->23161 23407 6cc7663b RaiseException 23327->23407 23330 6cc6703f 23328->23330 23337 6cc66ffc 23330->23337 23664 6cc66b40 86 API calls 23330->23664 23333->23320 23334 6cc755f0 __VEC_memcpy ___sbh_free_block 23333->23334 23661 6cc66280 68 API calls 23333->23661 23662 6cc67860 68 API calls 2 library calls 23333->23662 23334->23333 23335 6cc67094 23335->23337 23665 6cc66b40 86 API calls 23335->23665 23337->23326 23341 6cc67329 23338->23341 23340 6cc673fa 23340->23160 23341->23340 23342 6cc60880 RaiseException 23341->23342 23691 6cc607d0 CharUpperW CharUpperW 23341->23691 23342->23341 23344 6cc6088d 23343->23344 23349 6cc608fc ___crtGetEnvironmentStringsA 23343->23349 23345 6cc608aa 23344->23345 23692 6cc7663b RaiseException 23344->23692 23348 6cc608d2 23345->23348 23693 6cc7663b RaiseException 23345->23693 23348->23349 23694 6cc7663b RaiseException 23348->23694 23349->23195 23360 6cc58b3d 23351->23360 23352 6cc58ca8 23353 6cc75f2a _malloc 67 API calls 23352->23353 23354 6cc58cb5 23353->23354 23355 6cc58cfd 23354->23355 23750 6cc7663b RaiseException 23354->23750 23695 6cc58400 23355->23695 23358 6cc62470 9 API calls 23358->23360 23359 6cc58ccf 23751 6cc7663b RaiseException 23359->23751 23360->23352 23360->23358 23360->23359 23361 6cc58bf8 FindClose 23360->23361 23363 6cc58ce6 23360->23363 23364 6cc60880 RaiseException 23360->23364 23361->23360 23752 6cc7663b RaiseException 23363->23752 23364->23360 23366 6cc62470 9 API calls 23375 6cc58d0f 23366->23375 23367 6cc58e9f FindClose 23367->23375 23368 6cc59969 23755 6cc7663b RaiseException 23368->23755 23370 6cc59980 23373 6cc67240 CharUpperW CharUpperW 23373->23375 23374 6cc58d9f 23374->23210 23375->23366 23375->23367 23375->23368 23375->23373 23375->23374 23379 6cc59d00 RaiseException 23375->23379 23701 6cc59f10 23375->23701 23706 6cc5cae0 23375->23706 23725 6cc58670 23375->23725 23753 6cc607d0 CharUpperW CharUpperW 23375->23753 23754 6cc755f0 __VEC_memcpy 23375->23754 23379->23375 23395 6cc64c52 23380->23395 23398 6cc652a9 23380->23398 23381 6cc62470 9 API calls 23381->23395 23382 6cc64cdf FindClose 23382->23395 23383 6cc5cae0 88 API calls 23383->23395 23384 6cc65315 23940 6cc7663b RaiseException 23384->23940 23386 6cc652eb 23390 6cc65303 23386->23390 23938 6cc7663b RaiseException 23386->23938 23387 6cc652c1 23387->23384 23387->23386 23388 6cc65327 23387->23388 23937 6cc7663b RaiseException 23387->23937 23388->23171 23939 6cc7663b RaiseException 23390->23939 23394 6cc5abe0 VariantClear 23394->23395 23395->23381 23395->23382 23395->23383 23395->23387 23395->23394 23396 6cc5ab10 VariantClear 23395->23396 23395->23398 23399 6cc64a10 VariantClear RaiseException 23395->23399 23401 6cc64b60 VariantClear 23395->23401 23921 6cc65440 23395->23921 23933 6cc6e6e0 72 API calls 23395->23933 23934 6cc64ac0 VariantClear 23395->23934 23935 6cc76308 67 API calls 4 library calls 23395->23935 23936 6cc65560 68 API calls 23395->23936 23396->23395 23398->23171 23399->23395 23401->23395 23404->23138 23405->23146 23406->23153 23407->23161 23408->23157 23409->23183 23410->23186 23411->23198 23412->23201 23413->23203 23414->23221 23415->23227 23416->23222 23417->23217 23418->23226 23419->23237 23420->23239 23421->23167 23422->23163 23423->23195 23424->23211 23425->23205 23426->23204 23427->23224 23428->23192 23429->23234 23430->23236 23431->23165 23432->23172 23433->23168 23434->23175 23435->23169 23436->23176 23437->23182 23438->23187 23439->23190 23441 6cc58209 23440->23441 23442 6cc58194 23440->23442 23441->23249 23442->23441 23449 6cc755f0 __VEC_memcpy 23442->23449 23445 6cc602d0 23444->23445 23446 6cc6032a 23445->23446 23450 6cc755f0 __VEC_memcpy 23445->23450 23446->23252 23448->23252 23449->23441 23450->23446 23452 6cc67c7f 23451->23452 23453 6cc71230 68 API calls 23452->23453 23454 6cc67d20 23453->23454 23454->23257 23456 6cc5fd05 23455->23456 23457 6cc5fc9a 23455->23457 23456->23260 23457->23456 23475 6cc5fd20 70 API calls __CxxThrowException@8 23457->23475 23476 6cc54d10 68 API calls 2 library calls 23457->23476 23461 6cc7540d 23460->23461 23462 6cc53c27 23460->23462 23477 6cc77f70 67 API calls __getptd_noexit 23461->23477 23466 6cc7539a 23462->23466 23464 6cc75412 23478 6cc75bb2 6 API calls 2 library calls 23464->23478 23467 6cc753a7 23466->23467 23468 6cc753b6 23466->23468 23479 6cc77f70 67 API calls __getptd_noexit 23467->23479 23474 6cc753da 23468->23474 23480 6cc77f70 67 API calls __getptd_noexit 23468->23480 23471 6cc753ac 23471->23264 23472 6cc753ca 23481 6cc75bb2 6 API calls 2 library calls 23472->23481 23474->23264 23475->23457 23476->23457 23477->23464 23479->23471 23480->23472 23483 6cc52720 23482->23483 23483->23483 23484 6cc52745 CharUpperW 23483->23484 23485 6cc5276e 23484->23485 23485->23279 23487 6cc53279 23486->23487 23488 6cc53258 23486->23488 23490 6cc6ed50 23487->23490 23488->23487 23530 6cc53070 23488->23530 23492 6cc6ed5a 23490->23492 23491 6cc5461d 23491->23300 23491->23301 23492->23491 23552 6cc6e7f0 70 API calls 23492->23552 23553 6cc64320 23494->23553 23496 6cc53f6f 23497 6cc541a5 23496->23497 23505 6cc53f83 23496->23505 23582 6cc7663b RaiseException 23497->23582 23499 6cc541ba 23500 6cc5401c 23512 6cc54047 23500->23512 23568 6cc7663b RaiseException 23500->23568 23502 6cc540cf 23581 6cc5d620 CharUpperW CharUpperW RaiseException 23502->23581 23505->23500 23567 6cc54d10 68 API calls 2 library calls 23505->23567 23506 6cc540f6 23508 6cc60880 RaiseException 23506->23508 23509 6cc54104 23508->23509 23510 6cc60880 RaiseException 23509->23510 23514 6cc5410f 23510->23514 23512->23502 23569 6cc61df0 23512->23569 23580 6cc54d10 68 API calls 2 library calls 23512->23580 23513 6cc54d10 68 API calls 23513->23514 23514->23513 23515 6cc5414c 23514->23515 23515->23315 23516->23279 23517->23283 23518->23285 23519->23287 23520->23291 23521->23310 23522->23315 23523->23316 23524->23318 23525->23288 23526->23308 23527->23304 23528->23305 23529->23302 23543 6cc53030 23530->23543 23533 6cc53030 10 API calls 23534 6cc530b3 23533->23534 23542 6cc530d9 23534->23542 23547 6cc52f70 23534->23547 23535 6cc53235 23535->23488 23538 6cc53070 75 API calls 23539 6cc531ce 23538->23539 23539->23535 23539->23538 23540 6cc55a70 68 API calls 23540->23542 23541 6cc60880 RaiseException 23541->23542 23542->23539 23542->23540 23542->23541 23551 6cc607d0 CharUpperW CharUpperW 23542->23551 23544 6cc5306a 23543->23544 23545 6cc5303b 23543->23545 23544->23533 23545->23544 23546 6cc52f70 10 API calls 23545->23546 23546->23545 23548 6cc52fa2 23547->23548 23550 6cc52fef 23547->23550 23549 6cc625a0 10 API calls 23548->23549 23548->23550 23549->23550 23550->23534 23551->23542 23552->23492 23554 6cc6437a 23553->23554 23555 6cc643cb 23553->23555 23554->23555 23562 6cc6441d 23554->23562 23583 6cc635f0 23554->23583 23626 6cc63460 68 API calls 23554->23626 23556 6cc60880 RaiseException 23555->23556 23558 6cc643d5 23556->23558 23560 6cc60880 RaiseException 23558->23560 23561 6cc643e0 23560->23561 23563 6cc60880 RaiseException 23561->23563 23562->23496 23564 6cc643eb 23563->23564 23565 6cc60880 RaiseException 23564->23565 23566 6cc643f6 23565->23566 23566->23496 23567->23505 23568->23512 23570 6cc61e14 23569->23570 23571 6cc61e25 GetFullPathNameW 23569->23571 23570->23571 23577 6cc61e46 23571->23577 23572 6cc61e5f 23572->23512 23573 6cc61ecc lstrlenW 23574 6cc61edd 23573->23574 23643 6cc61cc0 CharUpperW CharUpperW 23574->23643 23575 6cc61e87 GetFullPathNameW 23576 6cc61ea5 23575->23576 23576->23572 23576->23573 23576->23574 23577->23572 23577->23575 23577->23576 23579 6cc61ef0 23579->23512 23580->23512 23581->23506 23582->23499 23585 6cc63628 23583->23585 23584 6cc64303 23584->23554 23585->23584 23599 6cc63e62 23585->23599 23600 6cc636e8 23585->23600 23586 6cc62470 9 API calls 23586->23600 23588 6cc62470 9 API calls 23605 6cc63a79 23588->23605 23589 6cc637c3 FindClose 23589->23600 23590 6cc64213 GetLastError 23591 6cc64225 GetLastError 23590->23591 23598 6cc6426f 23590->23598 23594 6cc64257 23591->23594 23595 6cc64234 23591->23595 23592 6cc637d1 GetLastError 23592->23600 23593 6cc63b47 FindClose 23593->23605 23641 6cc54d10 68 API calls 2 library calls 23594->23641 23601 6cc60880 RaiseException 23595->23601 23597 6cc63c19 GetLastError 23597->23605 23608 6cc642a5 FindClose 23598->23608 23609 6cc642ac 23598->23609 23599->23590 23610 6cc54d10 68 API calls 23599->23610 23612 6cc642c4 23599->23612 23615 6cc60880 RaiseException 23599->23615 23619 6cc6e790 70 API calls 23599->23619 23632 6cc62790 10 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 23599->23632 23633 6cc631d0 68 API calls 23599->23633 23634 6cc6e370 CharUpperW CharUpperW 23599->23634 23635 6cc55bb0 23599->23635 23640 6cc634f0 85 API calls 23599->23640 23600->23586 23600->23589 23600->23592 23602 6cc54d10 68 API calls 23600->23602 23600->23605 23607 6cc60880 RaiseException 23600->23607 23625 6cc63ba9 23600->23625 23627 6cc6e790 70 API calls 23600->23627 23628 6cc631d0 68 API calls 23600->23628 23629 6cc6e370 CharUpperW CharUpperW 23600->23629 23630 6cc634f0 85 API calls 23600->23630 23601->23594 23602->23600 23605->23588 23605->23593 23605->23597 23606 6cc54d10 68 API calls 23605->23606 23611 6cc60880 RaiseException 23605->23611 23618 6cc63db4 23605->23618 23631 6cc634f0 85 API calls 23605->23631 23606->23605 23607->23600 23608->23609 23609->23554 23610->23599 23611->23605 23613 6cc64301 23612->23613 23614 6cc642fa FindClose 23612->23614 23613->23584 23614->23613 23615->23599 23618->23554 23619->23599 23625->23554 23626->23554 23627->23600 23628->23600 23629->23600 23630->23600 23631->23605 23632->23599 23633->23599 23634->23599 23636 6cc60880 RaiseException 23635->23636 23638 6cc55bc8 23636->23638 23637 6cc55be6 23637->23599 23638->23637 23642 6cc54d10 68 API calls 2 library calls 23638->23642 23640->23599 23641->23598 23642->23638 23643->23579 23645 6cc66a3e 23644->23645 23646 6cc66a0f LoadLibraryExW 23644->23646 23666 6cc67750 23645->23666 23647 6cc66a37 FreeLibrary 23646->23647 23648 6cc66a22 23646->23648 23647->23645 23648->23337 23651 6cc66ae9 23651->23337 23652 6cc66a97 GetProcAddress 23652->23651 23655 6cc66ab5 23652->23655 23653 6cc66a83 FreeLibrary 23653->23652 23654 6cc66a8e 23653->23654 23654->23652 23673 6cc65f50 GetProcAddress 23655->23673 23658 6cc66acc 23681 6cc66530 73 API calls 2 library calls 23658->23681 23660 6cc66ad8 23660->23651 23661->23333 23662->23333 23663->23325 23664->23335 23665->23337 23667 6cc75f2a _malloc 67 API calls 23666->23667 23668 6cc67762 23667->23668 23671 6cc6777e 23668->23671 23682 6cc7663b RaiseException 23668->23682 23670 6cc66a54 23670->23651 23670->23652 23670->23653 23671->23670 23672 6cc60880 RaiseException 23671->23672 23672->23670 23674 6cc65f90 GetProcAddress 23673->23674 23675 6cc6601a 23673->23675 23679 6cc65fa5 23674->23679 23676 6cc751c7 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23675->23676 23677 6cc66029 23676->23677 23677->23651 23677->23658 23678 6cc65e80 VariantClear 23678->23679 23679->23675 23679->23678 23683 6cc677e0 23679->23683 23681->23660 23682->23671 23684 6cc75f2a _malloc 67 API calls 23683->23684 23685 6cc677eb 23684->23685 23688 6cc67808 23685->23688 23690 6cc7663b RaiseException 23685->23690 23687 6cc67843 23687->23679 23688->23687 23689 6cc60880 RaiseException 23688->23689 23689->23687 23690->23688 23691->23341 23692->23345 23693->23348 23694->23349 23696 6cc58473 23695->23696 23697 6cc75f2a _malloc 67 API calls 23696->23697 23698 6cc584fb 23697->23698 23700 6cc58515 23698->23700 23756 6cc7663b RaiseException 23698->23756 23700->23375 23702 6cc60880 RaiseException 23701->23702 23704 6cc59f2e 23702->23704 23703 6cc59f81 23703->23375 23704->23703 23705 6cc60880 RaiseException 23704->23705 23705->23704 23707 6cc75f2a _malloc 67 API calls 23706->23707 23708 6cc5cb1d 23707->23708 23710 6cc5cb35 23708->23710 23777 6cc7663b RaiseException 23708->23777 23711 6cc5cc8c 23710->23711 23712 6cc61df0 5 API calls 23710->23712 23763 6cc5c430 23711->23763 23713 6cc5cbcc 23712->23713 23715 6cc5cbd3 GetLastError 23713->23715 23720 6cc5cc24 23713->23720 23719 6cc5cbe4 23715->23719 23716 6cc5ccbc 23718 6cc5ccc2 23716->23718 23778 6cc54d10 68 API calls 2 library calls 23716->23778 23718->23375 23719->23375 23757 6cc5a910 23720->23757 23721 6cc5cd7e 23721->23375 23724 6cc5cd2e 23724->23721 23779 6cc54d10 68 API calls 2 library calls 23724->23779 23726 6cc587cd 23725->23726 23735 6cc586cf 23725->23735 23733 6cc587d9 23726->23733 23863 6cc5a5c0 23726->23863 23728 6cc5abe0 VariantClear 23728->23735 23729 6cc588d1 23868 6cc599d0 23729->23868 23731 6cc586e1 23731->23375 23732 6cc5ab10 VariantClear 23732->23735 23733->23375 23734 6cc588e5 23737 6cc58931 23734->23737 23874 6cc61420 23734->23874 23735->23726 23735->23728 23735->23731 23735->23732 23901 6cc6e6e0 72 API calls 23735->23901 23902 6cc59d00 RaiseException 23735->23902 23887 6cc55e10 23737->23887 23740 6cc5890f 23740->23737 23742 6cc58916 GetLastError 23740->23742 23741 6cc58967 23891 6cc5d1b0 23741->23891 23903 6cc7663b RaiseException 23742->23903 23746 6cc58a26 23748 6cc62e40 VariantClear 23746->23748 23747 6cc58974 23747->23731 23747->23746 23904 6cc62f70 RaiseException __CxxThrowException@8 23747->23904 23748->23731 23750->23359 23751->23363 23752->23355 23753->23375 23754->23375 23755->23370 23756->23700 23758 6cc5a943 23757->23758 23759 6cc625a0 10 API calls 23758->23759 23760 6cc5a966 23759->23760 23761 6cc5a997 23760->23761 23780 6cc7663b RaiseException 23760->23780 23761->23711 23773 6cc5c46b 23763->23773 23764 6cc5c88a 23767 6cc62e40 VariantClear 23764->23767 23765 6cc5caa1 23768 6cc62e40 VariantClear 23765->23768 23769 6cc5c893 23767->23769 23771 6cc5c860 23768->23771 23769->23716 23770 6cc62e40 VariantClear 23770->23773 23771->23716 23772 6cc5abe0 VariantClear 23772->23773 23773->23716 23773->23764 23773->23765 23773->23770 23773->23771 23773->23772 23776 6cc5ce60 68 API calls 23773->23776 23781 6cc5c2d0 23773->23781 23797 6cc5ae70 23773->23797 23840 6cc5ad90 VariantClear 23773->23840 23776->23773 23777->23710 23778->23724 23779->23724 23780->23761 23782 6cc5c351 23781->23782 23783 6cc5c311 23781->23783 23784 6cc75f2a _malloc 67 API calls 23782->23784 23785 6cc75f2a _malloc 67 API calls 23783->23785 23786 6cc5c358 23784->23786 23787 6cc5c318 23785->23787 23788 6cc5c374 23786->23788 23842 6cc7663b RaiseException 23786->23842 23789 6cc5c334 23787->23789 23841 6cc7663b RaiseException 23787->23841 23792 6cc62a70 4 API calls 23788->23792 23793 6cc5ae70 13 API calls 23789->23793 23794 6cc5c3b8 23792->23794 23796 6cc5c3d3 23793->23796 23794->23789 23795 6cc5c3bc GetLastError 23794->23795 23795->23796 23796->23773 23800 6cc5aecd 23797->23800 23798 6cc5afba 23799 6cc60880 RaiseException 23798->23799 23813 6cc5afca 23799->23813 23800->23798 23806 6cc5afe4 23800->23806 23801 6cc5b0e3 23808 6cc5b1a8 23801->23808 23817 6cc5b734 23801->23817 23838 6cc5b0fa 23801->23838 23853 6cc607d0 CharUpperW CharUpperW 23801->23853 23804 6cc5b19d 23804->23808 23804->23817 23805 6cc60880 RaiseException 23805->23806 23806->23801 23806->23805 23851 6cc607d0 CharUpperW CharUpperW 23806->23851 23852 6cc60930 __VEC_memcpy RaiseException ___sbh_free_block 23806->23852 23808->23838 23854 6cc5ce00 __VEC_memcpy ___sbh_free_block 23808->23854 23809 6cc751c7 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23810 6cc5bd53 23809->23810 23810->23773 23821 6cc5be65 23813->23821 23813->23838 23843 6cc51ab0 23813->23843 23814 6cc5b9e7 23814->23813 23859 6cc607d0 CharUpperW CharUpperW 23814->23859 23815 6cc5b6c4 23818 6cc59f10 RaiseException 23815->23818 23822 6cc5b915 23817->23822 23828 6cc5b6ea 23817->23828 23817->23838 23855 6cc607d0 CharUpperW CharUpperW 23817->23855 23818->23828 23820 6cc5bee7 VariantClear 23830 6cc5bef4 23820->23830 23821->23820 23821->23830 23821->23838 23856 6cc60990 __VEC_memcpy ___sbh_free_block 23822->23856 23823 6cc5b639 23823->23815 23825 6cc60880 RaiseException 23823->23825 23825->23823 23826 6cc5b923 23857 6cc60930 __VEC_memcpy RaiseException ___sbh_free_block 23826->23857 23827 6cc5b3c7 _memset 23827->23823 23832 6cc60880 RaiseException 23827->23832 23827->23838 23828->23813 23828->23814 23858 6cc607d0 CharUpperW CharUpperW 23828->23858 23835 6cc5c0f3 23830->23835 23836 6cc5bf38 23830->23836 23831 6cc5c122 23862 6cc580f0 CharUpperW CharUpperW __VEC_memcpy 23831->23862 23832->23827 23835->23831 23861 6cc607d0 CharUpperW CharUpperW 23835->23861 23860 6cc580f0 CharUpperW CharUpperW __VEC_memcpy 23836->23860 23838->23809 23840->23773 23841->23789 23842->23788 23844 6cc51ad0 SetFilePointer 23843->23844 23845 6cc51ac3 23843->23845 23846 6cc51b01 GetLastError 23844->23846 23847 6cc51b0b 23844->23847 23845->23813 23846->23847 23848 6cc51b25 23847->23848 23849 6cc51b2f GetLastError 23847->23849 23848->23813 23850 6cc51b35 23849->23850 23850->23813 23851->23806 23852->23806 23853->23804 23854->23827 23855->23817 23856->23826 23857->23828 23858->23828 23859->23814 23860->23838 23861->23835 23862->23838 23864 6cc5a2f0 __VEC_memcpy 23863->23864 23865 6cc5a5fc 23864->23865 23866 6cc5a240 3 API calls 23865->23866 23867 6cc5a60d 23866->23867 23867->23729 23869 6cc599e4 23868->23869 23873 6cc599ed 23868->23873 23869->23734 23870 6cc599fe 23870->23734 23873->23870 23905 6cc755f0 __VEC_memcpy 23873->23905 23906 6cc59e80 __VEC_memcpy ___sbh_free_block 23873->23906 23876 6cc61454 23874->23876 23875 6cc614ca 23907 6cc61340 CreateDirectoryW 23875->23907 23876->23875 23883 6cc61659 23876->23883 23916 6cc755f0 __VEC_memcpy 23876->23916 23878 6cc61520 23879 6cc61528 GetLastError 23878->23879 23878->23883 23885 6cc61655 23878->23885 23886 6cc61340 4 API calls 23878->23886 23879->23878 23881 6cc61630 23879->23881 23882 6cc625a0 10 API calls 23881->23882 23882->23885 23883->23740 23884 6cc61340 4 API calls 23884->23885 23885->23883 23885->23884 23886->23878 23888 6cc55e5d 23887->23888 23889 6cc55bb0 68 API calls 23888->23889 23890 6cc55f27 23889->23890 23890->23741 23897 6cc5d1ec 23891->23897 23898 6cc5d487 23891->23898 23892 6cc5d415 23895 6cc60880 RaiseException 23892->23895 23892->23898 23895->23892 23897->23892 23897->23898 23900 6cc62e40 VariantClear 23897->23900 23917 6cc5d100 SysAllocString VariantClear RaiseException 23897->23917 23918 6cc54d10 68 API calls 2 library calls 23897->23918 23919 6cc62ec0 VariantClear VariantCopy __VEC_memcpy ___sbh_free_block 23897->23919 23920 6cc7663b RaiseException 23897->23920 23898->23747 23900->23897 23901->23735 23902->23735 23903->23737 23904->23746 23905->23873 23906->23873 23908 6cc6138c GetLastError 23907->23908 23909 6cc61378 23907->23909 23910 6cc61399 23908->23910 23914 6cc613ff 23908->23914 23909->23878 23911 6cc628a0 GetCurrentDirectoryW 23910->23911 23912 6cc613bf 23911->23912 23913 6cc613d1 CreateDirectoryW 23912->23913 23912->23914 23915 6cc613e5 23913->23915 23914->23878 23915->23878 23916->23875 23917->23897 23918->23897 23919->23897 23920->23897 23922 6cc6547d 23921->23922 23923 6cc65478 23921->23923 23925 6cc65509 23922->23925 23942 6cc659c0 68 API calls 3 library calls 23922->23942 23941 6cc5ed10 68 API calls 2 library calls 23923->23941 23925->23395 23927 6cc654a9 23928 6cc654c0 23927->23928 23943 6cc75bd8 6 API calls __fileno 23927->23943 23931 6cc654cd 23928->23931 23944 6cc75bd8 6 API calls __fileno 23928->23944 23931->23925 23945 6cc75ff4 67 API calls 7 library calls 23931->23945 23933->23395 23934->23395 23935->23395 23936->23395 23937->23386 23938->23390 23939->23384 23940->23388 23941->23922 23942->23927 23943->23928 23944->23931 23945->23925 23946 6cc728b0 23947 6cc728f6 23946->23947 23948 6cc728bd 23946->23948 23948->23947 23952 6cc72bf0 23948->23952 23953 6cc72c0a 23952->23953 23954 6cc72bf9 FreeLibrary 23952->23954 23955 6cc728f1 23953->23955 23956 6cc72c13 DeleteFileW 23953->23956 23954->23953 23957 6cc72a30 23955->23957 23956->23955 23958 6cc72a94 23957->23958 23959 6cc72b5b 23958->23959 23969 6cc72aac _memset 23958->23969 23986 6cc72c40 70 API calls ___crtGetEnvironmentStringsA 23959->23986 23961 6cc72b65 23962 6cc72b76 FindResourceW 23961->23962 23964 6cc72bb2 23961->23964 23963 6cc72b88 23962->23963 23962->23964 23976 6cc72980 LoadResource 23963->23976 23966 6cc751c7 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23964->23966 23968 6cc72bdd 23966->23968 23967 6cc72b94 23967->23964 23970 6cc72ba6 LoadLibraryW 23967->23970 23968->23947 23971 6cc72b13 FindFirstFileW 23969->23971 23970->23964 23972 6cc72b72 23971->23972 23973 6cc72b2d 23971->23973 23972->23962 23974 6cc72b3b LoadLibraryW FindClose 23973->23974 23975 6cc72b54 23974->23975 23975->23964 23977 6cc7299f SizeofResource 23976->23977 23978 6cc72a1b 23976->23978 23977->23978 23979 6cc729ad LockResource 23977->23979 23978->23967 23979->23978 23980 6cc729ba CreateFileW 23979->23980 23980->23978 23981 6cc729dc WriteFile 23980->23981 23982 6cc729ef FindCloseChangeNotification 23981->23982 23984 6cc72a04 DeleteFileW 23982->23984 23985 6cc72a10 23982->23985 23984->23985 23985->23967 23986->23961 23987 6cc73c8e 23989 6cc73bd7 23987->23989 23988 6cc73d60 23989->23988 23990 6cc682b0 199 API calls 23989->23990 23991 6cc73c62 23990->23991 23992 6cc7658b 23993 6cc76596 23992->23993 23994 6cc7659b 23992->23994 24006 6cc7a8ed GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 23993->24006 23998 6cc76495 23994->23998 23997 6cc765a9 23999 6cc764a1 _flsall 23998->23999 24001 6cc7653e _flsall 23999->24001 24003 6cc764ee ___DllMainCRTStartup 23999->24003 24007 6cc76360 23999->24007 24001->23997 24002 6cc76360 __CRT_INIT@12 156 API calls 24002->24001 24003->24001 24004 6cc76360 __CRT_INIT@12 156 API calls 24003->24004 24005 6cc7651e 24003->24005 24004->24005 24005->24001 24005->24002 24006->23994 24008 6cc7636f 24007->24008 24009 6cc763eb 24007->24009 24056 6cc793e1 HeapCreate 24008->24056 24011 6cc76422 24009->24011 24012 6cc763f1 24009->24012 24013 6cc76427 24011->24013 24014 6cc76480 24011->24014 24018 6cc7640c 24012->24018 24025 6cc7637a 24012->24025 24067 6cc77a46 67 API calls _doexit 24012->24067 24071 6cc770ea 8 API calls __decode_pointer 24013->24071 24014->24025 24076 6cc77404 79 API calls 2 library calls 24014->24076 24017 6cc76381 24058 6cc77472 78 API calls 7 library calls 24017->24058 24018->24025 24068 6cc77ee0 68 API calls ___crtGetEnvironmentStringsA 24018->24068 24019 6cc7642c 24072 6cc77653 67 API calls __calloc_impl 24019->24072 24025->24003 24026 6cc76386 __RTC_Initialize 24032 6cc76396 GetCommandLineA 24026->24032 24048 6cc7638a 24026->24048 24027 6cc76416 24069 6cc7711e 70 API calls 2 library calls 24027->24069 24028 6cc76438 24028->24025 24073 6cc7706f 6 API calls __crt_waiting_on_module_handle 24028->24073 24031 6cc7641b 24070 6cc79411 VirtualFree HeapFree HeapFree HeapDestroy 24031->24070 24060 6cc7a76a 76 API calls 2 library calls 24032->24060 24036 6cc76456 24039 6cc76474 24036->24039 24040 6cc7645d 24036->24040 24037 6cc763a6 24061 6cc77c8c 72 API calls 3 library calls 24037->24061 24075 6cc75ff4 67 API calls 7 library calls 24039->24075 24074 6cc7715b 67 API calls 5 library calls 24040->24074 24041 6cc763b0 24054 6cc763b4 24041->24054 24063 6cc7a6af 112 API calls 3 library calls 24041->24063 24044 6cc76464 GetCurrentThreadId 24044->24025 24045 6cc7638f 24045->24025 24059 6cc79411 VirtualFree HeapFree HeapFree HeapDestroy 24048->24059 24049 6cc763c0 24050 6cc763d4 24049->24050 24064 6cc7a437 111 API calls 6 library calls 24049->24064 24050->24045 24066 6cc77ee0 68 API calls ___crtGetEnvironmentStringsA 24050->24066 24053 6cc763c9 24053->24050 24065 6cc7787f 74 API calls 5 library calls 24053->24065 24062 6cc7711e 70 API calls 2 library calls 24054->24062 24057 6cc76375 24056->24057 24057->24017 24057->24025 24058->24026 24059->24045 24060->24037 24061->24041 24062->24048 24063->24049 24064->24053 24065->24050 24066->24054 24067->24018 24068->24027 24069->24031 24070->24025 24071->24019 24072->24028 24073->24036 24074->24044 24075->24045 24076->24025
                                    APIs
                                      • Part of subcall function 6CC607D0: CharUpperW.USER32(?,00000000,?,6CC5FCF3,?,6CC5FE6C,?,00000000,?,00000010,B4419C60,?,00000000,00000000), ref: 6CC607F7
                                      • Part of subcall function 6CC607D0: CharUpperW.USER32(?,?,6CC5FE6C,?,00000000,?,00000010,B4419C60,?,00000000,00000000), ref: 6CC60804
                                    • _memset.LIBCMT ref: 6CC5B3D4
                                    • VariantClear.OLEAUT32(?), ref: 6CC5BEEE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CharUpper$ClearVariant_memset
                                    • String ID: !$001$R$Unknown error$a$exe$iso$r$rar$udf
                                    • API String ID: 2702283269-2136912355
                                    • Opcode ID: 6c2dcc235a526218a064a9219a22b03a65bbd1dc26e4a410ab0a5e7f03907a09
                                    • Instruction ID: 9c56bac5e93b5c17ce738ca691599a03b830d5fbaaab75a8b7d5575671ec3ce4
                                    • Opcode Fuzzy Hash: 6c2dcc235a526218a064a9219a22b03a65bbd1dc26e4a410ab0a5e7f03907a09
                                    • Instruction Fuzzy Hash: CBC27B759012688FCB24CF28CC90BDABBB0BF49304F5441D9E549AB750EB71AEA5CF94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 712 6cc58ab0-6cc58b3b 713 6cc58b42-6cc58b45 712->713 714 6cc58b3d-6cc58b40 712->714 715 6cc58b48-6cc58b52 713->715 714->715 716 6cc58b58-6cc58baf call 6cc7514c 715->716 717 6cc58cab-6cc58cba call 6cc75f2a 715->717 724 6cc58bb1-6cc58bde call 6cc62470 716->724 725 6cc58c1c-6cc58c24 716->725 722 6cc58cfd-6cc58d25 call 6cc58400 717->722 723 6cc58cbc-6cc58cca call 6cc7663b 717->723 742 6cc58d27-6cc58d2c 722->742 743 6cc58d2f-6cc58d80 722->743 731 6cc58ccf-6cc58ce1 call 6cc7663b 723->731 736 6cc58be3-6cc58bf6 724->736 727 6cc58c26-6cc58c2e 725->727 728 6cc58c4d-6cc58ca2 call 6cc751d6 725->728 732 6cc58c37-6cc58c3a 727->732 733 6cc58c30-6cc58c35 727->733 728->716 750 6cc58ca8 728->750 746 6cc58ce6-6cc58cf8 call 6cc7663b 731->746 740 6cc58c41-6cc58c48 call 6cc60880 732->740 741 6cc58c3c 732->741 733->740 737 6cc58bff-6cc58c03 736->737 738 6cc58bf8-6cc58bf9 FindClose 736->738 737->731 745 6cc58c09-6cc58c16 737->745 738->737 740->728 741->740 742->743 748 6cc58de4-6cc58dee 743->748 749 6cc58d82-6cc58d9d 743->749 745->725 745->746 746->722 752 6cc58df4-6cc58e4e call 6cc7514c 748->752 753 6cc59562-6cc595fb call 6cc751d6 748->753 749->748 756 6cc58d9f-6cc58ddf call 6cc751d6 749->756 750->717 759 6cc58e67-6cc58e9d call 6cc62470 752->759 760 6cc58e50-6cc58e65 752->760 774 6cc595ff-6cc59617 753->774 756->774 770 6cc58ea6-6cc58eaa 759->770 771 6cc58e9f-6cc58ea0 FindClose 759->771 763 6cc58ec3-6cc58ede 760->763 779 6cc58ee4-6cc58f8d call 6cc59f10 763->779 780 6cc59618-6cc5966a call 6cc751d6 * 2 763->780 772 6cc58eb0-6cc58ebd 770->772 773 6cc59969-6cc59980 call 6cc7663b 770->773 771->770 772->763 772->773 788 6cc58f93-6cc58f98 779->788 789 6cc590ff-6cc5912d call 6cc5cae0 779->789 780->774 788->789 792 6cc58f9e-6cc58faa 788->792 798 6cc59133-6cc59158 789->798 799 6cc5966c-6cc59709 call 6cc751d6 call 6cc582a0 call 6cc751d6 * 2 789->799 795 6cc58fc1-6cc58fc9 792->795 796 6cc58fac 792->796 795->789 797 6cc58fcf-6cc58ff9 call 6cc51640 call 6cc67240 795->797 801 6cc58fb0-6cc58fb2 796->801 813 6cc590e6-6cc590fc call 6cc751d6 797->813 814 6cc58fff-6cc5900f call 6cc60790 797->814 815 6cc5970e-6cc59761 call 6cc751d6 call 6cc582a0 798->815 816 6cc5915e-6cc59160 798->816 799->774 801->789 802 6cc58fb8-6cc58fbf 801->802 802->795 802->801 813->789 814->813 831 6cc59015-6cc59058 call 6cc51660 call 6cc51460 call 6cc751d6 814->831 854 6cc59762-6cc597a8 call 6cc751d6 * 2 815->854 820 6cc59162-6cc591c6 call 6cc751d6 call 6cc582a0 call 6cc751d6 816->820 821 6cc591cb-6cc591d0 816->821 876 6cc59549-6cc59559 820->876 825 6cc591d6-6cc591e3 821->825 826 6cc592a8 821->826 832 6cc592af 825->832 833 6cc591e9 825->833 826->832 831->813 873 6cc5905e-6cc5906c 831->873 838 6cc592b1-6cc592e4 832->838 839 6cc592ea-6cc5931a call 6cc7514c 832->839 837 6cc591f0-6cc59206 call 6cc59ae0 833->837 858 6cc59296-6cc592a2 837->858 859 6cc5920c-6cc59210 837->859 838->815 838->839 852 6cc59344-6cc59375 839->852 853 6cc5931c-6cc59322 839->853 877 6cc597ad-6cc5980e call 6cc751d6 * 2 call 6cc582a0 852->877 878 6cc5937b-6cc59382 852->878 860 6cc59324-6cc59335 853->860 861 6cc59337-6cc59341 call 6cc751d6 853->861 854->774 858->826 858->837 859->858 866 6cc59216-6cc59251 859->866 860->860 860->861 861->852 893 6cc59253-6cc59259 866->893 894 6cc5925b-6cc59284 call 6cc755f0 866->894 879 6cc5907d-6cc59085 873->879 880 6cc5906e-6cc59072 873->880 876->752 884 6cc5955f 876->884 877->854 882 6cc59384-6cc59396 878->882 883 6cc5939c-6cc593ab 878->883 879->813 888 6cc59087-6cc590b6 call 6cc51640 call 6cc67240 call 6cc751d6 879->888 880->813 886 6cc59074-6cc5907b 880->886 882->877 882->883 889 6cc593ad 883->889 890 6cc593e9-6cc593f9 883->890 884->753 886->879 886->880 888->813 930 6cc590b8-6cc590cc call 6cc607d0 888->930 892 6cc593b0-6cc593bd 889->892 896 6cc5940b 890->896 897 6cc593fb-6cc59402 890->897 900 6cc593e0-6cc593e7 892->900 901 6cc593bf-6cc593cf 892->901 893->894 903 6cc59288-6cc59292 893->903 894->903 907 6cc5940d-6cc59459 call 6cc58670 896->907 897->896 906 6cc59404-6cc59409 897->906 900->890 900->892 901->877 918 6cc593d5-6cc593dc 901->918 903->858 906->907 917 6cc5945e-6cc59465 907->917 921 6cc59813-6cc598b9 call 6cc751d6 * 2 call 6cc582a0 call 6cc751d6 * 2 917->921 922 6cc5946b-6cc59470 917->922 918->900 921->774 926 6cc59472-6cc5949c 922->926 927 6cc5949e-6cc594a5 922->927 928 6cc594ac-6cc594d6 926->928 927->928 931 6cc594dc-6cc59544 call 6cc751d6 * 2 call 6cc582a0 call 6cc751d6 928->931 932 6cc598be-6cc59964 call 6cc751d6 * 2 call 6cc582a0 call 6cc751d6 * 2 928->932 930->813 941 6cc590ce-6cc590e1 call 6cc59d00 * 2 930->941 931->876 932->774 941->813
                                    APIs
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 6CC58BF9
                                    • _malloc.LIBCMT ref: 6CC58CB0
                                    • __CxxThrowException@8.LIBCMT ref: 6CC58CCA
                                    • __CxxThrowException@8.LIBCMT ref: 6CC58CE1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC58CF8
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 6CC58EA0
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5997B
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$CloseFind$ExceptionRaise_malloc
                                    • String ID: 001$rar
                                    • API String ID: 231924613-402399766
                                    • Opcode ID: f157bda0603d1e1d837dafe979675dbdc8ee491550b69e3d1dfdfaedbc6021ee
                                    • Instruction ID: 4fe7fb82d4d172c4688f8d64ae16c94c92dabfae7e1b5ead6f5f711c10d744ec
                                    • Opcode Fuzzy Hash: f157bda0603d1e1d837dafe979675dbdc8ee491550b69e3d1dfdfaedbc6021ee
                                    • Instruction Fuzzy Hash: F3925AB55083819FD324CF29C480A9BFBF5BF88308F548A6DE59A87750E731E816CB56
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 6CC72B0E
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 6CC72B20
                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 6CC72B3C
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 6CC72B48
                                    • FindResourceW.KERNEL32(6CC50000,00000068,RC_DATA), ref: 6CC72B7E
                                    • LoadLibraryW.KERNEL32(?,?), ref: 6CC72BA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Find$LibraryLoad$CloseFileFirstResource_memset
                                    • String ID: 7z.dll$RC_DATA
                                    • API String ID: 597928718-3209790242
                                    • Opcode ID: 04520c4111c290ee1836deeb602f8886e26558ad3acaa9e22755ed6157c2a6ae
                                    • Instruction ID: 42cc22d37b5d89fa83feb4d60cf99ed357cfec9f383cb479243b5a719166f132
                                    • Opcode Fuzzy Hash: 04520c4111c290ee1836deeb602f8886e26558ad3acaa9e22755ed6157c2a6ae
                                    • Instruction Fuzzy Hash: 9141B2716093419FC720DF24C848B9B7BF8EB8A358F540A1DE54697780FB35D5198B62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 6CC637C4
                                    • GetLastError.KERNEL32(?), ref: 6CC637D1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CloseErrorFindLast
                                    • String ID:
                                    • API String ID: 754982922-0
                                    • Opcode ID: 9f9a2f8678d3b48b29f9e959fcdd6838fe377665cdc5bc0cf1ead933a3ec4a75
                                    • Instruction ID: daaedb9f4045b16765648094d1e5fc25d30e298a0253c506fc78311bb6e44294
                                    • Opcode Fuzzy Hash: 9f9a2f8678d3b48b29f9e959fcdd6838fe377665cdc5bc0cf1ead933a3ec4a75
                                    • Instruction Fuzzy Hash: 838290716083809FD724CF15C580B9BB7E5FF89318F144A1DE98A97B50E771E849CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1675 6cc72980-6cc7299d LoadResource 1676 6cc7299f-6cc729ab SizeofResource 1675->1676 1677 6cc72a1b-6cc72a24 1675->1677 1676->1677 1678 6cc729ad-6cc729b8 LockResource 1676->1678 1678->1677 1679 6cc729ba-6cc729da CreateFileW 1678->1679 1679->1677 1680 6cc729dc-6cc729ed WriteFile 1679->1680 1681 6cc729f6 1680->1681 1682 6cc729ef-6cc729f4 1680->1682 1683 6cc729f9-6cc72a02 FindCloseChangeNotification 1681->1683 1682->1681 1682->1683 1684 6cc72a04-6cc72a0a DeleteFileW 1683->1684 1685 6cc72a10-6cc72a18 1683->1685 1684->1685
                                    APIs
                                    • LoadResource.KERNEL32(6CC50000,00000000,6CC50000,?,?,6CC72B94,?), ref: 6CC72993
                                    • SizeofResource.KERNEL32(6CC50000,00000000), ref: 6CC729A1
                                    • LockResource.KERNEL32(00000000), ref: 6CC729AE
                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 6CC729CF
                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 6CC729E5
                                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 6CC729FA
                                    • DeleteFileW.KERNEL32(00000000), ref: 6CC72A0A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: FileResource$ChangeCloseCreateDeleteFindLoadLockNotificationSizeofWrite
                                    • String ID:
                                    • API String ID: 290882627-0
                                    • Opcode ID: db65babe239e57f152498a2b0d313eb53c80118b14cf0a569d9327bfe14c5cda
                                    • Instruction ID: a5dcef1f4a3b4ffaf625ce5f241a1cc4d7ca15eb3fd80006bd040b93a8c75ef9
                                    • Opcode Fuzzy Hash: db65babe239e57f152498a2b0d313eb53c80118b14cf0a569d9327bfe14c5cda
                                    • Instruction Fuzzy Hash: CD112631742604BBDB308AA98C5CF9BBB7CDB8B661F244165FE40E7280E771880282B0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1686 6cc64c00-6cc64c4c 1687 6cc64c52-6cc64c66 1686->1687 1688 6cc652a9-6cc652c0 1686->1688 1689 6cc64d12-6cc64db3 call 6cc7514c 1687->1689 1690 6cc64c6c-6cc64ccd call 6cc7514c call 6cc62470 1687->1690 1695 6cc64db5-6cc64dbb 1689->1695 1696 6cc64de0-6cc64e22 1689->1696 1700 6cc64cd2-6cc64cdd 1690->1700 1698 6cc64dd3-6cc64ddd call 6cc751d6 1695->1698 1699 6cc64dbd 1695->1699 1709 6cc64ec8-6cc64ef5 call 6cc5cae0 1696->1709 1710 6cc64e28-6cc64e3d 1696->1710 1698->1696 1701 6cc64dc0-6cc64dd1 1699->1701 1703 6cc64ce6-6cc64cea 1700->1703 1704 6cc64cdf-6cc64ce0 FindClose 1700->1704 1701->1698 1701->1701 1707 6cc64fc3-6cc64fe4 call 6cc751d6 1703->1707 1708 6cc64cf0-6cc64cfc 1703->1708 1704->1703 1725 6cc65296-6cc652a3 1707->1725 1708->1707 1711 6cc64d02-6cc64d0f call 6cc751d6 1708->1711 1721 6cc652c1-6cc652c6 1709->1721 1722 6cc64efb-6cc64efe 1709->1722 1712 6cc64ea5-6cc64eab 1710->1712 1713 6cc64e3f-6cc64e60 call 6cc7514c 1710->1713 1711->1689 1719 6cc64eb0-6cc64ebf 1712->1719 1729 6cc64e62-6cc64e68 1713->1729 1730 6cc64e90-6cc64ea1 1713->1730 1719->1719 1726 6cc64ec1-6cc64ec4 1719->1726 1731 6cc65327-6cc65363 call 6cc751d6 call 6cc582a0 1721->1731 1732 6cc652c8-6cc652d2 1721->1732 1727 6cc64f66-6cc64fab call 6cc65440 1722->1727 1728 6cc64f00-6cc64f0b 1722->1728 1725->1687 1725->1688 1726->1709 1762 6cc65364-6cc6539d call 6cc751d6 call 6cc582a0 1727->1762 1763 6cc64fb1-6cc64fbb 1727->1763 1728->1727 1733 6cc64f0d-6cc64f29 call 6cc59ae0 1728->1733 1734 6cc64e83-6cc64e8d call 6cc751d6 1729->1734 1735 6cc64e6a 1729->1735 1730->1712 1737 6cc652d4-6cc652d7 1732->1737 1738 6cc65315-6cc65322 call 6cc7663b 1732->1738 1756 6cc64f54-6cc64f64 1733->1756 1757 6cc64f2b-6cc64f2f 1733->1757 1734->1730 1741 6cc64e70-6cc64e81 1735->1741 1744 6cc652eb-6cc652ef 1737->1744 1745 6cc652d9-6cc652e6 call 6cc7663b 1737->1745 1738->1731 1741->1734 1741->1741 1751 6cc65303-6cc65310 call 6cc7663b 1744->1751 1752 6cc652f1-6cc652fe call 6cc7663b 1744->1752 1745->1744 1751->1738 1752->1751 1756->1727 1756->1733 1757->1756 1760 6cc64f31-6cc64f50 1757->1760 1760->1756 1765 6cc65271-6cc6528e call 6cc751d6 call 6cc582a0 1763->1765 1766 6cc64fc1 1763->1766 1778 6cc65293 1765->1778 1769 6cc64ff4-6cc65041 call 6cc7514c call 6cc5abe0 1766->1769 1781 6cc65043-6cc65049 1769->1781 1782 6cc6504f-6cc65051 1769->1782 1778->1725 1781->1782 1785 6cc65262-6cc6526f call 6cc751d6 1781->1785 1783 6cc65057-6cc6506f call 6cc5ab10 1782->1783 1784 6cc6539e-6cc653e4 call 6cc751d6 * 2 call 6cc582a0 1782->1784 1793 6cc653e5-6cc6542b call 6cc751d6 * 2 call 6cc582a0 1783->1793 1794 6cc65075-6cc65079 1783->1794 1785->1765 1796 6cc65092-6cc650a9 call 6cc6e6e0 1794->1796 1797 6cc6507b-6cc6508d call 6cc751d6 1794->1797 1809 6cc650b2-6cc650c4 call 6cc751d6 1796->1809 1810 6cc650ab-6cc650b0 1796->1810 1807 6cc6524c-6cc6525a 1797->1807 1814 6cc64ff0 1807->1814 1815 6cc65260 1807->1815 1809->1807 1810->1809 1812 6cc650c9-6cc650df call 6cc64a10 1810->1812 1820 6cc650e1-6cc650e5 1812->1820 1821 6cc650e9-6cc65103 call 6cc64a10 1812->1821 1814->1769 1815->1765 1820->1821 1824 6cc65105-6cc6510b 1821->1824 1825 6cc6510f-6cc651cf call 6cc64ac0 call 6cc64b60 * 2 1821->1825 1824->1825 1832 6cc651d6-6cc651de 1825->1832 1833 6cc651d1 call 6cc51680 1825->1833 1834 6cc651e0-6cc651ef 1832->1834 1833->1832 1834->1834 1836 6cc651f1-6cc65248 call 6cc73910 call 6cc76308 call 6cc751d6 call 6cc65560 call 6cc751d6 1834->1836 1836->1807
                                    APIs
                                      • Part of subcall function 6CC62470: FindClose.KERNEL32(?,B4419C60,6CC80658,00000000), ref: 6CC624C4
                                      • Part of subcall function 6CC62470: FindFirstFileW.KERNEL32(6CC850B8,?,B4419C60,6CC80658,00000000), ref: 6CC624DE
                                      • Part of subcall function 6CC62470: FindFirstFileW.KERNEL32(?,?), ref: 6CC6253A
                                    • FindClose.KERNEL32(FFFFFFFF,?,?,?,?,?,?,?,?,?,?), ref: 6CC64CE0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: 35ade9f95fe9e36efa3f517109b843cc4880b4be2cfc3f975de42308fe6238fd
                                    • Instruction ID: d28387a08264ffae3aa9cdbe5b3378b473714999bd413a331c6f6d6ccd775f44
                                    • Opcode Fuzzy Hash: 35ade9f95fe9e36efa3f517109b843cc4880b4be2cfc3f975de42308fe6238fd
                                    • Instruction Fuzzy Hash: 03325AB15083808FD720CF69C980A9BB7E4FFC9318F144A2EE59997750E771E949CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(?,B4419C60,6CC80658,00000000), ref: 6CC624C4
                                    • FindFirstFileW.KERNEL32(6CC850B8,?,B4419C60,6CC80658,00000000), ref: 6CC624DE
                                    • FindFirstFileW.KERNEL32(?,?), ref: 6CC6253A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Find$FileFirst$Close
                                    • String ID:
                                    • API String ID: 2810966245-0
                                    • Opcode ID: e8f8e4b4df623340fbdf5f3796db4c3f21d0327500e4e49d00f17895b1e2bc79
                                    • Instruction ID: e2df395b16170375b58bd07f63714938f971c1708495a3e0841a55720f3d72aa
                                    • Opcode Fuzzy Hash: e8f8e4b4df623340fbdf5f3796db4c3f21d0327500e4e49d00f17895b1e2bc79
                                    • Instruction Fuzzy Hash: 403161715097429FC710DF25C958AABBBF4FF49328F100B1DE4A5D3A80E735A909CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 6cc682b0-6cc6830c call 6cc5f940 3 6cc6830e-6cc68324 call 6cc7663b 0->3 4 6cc68329-6cc68378 call 6cc54dd0 call 6cc67df0 call 6cc5fb40 call 6cc53be0 0->4 3->4 14 6cc68395-6cc683bb call 6cc542e0 call 6cc75f2a 4->14 15 6cc6837a-6cc68390 call 6cc7663b 4->15 21 6cc683d0-6cc683e2 call 6cc68eb0 14->21 22 6cc683bd-6cc683cb call 6cc7663b 14->22 15->14 26 6cc683e4-6cc683e9 21->26 27 6cc683ec-6cc683fe call 6cc66cc0 21->27 22->21 26->27 30 6cc68400-6cc68416 call 6cc7663b 27->30 31 6cc6841b-6cc68424 27->31 30->31 33 6cc68426-6cc6842d 31->33 34 6cc6842f 31->34 33->34 35 6cc68433-6cc68436 33->35 34->35 36 6cc6846d-6cc6849a call 6cc672f0 35->36 37 6cc68438-6cc6843c 35->37 45 6cc684b7-6cc684bb 36->45 46 6cc6849c-6cc684b2 call 6cc7663b 36->46 38 6cc68452-6cc68468 call 6cc7663b 37->38 39 6cc6843e-6cc68441 37->39 38->36 39->38 41 6cc68443-6cc68450 call 6cc526c0 39->41 41->36 41->38 48 6cc68834-6cc68847 call 6cc609e0 45->48 49 6cc684c1-6cc684c8 45->49 46->45 58 6cc68853 48->58 59 6cc68849-6cc68851 call 6cc68110 48->59 52 6cc68c70-6cc68caf call 6cc64c00 49->52 53 6cc684ce-6cc684db call 6cc526c0 49->53 57 6cc68cb4-6cc68cbc 52->57 64 6cc684e1-6cc684e8 53->64 65 6cc68819-6cc6882f call 6cc7663b 53->65 61 6cc68cbe 57->61 62 6cc68d19-6cc68d1e 57->62 66 6cc68855-6cc6885e 58->66 59->66 67 6cc68cc0-6cc68cc5 61->67 68 6cc68cfe-6cc68d14 call 6cc7663b 61->68 74 6cc68d65-6cc68dd3 call 6cc7663b * 4 62->74 75 6cc68d20-6cc68d23 62->75 70 6cc68502-6cc68538 call 6cc649e0 call 6cc7e5ce 64->70 71 6cc684ea-6cc684f0 64->71 65->48 72 6cc68860-6cc68865 66->72 73 6cc68868-6cc6892e call 6cc51460 call 6cc649e0 call 6cc51460 call 6cc67bc0 66->73 77 6cc68cc7-6cc68ccc 67->77 78 6cc68ce9-6cc68cf9 call 6cc7663b 67->78 68->62 112 6cc68553-6cc6855a 70->112 113 6cc6853a-6cc6854d call 6cc693a0 70->113 71->70 80 6cc684f2-6cc684fd call 6cc57e60 71->80 72->73 147 6cc68930-6cc6893d 73->147 148 6cc6893f 73->148 83 6cc68d25-6cc68d28 75->83 84 6cc68d2a-6cc68d3c call 6cc59990 75->84 77->75 86 6cc68cce-6cc68ce4 call 6cc7663b 77->86 78->68 80->70 83->84 92 6cc68d42-6cc68d44 83->92 84->92 86->78 94 6cc68b32-6cc68b47 call 6cc59990 92->94 95 6cc68d4a-6cc68d60 call 6cc7663b 92->95 109 6cc68b51-6cc68b94 call 6cc5fc00 call 6cc68de0 call 6cc54c80 94->109 110 6cc68b49-6cc68b4e 94->110 95->74 110->109 118 6cc6855c-6cc68567 112->118 119 6cc68569 112->119 113->112 118->119 124 6cc6856d-6cc685ac call 6cc51460 call 6cc681d0 118->124 119->124 139 6cc685ae-6cc685b9 124->139 140 6cc685bb 124->140 139->140 141 6cc685bf-6cc685c1 139->141 140->141 143 6cc685c3-6cc685ce 141->143 144 6cc685d0 141->144 143->144 146 6cc685d4-6cc6866f call 6cc51460 call 6cc67d70 call 6cc6a7b0 143->146 144->146 173 6cc68671-6cc68687 call 6cc7663b 146->173 174 6cc6868c-6cc686bf call 6cc6b9c0 146->174 147->148 149 6cc68949-6cc689c6 call 6cc51460 call 6cc60880 147->149 148->149 159 6cc689eb-6cc68a39 call 6cc51400 call 6cc58ab0 149->159 160 6cc689c8 149->160 171 6cc68a3e-6cc68a46 159->171 162 6cc689d0-6cc689e9 call 6cc55290 160->162 162->159 175 6cc68aa3-6cc68aa8 171->175 176 6cc68a48 171->176 173->174 192 6cc686c6-6cc686cb 174->192 193 6cc686c1 174->193 181 6cc68c55-6cc68c6b call 6cc7663b 175->181 182 6cc68aae-6cc68ab5 175->182 177 6cc68a4a-6cc68a4f 176->177 178 6cc68a88-6cc68a9e call 6cc7663b 176->178 183 6cc68a51-6cc68a56 177->183 184 6cc68a6d-6cc68a83 call 6cc7663b 177->184 178->175 181->52 187 6cc68ab7-6cc68ab9 182->187 188 6cc68ac0-6cc68ac6 182->188 183->182 190 6cc68a58-6cc68a68 call 6cc7663b 183->190 184->178 187->188 194 6cc68abb 187->194 195 6cc68b95-6cc68b97 188->195 196 6cc68acc-6cc68ad2 188->196 190->184 198 6cc686cd 192->198 199 6cc68728-6cc6872d 192->199 193->192 194->188 200 6cc68bb4-6cc68be5 call 6cc751d6 call 6cc68f00 call 6cc751d6 195->200 201 6cc68b99-6cc68baf call 6cc7663b 195->201 196->195 202 6cc68ad8-6cc68ada 196->202 205 6cc686cf-6cc686d4 198->205 206 6cc6870d-6cc68723 call 6cc7663b 198->206 203 6cc68733-6cc68735 199->203 204 6cc687fe-6cc68814 call 6cc7663b 199->204 237 6cc68be7-6cc68bec 200->237 238 6cc68bef-6cc68c04 call 6cc59990 200->238 201->200 209 6cc68af7-6cc68b28 call 6cc751d6 call 6cc68f00 call 6cc751d6 202->209 210 6cc68adc-6cc68af2 call 6cc7663b 202->210 212 6cc68737-6cc6874d call 6cc7663b 203->212 213 6cc68752-6cc68759 203->213 204->65 215 6cc686d6-6cc686db 205->215 216 6cc686f2-6cc68708 call 6cc7663b 205->216 206->199 209->94 242 6cc68b2a-6cc68b2f 209->242 210->209 212->213 222 6cc6875f 213->222 223 6cc6875b-6cc6875d 213->223 215->203 224 6cc686dd-6cc686ed call 6cc7663b 215->224 216->206 228 6cc68764-6cc687fd call 6cc751d6 * 3 call 6cc68270 call 6cc751d6 call 6cc59990 call 6cc5fc00 call 6cc68de0 call 6cc54c80 222->228 223->222 223->228 224->216 237->238 246 6cc68c06-6cc68c09 238->246 247 6cc68c0e-6cc68c54 call 6cc5fc00 call 6cc68de0 call 6cc54c80 238->247 242->94 246->247
                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC684B2
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68687
                                    • __CxxThrowException@8.LIBCMT ref: 6CC686ED
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68708
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68723
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6874D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6882F
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68A68
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68A83
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68A9E
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68AF2
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68324
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68390
                                    • _malloc.LIBCMT ref: 6CC683B1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC683CB
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68416
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68468
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68CE4
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68CF9
                                    • __CxxThrowException@8.LIBCMT ref: 6CC68D14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise_malloc
                                    • String ID: 7zCon.sfx
                                    • API String ID: 1305767944-1084822657
                                    • Opcode ID: ada0e9c5f9130dbb05a2505f5b6caa63151b092e05d1f4325f1882cd8d579162
                                    • Instruction ID: 91a01b51a5dbc9ff639c54794a9ea73082f3f6a18204330d18bf2db7ed590649
                                    • Opcode Fuzzy Hash: ada0e9c5f9130dbb05a2505f5b6caa63151b092e05d1f4325f1882cd8d579162
                                    • Instruction Fuzzy Hash: 5E62A171C01258DFDB21CBA5C980FDEB7B8AF49308F1485DAD548A7A41EB709B89CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1302 6cc73ef0-6cc73fb6 call 6cc74b70 call 6cc54a90 call 6cc55bf0 call 6cc751d6 * 2 call 6cc74c50 call 6cc57630 call 6cc515c0 call 6cc751d6 * 2 1323 6cc73fc3-6cc73fc8 1302->1323 1324 6cc73fb8-6cc73fbd 1302->1324 1326 6cc74185-6cc7418a 1323->1326 1327 6cc73fce-6cc73fd3 1323->1327 1324->1323 1325 6cc74072-6cc74076 1324->1325 1332 6cc740d3-6cc740e1 call 6cc751d6 1325->1332 1333 6cc74078-6cc7407c 1325->1333 1330 6cc74190-6cc74195 1326->1330 1331 6cc742cb-6cc742d0 1326->1331 1328 6cc740e6-6cc740eb 1327->1328 1329 6cc73fd9-6cc74065 call 6cc74b70 call 6cc74c50 call 6cc57630 call 6cc57ee0 call 6cc55bf0 call 6cc515c0 call 6cc751d6 * 4 1327->1329 1328->1326 1340 6cc740f1-6cc7417c call 6cc74b70 call 6cc74c50 call 6cc57630 call 6cc57ee0 call 6cc55bf0 call 6cc515c0 call 6cc751d6 * 4 1328->1340 1470 6cc7417d-6cc74182 call 6cc751d6 1329->1470 1337 6cc7422c-6cc74231 1330->1337 1338 6cc7419b-6cc74227 call 6cc74b70 call 6cc74c50 call 6cc57630 call 6cc57ee0 call 6cc55bf0 call 6cc515c0 call 6cc751d6 * 4 1330->1338 1335 6cc742d2-6cc742d4 1331->1335 1336 6cc7432c-6cc74338 call 6cc75f2a 1331->1336 1354 6cc74400-6cc74414 1332->1354 1333->1332 1341 6cc7407e-6cc740cc call 6cc74b70 call 6cc57630 call 6cc515c0 call 6cc751d6 * 2 1333->1341 1344 6cc742d7-6cc742e0 1335->1344 1358 6cc7434d-6cc74379 call 6cc71230 call 6cc682b0 1336->1358 1359 6cc7433a-6cc74348 call 6cc7663b 1336->1359 1337->1331 1347 6cc74237-6cc742c2 call 6cc74b70 call 6cc74c50 call 6cc57630 call 6cc57ee0 call 6cc55bf0 call 6cc515c0 call 6cc751d6 * 4 1337->1347 1475 6cc742c3-6cc742c8 call 6cc751d6 1338->1475 1340->1470 1419 6cc74070 1341->1419 1420 6cc740ce 1341->1420 1344->1344 1352 6cc742e2-6cc742e6 1344->1352 1347->1475 1352->1336 1361 6cc742e8-6cc74329 call 6cc74b70 call 6cc57630 call 6cc515c0 call 6cc751d6 * 2 1352->1361 1391 6cc7437e-6cc743c9 call 6cc71a40 1358->1391 1359->1358 1361->1336 1412 6cc743f4-6cc743fd call 6cc751d6 1391->1412 1413 6cc743cb-6cc743ce 1391->1413 1412->1354 1422 6cc743d5-6cc743d9 1413->1422 1423 6cc743d0 call 6cc75bd8 1413->1423 1419->1325 1420->1323 1428 6cc74417-6cc74419 1422->1428 1429 6cc743db call 6cc75bd8 1422->1429 1423->1422 1442 6cc743e0-6cc743e3 1428->1442 1429->1442 1445 6cc743e5 call 6cc75bd8 1442->1445 1446 6cc743ea-6cc743f2 1442->1446 1445->1446 1446->1412 1470->1326 1475->1331
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -i$ -p$ -x$!$7za L
                                    • API String ID: 0-2873427068
                                    • Opcode ID: 4597bd1029fc7065217004273622dd43e26df07cd88b446a46f4ed3170bc880c
                                    • Instruction ID: 2d2c1d6cc303aa063399c1e231c6f7e242e8c39de5fdc558aec554c6f92cc906
                                    • Opcode Fuzzy Hash: 4597bd1029fc7065217004273622dd43e26df07cd88b446a46f4ed3170bc880c
                                    • Instruction Fuzzy Hash: A1F1A572901248EBDF15DBE4C944ACFBBB8EF54308F248559E505AB741FB74AA08CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1480 6cc542e0-6cc54319 1481 6cc54325-6cc5433c call 6cc526e0 1480->1481 1482 6cc5431b-6cc54320 call 6cc52670 1480->1482 1486 6cc5433e-6cc54343 call 6cc52670 1481->1486 1487 6cc54348-6cc5436a 1481->1487 1482->1481 1486->1487 1489 6cc5436c-6cc54378 1487->1489 1490 6cc5437e-6cc54387 1487->1490 1489->1490 1491 6cc543a4 1490->1491 1492 6cc54389-6cc54392 1490->1492 1493 6cc543a9-6cc543e1 call 6cc53cf0 * 2 1491->1493 1494 6cc54394-6cc54397 1492->1494 1495 6cc5439d-6cc543a2 1492->1495 1501 6cc543e3-6cc543ff call 6cc52d80 1493->1501 1502 6cc54402-6cc5440c 1493->1502 1494->1491 1497 6cc54399-6cc5439b 1494->1497 1495->1493 1497->1493 1501->1502 1504 6cc5440e-6cc54425 call 6cc52d80 1502->1504 1505 6cc54428-6cc5443b 1502->1505 1504->1505 1508 6cc5443d-6cc54443 1505->1508 1509 6cc5444e 1505->1509 1508->1509 1512 6cc54445-6cc5444c 1508->1512 1510 6cc54453-6cc5445c 1509->1510 1513 6cc54462 1510->1513 1514 6cc5452b-6cc54533 1510->1514 1512->1509 1512->1510 1515 6cc54466-6cc5446e 1513->1515 1514->1515 1516 6cc54539 1514->1516 1517 6cc54474 1515->1517 1518 6cc5453e-6cc54543 1515->1518 1516->1518 1519 6cc54479-6cc544ba call 6cc52940 1517->1519 1518->1519 1520 6cc54549-6cc5454d 1518->1520 1527 6cc544d3-6cc544e9 1519->1527 1528 6cc544bc-6cc544cf call 6cc51460 1519->1528 1522 6cc5454f-6cc54554 call 6cc52670 1520->1522 1523 6cc54559-6cc54573 call 6cc51460 1520->1523 1522->1523 1523->1519 1533 6cc54579-6cc5457e call 6cc52670 1523->1533 1531 6cc54504-6cc54509 1527->1531 1532 6cc544eb-6cc54500 call 6cc51460 1527->1532 1528->1527 1537 6cc5450f-6cc54513 1531->1537 1538 6cc54738-6cc5473d 1531->1538 1532->1531 1544 6cc54583-6cc545ad 1533->1544 1539 6cc54515-6cc5451f 1537->1539 1540 6cc54521-6cc54526 call 6cc52670 1537->1540 1541 6cc5474d-6cc54779 call 6cc53750 call 6cc539a0 1538->1541 1542 6cc5473f-6cc54742 1538->1542 1539->1540 1539->1544 1540->1514 1570 6cc54782-6cc54794 1541->1570 1571 6cc5477b 1541->1571 1542->1541 1545 6cc54744-6cc54747 1542->1545 1548 6cc545af-6cc545c8 call 6cc52d80 1544->1548 1549 6cc545cb-6cc545d5 1544->1549 1545->1541 1551 6cc548a6-6cc548a9 1545->1551 1548->1549 1552 6cc545f4-6cc545f9 1549->1552 1553 6cc545d7-6cc545f1 call 6cc52d80 1549->1553 1558 6cc54a62-6cc54a65 1551->1558 1559 6cc548af-6cc548dd 1551->1559 1560 6cc5460d-6cc54621 call 6cc53250 call 6cc6ed50 1552->1560 1561 6cc545fb-6cc54608 call 6cc6e950 1552->1561 1553->1552 1558->1482 1562 6cc54a6b-6cc54a86 call 6cc6ed50 1558->1562 1565 6cc54903-6cc54915 1559->1565 1566 6cc548df-6cc548f7 call 6cc53e30 1559->1566 1594 6cc54623-6cc5466d call 6cc51420 call 6cc54d10 * 2 call 6cc751d6 1560->1594 1595 6cc5466f-6cc5467b call 6cc53e70 1560->1595 1561->1560 1565->1562 1574 6cc5491b 1565->1574 1566->1565 1583 6cc548f9-6cc548fe call 6cc52670 1566->1583 1576 6cc547b4-6cc547c5 1570->1576 1577 6cc54796-6cc5479b 1570->1577 1571->1570 1580 6cc54920-6cc5494e call 6cc51420 CharUpperW 1574->1580 1585 6cc547c7-6cc547e9 call 6cc51460 1576->1585 1586 6cc54819 1576->1586 1581 6cc547a7-6cc547ab 1577->1581 1582 6cc5479d-6cc547a1 1577->1582 1580->1482 1597 6cc54954-6cc5495b 1580->1597 1581->1576 1592 6cc547ad 1581->1592 1591 6cc547a3-6cc547a5 1582->1591 1582->1592 1583->1565 1585->1586 1605 6cc547eb-6cc547fd 1585->1605 1590 6cc5481d-6cc54838 1586->1590 1598 6cc5487b-6cc5487d 1590->1598 1599 6cc5483a-6cc54841 1590->1599 1591->1576 1591->1581 1592->1576 1619 6cc54686-6cc5468b 1594->1619 1610 6cc54680-6cc54683 1595->1610 1606 6cc549a6-6cc549aa 1597->1606 1607 6cc5495d-6cc54967 1597->1607 1602 6cc5487f-6cc54893 call 6cc51460 1598->1602 1603 6cc54898-6cc548a1 call 6cc53250 1598->1603 1608 6cc54843-6cc54855 call 6cc7663b 1599->1608 1609 6cc5485a-6cc5485c 1599->1609 1602->1603 1603->1562 1605->1590 1614 6cc547ff-6cc54817 call 6cc54b20 1605->1614 1606->1482 1617 6cc549b0-6cc549b8 1606->1617 1615 6cc5496e-6cc54981 call 6cc53e30 1607->1615 1616 6cc54969 1607->1616 1608->1609 1609->1598 1620 6cc5485e-6cc54862 1609->1620 1610->1619 1614->1590 1615->1482 1642 6cc54987-6cc5498e 1615->1642 1616->1615 1625 6cc549ed-6cc549f1 1617->1625 1626 6cc549ba-6cc549c4 1617->1626 1627 6cc54721-6cc54733 call 6cc55110 1619->1627 1628 6cc54691-6cc546a2 call 6cc539a0 1619->1628 1620->1598 1629 6cc54864-6cc54876 call 6cc7663b 1620->1629 1625->1482 1631 6cc549f7-6cc549fc 1625->1631 1634 6cc549c6 1626->1634 1635 6cc549cb-6cc549d3 1626->1635 1627->1562 1650 6cc546a4-6cc546a8 1628->1650 1651 6cc546c7-6cc546d1 1628->1651 1629->1598 1640 6cc54a34-6cc54a5a call 6cc751d6 1631->1640 1641 6cc549fe-6cc54a31 call 6cc51640 call 6cc51460 call 6cc751d6 1631->1641 1634->1635 1635->1640 1644 6cc549d5-6cc549e5 call 6cc53e30 1635->1644 1640->1580 1666 6cc54a60 1640->1666 1641->1640 1642->1482 1648 6cc54994-6cc549a1 1642->1648 1644->1482 1661 6cc549eb 1644->1661 1648->1640 1650->1651 1659 6cc546aa-6cc546ae 1650->1659 1654 6cc546d3-6cc546ec call 6cc51460 call 6cc62cb0 1651->1654 1655 6cc546ef-6cc54700 1651->1655 1654->1655 1664 6cc54714-6cc54718 1655->1664 1665 6cc54702-6cc54712 1655->1665 1659->1651 1660 6cc546b0-6cc546c2 call 6cc7663b 1659->1660 1660->1651 1661->1640 1664->1627 1670 6cc5471a 1664->1670 1665->1627 1666->1562 1670->1627
                                    APIs
                                      • Part of subcall function 6CC52670: __CxxThrowException@8.LIBCMT ref: 6CC52688
                                      • Part of subcall function 6CC54D10: _malloc.LIBCMT ref: 6CC54D3A
                                      • Part of subcall function 6CC54D10: __CxxThrowException@8.LIBCMT ref: 6CC54D54
                                    • __CxxThrowException@8.LIBCMT ref: 6CC546C2
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC54855
                                    • __CxxThrowException@8.LIBCMT ref: 6CC54876
                                    • CharUpperW.USER32(?), ref: 6CC54943
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$CharExceptionRaiseUpper_malloc
                                    • String ID: Cannot use absolute pathnames for this command$Incorrect command line
                                    • API String ID: 2609558216-724315024
                                    • Opcode ID: 77e57ab17e442d0b5c6b5867c1e8d375486f86db2fcf8a42bbd8cf77bd7dd32a
                                    • Instruction ID: 69b089ededda35a97c0b504a35a8d76e1e592d2c25946877f85200b819f76610
                                    • Opcode Fuzzy Hash: 77e57ab17e442d0b5c6b5867c1e8d375486f86db2fcf8a42bbd8cf77bd7dd32a
                                    • Instruction Fuzzy Hash: D922D3715083409FD701CF14C484B9BBBE5AF8530CF98899CE4994BB92E770E979CBA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1847 6cc669e0-6cc66a0d 1848 6cc66a3e-6cc66a78 call 6cc67750 1847->1848 1849 6cc66a0f-6cc66a20 LoadLibraryExW 1847->1849 1854 6cc66af6-6cc66b02 1848->1854 1855 6cc66a7a-6cc66a81 1848->1855 1850 6cc66a37-6cc66a38 FreeLibrary 1849->1850 1851 6cc66a22-6cc66a34 1849->1851 1850->1848 1858 6cc66b06-6cc66b19 1854->1858 1856 6cc66a97-6cc66ab3 GetProcAddress 1855->1856 1857 6cc66a83-6cc66a8c FreeLibrary 1855->1857 1860 6cc66ab5-6cc66aba call 6cc65f50 1856->1860 1861 6cc66ae9-6cc66af4 1856->1861 1857->1856 1859 6cc66a8e-6cc66a91 1857->1859 1859->1856 1863 6cc66abf-6cc66aca 1860->1863 1861->1854 1861->1858 1863->1861 1864 6cc66acc-6cc66add call 6cc66530 1863->1864 1867 6cc66ae7 1864->1867 1868 6cc66adf-6cc66ae5 1864->1868 1867->1861 1868->1861 1868->1867
                                    APIs
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,B4419C60,6CC8FCC8,00000000), ref: 6CC66A18
                                    • FreeLibrary.KERNEL32(00000000), ref: 6CC66A38
                                    • FreeLibrary.KERNEL32(00000000,B4419C60,6CC8FCC8,00000000), ref: 6CC66A84
                                    • GetProcAddress.KERNEL32(?,CreateObject), ref: 6CC66AA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Library$Free$AddressLoadProc
                                    • String ID: CreateObject
                                    • API String ID: 1386263645-166191583
                                    • Opcode ID: 204cd151218048122ead577ad9d79624137b105eb3174500cf960b35af8db75c
                                    • Instruction ID: 66b2d28d26ab9acb19fbc20250837a73c4a7464169c78ce6f90d598abc16c62c
                                    • Opcode Fuzzy Hash: 204cd151218048122ead577ad9d79624137b105eb3174500cf960b35af8db75c
                                    • Instruction Fuzzy Hash: B7417E75A41A05EFDB00CF66C580B9ABBF5FF49314F10861AE825DBB80E734E941CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1869 6cc5c2d0-6cc5c30f 1870 6cc5c351-6cc5c35f call 6cc75f2a 1869->1870 1871 6cc5c311-6cc5c31f call 6cc75f2a 1869->1871 1876 6cc5c374-6cc5c3b3 call 6cc62a70 1870->1876 1877 6cc5c361-6cc5c36f call 6cc7663b 1870->1877 1878 6cc5c334-6cc5c34c 1871->1878 1879 6cc5c321-6cc5c32f call 6cc7663b 1871->1879 1887 6cc5c3b8-6cc5c3ba 1876->1887 1877->1876 1884 6cc5c3d7-6cc5c3eb call 6cc5ae70 1878->1884 1879->1878 1888 6cc5c3f0-6cc5c3f8 1884->1888 1889 6cc5c3d5 1887->1889 1890 6cc5c3bc-6cc5c3d3 GetLastError 1887->1890 1891 6cc5c402-6cc5c40b 1888->1891 1892 6cc5c3fa-6cc5c3ff 1888->1892 1889->1884 1894 6cc5c415-6cc5c428 1890->1894 1891->1894 1895 6cc5c40d-6cc5c412 1891->1895 1892->1891 1895->1894
                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5C32F
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • _malloc.LIBCMT ref: 6CC5C313
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • _malloc.LIBCMT ref: 6CC5C353
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5C36F
                                    • GetLastError.KERNEL32(6CC84C28,80000000,00000001,00000003), ref: 6CC5C3BC
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc$AllocateErrorExceptionHeapLastRaise
                                    • String ID:
                                    • API String ID: 2571202727-0
                                    • Opcode ID: 67598317067fb184164d91c0889b05dd39baa059a7982edf34523b97b30fb448
                                    • Instruction ID: e7e3846345c7e58ea4f02a8e84e600ed968e611541dbd33c6d4dd003098155fb
                                    • Opcode Fuzzy Hash: 67598317067fb184164d91c0889b05dd39baa059a7982edf34523b97b30fb448
                                    • Instruction Fuzzy Hash: 8541B372601609AFDB10DF99C880B9BBBF8FF49314F108659E95597B80E770D916C7A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1896 6cc65f50-6cc65f8a GetProcAddress 1897 6cc65f90-6cc65fa3 GetProcAddress 1896->1897 1898 6cc6601a 1896->1898 1899 6cc65fa5-6cc65fad 1897->1899 1900 6cc65faf-6cc65fb4 1897->1900 1901 6cc6601c-6cc6602c call 6cc751c7 1898->1901 1899->1900 1899->1901 1900->1898 1902 6cc65fb6 1900->1902 1905 6cc65fc6-6cc65fe7 call 6cc65e80 1902->1905 1906 6cc65fc0-6cc65fc3 1902->1906 1905->1901 1910 6cc65fe9-6cc66003 call 6cc65e80 1905->1910 1906->1905 1910->1901 1913 6cc66005-6cc6600f call 6cc677e0 1910->1913 1915 6cc66014-6cc66018 1913->1915 1915->1898 1915->1906
                                    APIs
                                    • GetProcAddress.KERNEL32(00000000,GetMethodProperty), ref: 6CC65F83
                                    • GetProcAddress.KERNEL32(00000000,GetNumberOfMethods), ref: 6CC65F9F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID: GetMethodProperty$GetNumberOfMethods
                                    • API String ID: 190572456-2134343882
                                    • Opcode ID: 5452f9e35e911da5b9f696ea5c88b8fc83df0311eba9067f00fd30b755adbb21
                                    • Instruction ID: cd9dab924766efa871ce3f16fcb96d3001f7ab7426e45c317a757e325c14e30b
                                    • Opcode Fuzzy Hash: 5452f9e35e911da5b9f696ea5c88b8fc83df0311eba9067f00fd30b755adbb21
                                    • Instruction Fuzzy Hash: 15215175E01219ABCB00CF96DAC09DEF7B9FF48348B244025E805A7B01F771E906CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2457 6cc58670-6cc586c9 2458 6cc58857-6cc58881 2457->2458 2459 6cc586cf-6cc586df 2457->2459 2460 6cc58883-6cc5888d call 6cc51680 2458->2460 2461 6cc5888f-6cc58892 2458->2461 2467 6cc58706-6cc5870b 2459->2467 2468 6cc586e1-6cc58701 2459->2468 2460->2461 2463 6cc58895-6cc588a4 2461->2463 2463->2463 2466 6cc588a6-6cc58904 call 6cc54a90 call 6cc5a5c0 call 6cc599d0 call 6cc751d6 * 2 2463->2466 2504 6cc58906-6cc5890a call 6cc61420 2466->2504 2505 6cc58931-6cc5897c call 6cc55e10 call 6cc5d1b0 2466->2505 2470 6cc58711-6cc58757 call 6cc7514c call 6cc5abe0 2467->2470 2471 6cc587d0-6cc587d3 2467->2471 2478 6cc58a91-6cc58a96 call 6cc751d6 2468->2478 2486 6cc5875d-6cc58773 call 6cc5ab10 2470->2486 2487 6cc5881f-6cc58852 call 6cc751d6 * 2 2470->2487 2471->2458 2472 6cc587d9-6cc5881e call 6cc751d6 2471->2472 2488 6cc58a98-6cc58aac 2478->2488 2486->2487 2500 6cc58779-6cc58799 call 6cc6e6e0 2486->2500 2487->2488 2511 6cc587a0-6cc587a7 2500->2511 2512 6cc5879b-6cc5879e 2500->2512 2513 6cc5890f-6cc58914 2504->2513 2526 6cc589c3-6cc589c6 2505->2526 2527 6cc5897e-6cc589be call 6cc751d6 call 6cc54c80 call 6cc751d6 2505->2527 2516 6cc587b9-6cc587c7 call 6cc751d6 2511->2516 2512->2511 2515 6cc587a9-6cc587b8 call 6cc59d00 2512->2515 2513->2505 2517 6cc58916-6cc5892c GetLastError call 6cc7663b 2513->2517 2515->2516 2516->2470 2525 6cc587cd 2516->2525 2517->2505 2525->2471 2528 6cc589d4 2526->2528 2529 6cc589c8-6cc589cb 2526->2529 2527->2488 2532 6cc589d6-6cc589df 2528->2532 2529->2528 2531 6cc589cd-6cc589d2 2529->2531 2531->2532 2534 6cc589e1-6cc58a0c 2532->2534 2535 6cc58a3c-6cc58a47 2532->2535 2546 6cc58a2e-6cc58a3a call 6cc62e40 2534->2546 2547 6cc58a0e-6cc58a16 2534->2547 2538 6cc58a4a 2535->2538 2541 6cc58a4c-6cc58a90 call 6cc751d6 call 6cc54c80 2538->2541 2541->2478 2546->2541 2548 6cc58a1e-6cc58a2b call 6cc62f70 2547->2548 2549 6cc58a18-6cc58a1c 2547->2549 2548->2546 2549->2546 2549->2548
                                    APIs
                                    • GetLastError.KERNEL32(?,?,00000000,?,00000000), ref: 6CC58916
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5892C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorException@8LastThrow
                                    • String ID: <H
                                    • API String ID: 1006195485-4022674625
                                    • Opcode ID: 6251e98b337458dba79868a72e66022b2780f400046567d1f03d4a516f6c3527
                                    • Instruction ID: 30bc067b614233ebb64bfe9774f7e8560f6732bc5e5aa0ac44209e5a104ecc8c
                                    • Opcode Fuzzy Hash: 6251e98b337458dba79868a72e66022b2780f400046567d1f03d4a516f6c3527
                                    • Instruction Fuzzy Hash: 6CE1A3B5D01248AFDB00DFE8C9809DEBBB5FF48304F64815EE516AB740E730AA15CBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC5CB18
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5CB30
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                      • Part of subcall function 6CC5A910: __CxxThrowException@8.LIBCMT ref: 6CC5A992
                                    • GetLastError.KERNEL32(?,00000000,00000000), ref: 6CC5CBD3
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateErrorExceptionHeapLastRaise_malloc
                                    • String ID:
                                    • API String ID: 214124409-0
                                    • Opcode ID: 901ffa5c2b638954c2585716a2d2dcaef17f8d5d01295302e8823be57573641f
                                    • Instruction ID: 5c991fc4c806f48a2a8e086534e7dc48999537059bf7477ddd3cea808ee48ab5
                                    • Opcode Fuzzy Hash: 901ffa5c2b638954c2585716a2d2dcaef17f8d5d01295302e8823be57573641f
                                    • Instruction Fuzzy Hash: 52A163B1D00248AFCF04DFA8D980ADEB7B4FF48318F144569E915A7740E735EA29CBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2635 6cc62a70-6cc62a9c 2636 6cc62ab3-6cc62ad7 CreateFileW 2635->2636 2637 6cc62a9e-6cc62aa7 CloseHandle 2635->2637 2638 6cc62b3c-6cc62b54 2636->2638 2639 6cc62ad9-6cc62b08 call 6cc51680 call 6cc628a0 2636->2639 2640 6cc62b57-6cc62b69 2637->2640 2641 6cc62aad 2637->2641 2646 6cc62b33-6cc62b39 call 6cc751d6 2639->2646 2647 6cc62b0a-6cc62b13 2639->2647 2641->2636 2646->2638 2647->2646 2648 6cc62b15-6cc62b31 CreateFileW 2647->2648 2648->2646
                                    APIs
                                    • CloseHandle.KERNEL32(?,B4419C60,?,00000000,?,?,00000000,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC62A9F
                                    • CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,B4419C60,?,00000000,?,?,00000000), ref: 6CC62ACC
                                    • CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6CC62B2B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CreateFile$CloseHandle
                                    • String ID:
                                    • API String ID: 1443461169-0
                                    • Opcode ID: bb98e358cb805e8b4e8c8778e9d5ea90d8740ac6c52a85720ac01cbb25d4139b
                                    • Instruction ID: b26b209da8986b1fc0dccdcef233d66e7a1b5089b735172d89fc44ba50cee408
                                    • Opcode Fuzzy Hash: bb98e358cb805e8b4e8c8778e9d5ea90d8740ac6c52a85720ac01cbb25d4139b
                                    • Instruction Fuzzy Hash: 9F31A171A0120AAFDB10CF64CC45BABBBB8FB45724F204719F825A77C0E730A915CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2651 6cc61340-6cc61376 CreateDirectoryW 2652 6cc6138c-6cc61397 GetLastError 2651->2652 2653 6cc61378-6cc6138b 2651->2653 2654 6cc6140b-6cc6141e 2652->2654 2655 6cc61399-6cc613c4 call 6cc51680 call 6cc628a0 2652->2655 2660 6cc613c6-6cc613cf 2655->2660 2661 6cc613ff-6cc61408 call 6cc751d6 2655->2661 2660->2661 2662 6cc613d1-6cc613fe CreateDirectoryW call 6cc751d6 2660->2662 2661->2654
                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000,B4419C60,?,?,?,?,?,00000000), ref: 6CC6136E
                                    • GetLastError.KERNEL32 ref: 6CC6138C
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 6CC613D7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$ErrorLast
                                    • String ID:
                                    • API String ID: 2485089472-0
                                    • Opcode ID: 9788399972b48156c33954fc7e561ecad5ac3c2a4358a419ed2f57482d281814
                                    • Instruction ID: f320b41ed3dc72109fc448867e5da4bed26456fdd919a8c6df47b1338d666907
                                    • Opcode Fuzzy Hash: 9788399972b48156c33954fc7e561ecad5ac3c2a4358a419ed2f57482d281814
                                    • Instruction Fuzzy Hash: BF21D373E056049BDB10CF99D8457EFBBB8EB46626F10017AED05A3B40EB369905C7E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNEL32(?,?,?,?), ref: 6CC51AEC
                                    • GetLastError.KERNEL32 ref: 6CC51B01
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastPointer
                                    • String ID:
                                    • API String ID: 2976181284-0
                                    • Opcode ID: a851be02af09d0fb94543c6557cbde5262a1ea073f6082d32b7a6395b0f731f7
                                    • Instruction ID: 6e440b0592c60abc07291f216d37746df766408ac64cce73199224a2608c2eae
                                    • Opcode Fuzzy Hash: a851be02af09d0fb94543c6557cbde5262a1ea073f6082d32b7a6395b0f731f7
                                    • Instruction Fuzzy Hash: C511D3B6B0620A4B8700CE6DE8449AB7BE8EB85321F10822EFD14C7660F732D43597E5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC54042
                                      • Part of subcall function 6CC54D10: _malloc.LIBCMT ref: 6CC54D3A
                                      • Part of subcall function 6CC54D10: __CxxThrowException@8.LIBCMT ref: 6CC54D54
                                    • __CxxThrowException@8.LIBCMT ref: 6CC541B5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID:
                                    • API String ID: 175252994-0
                                    • Opcode ID: 060259eeb703d635087967f26f87ab2e5d86094cc82e90c6da122884a51fef7b
                                    • Instruction ID: 26b8075fd2a12a3d684132d57b0164fc77dbea6213a0abd23e5f6a33958ab967
                                    • Opcode Fuzzy Hash: 060259eeb703d635087967f26f87ab2e5d86094cc82e90c6da122884a51fef7b
                                    • Instruction Fuzzy Hash: 04B116B1D01258DBDB10CF99C980ADEFBB4BF08304FA481AEE51AA7740E7345A59CF95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFileAttributesW.KERNEL32(00000000,00000000,B4419C60,?,00000000,?,?,00000000,?,B4419C60,00000000), ref: 6CC6108F
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 6CC610ED
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 62f785814cd8d7e2bcdaf81191c614dc6a5e4bd98f2bcdb114f99d466539c53a
                                    • Instruction ID: 01ff17edb462d954cced3ee0040335fc910ff786f0b45b1c852c6c192aac0b60
                                    • Opcode Fuzzy Hash: 62f785814cd8d7e2bcdaf81191c614dc6a5e4bd98f2bcdb114f99d466539c53a
                                    • Instruction Fuzzy Hash: 4921C473E056089BDF00CF99D946BDFFBB8EB45629F10016AE908D3740EB35AA05C7A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC677E6
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC67803
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: 8864b617a02359347f7a536a2a99390d9d2430bf500ea68b08838cbb9106f3f8
                                    • Instruction ID: 59684dea46d6bad785108ffdd62cbb3f2ac04f217e50a584bd185c55911639ec
                                    • Opcode Fuzzy Hash: 8864b617a02359347f7a536a2a99390d9d2430bf500ea68b08838cbb9106f3f8
                                    • Instruction Fuzzy Hash: 95019E71501205EBDB04CE5AC4D099AB3A9EF59318F0484AAEC05AFF45FB71EE45DBE0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 6CC51C4C
                                    • GetLastError.KERNEL32 ref: 6CC51C75
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID:
                                    • API String ID: 442123175-0
                                    • Opcode ID: 5dae9efe333bdf25a55a948d755b15dc228283a3b481bb0391dd79f141f5c833
                                    • Instruction ID: 6146cc447677b37a8c8eccbf07a4d942960951da32e201705d9ee8fc8c6059bd
                                    • Opcode Fuzzy Hash: 5dae9efe333bdf25a55a948d755b15dc228283a3b481bb0391dd79f141f5c833
                                    • Instruction Fuzzy Hash: 1101A23270130A9BD710CE58D844BA737F8BB04704F40492AF916DB980E376E8318BA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 6CC519EB
                                    • GetLastError.KERNEL32 ref: 6CC51A0C
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastRead
                                    • String ID:
                                    • API String ID: 1948546556-0
                                    • Opcode ID: 984dfb5ab95badacb1ad40d2d34f23170b0a069e60904117fbba12aa19595ec5
                                    • Instruction ID: de9ee24920336acc78b3921bd2af43b289aedc69fc060c4d0ba5e82ed2bc8a28
                                    • Opcode Fuzzy Hash: 984dfb5ab95badacb1ad40d2d34f23170b0a069e60904117fbba12aa19595ec5
                                    • Instruction Fuzzy Hash: 60F0AF7635020A9BDB00CE58D848B6737A9BB84314F10C52AF819CB680E775D8718B64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(00000002,6CC6B356,?,?,?,?,?,?,6CC85380,?), ref: 6CC51BE9
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,6CC85380,?), ref: 6CC51BFD
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ChangeCloseErrorFindLastNotification
                                    • String ID:
                                    • API String ID: 1687624791-0
                                    • Opcode ID: 4389519e8c58fe1287045f1c5edb8f2880934d59eddbcfb1844e3d40ef4f1e93
                                    • Instruction ID: ad9e341d38f6bc7e3ca4ff52c75c9192ac01f8d2fda0b5807d3ec0cd763047b7
                                    • Opcode Fuzzy Hash: 4389519e8c58fe1287045f1c5edb8f2880934d59eddbcfb1844e3d40ef4f1e93
                                    • Instruction Fuzzy Hash: 10E012B8B51A035ADB104E3DCC4C32679B46B0273A7E48B28E076D68E0F72DD0728A08
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC609E8
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC60A02
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: 4a7cece484938596848f8f47272bc67adec6e58558574200314fcb2248ee3773
                                    • Instruction ID: acdcd41bb56c69956200822a86e31c93b8eba19274f61892fb9407e359de513c
                                    • Opcode Fuzzy Hash: 4a7cece484938596848f8f47272bc67adec6e58558574200314fcb2248ee3773
                                    • Instruction Fuzzy Hash: 6DD05EA080A248728A04C6A6A84199E7BAC8A1524CF400299BC0993E02FA32D61E42A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFileTime.KERNEL32(?,00000000,00000000,00000000,B4419C60,?,?,?,?,?,6CC80300,000000FF), ref: 6CC57438
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: FileTime
                                    • String ID:
                                    • API String ID: 1425588814-0
                                    • Opcode ID: c7350521bb98e66ad92a64c237f9133a1f3e6485ca795c7eb73054bcf3167acc
                                    • Instruction ID: 8a63a6f597d6d14a4ad021eea1da1dace8b813ff9b007ae04833d421c6ecb836
                                    • Opcode Fuzzy Hash: c7350521bb98e66ad92a64c237f9133a1f3e6485ca795c7eb73054bcf3167acc
                                    • Instruction Fuzzy Hash: 9C5190B1A15A82AFD708CF75C480B95FBA0FB09318F90865DD46D87E01E731B8B4EB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 6CC625A0: FindClose.KERNEL32(FFFFFFFF,?,B4419C60,?,00000000,6CC850B8,?,6CC80438,000000FF,?,6CC6265E), ref: 6CC625EA
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5A992
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CloseExceptionException@8FindRaiseThrow
                                    • String ID:
                                    • API String ID: 2665002293-0
                                    • Opcode ID: 6cad88667721e2edb622c86b983671d08e6d3488cf7d1a140b3eb7b84457d6db
                                    • Instruction ID: 09ab3eb3c60d49b19ad97856064a65933ab619e94a98cebc661cce8e62d24f37
                                    • Opcode Fuzzy Hash: 6cad88667721e2edb622c86b983671d08e6d3488cf7d1a140b3eb7b84457d6db
                                    • Instruction Fuzzy Hash: F71163B2500744ABC710CF69C880EDBFBF8FF55318F50461EE95683B50EB35A5098BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(6CC5890F,B4419C60,?,?,00000000), ref: 6CC61528
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID:
                                    • API String ID: 1452528299-0
                                    • Opcode ID: 4bdb5883da022db16b86a1d30c4970221908e223630ac45277e18997f018307c
                                    • Instruction ID: 4848bc8498803e71ef5ad245cbe4e9973d554a98b172e7327cfec4980f6557c3
                                    • Opcode Fuzzy Hash: 4bdb5883da022db16b86a1d30c4970221908e223630ac45277e18997f018307c
                                    • Instruction Fuzzy Hash: 65B18575D002099BCF14CFA9DA816EEB7B5FF44309F184169D806A7F40FB35E9198BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 6CC62470: FindClose.KERNEL32(?,B4419C60,6CC80658,00000000), ref: 6CC624C4
                                      • Part of subcall function 6CC62470: FindFirstFileW.KERNEL32(6CC850B8,?,B4419C60,6CC80658,00000000), ref: 6CC624DE
                                      • Part of subcall function 6CC62470: FindFirstFileW.KERNEL32(?,?), ref: 6CC6253A
                                    • FindClose.KERNEL32(FFFFFFFF,?,B4419C60,?,00000000,6CC850B8,?,6CC80438,000000FF,?,6CC6265E), ref: 6CC625EA
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: c9ec87f2f10d9a8b56bf758a60111cb1e154b0dfbd4bc817dd3691439dee8862
                                    • Instruction ID: ee2a5ad67ccf941be002d4cb8cf723cb09c15b903dbcb053b8c4cb20eec6fc20
                                    • Opcode Fuzzy Hash: c9ec87f2f10d9a8b56bf758a60111cb1e154b0dfbd4bc817dd3691439dee8862
                                    • Instruction Fuzzy Hash: 00F062B6945648AFC710CF59C844FABB7B8FB06724F50071AF43193BC0D73569058A60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(?), ref: 6CC5196C
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 08b0e8dd326f45b5362a0d12f756ee6a5acae2e26371f31a41e3dd2320615e10
                                    • Instruction ID: 2badad511d341f74f1bb19afe5b16e4ef82be072044711b7fd9b5d0c54f64196
                                    • Opcode Fuzzy Hash: 08b0e8dd326f45b5362a0d12f756ee6a5acae2e26371f31a41e3dd2320615e10
                                    • Instruction Fuzzy Hash: F7E092B260271016C2109F699809B47BBDC9F022B9B608B18E47987AD0E371D421C794
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6CC76375,00000001,?,?,?,6CC764EE,?,?,?,6CC87F18,0000000C,6CC765A9), ref: 6CC793F6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CreateHeap
                                    • String ID:
                                    • API String ID: 10892065-0
                                    • Opcode ID: 88e79978bc0467462b85377d3503bde573e83d467808882a9f24e0510731a113
                                    • Instruction ID: 2371a0d35faf167fcafe2906d1bf1ddf8ff0fa68a4ed01834329ee36c6deac57
                                    • Opcode Fuzzy Hash: 88e79978bc0467462b85377d3503bde573e83d467808882a9f24e0510731a113
                                    • Instruction Fuzzy Hash: 92D05E727553485EDB006EB59C08B233FFCE787799F048476B90CC7540F670C5508610
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 6CC76B91
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CC76BA6
                                    • UnhandledExceptionFilter.KERNEL32(6CC83328), ref: 6CC76BB1
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 6CC76BCD
                                    • TerminateProcess.KERNEL32(00000000), ref: 6CC76BD4
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: 6f7ea61577e14bcc833e7eb4d29b6347d1aeca409d640c3811c4f225e89f6e95
                                    • Instruction ID: af6dd7c6b781da2a3a0526d0732290b11b726db25717487373333bcd225adb58
                                    • Opcode Fuzzy Hash: 6f7ea61577e14bcc833e7eb4d29b6347d1aeca409d640c3811c4f225e89f6e95
                                    • Instruction Fuzzy Hash: C321EDB8A02305DFDF00DF29C589A463FB4FB0B71AF61501AE909D7740E7B459868F21
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • OpenFileMappingW.KERNEL32(00000004,00000000,?,00000002), ref: 6CC52BB4
                                    • GetLastError.KERNEL32 ref: 6CC52BC3
                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 6CC52BDF
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 6CC52C88
                                    • CloseHandle.KERNEL32(?), ref: 6CC52C96
                                    • OpenEventW.KERNEL32(00000002,00000000,?), ref: 6CC52CA8
                                    • GetLastError.KERNEL32 ref: 6CC52CBD
                                    • SetEvent.KERNEL32(00000000), ref: 6CC52CC4
                                    • GetLastError.KERNEL32 ref: 6CC52CCE
                                    • CloseHandle.KERNEL32(00000000), ref: 6CC52CD5
                                    • GetLastError.KERNEL32 ref: 6CC52CDF
                                      • Part of subcall function 6CC52670: __CxxThrowException@8.LIBCMT ref: 6CC52688
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorLast$File$CloseEventHandleOpenView$Exception@8MappingThrowUnmap
                                    • String ID: Can not open mapping$Incorrect command line$Incorrect mapping data$MapViewOfFile error$data error
                                    • API String ID: 682782048-464465891
                                    • Opcode ID: 3a63f1ff41cab445160bdb91efd6250046642837f9ec06fc266624e1029e3fb1
                                    • Instruction ID: 986aa1142c4c7fc1a5eae0eaecc66a84a0380bb02a774176dd18cdcca0c5f45b
                                    • Opcode Fuzzy Hash: 3a63f1ff41cab445160bdb91efd6250046642837f9ec06fc266624e1029e3fb1
                                    • Instruction Fuzzy Hash: 1D61F671E016099BDB01CFA8C858BDEBBF4EF45358F544124E901A7B40FB70E92587A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6CC87F58,0000000C,6CC77296,00000000,00000000,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B), ref: 6CC7716D
                                    • __crt_waiting_on_module_handle.LIBCMT ref: 6CC77178
                                      • Part of subcall function 6CC77790: Sleep.KERNEL32(000003E8,?,?,6CC770BE,KERNEL32.DLL,?,6CC794A4,?,6CC75FE3,6CC5FA7E,?,?,6CC54D3F,0000000C,B4419C60,?), ref: 6CC7779C
                                      • Part of subcall function 6CC77790: GetModuleHandleW.KERNEL32(6CC5FA7E,?,6CC770BE,KERNEL32.DLL,?,6CC794A4,?,6CC75FE3,6CC5FA7E,?,?,6CC54D3F,0000000C,B4419C60,?,?), ref: 6CC777A5
                                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6CC771A1
                                    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6CC771B1
                                    • __lock.LIBCMT ref: 6CC771D3
                                    • InterlockedIncrement.KERNEL32(02C08302), ref: 6CC771E0
                                    • __lock.LIBCMT ref: 6CC771F4
                                    • ___addlocaleref.LIBCMT ref: 6CC77212
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                    • API String ID: 1028249917-2843748187
                                    • Opcode ID: 4754a6f57d3b0af658247ad622aaed49ef2b2045dd3343fb456013769712831b
                                    • Instruction ID: 546318244b442845b362790b824af775be4d57f3df9d95c89748ceeaac622989
                                    • Opcode Fuzzy Hash: 4754a6f57d3b0af658247ad622aaed49ef2b2045dd3343fb456013769712831b
                                    • Instruction Fuzzy Hash: 581190715027059BDB21DF79C801B9BBFF0EF01328F14455AE4A9E7B90EB34A544DB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 6CC71230: _malloc.LIBCMT ref: 6CC71258
                                      • Part of subcall function 6CC71230: __CxxThrowException@8.LIBCMT ref: 6CC71272
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70704
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68324
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68390
                                      • Part of subcall function 6CC682B0: _malloc.LIBCMT ref: 6CC683B1
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC683CB
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68416
                                      • Part of subcall function 6CC75FF4: __lock.LIBCMT ref: 6CC76012
                                      • Part of subcall function 6CC75FF4: ___sbh_find_block.LIBCMT ref: 6CC7601D
                                      • Part of subcall function 6CC75FF4: ___sbh_free_block.LIBCMT ref: 6CC7602C
                                      • Part of subcall function 6CC75FF4: HeapFree.KERNEL32(00000000,6CC5FA7E,6CC87EB0,0000000C,6CC781B5,00000000,6CC88028,0000000C,6CC781EF,6CC5FA7E,?,?,6CC7C6AB,00000004,6CC882E8,0000000C), ref: 6CC7605C
                                      • Part of subcall function 6CC75FF4: GetLastError.KERNEL32(?,6CC7C6AB,00000004,6CC882E8,0000000C,6CC77669,6CC5FA7E,?,00000000,00000000,00000000,?,6CC7726D,00000001,00000214), ref: 6CC7606D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70A37
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc$ErrorExceptionFreeHeapLastRaise___sbh_find_block___sbh_free_block__lock
                                    • String ID: -mhe$ -sfx$ -ssw$ -w$7za
                                    • API String ID: 1499254937-429077366
                                    • Opcode ID: 9a051f9bfbba4bb5fa444ddee982fcf6e40ad286552d78faa3131c1c1185d0d6
                                    • Instruction ID: bcdf39659fe4c1acecec2696d9d3062f4e25214f985806021ae806902c2814a6
                                    • Opcode Fuzzy Hash: 9a051f9bfbba4bb5fa444ddee982fcf6e40ad286552d78faa3131c1c1185d0d6
                                    • Instruction Fuzzy Hash: 56C16E718012889BDF10DFE8C984BDEBBB8AF14308F544559D805ABB45F7B5AA1CCBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcAddress.KERNEL32(6CC66AD8,GetHandlerProperty2), ref: 6CC66584
                                    • GetProcAddress.KERNEL32(?,GetHandlerProperty), ref: 6CC66595
                                    • GetProcAddress.KERNEL32(?,GetNumberOfFormats), ref: 6CC665B1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID: GetHandlerProperty$GetHandlerProperty2$GetNumberOfFormats
                                    • API String ID: 190572456-3564775856
                                    • Opcode ID: a52d6888fa670dceed01ac8eb63d1ce97debf414b6690e26a44f6b296d4c9521
                                    • Instruction ID: b7e67fca4d69a7c0bc3c606e1418e17061faecd7ea60374736a0615d516c4244
                                    • Opcode Fuzzy Hash: a52d6888fa670dceed01ac8eb63d1ce97debf414b6690e26a44f6b296d4c9521
                                    • Instruction Fuzzy Hash: 72D13AB1D006589BDB24DFAAC980BDEBBB4BF48314F1041ADD559E7B40EB309A45CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC70C28
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70C42
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70D3F
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70D54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise_malloc
                                    • String ID: -an$7za l
                                    • API String ID: 1305767944-193614407
                                    • Opcode ID: be56522f857e3fdb3c0b3538554ad53422fe97b81ef3ef765e5012cb405f237b
                                    • Instruction ID: 95efde55cb004960ffcf2da4d934a37ab521fcd464e481853bdfdfdf8ecc17a7
                                    • Opcode Fuzzy Hash: be56522f857e3fdb3c0b3538554ad53422fe97b81ef3ef765e5012cb405f237b
                                    • Instruction Fuzzy Hash: EA917F71901248DFDF10DFA8C980BCEBBB4EF15308F544599E805ABB41EB75EA49CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindMITargetTypeInstance.LIBCMT ref: 6CC7E624
                                      • Part of subcall function 6CC7E370: PMDtoOffset.LIBCMT ref: 6CC7E400
                                    • FindVITargetTypeInstance.LIBCMT ref: 6CC7E62B
                                    • PMDtoOffset.LIBCMT ref: 6CC7E63B
                                    • std::bad_exception::bad_exception.LIBCMT ref: 6CC7E661
                                    • __CxxThrowException@8.LIBCMT ref: 6CC7E66F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: FindInstanceOffsetTargetType$Exception@8Throwstd::bad_exception::bad_exception
                                    • String ID: Bad dynamic_cast!
                                    • API String ID: 3308565544-2956939130
                                    • Opcode ID: 950069841f896644a977fe5d5323e1b7985912d14c576b4bca8dfa2f55c1a66e
                                    • Instruction ID: a2f2f2706f2db3e22781277342d869007692928a691b1d6fc818d2e284ce7620
                                    • Opcode Fuzzy Hash: 950069841f896644a977fe5d5323e1b7985912d14c576b4bca8dfa2f55c1a66e
                                    • Instruction Fuzzy Hash: EB118933A002099FDB20DEA9C940ADE77B4EF59328F140558E410EBA90FB34DA058BF0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 6CC62A70: CloseHandle.KERNEL32(?,B4419C60,?,00000000,?,?,00000000,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC62A9F
                                      • Part of subcall function 6CC62A70: CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,B4419C60,?,00000000,?,?,00000000), ref: 6CC62ACC
                                      • Part of subcall function 6CC62A70: CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6CC62B2B
                                    • GetFileSize.KERNEL32(FFFFFFFF,?,00000004,80000000,00000001,00000003,B4419C60,?,?,00000000,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC604A7
                                    • GetLastError.KERNEL32(?,?,?,00000000,6CC80C38,000000FF), ref: 6CC604B4
                                    • CloseHandle.KERNEL32(FFFFFFFF,00000004,80000000,00000001,00000003,B4419C60,?,?,00000000,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC6051D
                                    • CloseHandle.KERNEL32(FFFFFFFF,?,00000000,00000000,00000001,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC6053D
                                    • CloseHandle.KERNEL32(FFFFFFFF,FFFFFFFF,00000000,?,00000000,00000000,00000001,?,?,?,00000000,6CC80C38,000000FF), ref: 6CC6056C
                                      • Part of subcall function 6CC60A20: MultiByteToWideChar.KERNEL32(00000002,00000000,?,?,?,?,B4419C60,00000000), ref: 6CC60AA7
                                      • Part of subcall function 6CC60A20: __CxxThrowException@8.LIBCMT ref: 6CC60AC1
                                    • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,00000000,00000001,?,?,?,00000000), ref: 6CC606D8
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CloseHandle$File$Create$ByteCharErrorException@8LastMultiSizeThrowWide
                                    • String ID:
                                    • API String ID: 1518168698-0
                                    • Opcode ID: c4e531271373360163c0dd5ecce88b87b00572647e05eeae83fb638a1b8ad373
                                    • Instruction ID: f9ccfa205c4852c6544f4594fcef51e78a6e08222a116701565df98cd70a0433
                                    • Opcode Fuzzy Hash: c4e531271373360163c0dd5ecce88b87b00572647e05eeae83fb638a1b8ad373
                                    • Instruction Fuzzy Hash: D181A372E002489BCF10DFA5D980BDEB7B4EF45318F244619E915B7B80FB359909CB68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc
                                    • String ID: -ir-!$ -p$ -r$7za A
                                    • API String ID: 3476970888-2239425251
                                    • Opcode ID: 1a53240f15f9b88a1b28aa319fa1b33afb20ad7a43b77c4540b8cdcd546d5114
                                    • Instruction ID: c4caeb721e0a7a03d319772a32bd0596d0e8d246730a04cfc35a698b95f3fd84
                                    • Opcode Fuzzy Hash: 1a53240f15f9b88a1b28aa319fa1b33afb20ad7a43b77c4540b8cdcd546d5114
                                    • Instruction Fuzzy Hash: 69028E72D01248DBDF20DBA4C884BCEBBB4EF44308F548599E805A7741FB75AA59CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CreateFrameInfo.LIBCMT ref: 6CC7AD0B
                                      • Part of subcall function 6CC76968: __getptd.LIBCMT ref: 6CC76976
                                      • Part of subcall function 6CC76968: __getptd.LIBCMT ref: 6CC76984
                                    • __getptd.LIBCMT ref: 6CC7AD15
                                      • Part of subcall function 6CC772BB: __getptd_noexit.LIBCMT ref: 6CC772BE
                                      • Part of subcall function 6CC772BB: __amsg_exit.LIBCMT ref: 6CC772CB
                                    • __getptd.LIBCMT ref: 6CC7AD23
                                    • __getptd.LIBCMT ref: 6CC7AD31
                                    • __getptd.LIBCMT ref: 6CC7AD3C
                                    • _CallCatchBlock2.LIBCMT ref: 6CC7AD62
                                      • Part of subcall function 6CC76A0D: __CallSettingFrame@12.LIBCMT ref: 6CC76A59
                                      • Part of subcall function 6CC7AE09: __getptd.LIBCMT ref: 6CC7AE18
                                      • Part of subcall function 6CC7AE09: __getptd.LIBCMT ref: 6CC7AE26
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                    • String ID:
                                    • API String ID: 1602911419-0
                                    • Opcode ID: 695b6775af41186f33b7f0902cea462219176f8014c34b88e3a72aab16d694f1
                                    • Instruction ID: 2cba91aacc0e170cd31e0c6f4482f37a0de56fc6f0c4f2f3d4d12285aef42fa7
                                    • Opcode Fuzzy Hash: 695b6775af41186f33b7f0902cea462219176f8014c34b88e3a72aab16d694f1
                                    • Instruction Fuzzy Hash: 8211C6B1C00609DFDF11DFA4C584BEE7BB0FF04318F108069E814A7750EB389A559B64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC7060F
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70329
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • __CxxThrowException@8.LIBCMT ref: 6CC70624
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID: -an$7za
                                    • API String ID: 3476068407-1592202885
                                    • Opcode ID: 6ec69981b81603c0a4e11cb3c36cd45d8f2b921af05c02c6eac93dd9cda4cab6
                                    • Instruction ID: 5d2445427788a3e3cb55f745ac7bb6b3a0a1e19ad3613ac4630273aa540c76ea
                                    • Opcode Fuzzy Hash: 6ec69981b81603c0a4e11cb3c36cd45d8f2b921af05c02c6eac93dd9cda4cab6
                                    • Instruction Fuzzy Hash: A7B17071801288EBDF10DFA8C984BCEBBB4AF1430CF504455E905A7B45E775EA58CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6F621
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: -aoa$ -aos$ -aot$ -aou
                                    • API String ID: 2005118841-2698752949
                                    • Opcode ID: 0f75fcb79d076288e59afb4d7e96213639e11bce917891cdc263fa757f3413ec
                                    • Instruction ID: 59437f9e14b61648c586b61298facbac4339b48641886d6678f3be5424a99a0e
                                    • Opcode Fuzzy Hash: 0f75fcb79d076288e59afb4d7e96213639e11bce917891cdc263fa757f3413ec
                                    • Instruction Fuzzy Hash: BAF0373470A518A79950CA9CAD0059E779C870695EB804AC6B80ADBB00EBA2CE3613CA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 6CC7AA4C
                                      • Part of subcall function 6CC772BB: __getptd_noexit.LIBCMT ref: 6CC772BE
                                      • Part of subcall function 6CC772BB: __amsg_exit.LIBCMT ref: 6CC772CB
                                    • __getptd.LIBCMT ref: 6CC7AA5D
                                    • __getptd.LIBCMT ref: 6CC7AA6B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: MOC$csm
                                    • API String ID: 803148776-1389381023
                                    • Opcode ID: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                    • Instruction ID: 661faa3238eeaccece4b94d258541ed982753e14adaf47f4c053bce5be914f1f
                                    • Opcode Fuzzy Hash: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                    • Instruction Fuzzy Hash: 41E04F31110108CFCB20DB64C144B9933A4FB8632CF5511A1E45CC7B22FB34D498AF76
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 6CC7C0D2
                                      • Part of subcall function 6CC772BB: __getptd_noexit.LIBCMT ref: 6CC772BE
                                      • Part of subcall function 6CC772BB: __amsg_exit.LIBCMT ref: 6CC772CB
                                    • __amsg_exit.LIBCMT ref: 6CC7C0F2
                                    • __lock.LIBCMT ref: 6CC7C102
                                    • InterlockedDecrement.KERNEL32(?), ref: 6CC7C11F
                                    • InterlockedIncrement.KERNEL32(02901668), ref: 6CC7C14A
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                    • String ID:
                                    • API String ID: 4271482742-0
                                    • Opcode ID: ce446eec5866dff37914170fb09552952a25a90513da0e4bcdcb679daaf6ab46
                                    • Instruction ID: 302072b7d3d530761d518e71fd2b3eb93a74e4ae057d6e67efdea664cf72f6ed
                                    • Opcode Fuzzy Hash: ce446eec5866dff37914170fb09552952a25a90513da0e4bcdcb679daaf6ab46
                                    • Instruction Fuzzy Hash: CC018431A07A179BDB21AB658404B8B7B70FF06B28F150116E420E7F80EB345985DBF1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __lock.LIBCMT ref: 6CC76012
                                      • Part of subcall function 6CC781D4: __mtinitlocknum.LIBCMT ref: 6CC781EA
                                      • Part of subcall function 6CC781D4: __amsg_exit.LIBCMT ref: 6CC781F6
                                      • Part of subcall function 6CC781D4: EnterCriticalSection.KERNEL32(?,?,?,6CC7C6AB,00000004,6CC882E8,0000000C,6CC77669,6CC5FA7E,?,00000000,00000000,00000000,?,6CC7726D,00000001), ref: 6CC781FE
                                    • ___sbh_find_block.LIBCMT ref: 6CC7601D
                                    • ___sbh_free_block.LIBCMT ref: 6CC7602C
                                    • HeapFree.KERNEL32(00000000,6CC5FA7E,6CC87EB0,0000000C,6CC781B5,00000000,6CC88028,0000000C,6CC781EF,6CC5FA7E,?,?,6CC7C6AB,00000004,6CC882E8,0000000C), ref: 6CC7605C
                                    • GetLastError.KERNEL32(?,6CC7C6AB,00000004,6CC882E8,0000000C,6CC77669,6CC5FA7E,?,00000000,00000000,00000000,?,6CC7726D,00000001,00000214), ref: 6CC7606D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 2714421763-0
                                    • Opcode ID: e095ff053c54cc7c52faefe40d348dc8c6594a5d5a8522de2ce534e42d2221d5
                                    • Instruction ID: 081a07ff94e610f524e4f1da8a1ef45ee14526b6de8715cf3a6fce824f0308ce
                                    • Opcode Fuzzy Hash: e095ff053c54cc7c52faefe40d348dc8c6594a5d5a8522de2ce534e42d2221d5
                                    • Instruction Fuzzy Hash: 91018FB1906605AAEF315BB1980CB8F7F74EF0236CF204109E610E7980FB348545DBB9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC7109D
                                      • Part of subcall function 6CC6F640: __CxxThrowException@8.LIBCMT ref: 6CC6F66A
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68324
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68390
                                      • Part of subcall function 6CC682B0: _malloc.LIBCMT ref: 6CC683B1
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC683CB
                                      • Part of subcall function 6CC682B0: __CxxThrowException@8.LIBCMT ref: 6CC68416
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID: -mhe$ -w$7za d
                                    • API String ID: 175252994-4051784903
                                    • Opcode ID: 7ad42432f99ad40007636140be1fcddc100cc37141023bfe21c4ac6aec1baa9c
                                    • Instruction ID: 969342247f03338bcae5701d0a61c8b778cf6b4dc7c352cfa1d084dfcab8963c
                                    • Opcode Fuzzy Hash: 7ad42432f99ad40007636140be1fcddc100cc37141023bfe21c4ac6aec1baa9c
                                    • Instruction Fuzzy Hash: 8A917071D01288EFDF10DFA8C984BCEBBB8AF14308F544459D805A7741E775EA59CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(80000001,Software\7-zip,00000000,00020019,6CC7FD48,B4419C60,00000000,?,80000001,00000000,6CC7FD48,000000FF,?,6CC65DBD,?,6CC8FCC8), ref: 6CC65C1D
                                      • Part of subcall function 6CC62FE0: RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6CC65DBD,?,?,6CC65C37,?,6CC65DBD,?,6CC8FCC8,00000000,00000000), ref: 6CC6300E
                                      • Part of subcall function 6CC62FE0: RegQueryValueExW.ADVAPI32(6CC65DBD,Path,00000000,6CC65DBD,?,6CC65DBD,?,6CC65DBD,?,6CC8FCC8,00000000,00000000), ref: 6CC6304E
                                    • RegCloseKey.ADVAPI32(?,?,6CC65DBD,?,6CC8FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CC65C47
                                    • RegCloseKey.ADVAPI32(?,?,6CC65DBD,?,6CC8FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CC65C65
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CloseQueryValue$Open
                                    • String ID: Software\7-zip
                                    • API String ID: 4082589901-3321436535
                                    • Opcode ID: 068ff33f3de7d590fe71a0a43b8678c03e12669499e15b60103bc6b85d628167
                                    • Instruction ID: 50dd5ccfa70cb5c95f01774bbd06eebc0a4bc15fd178df252b942f6126277207
                                    • Opcode Fuzzy Hash: 068ff33f3de7d590fe71a0a43b8678c03e12669499e15b60103bc6b85d628167
                                    • Instruction Fuzzy Hash: B3117772E05A24BBC7118F45DD84AAFBB78FB06B28F10065BFC15A7B40E734550586D4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 6CC7B0A3
                                      • Part of subcall function 6CC7AFFE: ___BuildCatchObjectHelper.LIBCMT ref: 6CC7B034
                                    • _UnwindNestedFrames.LIBCMT ref: 6CC7B0BA
                                    • ___FrameUnwindToState.LIBCMT ref: 6CC7B0C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                    • String ID: csm
                                    • API String ID: 2163707966-1018135373
                                    • Opcode ID: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                    • Instruction ID: 554f6e275bd8e4eef3053bbe17c1b021b35b3a8d58b2aaf788c9ae0ef886a391
                                    • Opcode Fuzzy Hash: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                    • Instruction Fuzzy Hash: 4101D2B100150ABBDF225E51CC44AEB7E6AFF48358F104010FD2855A20EB32E9A6DBB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6F66A
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrow
                                    • String ID: -r$ -r-$ -r0
                                    • API String ID: 3976011213-1696425382
                                    • Opcode ID: 18d9e9deaf88325f4d5035ec5aa49292d4291ebc009fa72a022f87e651c3f38a
                                    • Instruction ID: d3b5c5deb919b99b38869be03bf5b8c4a14ca0ce1552fe40fe85b30af1f6b352
                                    • Opcode Fuzzy Hash: 18d9e9deaf88325f4d5035ec5aa49292d4291ebc009fa72a022f87e651c3f38a
                                    • Instruction Fuzzy Hash: E4F0A0707060196BC601CA6DAE04B9E7B9CC70160CF800AC6B808E7F10F7A2CE3443C9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b48bf725274e0261ce0c8dcf76a79c6e84b064b59e03fc5adf4287a391d1d870
                                    • Instruction ID: 82fecdca7f061b9b96656e4aa0b85b398e51c303ec5dbb6ec16e51ac11872da4
                                    • Opcode Fuzzy Hash: b48bf725274e0261ce0c8dcf76a79c6e84b064b59e03fc5adf4287a391d1d870
                                    • Instruction Fuzzy Hash: 51C1D175D04209DFCB04CF98C580ADEB7B5FF49318F648259D815BBB50E731AA26CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6CC7CEDC
                                    • __isleadbyte_l.LIBCMT ref: 6CC7CF10
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 6CC7CF41
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 6CC7CFAF
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 632b5e338378e772f9ad12ce7969f6420bc45b74ea9c4b8ab195af52f287ef83
                                    • Instruction ID: 5107868cee0383bf40dace50358fe3ff45516d98b665b06518b76f877eba738d
                                    • Opcode Fuzzy Hash: 632b5e338378e772f9ad12ce7969f6420bc45b74ea9c4b8ab195af52f287ef83
                                    • Instruction Fuzzy Hash: 7031D631A05247EFDB21EF64C841AAE7BB5FF02315F2445A9F4609B590F731D950DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000003,00000000,00000003,02000000,00000000,B4419C60,00000000,?,?,00000000,00000000,00000000), ref: 6CC60FAE
                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 6CC6100C
                                    • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CC61033
                                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 6CC6103F
                                      • Part of subcall function 6CC628A0: GetCurrentDirectoryW.KERNEL32(00000105,?,B4419C60,FFFFFFFF,?,00000004), ref: 6CC62994
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: File$Create$CloseCurrentDirectoryHandleTime
                                    • String ID:
                                    • API String ID: 2622452211-0
                                    • Opcode ID: 6631942947ff8116c5737405f839473abf673a41710d73c62a94c4513b9984b8
                                    • Instruction ID: dc8c4dbd8b2bc0b44e9ee6503630f2aee557e717aa40ed80845f08e4484bc802
                                    • Opcode Fuzzy Hash: 6631942947ff8116c5737405f839473abf673a41710d73c62a94c4513b9984b8
                                    • Instruction Fuzzy Hash: C621C771601204BFEF10CF59DC85FAFBBB8EB46768F104229FA15A76C0D774AE0586A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(6CC8FC98,B4419C60,?,?,?,6CC7FB68,000000FF), ref: 6CC6D4F2
                                    • LeaveCriticalSection.KERNEL32(6CC8FC98,?,?,?,6CC7FB68,000000FF), ref: 6CC6D50A
                                    • LeaveCriticalSection.KERNEL32(6CC8FC98,?,?,?,?,6CC7FB68,000000FF), ref: 6CC6D547
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID: [Content]
                                    • API String ID: 2978645861-3799411330
                                    • Opcode ID: 821ff7f3bb9f2a69e60bac6c08e5b02486908f1e3dcd8e064068760d8dffde8b
                                    • Instruction ID: db05f0af0ce92a2bbfe63207edbbe14a3cb0334d4bc90f5bc4ec43f46a127349
                                    • Opcode Fuzzy Hash: 821ff7f3bb9f2a69e60bac6c08e5b02486908f1e3dcd8e064068760d8dffde8b
                                    • Instruction Fuzzy Hash: E801C472E05508AFD720DF59C845B9EBBF8FB0A614F90465AE802D7F80F77569048B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6,?,00100000,?,00000000), ref: 6CC51A4E
                                    • ReadFile.KERNEL32(00000000), ref: 6CC51A55
                                    • GetLastError.KERNEL32 ref: 6CC51A72
                                    • GetLastError.KERNEL32 ref: 6CC51A80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorLast$FileHandleRead
                                    • String ID:
                                    • API String ID: 2244327787-0
                                    • Opcode ID: ec5dc696516c4108049ba7dcf58c5bb352918ac809e20c82317e906c387b0afd
                                    • Instruction ID: f92d93a576d4243ede7fad30a90b989f04bf891550db08d67cfa260521bc6475
                                    • Opcode Fuzzy Hash: ec5dc696516c4108049ba7dcf58c5bb352918ac809e20c82317e906c387b0afd
                                    • Instruction Fuzzy Hash: 8F01F43730120A9BDB01DE989C04BB737BCEB45365F14863AF906CBA80E730D8B187A4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC5EF8A
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5EFA4
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • std::exception::exception.LIBCMT ref: 6CC5EFC3
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5EFD8
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 1974103008-0
                                    • Opcode ID: 16889649c80ab21a0561680a9577ab6b7a62642f300c8ccd2dd3e5768ee5e703
                                    • Instruction ID: 7032f7243f824c0442b46c8af6cbf53b7297e5bcd223c1bc19f5807d417bb87c
                                    • Opcode Fuzzy Hash: 16889649c80ab21a0561680a9577ab6b7a62642f300c8ccd2dd3e5768ee5e703
                                    • Instruction Fuzzy Hash: CCF0F6B1D052086ADB08DFF49941BEFBB399B84318F4487ADD40192E85FF75C62D82B2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC659D3
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC659ED
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • std::exception::exception.LIBCMT ref: 6CC65A0C
                                    • __CxxThrowException@8.LIBCMT ref: 6CC65A21
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 1974103008-0
                                    • Opcode ID: 7d1744f20fbab7b7240cfe667ec36cf7a627450e42f3f442241f143d0c1f6404
                                    • Instruction ID: 7874c107a7b9d8df27e8ad3c576b6e2af6bd8084af0214112d2dbf4dffc50407
                                    • Opcode Fuzzy Hash: 7d1744f20fbab7b7240cfe667ec36cf7a627450e42f3f442241f143d0c1f6404
                                    • Instruction Fuzzy Hash: 9BF0F6B180520969DB14DAB58981EEFBB389B4031CF10465AD402A2D82FB70D61E8272
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 6CC5F320
                                      • Part of subcall function 6CC75F2A: __FF_MSGBANNER.LIBCMT ref: 6CC75F4D
                                      • Part of subcall function 6CC75F2A: __NMSG_WRITE.LIBCMT ref: 6CC75F54
                                      • Part of subcall function 6CC75F2A: RtlAllocateHeap.NTDLL(00000000,6CC5FA6F,?,00000000,?,?,6CC54D3F,0000000C,B4419C60,?,?,00000000,?,?,6CC7EF9B,000000FF), ref: 6CC75FA1
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5F33A
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • std::exception::exception.LIBCMT ref: 6CC5F359
                                    • __CxxThrowException@8.LIBCMT ref: 6CC5F36E
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 1974103008-0
                                    • Opcode ID: 907812c1d9d4f7a716572cfb1247c3d7bd953766ca115320a30244190c4d2956
                                    • Instruction ID: cafdc408f2b115f9b498cd39ed0f560dd5ff4d4671a7c0ae555965613923c49f
                                    • Opcode Fuzzy Hash: 907812c1d9d4f7a716572cfb1247c3d7bd953766ca115320a30244190c4d2956
                                    • Instruction Fuzzy Hash: C1F024B08062087ADB1CCFB5D801ADE7B68DF44358F80C61EEC1982E84FB70D32886A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 6CC7BE36
                                      • Part of subcall function 6CC772BB: __getptd_noexit.LIBCMT ref: 6CC772BE
                                      • Part of subcall function 6CC772BB: __amsg_exit.LIBCMT ref: 6CC772CB
                                    • __getptd.LIBCMT ref: 6CC7BE4D
                                    • __amsg_exit.LIBCMT ref: 6CC7BE5B
                                    • __lock.LIBCMT ref: 6CC7BE6B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                    • String ID:
                                    • API String ID: 3521780317-0
                                    • Opcode ID: 934d52ef7c1c4e6d81c7ee75a753c8961c02d2b384a9434f14b413b252ab0d16
                                    • Instruction ID: 9a41e9f557c2bda0b886a865c00fe67bd591e690452da758e9faba8e6afa02c0
                                    • Opcode Fuzzy Hash: 934d52ef7c1c4e6d81c7ee75a753c8961c02d2b384a9434f14b413b252ab0d16
                                    • Instruction Fuzzy Hash: 88F09032901B06CBEB329BA48401B8E77B0EF0172CF15469AE55097F90FB345949DB72
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6FD8E
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6FDA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: -u
                                    • API String ID: 2005118841-3343466670
                                    • Opcode ID: 0c7017dc501e275563f7bf92e48229c5243c243f690f983ba098de85a00e3170
                                    • Instruction ID: 6d41d22e96fb895e7f3121975b7c873323fbdd5c36b3f6d38a16c54bf6d3aa36
                                    • Opcode Fuzzy Hash: 0c7017dc501e275563f7bf92e48229c5243c243f690f983ba098de85a00e3170
                                    • Instruction Fuzzy Hash: 54416071D05248EFDB21CF9ACE80ACEBBB4FB05348F508956E805A7E00F7749A558BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: Exception@8Throwwsprintf
                                    • String ID: -v
                                    • API String ID: 2898814609-1581256980
                                    • Opcode ID: 16e56adefd2769c3bebeefda27791f3881c15e460cfd2ad82f78627719a06dbf
                                    • Instruction ID: 70f3a1789101913e919f622fb057b496553cd7975a543ce89c3af4ca4defc14d
                                    • Opcode Fuzzy Hash: 16e56adefd2769c3bebeefda27791f3881c15e460cfd2ad82f78627719a06dbf
                                    • Instruction Fuzzy Hash: D1313271D01248AFCB10CFE9C984ADEFBF8EF44704F50852AE515E7B45E7759A188BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,0000005F,00000000,B4419C60,00000000), ref: 6CC60B62
                                    • __CxxThrowException@8.LIBCMT ref: 6CC60B88
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ByteCharExceptionException@8MultiRaiseThrowWide
                                    • String ID: _
                                    • API String ID: 3144726602-701932520
                                    • Opcode ID: eeec5ecf6f20f58fc363c881e4a3933c8b6b570e3adc5d09b17ff413d53ab17b
                                    • Instruction ID: 9c80100e5ccb484e7f7868ca3dc09e15b802f286f2b9bae2f08bb1120c7d8e59
                                    • Opcode Fuzzy Hash: eeec5ecf6f20f58fc363c881e4a3933c8b6b570e3adc5d09b17ff413d53ab17b
                                    • Instruction Fuzzy Hash: FA218E71504249EFDB00CF99C980F9BFBF8EF89718F14855AE9149B741E771AA04CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6CC65DBD,?,?,6CC65C37,?,6CC65DBD,?,6CC8FCC8,00000000,00000000), ref: 6CC6300E
                                    • RegQueryValueExW.ADVAPI32(6CC65DBD,Path,00000000,6CC65DBD,?,6CC65DBD,?,6CC65DBD,?,6CC8FCC8,00000000,00000000), ref: 6CC6304E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID: Path
                                    • API String ID: 3660427363-2875597873
                                    • Opcode ID: 756be8842b2b1da10e68d523bed1dc8ad6b711ec50697d73e69c760d41b9911d
                                    • Instruction ID: 451acc4222f5deb81ae76846ff4a5fd1a407e765c0972837e943983af90ae742
                                    • Opcode Fuzzy Hash: 756be8842b2b1da10e68d523bed1dc8ad6b711ec50697d73e69c760d41b9911d
                                    • Instruction Fuzzy Hash: 4E1190B1A05604AFEB14DFA9C9C08AFFBF9FF08304B24886EE146D3A00F77099458B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC6C8C2
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • GetLastError.KERNEL32(00000000,00000000), ref: 6CC6C8C7
                                    Strings
                                    • 7-Zip cannot load Mapi32.dll, xrefs: 6CC6C8D2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ErrorExceptionException@8LastRaiseThrow
                                    • String ID: 7-Zip cannot load Mapi32.dll
                                    • API String ID: 2060628206-1691247220
                                    • Opcode ID: f39da91e392f6b300fd458b5281dafc298e570c085853b91790f46ec5e5eee12
                                    • Instruction ID: 8a5a8546fc23943c71a56941da395d7639a824325ff2b3c87960d7c9c448338f
                                    • Opcode Fuzzy Hash: f39da91e392f6b300fd458b5281dafc298e570c085853b91790f46ec5e5eee12
                                    • Instruction Fuzzy Hash: 1611A172905248EAEB10DBE4DD40BDEB7B4EF54308F54419CE50997780EB715A19CB73
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 6CC769BB: __getptd.LIBCMT ref: 6CC769C1
                                      • Part of subcall function 6CC769BB: __getptd.LIBCMT ref: 6CC769D1
                                    • __getptd.LIBCMT ref: 6CC7AE18
                                      • Part of subcall function 6CC772BB: __getptd_noexit.LIBCMT ref: 6CC772BE
                                      • Part of subcall function 6CC772BB: __amsg_exit.LIBCMT ref: 6CC772CB
                                    • __getptd.LIBCMT ref: 6CC7AE26
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: csm
                                    • API String ID: 803148776-1018135373
                                    • Opcode ID: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                    • Instruction ID: 91fcb7cb0f407e4be3060bbd94a9b00f7794626f3bc14f634c9d2a8d1722d9a4
                                    • Opcode Fuzzy Hash: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                    • Instruction Fuzzy Hash: 74014634801609CBCB358FB1D480AADB7B5FF80319F24652ED45196EA0EB30D5A9DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 6CC7E66F
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    • std::bad_exception::bad_exception.LIBCMT ref: 6CC7E697
                                      • Part of subcall function 6CC75DCA: std::bad_exception::bad_exception.LIBCMT ref: 6CC75DD5
                                    Strings
                                    • Access violation - no RTTI data!, xrefs: 6CC7E68F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: std::bad_exception::bad_exception$ExceptionException@8RaiseThrow
                                    • String ID: Access violation - no RTTI data!
                                    • API String ID: 1432139112-2158758863
                                    • Opcode ID: 0b4493de8fa3738aa378f2973125c457093b067c22ff53aee6b6ce9420da0385
                                    • Instruction ID: 913640efd5052ef89182582f190b9a674c55fa86fbffb79bb790e5ee121507a3
                                    • Opcode Fuzzy Hash: 0b4493de8fa3738aa378f2973125c457093b067c22ff53aee6b6ce9420da0385
                                    • Instruction Fuzzy Hash: 5EE01276910508CFCF14CBA9C981ADE77B4FB19319F150854E402F7A50E734E955DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 6CC75196
                                    • __CxxThrowException@8.LIBCMT ref: 6CC751C1
                                      • Part of subcall function 6CC7663B: RaiseException.KERNEL32(?,6CC70629,B4419C60,?,?,6CC70629,?,6CC88388,B4419C60), ref: 6CC7667D
                                    Strings
                                    • invalid string position, xrefs: 6CC7519B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2620853410.000000006CC51000.00000020.00000001.01000000.00000005.sdmp, Offset: 6CC50000, based on PE: true
                                    • Associated: 00000002.00000002.2620796351.000000006CC50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621061200.000000006CC83000.00000002.00000001.01000000.00000005.sdmpDownload File
                                    • Associated: 00000002.00000002.2621144850.000000006CC8D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6cc50000_TDService.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8H_prolog3RaiseThrow
                                    • String ID: invalid string position
                                    • API String ID: 1961742612-1799206989
                                    • Opcode ID: 9a9a10ee5e9832a31d583627241a76e1fc229767294974540bc4f1a8a0dd9857
                                    • Instruction ID: bde5062807180bda053feb2d60e8383cbc40ec3594d344c2fcf2dc6e2a975135
                                    • Opcode Fuzzy Hash: 9a9a10ee5e9832a31d583627241a76e1fc229767294974540bc4f1a8a0dd9857
                                    • Instruction Fuzzy Hash: 59D017728501089BDB10DBE4CC54FDE7738EB14328F840829A201AA980FBB4AA088A74
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:8.2%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0.1%
                                    Total number of Nodes:1921
                                    Total number of Limit Nodes:17
                                    execution_graph 36729 1000e070 36730 1000e082 36729->36730 36733 1000e08c 36729->36733 36745 10012a20 36730->36745 36732 1000e093 36733->36732 36736 100027a0 36733->36736 36740 10002f54 36733->36740 36737 100027c4 36736->36737 36738 100027e3 36737->36738 36748 10002870 36737->36748 36738->36733 36741 10002f61 36740->36741 36742 10002f8b 36741->36742 36774 10006814 36741->36774 36779 100068c9 36741->36779 36742->36733 36746 10012a24 36745->36746 36747 10012a27 VirtualAlloc 36745->36747 36746->36733 36747->36733 36751 10002805 36748->36751 36750 10002894 36750->36738 36758 10018eb0 36751->36758 36753 1000280f EnterCriticalSection 36759 693c1ab0 36753->36759 36754 10002837 36755 1000284c LeaveCriticalSection 36754->36755 36767 693c19c0 36754->36767 36755->36750 36758->36753 36760 693c1ad0 SetFilePointer 36759->36760 36761 693c1ac3 36759->36761 36762 693c1b0b 36760->36762 36763 693c1b01 GetLastError 36760->36763 36761->36754 36764 693c1b2f GetLastError 36762->36764 36765 693c1b25 36762->36765 36763->36762 36766 693c1b35 36764->36766 36765->36754 36766->36754 36768 693c19cd 36767->36768 36769 693c19d2 ReadFile 36767->36769 36768->36769 36770 693c19fd 36769->36770 36771 693c1a0c GetLastError 36770->36771 36772 693c1a06 36770->36772 36773 693c1a16 36771->36773 36772->36755 36773->36755 36775 1000681f 36774->36775 36786 693c7350 36775->36786 36796 693c1be0 36775->36796 36776 10006833 36776->36741 36781 100068d5 36779->36781 36780 10006982 36780->36741 36781->36780 36784 1000688a 99 API calls 36781->36784 36828 100045ee 36781->36828 36832 1000670b 36781->36832 36836 1000684d 8 API calls 36781->36836 36784->36781 36787 693c7516 36786->36787 36792 693c7389 36786->36792 36787->36776 36788 693c7462 36788->36787 36790 693c7491 36788->36790 36809 693c63a0 36788->36809 36791 693c74eb 36790->36791 36801 693d1060 SetFileAttributesW 36790->36801 36791->36776 36792->36787 36792->36788 36793 693c742b SetFileTime 36792->36793 36795 693c1be0 2 API calls 36793->36795 36795->36788 36797 693c1be8 FindCloseChangeNotification 36796->36797 36798 693c1bf3 36796->36798 36797->36798 36799 693c1bfd GetLastError 36797->36799 36798->36776 36800 693c1c07 36799->36800 36800->36776 36802 693d10ad 36801->36802 36803 693d1099 36801->36803 36819 693d28a0 36802->36819 36803->36791 36805 693d10d6 36806 693d1115 36805->36806 36807 693d10e8 SetFileAttributesW 36805->36807 36806->36791 36808 693d10fb 36807->36808 36808->36791 36810 693c63f7 36809->36810 36811 693c63fd 36810->36811 36812 693c6419 36810->36812 36823 693d2e40 36811->36823 36813 693c6435 36812->36813 36827 693d2f70 RaiseException __CxxThrowException@8 36812->36827 36817 693d2e40 VariantClear 36813->36817 36815 693c6406 36815->36790 36818 693c644a 36817->36818 36818->36790 36820 693d28e4 36819->36820 36821 693d298b GetCurrentDirectoryW 36820->36821 36822 693d29a4 36820->36822 36821->36822 36822->36805 36824 693d2e4b 36823->36824 36825 693d2e65 VariantClear 36823->36825 36824->36825 36826 693d2e59 36824->36826 36825->36815 36826->36815 36827->36813 36829 1000460f 36828->36829 36830 100045ff 36828->36830 36829->36781 36837 693c1c20 36830->36837 36833 10006715 __EH_prolog 36832->36833 36844 693c6460 36833->36844 36834 10006762 36834->36781 36836->36781 36838 693c1c2d 36837->36838 36839 693c1c32 WriteFile 36837->36839 36838->36839 36840 693c1c69 36839->36840 36841 693c1c6f 36840->36841 36842 693c1c75 GetLastError 36840->36842 36841->36829 36843 693c1c7f 36842->36843 36843->36829 36845 693c64a0 36844->36845 36932 693cabe0 36845->36932 36847 693c6522 36848 693c6528 36847->36848 36954 693cab10 36847->36954 36848->36834 36850 693c6565 36850->36834 36851 693c655c 36851->36850 36852 693c65bd 36851->36852 36853 693c65e7 36851->36853 36855 693d2e40 VariantClear 36852->36855 36854 693c6623 36853->36854 36856 693c65f6 36853->36856 36857 693d2e40 VariantClear 36854->36857 36858 693c65c5 36855->36858 36859 693d2e40 VariantClear 36856->36859 36860 693c663f 36857->36860 36858->36834 36929 693c65fe 36859->36929 36861 693cab10 VariantClear 36860->36861 36862 693c6651 36861->36862 36863 693c665a 36862->36863 36864 693c63a0 2 API calls 36862->36864 36863->36834 36865 693c6683 36864->36865 36866 693c6689 36865->36866 36867 693c66c4 36865->36867 37010 693de770 72 API calls 36865->37010 36866->36834 36869 693c673c 36867->36869 36870 693c66ec 36867->36870 36927 693c6fdb 36867->36927 36873 693c6767 36869->36873 36874 693c6791 36869->36874 37011 693d09e0 36870->37011 36872 693d09e0 68 API calls 36890 693c70cd 36872->36890 36876 693d2e40 VariantClear 36873->36876 36875 693c679b 36874->36875 36877 693c716a 36874->36877 36880 693d2e40 VariantClear 36875->36880 36879 693c676f 36876->36879 36881 693d2e40 VariantClear 36877->36881 36878 693c66f3 36878->36834 36879->36834 36882 693c67bf 36880->36882 36894 693c688e 36881->36894 36966 693c62b0 36882->36966 36884 693c67d5 36885 693c67db 36884->36885 36886 693c62b0 VariantClear 36884->36886 36885->36834 36887 693c6810 36886->36887 36887->36858 36888 693c62b0 VariantClear 36887->36888 36889 693c682d 36888->36889 36889->36850 36891 693cab10 VariantClear 36889->36891 36890->36834 36892 693c6850 36891->36892 36892->36850 36978 693ddf80 36892->36978 36894->36834 36895 693c68ad 36984 693c4dd0 36895->36984 36900 693c6884 36900->36894 36900->36895 37017 693d07d0 CharUpperW CharUpperW 36900->37017 36901 693c68c9 36906 693c69f7 36901->36906 37016 693c6250 CreateDirectoryW GetLastError CreateDirectoryW GetCurrentDirectoryW 36901->37016 36903 693c6a28 36928 693c6a42 36903->36928 37019 693d1140 RemoveDirectoryW RemoveDirectoryW GetCurrentDirectoryW 36903->37019 36904 693c6a86 36909 693c6c89 36904->36909 36995 693d25a0 36904->36995 36905 693d09e0 68 API calls 36926 693c6e99 36905->36926 36906->36903 36906->36904 36909->36905 36909->36927 36909->36929 36911 693c6931 36911->36906 36912 693c69e1 36911->36912 37018 693d0f70 CreateFileW CreateFileW SetFileTime CloseHandle GetCurrentDirectoryW 36912->37018 36913 693c6d35 36915 693c6d3e 36913->36915 36916 693c6ebf 36913->36916 36914 693c6c81 37020 693c10e0 10 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 36914->37020 37021 693c10e0 10 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 36915->37021 37023 693d17b0 SetFileAttributesW SetFileAttributesW DeleteFileW DeleteFileW GetCurrentDirectoryW 36916->37023 36920 693c69f4 36920->36906 36922 693c6d55 36923 693c6dc8 36922->36923 36922->36929 37022 693d1210 MoveFileW MoveFileW GetCurrentDirectoryW 36923->37022 36925 693c6aaa 36925->36909 36925->36913 36925->36914 36925->36926 36925->36928 37000 693d2a70 36926->37000 36927->36872 36927->36890 36928->36834 36929->36834 36930 693c6ecb 36930->36926 36930->36928 36931 693c6dd5 36931->36909 36931->36930 36933 693cac34 36932->36933 36934 693cac3a 36933->36934 36938 693cac59 36933->36938 36935 693d2e40 VariantClear 36934->36935 36937 693cac43 36935->36937 36936 693cad61 36939 693d2e40 VariantClear 36936->36939 36937->36847 36938->36936 36940 693d2e40 VariantClear 36938->36940 36941 693cad6a 36939->36941 36943 693cac9a 36940->36943 36941->36847 36942 693cad4b 36942->36847 36943->36942 36944 693cacfe 36943->36944 36945 693cacdf 36943->36945 36946 693cad3d 36944->36946 36951 693cad09 36944->36951 36947 693d2e40 VariantClear 36945->36947 36946->36936 36948 693cad42 36946->36948 36949 693cace8 36947->36949 36950 693d2e40 VariantClear 36948->36950 36949->36847 36950->36942 36952 693d2e40 VariantClear 36951->36952 36953 693cad27 36952->36953 36953->36847 36955 693cab66 36954->36955 36956 693cab6c 36955->36956 36957 693cab88 36955->36957 36958 693d2e40 VariantClear 36956->36958 36959 693cab93 36957->36959 36960 693cabbf 36957->36960 36961 693cab75 36958->36961 36963 693d2e40 VariantClear 36959->36963 36962 693d2e40 VariantClear 36960->36962 36961->36851 36965 693cabc8 36962->36965 36964 693caba7 36963->36964 36964->36851 36965->36851 36967 693c6309 36966->36967 36968 693c632d 36967->36968 36969 693c630f 36967->36969 36971 693c6338 36968->36971 36972 693c637b 36968->36972 36970 693d2e40 VariantClear 36969->36970 36973 693c6318 36970->36973 36974 693d2e40 VariantClear 36971->36974 36975 693d2e40 VariantClear 36972->36975 36973->36884 36976 693c6361 36974->36976 36977 693c6384 36975->36977 36976->36884 36977->36884 36979 693ddfb7 36978->36979 36980 693de021 36979->36980 36982 693ddfda 36979->36982 37024 693c4d10 68 API calls 2 library calls 36979->37024 37025 693c4d10 68 API calls 2 library calls 36980->37025 36982->36900 36988 693c4de9 36984->36988 36985 693c4e2a 36986 693c4e60 36985->36986 37027 693e55f0 __VEC_memcpy 36985->37027 36990 693ca360 36986->36990 36988->36985 37026 693e5ff4 67 API calls 7 library calls 36988->37026 36991 693ca51c 36990->36991 36994 693ca399 36990->36994 36991->36901 36994->36991 37028 693ca2f0 36994->37028 37033 693ca240 36994->37033 37048 693d2470 36995->37048 36998 693d25e9 FindClose 36999 693d25f0 36998->36999 36999->36925 37001 693d2a9e CloseHandle 37000->37001 37002 693d2ab3 CreateFileW 37000->37002 37003 693d2aad 37001->37003 37004 693d2b57 37001->37004 37005 693d2ad9 37002->37005 37008 693d2b33 37002->37008 37003->37002 37004->36927 37006 693d28a0 GetCurrentDirectoryW 37005->37006 37007 693d2b00 37006->37007 37007->37008 37009 693d2b15 CreateFileW 37007->37009 37008->36927 37009->37008 37010->36867 37068 693e5f2a 37011->37068 37014 693d0a07 37014->36878 37016->36911 37017->36900 37018->36920 37019->36928 37020->36909 37021->36922 37022->36931 37023->36931 37024->36979 37025->36982 37026->36988 37027->36986 37029 693ca310 37028->37029 37030 693ca338 37029->37030 37043 693c9ff0 __VEC_memcpy ___BuildCatchObjectHelper 37029->37043 37030->36994 37032 693ca32c 37032->36994 37041 693ca250 37033->37041 37034 693ca2b7 37046 693ca1c0 CharUpperW CharUpperW __VEC_memcpy 37034->37046 37036 693ca2c5 37038 693ca2e1 37036->37038 37047 693ca1c0 CharUpperW CharUpperW __VEC_memcpy 37036->37047 37038->36994 37040 693ca2d7 37040->36994 37041->37034 37041->37038 37044 693d07d0 CharUpperW CharUpperW 37041->37044 37045 693ca110 __VEC_memcpy 37041->37045 37043->37032 37044->37041 37045->37041 37046->37036 37047->37040 37049 693d24d8 FindFirstFileW 37048->37049 37050 693d24c3 FindClose 37048->37050 37052 693d24eb 37049->37052 37053 693d2542 37049->37053 37051 693d24d2 37050->37051 37050->37053 37051->37049 37056 693d28a0 GetCurrentDirectoryW 37052->37056 37059 693e51c7 37053->37059 37055 693d2589 37055->36998 37055->36999 37057 693d251d 37056->37057 37057->37053 37058 693d2534 FindFirstFileW 37057->37058 37058->37053 37060 693e51cf 37059->37060 37061 693e51d1 IsDebuggerPresent 37059->37061 37060->37055 37067 693e84c5 37061->37067 37064 693e6ba3 SetUnhandledExceptionFilter UnhandledExceptionFilter 37065 693e6bc8 GetCurrentProcess TerminateProcess 37064->37065 37066 693e6bc0 __invoke_watson 37064->37066 37065->37055 37066->37065 37067->37064 37069 693e5f3c 37068->37069 37070 693e5fdd 37068->37070 37072 693e5f4d 37069->37072 37078 693d09ed 37069->37078 37079 693e5f99 RtlAllocateHeap 37069->37079 37081 693e5fc9 37069->37081 37084 693e5fce 37069->37084 37090 693e5edb 67 API calls 4 library calls 37069->37090 37091 693e9494 6 API calls __decode_pointer 37069->37091 37094 693e9494 6 API calls __decode_pointer 37070->37094 37072->37069 37087 693e6fbb 67 API calls 2 library calls 37072->37087 37088 693e6e10 67 API calls 7 library calls 37072->37088 37089 693e7814 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 37072->37089 37073 693e5fe3 37095 693e7f70 67 API calls __getptd_noexit 37073->37095 37078->37014 37086 693e663b RaiseException 37078->37086 37079->37069 37092 693e7f70 67 API calls __getptd_noexit 37081->37092 37093 693e7f70 67 API calls __getptd_noexit 37084->37093 37086->37014 37087->37072 37088->37072 37090->37069 37091->37069 37092->37084 37093->37078 37094->37073 37095->37078 37096 693e3c8e 37098 693e3bd7 37096->37098 37097 693e3d60 37098->37097 37101 693d82b0 37098->37101 37100 693e3c62 37206 693cf940 37101->37206 37103 693d8305 37104 693d8329 37103->37104 37387 693e663b RaiseException 37103->37387 37106 693c4dd0 67 API calls 37104->37106 37107 693d8334 37106->37107 37214 693d7df0 37107->37214 37109 693d8340 37218 693c3be0 37109->37218 37112 693d8395 37233 693c42e0 37112->37233 37116 693e5f2a _malloc 67 API calls 37117 693d83b6 37116->37117 37119 693d83d0 37117->37119 37389 693e663b RaiseException 37117->37389 37279 693d6cc0 37119->37279 37123 693d846d 37298 693d72f0 37123->37298 37126 693d8498 37143 693d84b7 37126->37143 37392 693e663b RaiseException 37126->37392 37127 693d841b 37127->37123 37391 693e663b RaiseException 37127->37391 37129 693d8834 37131 693d09e0 68 API calls 37129->37131 37130 693d8c70 37351 693d4c00 37130->37351 37159 693d883b 37131->37159 37133 693d8819 37405 693e663b RaiseException 37133->37405 37134 693d8cfe 37417 693e663b RaiseException 37134->37417 37135 693d8d65 37419 693e663b RaiseException 37135->37419 37137 693d8ce9 37416 693e663b RaiseException 37137->37416 37138 693d8cb4 37138->37134 37138->37137 37144 693d8d19 37138->37144 37415 693e663b RaiseException 37138->37415 37141 693d8d80 37420 693e663b RaiseException 37141->37420 37143->37129 37143->37130 37143->37133 37393 693ee5ce 68 API calls 6 library calls 37143->37393 37144->37135 37145 693d8d4a 37144->37145 37188 693d8af7 37144->37188 37418 693e663b RaiseException 37145->37418 37149 693d8d9d 37421 693e663b RaiseException 37149->37421 37152 693d8db8 37422 693e663b RaiseException 37152->37422 37153 693d8531 37164 693d854a 37153->37164 37394 693d93a0 68 API calls ___crtGetEnvironmentStringsA 37153->37394 37155 693d8dd3 37158 693d8b71 37158->37100 37303 693d0880 37159->37303 37161 693d89c1 37162 693d89eb 37161->37162 37406 693c5290 68 API calls 2 library calls 37161->37406 37311 693c8ab0 37162->37311 37395 693da7b0 CharUpperW CharUpperW 37164->37395 37167 693d866d 37169 693d868c 37167->37169 37170 693d8671 37167->37170 37168 693d8aa3 37172 693d8aae 37168->37172 37173 693d8c55 37168->37173 37397 693db9c0 225 API calls __CxxThrowException@8 37169->37397 37396 693e663b RaiseException 37170->37396 37181 693d8b95 37172->37181 37184 693d8ad8 37172->37184 37414 693e663b RaiseException 37173->37414 37174 693d8a88 37409 693e663b RaiseException 37174->37409 37178 693d8a6d 37408 693e663b RaiseException 37178->37408 37179 693d8a3e 37179->37168 37179->37172 37179->37174 37179->37178 37407 693e663b RaiseException 37179->37407 37200 693d8bb4 37181->37200 37412 693e663b RaiseException 37181->37412 37183 693d8728 37189 693d87fe 37183->37189 37190 693d8733 37183->37190 37184->37188 37410 693e663b RaiseException 37184->37410 37185 693d870d 37400 693e663b RaiseException 37185->37400 37186 693d86b2 37186->37183 37186->37185 37186->37190 37191 693d86f2 37186->37191 37398 693e663b RaiseException 37186->37398 37411 693d8de0 67 API calls 37188->37411 37404 693e663b RaiseException 37189->37404 37198 693d8752 37190->37198 37401 693e663b RaiseException 37190->37401 37399 693e663b RaiseException 37191->37399 37402 693d8270 EnterCriticalSection LeaveCriticalSection 37198->37402 37413 693d8de0 67 API calls 37200->37413 37202 693d8c2e 37202->37100 37203 693d8796 37403 693d8de0 67 API calls 37203->37403 37205 693d87da 37205->37100 37207 693cf97d 37206->37207 37423 693c8180 37207->37423 37209 693cf9be 37427 693d02c0 37209->37427 37212 693cf9de 37213 693cfb0c 37212->37213 37431 693c4d10 68 API calls 2 library calls 37212->37431 37213->37103 37215 693d7e4b 37214->37215 37434 693d7c10 37215->37434 37217 693d7ecb 37217->37109 37444 693cfc80 37218->37444 37220 693c3c1c 37449 693e53fe 37220->37449 37224 693c3c2d 37225 693e53fe __fileno 67 API calls 37224->37225 37226 693c3c43 37225->37226 37227 693e539a __write_nolock 67 API calls 37226->37227 37228 693c3c49 37227->37228 37229 693e53fe __fileno 67 API calls 37228->37229 37230 693c3c5f 37229->37230 37231 693e539a __write_nolock 67 API calls 37230->37231 37232 693c3c65 37231->37232 37232->37112 37388 693e663b RaiseException 37232->37388 37238 693c431b 37233->37238 37235 693c3cf0 CharUpperW RaiseException 37235->37238 37236 693c2d80 99 API calls 37236->37238 37238->37235 37238->37236 37239 693c2670 RaiseException 37238->37239 37240 693c4579 37238->37240 37242 693c4583 37238->37242 37243 693c474d 37238->37243 37261 693c4936 CharUpperW 37238->37261 37278 693c46c7 37238->37278 37471 693c26e0 37238->37471 37505 693c2940 87 API calls __CxxThrowException@8 37238->37505 37239->37238 37506 693c2670 RaiseException __CxxThrowException@8 37240->37506 37244 693c45c8 37242->37244 37507 693c2d80 99 API calls 37242->37507 37514 693c3750 75 API calls 37243->37514 37247 693c45f1 37244->37247 37508 693c2d80 99 API calls 37244->37508 37251 693c460d 37247->37251 37509 693de950 70 API calls __CxxThrowException@8 37247->37509 37248 693c475f 37515 693c39a0 68 API calls 37248->37515 37475 693c3250 37251->37475 37254 693ded50 70 API calls 37257 693c4a74 37254->37257 37257->37116 37259 693c466f 37483 693c3e70 37259->37483 37260 693c4623 37510 693c4d10 68 API calls 2 library calls 37260->37510 37261->37238 37263 693c487b 37268 693c3250 75 API calls 37263->37268 37264 693c476c 37266 693c4814 37264->37266 37516 693c4b20 __VEC_memcpy ___BuildCatchObjectHelper 37264->37516 37265 693c485a 37265->37263 37518 693e663b RaiseException 37265->37518 37266->37263 37266->37265 37517 693e663b RaiseException 37266->37517 37268->37278 37270 693c464e 37511 693c4d10 68 API calls 2 library calls 37270->37511 37275 693c465b 37275->37278 37512 693c39a0 68 API calls 37275->37512 37276 693c469b 37276->37278 37513 693e663b RaiseException 37276->37513 37278->37254 37287 693d6d1e 37279->37287 37280 693d6ff5 37633 693d69e0 37280->37633 37281 693d7001 37665 693d5c80 16 API calls 37281->37665 37284 693d700b 37289 693d69e0 79 API calls 37284->37289 37285 693d6ffc 37286 693e51c7 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 37285->37286 37288 693d7139 37286->37288 37287->37287 37294 693e55f0 __VEC_memcpy ___BuildCatchObjectHelper 37287->37294 37297 693d6fe8 37287->37297 37648 693d6280 37287->37648 37656 693d7860 37287->37656 37288->37127 37390 693e663b RaiseException 37288->37390 37291 693d703f 37289->37291 37291->37285 37666 693d6b40 86 API calls 37291->37666 37294->37287 37295 693d7094 37295->37285 37667 693d6b40 86 API calls 37295->37667 37297->37280 37297->37281 37301 693d7329 37298->37301 37300 693d73fa 37300->37126 37301->37300 37302 693d0880 RaiseException 37301->37302 37728 693d07d0 CharUpperW CharUpperW 37301->37728 37302->37301 37304 693d088d 37303->37304 37310 693d08fc ___crtGetEnvironmentStringsA 37303->37310 37305 693d08aa 37304->37305 37729 693e663b RaiseException 37304->37729 37307 693d08d2 37305->37307 37730 693e663b RaiseException 37305->37730 37307->37310 37731 693e663b RaiseException 37307->37731 37310->37161 37320 693c8b3d 37311->37320 37312 693c8ca8 37313 693e5f2a _malloc 67 API calls 37312->37313 37314 693c8cb5 37313->37314 37315 693c8cfd 37314->37315 37791 693e663b RaiseException 37314->37791 37732 693c8400 37315->37732 37317 693d2470 9 API calls 37317->37320 37319 693c8ccf 37792 693e663b RaiseException 37319->37792 37320->37312 37320->37317 37320->37319 37322 693c8bf8 FindClose 37320->37322 37323 693c8ce6 37320->37323 37324 693d0880 RaiseException 37320->37324 37322->37320 37793 693e663b RaiseException 37323->37793 37324->37320 37326 693d2470 9 API calls 37347 693c8d0f 37326->37347 37327 693c8e9f FindClose 37327->37347 37328 693c9969 37800 693e663b RaiseException 37328->37800 37330 693c9980 37333 693d7240 CharUpperW CharUpperW 37333->37347 37334 693c966c 37796 693c82a0 37334->37796 37336 693c970e 37337 693c82a0 102 API calls 37336->37337 37350 693c8d9f 37337->37350 37339 693c97ad 37341 693c82a0 102 API calls 37339->37341 37341->37350 37343 693c9813 37345 693c82a0 102 API calls 37343->37345 37344 693c98be 37349 693c82a0 102 API calls 37344->37349 37345->37350 37346 693c9d00 RaiseException 37346->37347 37347->37326 37347->37327 37347->37328 37347->37333 37347->37334 37347->37336 37347->37339 37347->37343 37347->37344 37347->37346 37348 693c82a0 102 API calls 37347->37348 37347->37350 37738 693c9f10 37347->37738 37743 693ccae0 37347->37743 37762 693c8670 37347->37762 37794 693d07d0 CharUpperW CharUpperW 37347->37794 37795 693e55f0 __VEC_memcpy 37347->37795 37348->37347 37349->37350 37350->37179 37352 693d52a9 37351->37352 37385 693d4c52 37351->37385 37352->37138 37353 693d2470 9 API calls 37353->37385 37354 693d4cdf FindClose 37354->37385 37355 693ccae0 180 API calls 37355->37385 37356 693d5327 37361 693c82a0 102 API calls 37356->37361 37357 693d5315 38891 693e663b RaiseException 37357->38891 37358 693d52c1 37358->37356 37358->37357 37359 693d52eb 37358->37359 38888 693e663b RaiseException 37358->38888 37363 693d5303 37359->37363 38889 693e663b RaiseException 37359->38889 37365 693d5349 37361->37365 38890 693e663b RaiseException 37363->38890 37365->37138 37368 693d5364 37369 693c82a0 102 API calls 37368->37369 37370 693d5386 37369->37370 37370->37138 37371 693c82a0 102 API calls 37371->37385 37372 693cabe0 VariantClear 37372->37385 37373 693cab10 VariantClear 37373->37385 37374 693d539e 37376 693c82a0 102 API calls 37374->37376 37378 693d53cd 37376->37378 37377 693d53e5 37379 693c82a0 102 API calls 37377->37379 37378->37138 37380 693d5414 37379->37380 37380->37138 37381 693d4a10 VariantClear RaiseException 37381->37385 37383 693d4b60 VariantClear 37383->37385 37385->37352 37385->37353 37385->37354 37385->37355 37385->37358 37385->37368 37385->37371 37385->37372 37385->37373 37385->37374 37385->37377 37385->37381 37385->37383 38872 693d5440 37385->38872 38884 693de6e0 72 API calls 37385->38884 38885 693d4ac0 VariantClear 37385->38885 38886 693e6308 67 API calls 4 library calls 37385->38886 38887 693d5560 68 API calls 37385->38887 37387->37104 37388->37112 37389->37119 37390->37127 37391->37123 37392->37143 37393->37153 37394->37164 37395->37167 37396->37169 37397->37186 37398->37191 37399->37185 37400->37183 37401->37198 37402->37203 37403->37205 37404->37133 37405->37129 37406->37161 37407->37178 37408->37174 37409->37168 37410->37188 37411->37158 37412->37200 37413->37202 37414->37130 37415->37137 37416->37134 37417->37144 37418->37135 37419->37141 37420->37149 37421->37152 37422->37155 37424 693c8209 37423->37424 37425 693c8194 37423->37425 37424->37209 37425->37424 37432 693e55f0 __VEC_memcpy 37425->37432 37428 693d02d0 37427->37428 37429 693d032a 37428->37429 37433 693e55f0 __VEC_memcpy 37428->37433 37429->37212 37431->37212 37432->37424 37433->37429 37435 693d7c7f 37434->37435 37438 693e1230 37435->37438 37439 693e5f2a _malloc 67 API calls 37438->37439 37440 693e125d 37439->37440 37441 693d7d20 37440->37441 37443 693e663b RaiseException 37440->37443 37441->37217 37443->37441 37445 693cfc9a 37444->37445 37448 693cfd05 37444->37448 37445->37448 37464 693cfd20 70 API calls __CxxThrowException@8 37445->37464 37465 693c4d10 68 API calls 2 library calls 37445->37465 37448->37220 37450 693e540d 37449->37450 37451 693c3c27 37449->37451 37466 693e7f70 67 API calls __getptd_noexit 37450->37466 37455 693e539a 37451->37455 37453 693e5412 37467 693e5bb2 6 API calls 2 library calls 37453->37467 37456 693e53b6 37455->37456 37457 693e53a7 37455->37457 37463 693e53da 37456->37463 37469 693e7f70 67 API calls __getptd_noexit 37456->37469 37468 693e7f70 67 API calls __getptd_noexit 37457->37468 37459 693e53ac 37459->37224 37461 693e53ca 37470 693e5bb2 6 API calls 2 library calls 37461->37470 37463->37224 37464->37445 37465->37445 37466->37453 37468->37459 37469->37461 37472 693c2720 37471->37472 37473 693c2745 CharUpperW 37472->37473 37474 693c276e 37473->37474 37474->37238 37476 693c3258 37475->37476 37477 693c3279 37475->37477 37476->37477 37519 693c3070 37476->37519 37479 693ded50 37477->37479 37481 693ded5a 37479->37481 37480 693c461d 37480->37259 37480->37260 37481->37480 37541 693de7f0 70 API calls 37481->37541 37542 693d4320 37483->37542 37485 693c3f6f 37486 693c41a5 37485->37486 37491 693c3f83 37485->37491 37571 693e663b RaiseException 37486->37571 37488 693c41ba 37489 693c4047 37493 693c40cf 37489->37493 37558 693d1df0 37489->37558 37569 693c4d10 68 API calls 2 library calls 37489->37569 37490 693c401c 37490->37489 37557 693e663b RaiseException 37490->37557 37491->37490 37556 693c4d10 68 API calls 2 library calls 37491->37556 37570 693cd620 CharUpperW CharUpperW RaiseException 37493->37570 37496 693c40f6 37497 693d0880 RaiseException 37496->37497 37499 693c4104 37497->37499 37500 693d0880 RaiseException 37499->37500 37503 693c410f 37500->37503 37502 693c4d10 68 API calls 37502->37503 37503->37502 37504 693c414c 37503->37504 37504->37275 37505->37238 37506->37242 37507->37244 37508->37247 37509->37251 37510->37270 37511->37275 37512->37276 37513->37278 37514->37248 37515->37264 37516->37266 37517->37265 37518->37263 37532 693c3030 37519->37532 37522 693c3030 10 API calls 37523 693c30b3 37522->37523 37531 693c30d9 37523->37531 37536 693c2f70 37523->37536 37524 693c3235 37524->37476 37527 693c3070 75 API calls 37528 693c31ce 37527->37528 37528->37524 37528->37527 37529 693c5a70 68 API calls 37529->37531 37530 693d0880 RaiseException 37530->37531 37531->37528 37531->37529 37531->37530 37540 693d07d0 CharUpperW CharUpperW 37531->37540 37533 693c306a 37532->37533 37534 693c303b 37532->37534 37533->37522 37534->37533 37535 693c2f70 10 API calls 37534->37535 37535->37534 37537 693c2fa2 37536->37537 37539 693c2fef 37536->37539 37538 693d25a0 10 API calls 37537->37538 37537->37539 37538->37539 37539->37523 37540->37531 37541->37481 37543 693d43cb 37542->37543 37545 693d437a 37542->37545 37544 693d0880 RaiseException 37543->37544 37547 693d43d5 37544->37547 37545->37543 37552 693d441d 37545->37552 37572 693d35f0 37545->37572 37615 693d3460 68 API calls 37545->37615 37548 693d0880 RaiseException 37547->37548 37550 693d43e0 37548->37550 37551 693d0880 RaiseException 37550->37551 37553 693d43eb 37551->37553 37552->37485 37554 693d0880 RaiseException 37553->37554 37555 693d43f6 37554->37555 37555->37485 37556->37491 37557->37489 37559 693d1e25 GetFullPathNameW 37558->37559 37560 693d1e14 37558->37560 37562 693d1e46 37559->37562 37560->37559 37561 693d1e5f 37561->37489 37562->37561 37563 693d1e87 GetFullPathNameW 37562->37563 37566 693d1ea5 37562->37566 37563->37566 37564 693d1edd 37632 693d1cc0 CharUpperW CharUpperW 37564->37632 37565 693d1ecc lstrlenW 37565->37564 37566->37561 37566->37564 37566->37565 37568 693d1ef0 37568->37489 37569->37489 37570->37496 37571->37488 37574 693d3628 37572->37574 37573 693d4303 37573->37545 37574->37573 37607 693d36e8 37574->37607 37614 693d3e62 37574->37614 37575 693d2470 9 API calls 37575->37607 37577 693d2470 9 API calls 37599 693d3a79 37577->37599 37578 693d37c3 FindClose 37578->37607 37579 693d4213 GetLastError 37580 693d4225 GetLastError 37579->37580 37589 693d426f 37579->37589 37583 693d4234 37580->37583 37584 693d4257 37580->37584 37581 693d37d1 GetLastError 37581->37607 37582 693d3b47 FindClose 37582->37599 37590 693d0880 RaiseException 37583->37590 37630 693c4d10 68 API calls 2 library calls 37584->37630 37586 693c4d10 68 API calls 37586->37607 37587 693d0880 RaiseException 37587->37614 37588 693d3c19 GetLastError 37588->37599 37595 693d42ac 37589->37595 37596 693d42a5 FindClose 37589->37596 37590->37584 37593 693c4d10 68 API calls 37593->37599 37594 693d0880 RaiseException 37594->37607 37595->37545 37596->37595 37597 693d0880 RaiseException 37597->37599 37598 693d42c4 37600 693d42fa FindClose 37598->37600 37601 693d4301 37598->37601 37599->37577 37599->37582 37599->37588 37599->37593 37599->37597 37604 693d3db4 37599->37604 37620 693d34f0 85 API calls 37599->37620 37600->37601 37601->37573 37604->37545 37606 693de790 70 API calls 37606->37614 37607->37575 37607->37578 37607->37581 37607->37586 37607->37594 37607->37599 37613 693d3ba9 37607->37613 37616 693de790 70 API calls 37607->37616 37617 693d31d0 68 API calls 37607->37617 37618 693de370 CharUpperW CharUpperW 37607->37618 37619 693d34f0 85 API calls 37607->37619 37611 693c4d10 68 API calls 37611->37614 37613->37545 37614->37579 37614->37587 37614->37598 37614->37606 37614->37611 37621 693d2790 10 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 37614->37621 37622 693d31d0 68 API calls 37614->37622 37623 693de370 CharUpperW CharUpperW 37614->37623 37624 693c5bb0 37614->37624 37629 693d34f0 85 API calls 37614->37629 37615->37545 37616->37607 37617->37607 37618->37607 37619->37607 37620->37599 37621->37614 37622->37614 37623->37614 37625 693d0880 RaiseException 37624->37625 37626 693c5bc8 37625->37626 37627 693c5be6 37626->37627 37631 693c4d10 68 API calls 2 library calls 37626->37631 37627->37614 37629->37614 37630->37589 37631->37626 37632->37568 37634 693d6a0f LoadLibraryExW 37633->37634 37635 693d6a3e 37633->37635 37636 693d6a37 FreeLibrary 37634->37636 37637 693d6a22 37634->37637 37668 693d7750 37635->37668 37636->37635 37637->37285 37640 693d6a97 GetProcAddress 37643 693d6ab5 37640->37643 37647 693d6ad8 37640->37647 37641 693d6a83 FreeLibrary 37641->37640 37642 693d6a8e 37641->37642 37642->37640 37675 693d5f50 GetProcAddress 37643->37675 37647->37285 37649 693d62e2 37648->37649 37650 693d62fb 37648->37650 37704 693d61b0 68 API calls 37649->37704 37654 693d6328 37650->37654 37705 693d61b0 68 API calls 37650->37705 37653 693d64f6 37653->37287 37654->37653 37706 693c5290 68 API calls 2 library calls 37654->37706 37657 693e5f2a _malloc 67 API calls 37656->37657 37658 693d788f 37657->37658 37659 693d78a9 37658->37659 37715 693e663b RaiseException 37658->37715 37707 693d7950 37659->37707 37662 693d78f1 37662->37287 37664 693d0880 RaiseException 37664->37662 37665->37284 37666->37295 37667->37285 37669 693e5f2a _malloc 67 API calls 37668->37669 37670 693d7762 37669->37670 37673 693d777e 37670->37673 37700 693e663b RaiseException 37670->37700 37672 693d6a54 37672->37640 37672->37641 37672->37647 37673->37672 37674 693d0880 RaiseException 37673->37674 37674->37672 37676 693d601a 37675->37676 37677 693d5f90 GetProcAddress 37675->37677 37678 693e51c7 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 37676->37678 37680 693d5fa5 37677->37680 37679 693d6029 37678->37679 37679->37647 37683 693d6530 GetProcAddress 37679->37683 37680->37676 37681 693d5e80 VariantClear 37680->37681 37701 693d77e0 68 API calls 2 library calls 37680->37701 37681->37680 37684 693d658d GetProcAddress 37683->37684 37685 693d65a2 GetProcAddress 37683->37685 37684->37685 37690 693d68f9 37684->37690 37688 693d65b7 37685->37688 37686 693e51c7 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 37687 693d6913 37686->37687 37687->37647 37689 693d60f0 VariantClear 37688->37689 37688->37690 37691 693d692d 37688->37691 37692 693d6280 68 API calls 37688->37692 37694 693d6030 VariantClear 37688->37694 37695 693d686b SysStringByteLen 37688->37695 37696 693d7860 68 API calls 37688->37696 37699 693d2e40 VariantClear 37688->37699 37703 693e55f0 __VEC_memcpy 37688->37703 37689->37688 37690->37686 37693 693d2e40 VariantClear 37691->37693 37692->37688 37693->37690 37694->37688 37702 693cce00 __VEC_memcpy ___BuildCatchObjectHelper 37695->37702 37696->37688 37699->37688 37700->37673 37701->37680 37702->37688 37703->37688 37704->37650 37705->37654 37706->37654 37708 693d79c4 37707->37708 37716 693d7a70 37708->37716 37710 693d78bd 37710->37662 37710->37664 37711 693d79fe 37711->37710 37720 693cce00 __VEC_memcpy ___BuildCatchObjectHelper 37711->37720 37713 693d7a32 37721 693e55f0 __VEC_memcpy 37713->37721 37715->37659 37717 693d7abb 37716->37717 37722 693d7ae0 37717->37722 37720->37713 37721->37710 37723 693d0880 RaiseException 37722->37723 37724 693d7af8 37723->37724 37725 693d7ac6 37724->37725 37727 693c5290 68 API calls 2 library calls 37724->37727 37725->37711 37727->37724 37728->37301 37729->37305 37730->37307 37731->37310 37733 693c8473 37732->37733 37734 693e5f2a _malloc 67 API calls 37733->37734 37735 693c84fb 37734->37735 37736 693c8515 37735->37736 37801 693e663b RaiseException 37735->37801 37736->37347 37739 693d0880 RaiseException 37738->37739 37741 693c9f2e 37739->37741 37740 693c9f81 37740->37347 37741->37740 37742 693d0880 RaiseException 37741->37742 37742->37741 37744 693e5f2a _malloc 67 API calls 37743->37744 37745 693ccb1d 37744->37745 37747 693ccb35 37745->37747 37822 693e663b RaiseException 37745->37822 37748 693d1df0 5 API calls 37747->37748 37749 693ccc8c 37747->37749 37750 693ccbcc 37748->37750 37808 693cc430 37749->37808 37752 693ccbd3 GetLastError 37750->37752 37758 693ccc24 37750->37758 37756 693ccbe4 37752->37756 37753 693cccbc 37755 693cccc2 37753->37755 37823 693c4d10 68 API calls 2 library calls 37753->37823 37755->37347 37756->37347 37802 693ca910 37758->37802 37759 693ccd2e 37761 693ccd7e 37759->37761 37824 693c4d10 68 API calls 2 library calls 37759->37824 37761->37347 37763 693c87cd 37762->37763 37775 693c86cf 37762->37775 37769 693c87d9 37763->37769 38288 693ca5c0 37763->38288 37765 693c88d1 38293 693c99d0 37765->38293 37766 693cabe0 VariantClear 37766->37775 37768 693cab10 VariantClear 37768->37775 37769->37347 37770 693c88e5 37772 693c8931 37770->37772 38300 693d1420 37770->38300 38313 693c5e10 37772->38313 37775->37763 37775->37766 37775->37768 37787 693c86e1 37775->37787 38411 693de6e0 72 API calls 37775->38411 38412 693c9d00 RaiseException 37775->38412 37776 693c890f 37776->37772 37778 693c8916 GetLastError 37776->37778 37777 693c8967 38317 693cd1b0 37777->38317 38413 693e663b RaiseException 37778->38413 37782 693c8974 37783 693c8a3c 37782->37783 37785 693c89e1 37782->37785 37782->37787 38327 100061aa 37783->38327 38365 10005aa5 37783->38365 37784 693c8a26 37786 693d2e40 VariantClear 37784->37786 37785->37784 38414 693d2f70 RaiseException __CxxThrowException@8 37785->38414 37786->37787 37787->37347 37791->37319 37792->37323 37793->37315 37794->37347 37795->37347 37797 693c82d4 37796->37797 37798 693c82e8 37796->37798 37797->37798 38798 10006b2c 37797->38798 37798->37350 37800->37330 37801->37736 37803 693ca943 37802->37803 37804 693d25a0 10 API calls 37803->37804 37805 693ca966 37804->37805 37807 693ca997 37805->37807 37825 693e663b RaiseException 37805->37825 37807->37749 37819 693cc46b 37808->37819 37809 693cc88a 37812 693d2e40 VariantClear 37809->37812 37811 693ccaa1 37813 693d2e40 VariantClear 37811->37813 37814 693cc893 37812->37814 37821 693cc491 37813->37821 37814->37753 37815 693d2e40 VariantClear 37815->37819 37816 693cabe0 VariantClear 37816->37819 37819->37809 37819->37811 37819->37815 37819->37816 37820 693cce60 68 API calls 37819->37820 37819->37821 37826 693cc2d0 37819->37826 37842 693cae70 37819->37842 37887 693cad90 VariantClear 37819->37887 37820->37819 37821->37753 37822->37747 37823->37759 37824->37759 37825->37807 37827 693cc351 37826->37827 37828 693cc311 37826->37828 37829 693e5f2a _malloc 67 API calls 37827->37829 37830 693e5f2a _malloc 67 API calls 37828->37830 37831 693cc358 37829->37831 37832 693cc318 37830->37832 37833 693cc374 37831->37833 37889 693e663b RaiseException 37831->37889 37840 693cc334 37832->37840 37888 693e663b RaiseException 37832->37888 37836 693d2a70 4 API calls 37833->37836 37837 693cc3b8 37836->37837 37839 693cc3bc GetLastError 37837->37839 37837->37840 37838 693cae70 175 API calls 37841 693cc3d3 37838->37841 37839->37841 37840->37838 37841->37819 37847 693caecd 37842->37847 37843 693cafba 37844 693d0880 RaiseException 37843->37844 37859 693cafca 37844->37859 37845 693cafe4 37846 693cb0e3 37845->37846 37851 693d0880 RaiseException 37845->37851 37926 693d07d0 CharUpperW CharUpperW 37845->37926 37927 693d0930 __VEC_memcpy RaiseException ___BuildCatchObjectHelper 37845->37927 37853 693cb1a8 37846->37853 37863 693cb734 37846->37863 37866 693cb0fa 37846->37866 37928 693d07d0 CharUpperW CharUpperW 37846->37928 37847->37843 37847->37845 37850 693cb19d 37850->37853 37850->37863 37851->37845 37853->37866 37929 693cce00 __VEC_memcpy ___BuildCatchObjectHelper 37853->37929 37854 693e51c7 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 37855 693cbd53 37854->37855 37855->37819 37858 693cb6ea 37858->37859 37860 693cb9e7 37858->37860 37933 693d07d0 CharUpperW CharUpperW 37858->37933 37859->37866 37868 693cbe65 37859->37868 37886 693c1ab0 3 API calls 37859->37886 37890 100089ec 37859->37890 37896 1000790d 37859->37896 37860->37859 37934 693d07d0 CharUpperW CharUpperW 37860->37934 37861 693cb6c4 37865 693c9f10 RaiseException 37861->37865 37863->37858 37863->37866 37870 693cb915 37863->37870 37930 693d07d0 CharUpperW CharUpperW 37863->37930 37864 693cb3c7 _memset 37864->37866 37871 693cb639 37864->37871 37878 693d0880 RaiseException 37864->37878 37865->37858 37866->37854 37868->37866 37869 693cbee7 VariantClear 37868->37869 37875 693cbef4 37868->37875 37869->37875 37931 693d0990 __VEC_memcpy ___BuildCatchObjectHelper 37870->37931 37871->37861 37873 693d0880 RaiseException 37871->37873 37873->37871 37874 693cb923 37932 693d0930 __VEC_memcpy RaiseException ___BuildCatchObjectHelper 37874->37932 37881 693cc0f3 37875->37881 37882 693cbf38 37875->37882 37877 693cc122 37937 693c80f0 CharUpperW CharUpperW __VEC_memcpy 37877->37937 37878->37864 37881->37877 37936 693d07d0 CharUpperW CharUpperW 37881->37936 37935 693c80f0 CharUpperW CharUpperW __VEC_memcpy 37882->37935 37886->37859 37887->37819 37888->37840 37889->37833 37891 100089fd 37890->37891 37895 693c1ab0 3 API calls 37891->37895 37892 10008a11 37893 10008a21 37892->37893 37938 100087ae 37892->37938 37893->37859 37895->37892 37897 10007917 __EH_prolog 37896->37897 37994 100015ec 37897->37994 37899 10007939 37900 100089ec 35 API calls 37899->37900 37901 1000798e 37900->37901 37902 10007995 37901->37902 37903 100079c8 37901->37903 38007 10007ad6 34 API calls 2 library calls 37902->38007 37997 100012b5 37903->37997 37909 10007a40 38009 10009f5e 35 API calls ctype 37909->38009 37910 10007a02 37912 1000109b ctype 29 API calls 37910->37912 37914 10007a0a 37912->37914 37913 10007a47 38010 10009fa0 35 API calls ctype 37913->38010 38008 10007ad6 34 API calls 2 library calls 37914->38008 37917 100079a1 37917->37859 37918 10007a4e 38011 10009ff5 35 API calls ctype 37918->38011 37920 10007a55 37921 1000109b ctype 29 API calls 37920->37921 37922 10007a68 37921->37922 38012 10007ad6 34 API calls 2 library calls 37922->38012 37924 10007a75 38013 1000a8eb 35 API calls 2 library calls 37924->38013 37926->37845 37927->37845 37928->37850 37929->37864 37930->37863 37931->37874 37932->37858 37933->37858 37934->37860 37935->37866 37936->37881 37937->37866 37939 100087b8 __EH_prolog 37938->37939 37946 10002f32 37939->37946 37941 100087e4 37941->37893 37942 100087d1 37942->37941 37949 10002e98 37942->37949 37945 1000880a ctype 37955 1000109b 37945->37955 37958 10002ee6 37946->37958 37950 10002ed9 37949->37950 37951 10002ea5 37949->37951 37950->37945 37954 10002eb0 ctype 37951->37954 37962 10001075 37951->37962 37953 1000109b ctype 29 API calls 37953->37950 37954->37953 37971 100189ee 37955->37971 37960 10002efa 37958->37960 37959 10002f29 37959->37942 37960->37959 37961 693c19c0 2 API calls 37960->37961 37961->37960 37967 1001887a 37962->37967 37965 10001099 37965->37954 37968 1001888c ctype 29 API calls 37967->37968 37969 10001080 37968->37969 37969->37965 37970 100189b4 RaiseException 37969->37970 37970->37965 37972 100010a4 37971->37972 37973 10018a1c 37971->37973 37972->37941 37974 10018a61 37973->37974 37975 10018a26 37973->37975 37977 10018a52 37974->37977 37991 1001a13a 29 API calls ctype 37974->37991 37988 1001a13a 29 API calls ctype 37975->37988 37977->37972 37978 10018aba HeapFree 37977->37978 37978->37972 37980 10018a2d ctype 37987 10018a47 37980->37987 37989 1001a53c VirtualFree VirtualFree HeapFree ctype 37980->37989 37981 10018a6d ctype 37982 10018a99 37981->37982 37992 1001b2c3 VirtualFree HeapFree VirtualFree ctype 37981->37992 37993 10018ab0 LeaveCriticalSection ctype 37982->37993 37990 10018a58 LeaveCriticalSection ctype 37987->37990 37988->37980 37989->37987 37990->37977 37991->37981 37992->37982 37993->37977 38014 10001601 37994->38014 37998 100012c5 37997->37998 38000 100012f5 37997->38000 37999 10001075 30 API calls 37998->37999 38001 100012cf 37999->38001 38003 1000a496 38000->38003 38001->38000 38002 1000109b ctype 29 API calls 38001->38002 38002->38000 38004 1000a4a0 __EH_prolog 38003->38004 38040 1000a0ce 38004->38040 38007->37917 38008->37917 38009->37913 38010->37918 38011->37920 38012->37924 38013->37917 38017 10005905 38014->38017 38015 100015f3 38015->37899 38020 1000591c 38017->38020 38018 10005954 38018->38015 38020->38018 38021 1000109b ctype 29 API calls 38020->38021 38022 100039c8 38020->38022 38021->38020 38023 100039d2 __EH_prolog 38022->38023 38024 100015a7 ctype 34 API calls 38023->38024 38025 100039ed 38024->38025 38026 100015a7 ctype 34 API calls 38025->38026 38027 100039fc 38026->38027 38028 100015ec ctype 34 API calls 38027->38028 38029 10003a16 38028->38029 38030 100015a7 ctype 34 API calls 38029->38030 38031 10003a21 38030->38031 38032 100015ec ctype 34 API calls 38031->38032 38033 10003a38 38032->38033 38034 100015a7 ctype 34 API calls 38033->38034 38035 10003a43 38034->38035 38036 1000302b CloseHandle GetLastError WaitForSingleObject SetEvent GetLastError 38035->38036 38037 10003a4e 38036->38037 38038 10003600 34 API calls 38037->38038 38039 10003a62 38038->38039 38039->38020 38041 1000a0d8 __EH_prolog 38040->38041 38083 10007b7e 38041->38083 38045 1000a11d 38046 1000a27a 38045->38046 38053 1000a170 38045->38053 38060 1000a1ee 38046->38060 38191 1000856a RaiseException 38046->38191 38048 100079fc 38048->37909 38048->37910 38049 1000a2da 38049->38048 38050 10002e98 30 API calls 38049->38050 38051 1000a2ff 38050->38051 38052 10002f32 2 API calls 38051->38052 38056 1000a30c 38052->38056 38053->38048 38054 10002f32 2 API calls 38053->38054 38054->38060 38055 1000109b ctype 29 API calls 38055->38048 38057 1000a35b 38056->38057 38076 1000a310 38056->38076 38192 1000856a RaiseException 38056->38192 38096 10008505 38057->38096 38060->38048 38082 693c1ab0 3 API calls 38060->38082 38063 1000a396 38064 1000a42a 38063->38064 38065 1000a3b1 38063->38065 38193 1000856a RaiseException 38063->38193 38105 10009824 38064->38105 38194 1000948e 169 API calls 2 library calls 38065->38194 38069 1000a3d9 38070 100015ec ctype 34 API calls 38069->38070 38073 1000a45b 38070->38073 38071 1000a3d5 38071->38069 38072 1000a3fe 38071->38072 38195 1000856a RaiseException 38071->38195 38077 10008505 30 API calls 38072->38077 38197 100015a7 38073->38197 38076->38055 38078 1000a414 38077->38078 38079 10008617 RaiseException 38078->38079 38080 1000a41c 38079->38080 38080->38064 38196 1000856a RaiseException 38080->38196 38082->38049 38203 10007bd9 38083->38203 38086 100015ec ctype 34 API calls 38087 10007b91 38086->38087 38088 100015ec ctype 34 API calls 38087->38088 38089 10007b9c 38088->38089 38090 100015ec ctype 34 API calls 38089->38090 38091 10007ba7 38090->38091 38092 100015ec ctype 34 API calls 38091->38092 38093 10007bb2 38092->38093 38094 100015ec ctype 34 API calls 38093->38094 38095 10007bbd 38094->38095 38095->38045 38190 1000856a RaiseException 38095->38190 38234 10008491 38096->38234 38099 10008617 38100 1000862a 38099->38100 38103 1000862f 38099->38103 38238 1000856a RaiseException 38100->38238 38104 1000868a 38103->38104 38239 1000856a RaiseException 38103->38239 38104->38063 38106 1000982e __EH_prolog 38105->38106 38107 10008617 RaiseException 38106->38107 38108 10009841 38107->38108 38111 1000986b 38108->38111 38248 10008a48 RaiseException 38108->38248 38110 10009863 38112 10008617 RaiseException 38110->38112 38117 100098e8 38111->38117 38249 1000948e 169 API calls 2 library calls 38111->38249 38112->38111 38114 100098b6 38115 10008617 RaiseException 38114->38115 38143 100098ba 38114->38143 38115->38117 38116 100015ec ctype 34 API calls 38118 10009a49 38116->38118 38120 10009944 38117->38120 38124 1000999d 38117->38124 38119 100015a7 ctype 34 API calls 38118->38119 38189 10009a55 38119->38189 38240 100092ee 38120->38240 38122 100015ec ctype 34 API calls 38123 100099fe 38122->38123 38126 10009a06 38123->38126 38127 10009a5c 38123->38127 38132 10009995 38124->38132 38144 100040e5 30 API calls 38124->38144 38250 10006206 RaiseException 38124->38250 38251 100034b0 30 API calls 38124->38251 38252 10006398 30 API calls 38124->38252 38130 100015a7 ctype 34 API calls 38126->38130 38135 10009a6c 38127->38135 38253 1000856a RaiseException 38127->38253 38129 10008617 RaiseException 38129->38132 38133 10009a15 38130->38133 38132->38122 38137 100015a7 ctype 34 API calls 38133->38137 38254 100086b3 38135->38254 38139 10009a24 38137->38139 38142 100015a7 ctype 34 API calls 38139->38142 38142->38143 38143->38116 38144->38124 38145 10009ab7 38273 100034b0 30 API calls 38145->38273 38147 10009ac5 38149 10009ad8 38147->38149 38274 100034b0 30 API calls 38147->38274 38152 10009af3 38149->38152 38275 100034b0 30 API calls 38149->38275 38150 10009a80 38150->38145 38156 1000109b ctype 29 API calls 38150->38156 38271 10009f34 30 API calls 38150->38271 38272 1000a563 30 API calls __EH_prolog 38150->38272 38276 1000841c 35 API calls ctype 38152->38276 38156->38150 38157 10008617 RaiseException 38183 10009b19 38157->38183 38158 10009e7e 38160 100015a7 ctype 34 API calls 38158->38160 38159 10009db8 38159->38158 38287 10006398 30 API calls 38159->38287 38162 10009e8a 38160->38162 38163 100015a7 ctype 34 API calls 38162->38163 38165 10009e96 38163->38165 38169 100015a7 ctype 34 API calls 38165->38169 38166 1000936b 35 API calls 38166->38183 38167 1000851b 30 API calls 38167->38183 38171 10009ea2 38169->38171 38173 100015a7 ctype 34 API calls 38171->38173 38175 10009eb1 38173->38175 38176 100015a7 ctype 34 API calls 38175->38176 38178 10009ec0 38176->38178 38181 100015a7 ctype 34 API calls 38178->38181 38179 1000841c 35 API calls 38179->38183 38180 1000856a RaiseException 38180->38183 38184 10009ecf 38181->38184 38183->38157 38183->38159 38183->38166 38183->38167 38183->38179 38183->38180 38185 100015a7 ctype 34 API calls 38183->38185 38277 1000871a 30 API calls 38183->38277 38278 100093bf 35 API calls ctype 38183->38278 38279 100086d0 RaiseException 38183->38279 38280 100034b0 30 API calls 38183->38280 38281 1000940a 35 API calls __EH_prolog 38183->38281 38282 10008582 38183->38282 38286 100085d9 RaiseException 38183->38286 38186 100015ec ctype 34 API calls 38184->38186 38185->38183 38187 10009ee5 38186->38187 38188 100015a7 ctype 34 API calls 38187->38188 38188->38189 38189->38069 38190->38045 38191->38060 38192->38057 38193->38065 38194->38071 38195->38072 38196->38064 38198 100015ce 38197->38198 38199 100015ec ctype 34 API calls 38198->38199 38200 100015d6 38199->38200 38201 1000109b ctype 29 API calls 38200->38201 38202 100015de 38201->38202 38202->38076 38204 100015ec ctype 34 API calls 38203->38204 38205 10007be2 38204->38205 38206 100015ec ctype 34 API calls 38205->38206 38207 10007bea 38206->38207 38208 100015ec ctype 34 API calls 38207->38208 38209 10007bf2 38208->38209 38210 100015ec ctype 34 API calls 38209->38210 38211 10007bfa 38210->38211 38212 100015ec ctype 34 API calls 38211->38212 38213 10007c02 38212->38213 38214 100015ec ctype 34 API calls 38213->38214 38215 10007c0a 38214->38215 38216 100015ec ctype 34 API calls 38215->38216 38217 10007c14 38216->38217 38218 100015ec ctype 34 API calls 38217->38218 38219 10007c1c 38218->38219 38220 100015ec ctype 34 API calls 38219->38220 38221 10007c29 38220->38221 38222 100015ec ctype 34 API calls 38221->38222 38223 10007c31 38222->38223 38224 100015ec ctype 34 API calls 38223->38224 38225 10007c3e 38224->38225 38226 100015ec ctype 34 API calls 38225->38226 38227 10007c46 38226->38227 38228 100015ec ctype 34 API calls 38227->38228 38229 10007c53 38228->38229 38230 100015ec ctype 34 API calls 38229->38230 38231 10007c5b 38230->38231 38232 100015ec ctype 34 API calls 38231->38232 38233 10007b86 38232->38233 38233->38086 38235 10008499 38234->38235 38236 100084b4 30 API calls 38235->38236 38237 100084ac 38236->38237 38237->38099 38238->38103 38239->38103 38243 100092f5 38240->38243 38241 10008617 RaiseException 38241->38243 38242 10009365 38242->38129 38243->38241 38243->38242 38244 10008d1a 35 API calls 38243->38244 38245 10008ddd 35 API calls 38243->38245 38246 1000856a RaiseException 38243->38246 38247 10009028 35 API calls 38243->38247 38244->38243 38245->38243 38246->38243 38247->38243 38248->38110 38249->38114 38250->38124 38251->38124 38252->38124 38253->38135 38255 10008617 RaiseException 38254->38255 38256 100086b9 38255->38256 38257 1000856a RaiseException 38256->38257 38258 100086cc 38256->38258 38257->38258 38259 1000163d 38258->38259 38260 10001651 38259->38260 38268 100016e1 38259->38268 38261 1000166e 38260->38261 38262 100189b4 RaiseException 38260->38262 38263 100189b4 RaiseException 38261->38263 38264 10001695 38261->38264 38262->38261 38263->38264 38266 10001075 30 API calls 38264->38266 38269 100016bd 38264->38269 38265 1000109b ctype 29 API calls 38265->38268 38267 100016a1 38266->38267 38267->38269 38270 100189b4 RaiseException 38267->38270 38268->38150 38269->38265 38270->38269 38271->38150 38272->38150 38273->38147 38274->38149 38275->38152 38276->38183 38277->38183 38278->38183 38279->38183 38280->38183 38281->38183 38283 10008592 38282->38283 38284 1000858d 38282->38284 38283->38183 38285 1000856a RaiseException 38284->38285 38285->38283 38286->38183 38287->38159 38289 693ca2f0 __VEC_memcpy 38288->38289 38290 693ca5fc 38289->38290 38291 693ca240 3 API calls 38290->38291 38292 693ca60d 38291->38292 38292->37765 38294 693c99e4 38293->38294 38299 693c99ed 38293->38299 38294->37770 38295 693c99fe 38295->37770 38296 693c9acc 38296->37770 38299->38295 38299->38296 38299->38299 38415 693e55f0 __VEC_memcpy 38299->38415 38416 693c9e80 __VEC_memcpy ___BuildCatchObjectHelper 38299->38416 38302 693d1454 38300->38302 38301 693d14ca 38417 693d1340 CreateDirectoryW 38301->38417 38302->38301 38309 693d1659 38302->38309 38426 693e55f0 __VEC_memcpy 38302->38426 38304 693d1528 GetLastError 38306 693d1630 38304->38306 38312 693d1520 38304->38312 38307 693d25a0 10 API calls 38306->38307 38310 693d1655 38307->38310 38308 693d1340 4 API calls 38308->38310 38309->37776 38310->38308 38310->38309 38311 693d1340 4 API calls 38311->38312 38312->38304 38312->38309 38312->38310 38312->38311 38314 693c5e5d 38313->38314 38315 693c5bb0 68 API calls 38314->38315 38316 693c5f27 38315->38316 38316->37777 38325 693cd1ec 38317->38325 38326 693cd487 38317->38326 38318 693cd415 38320 693d0880 RaiseException 38318->38320 38318->38326 38320->38318 38322 693d2e40 VariantClear 38322->38325 38325->38318 38325->38322 38325->38326 38427 693cd100 SysAllocString VariantClear RaiseException 38325->38427 38428 693c4d10 68 API calls 2 library calls 38325->38428 38429 693d2ec0 VariantClear VariantCopy __VEC_memcpy ___BuildCatchObjectHelper 38325->38429 38430 693e663b RaiseException 38325->38430 38326->37782 38345 10005ce0 38327->38345 38328 10005d05 38331 10006305 34 API calls 38328->38331 38329 10005d3a 38431 10006305 38329->38431 38330 10001075 30 API calls 38330->38345 38332 10005c59 38331->38332 38334 100015ec ctype 34 API calls 38332->38334 38337 10005c61 38334->38337 38339 100015a7 ctype 34 API calls 38337->38339 38342 10005c6d 38339->38342 38341 10005e06 38343 10006305 34 API calls 38341->38343 38342->37787 38344 10005e37 38343->38344 38346 100015ec ctype 34 API calls 38344->38346 38345->38328 38345->38329 38345->38330 38345->38341 38350 100069d4 99 API calls 38345->38350 38351 10006040 38345->38351 38353 10005f4b 38345->38353 38355 10005fcd 38345->38355 38359 100060b5 38345->38359 38441 100066c2 38345->38441 38445 10004859 38345->38445 38587 1000657a 30 API calls __EH_prolog 38345->38587 38348 10005e4a 38346->38348 38349 100015a7 ctype 34 API calls 38348->38349 38349->38342 38350->38345 38352 10006305 34 API calls 38351->38352 38356 10005f86 38352->38356 38354 10006305 34 API calls 38353->38354 38354->38356 38357 10006305 34 API calls 38355->38357 38358 100015ec ctype 34 API calls 38356->38358 38357->38356 38360 10005f99 38358->38360 38361 10006305 34 API calls 38359->38361 38362 100015a7 ctype 34 API calls 38360->38362 38363 100060f3 38361->38363 38362->38342 38588 100063c7 34 API calls 2 library calls 38363->38588 38366 10005aaf __EH_prolog 38365->38366 38369 10005c39 38366->38369 38371 100063ff 35 API calls 38366->38371 38375 100015a7 34 API calls ctype 38366->38375 38394 10005aff 38366->38394 38792 10006293 30 API calls __EH_prolog 38366->38792 38793 10006206 RaiseException 38366->38793 38794 10006398 30 API calls 38366->38794 38367 10005c4e 38370 100015ec ctype 34 API calls 38367->38370 38369->38367 38373 10001075 30 API calls 38369->38373 38372 10005c61 38370->38372 38371->38366 38374 100015a7 ctype 34 API calls 38372->38374 38397 10005c9f 38373->38397 38374->38394 38375->38366 38378 10005d05 38381 10006305 34 API calls 38378->38381 38379 10005d3a 38382 10006305 34 API calls 38379->38382 38380 10001075 30 API calls 38380->38397 38381->38367 38383 10005d55 38382->38383 38795 100063c7 34 API calls 2 library calls 38383->38795 38386 100066c2 99 API calls 38386->38397 38387 10005e06 38388 10006305 34 API calls 38387->38388 38389 10005e37 38388->38389 38390 100015ec ctype 34 API calls 38389->38390 38392 10005e4a 38390->38392 38391 10004859 169 API calls 38391->38397 38393 100015a7 ctype 34 API calls 38392->38393 38393->38394 38394->37787 38395 100069d4 99 API calls 38395->38397 38396 10006040 38398 10006305 34 API calls 38396->38398 38397->38378 38397->38379 38397->38380 38397->38386 38397->38387 38397->38391 38397->38395 38397->38396 38399 10005f4b 38397->38399 38401 10005fcd 38397->38401 38405 100060b5 38397->38405 38796 1000657a 30 API calls __EH_prolog 38397->38796 38402 10005f86 38398->38402 38400 10006305 34 API calls 38399->38400 38400->38402 38403 10006305 34 API calls 38401->38403 38404 100015ec ctype 34 API calls 38402->38404 38403->38402 38406 10005f99 38404->38406 38407 10006305 34 API calls 38405->38407 38408 100015a7 ctype 34 API calls 38406->38408 38409 100060f3 38407->38409 38408->38394 38797 100063c7 34 API calls 2 library calls 38409->38797 38411->37775 38412->37775 38413->37772 38414->37784 38415->38299 38416->38299 38418 693d138c GetLastError 38417->38418 38419 693d1378 38417->38419 38420 693d1399 38418->38420 38423 693d13ff 38418->38423 38419->38312 38421 693d28a0 GetCurrentDirectoryW 38420->38421 38422 693d13bf 38421->38422 38422->38423 38424 693d13d1 CreateDirectoryW 38422->38424 38423->38312 38425 693d13e5 38424->38425 38425->38312 38426->38301 38427->38325 38428->38325 38429->38325 38430->38325 38432 1000630f __EH_prolog 38431->38432 38433 100015ec ctype 34 API calls 38432->38433 38434 10006333 38433->38434 38435 100015a7 ctype 34 API calls 38434->38435 38436 1000633e 38435->38436 38437 100015a7 ctype 34 API calls 38436->38437 38438 10006364 38437->38438 38589 100033a2 34 API calls 2 library calls 38438->38589 38440 10005d55 38586 100063c7 34 API calls 2 library calls 38440->38586 38442 100066eb 38441->38442 38590 1000688a 38442->38590 38446 10004863 __EH_prolog 38445->38446 38596 100081ef 38446->38596 38448 1000487b 38556 10004f5e 38448->38556 38613 10017690 InitializeCriticalSection 38448->38613 38450 100049a8 38614 100054e2 38450->38614 38452 100049df 38454 100015ec ctype 34 API calls 38452->38454 38472 10004bb4 38452->38472 38453 10001075 30 API calls 38461 100048a7 38453->38461 38455 10004a08 38454->38455 38456 10001075 30 API calls 38455->38456 38468 10004a29 38455->38468 38456->38468 38457 10004a74 38460 100015a7 ctype 34 API calls 38457->38460 38464 10004a83 38460->38464 38461->38450 38461->38453 38651 10003f9b 30 API calls __EH_prolog 38461->38651 38462 10004ba5 38656 10005815 35 API calls ctype 38462->38656 38652 100033a2 34 API calls 2 library calls 38464->38652 38468->38457 38486 10004abc 38468->38486 38469 100053b3 38480 1000163d 30 API calls 38469->38480 38470 10005357 38475 100015a7 ctype 34 API calls 38470->38475 38471 1000504d 38478 100015a7 ctype 34 API calls 38471->38478 38472->38471 38484 1000508e 38472->38484 38499 10005169 38472->38499 38518 100050fb 38472->38518 38520 100051c2 SysFreeString 38472->38520 38532 1000163d 30 API calls 38472->38532 38540 10002e98 30 API calls 38472->38540 38551 1000521f 38472->38551 38554 1000109b ctype 29 API calls 38472->38554 38558 1000109b ctype 29 API calls 38472->38558 38562 100040e5 30 API calls 38472->38562 38564 100015a7 34 API calls ctype 38472->38564 38565 100052a9 38472->38565 38568 10005043 38472->38568 38657 1000124b 30 API calls 38472->38657 38473 10004a92 DeleteCriticalSection 38489 10004aa7 38473->38489 38474 10004e20 38481 100015a7 ctype 34 API calls 38474->38481 38476 10005366 38475->38476 38668 100033a2 34 API calls 2 library calls 38476->38668 38483 1000506a 38478->38483 38479 10004ef8 38493 100015a7 ctype 34 API calls 38479->38493 38485 100053dc 38480->38485 38488 10004e51 38481->38488 38482 10005375 DeleteCriticalSection 38482->38489 38661 100033a2 34 API calls 2 library calls 38483->38661 38497 100015a7 ctype 34 API calls 38484->38497 38492 100053fc 38485->38492 38669 100040e5 38485->38669 38486->38462 38486->38474 38486->38479 38487 10004e8b 38486->38487 38626 10001c8a 38486->38626 38653 10003a70 35 API calls 38486->38653 38654 10003a95 35 API calls 38486->38654 38655 10005966 30 API calls __EH_prolog 38486->38655 38505 100015a7 ctype 34 API calls 38487->38505 38658 100033a2 34 API calls 2 library calls 38488->38658 38491 100015ec ctype 34 API calls 38489->38491 38496 100053a0 38491->38496 38583 10012a20 VirtualAlloc 38492->38583 38634 1000367f 38492->38634 38645 10017570 38492->38645 38500 10004f18 38493->38500 38495 10005079 DeleteCriticalSection 38495->38484 38502 100015a7 ctype 34 API calls 38496->38502 38506 100050c1 38497->38506 38510 100015a7 ctype 34 API calls 38499->38510 38660 100033a2 34 API calls 2 library calls 38500->38660 38501 10004e60 DeleteCriticalSection 38525 10004e75 38501->38525 38502->38556 38511 10004ebc 38505->38511 38662 100033a2 34 API calls 2 library calls 38506->38662 38507 1000541f 38513 100015a7 ctype 34 API calls 38507->38513 38515 10005186 38510->38515 38659 100033a2 34 API calls 2 library calls 38511->38659 38519 10005430 38513->38519 38514 10004f27 DeleteCriticalSection 38521 10004f3c 38514->38521 38664 100033a2 34 API calls 2 library calls 38515->38664 38517 100050d0 DeleteCriticalSection 38517->38525 38527 100015a7 ctype 34 API calls 38518->38527 38672 100056b6 34 API calls 2 library calls 38519->38672 38523 100051d6 38520->38523 38535 100015ec ctype 34 API calls 38521->38535 38531 100015a7 ctype 34 API calls 38523->38531 38524 10004ecb DeleteCriticalSection 38524->38525 38529 100015ec ctype 34 API calls 38525->38529 38534 1000511b 38527->38534 38536 10005298 38529->38536 38530 10005195 DeleteCriticalSection 38530->38525 38537 100051eb 38531->38537 38532->38472 38533 1000543f 38673 100056eb DeleteCriticalSection 38533->38673 38663 100033a2 34 API calls 2 library calls 38534->38663 38541 10004f52 38535->38541 38543 100015a7 ctype 34 API calls 38536->38543 38665 100033a2 34 API calls 2 library calls 38537->38665 38540->38472 38542 100015a7 ctype 34 API calls 38541->38542 38542->38556 38543->38556 38545 1000544a 38674 10003f63 34 API calls 2 library calls 38545->38674 38546 1000512a DeleteCriticalSection 38549 1000513f 38546->38549 38547 100051fa DeleteCriticalSection 38547->38525 38550 100015ec ctype 34 API calls 38549->38550 38552 10005155 38550->38552 38555 1000109b ctype 29 API calls 38551->38555 38553 100015a7 ctype 34 API calls 38552->38553 38553->38556 38554->38472 38557 10005224 38555->38557 38556->38345 38559 1000109b ctype 29 API calls 38557->38559 38560 10004d6e SysFreeString 38558->38560 38561 10005233 SysFreeString 38559->38561 38560->38472 38563 10005249 38561->38563 38562->38472 38566 100015a7 ctype 34 API calls 38563->38566 38564->38472 38567 100015a7 ctype 34 API calls 38565->38567 38569 1000525e 38566->38569 38571 100052b8 38567->38571 38630 10003db9 38568->38630 38666 100033a2 34 API calls 2 library calls 38569->38666 38573 100015a7 ctype 34 API calls 38571->38573 38572 1000526d DeleteCriticalSection 38572->38525 38574 100052c7 38573->38574 38575 100015a7 ctype 34 API calls 38574->38575 38576 100052d6 38575->38576 38667 100033a2 34 API calls 2 library calls 38576->38667 38578 100052e5 DeleteCriticalSection 38579 100052fa 38578->38579 38580 100015ec ctype 34 API calls 38579->38580 38581 10005310 38580->38581 38582 100015a7 ctype 34 API calls 38581->38582 38582->38556 38583->38507 38586->38342 38587->38345 38588->38342 38589->38440 38593 1000688d 38590->38593 38591 10006706 38591->38345 38592 1000670b 96 API calls 38592->38593 38593->38591 38593->38592 38595 1000684d 8 API calls 38593->38595 38595->38593 38597 100081f9 __EH_prolog 38596->38597 38612 100083a5 38597->38612 38675 1000841c 35 API calls ctype 38597->38675 38600 10008241 38601 100083ff 38600->38601 38676 1000841c 35 API calls ctype 38600->38676 38603 100015a7 ctype 34 API calls 38601->38603 38602 100082b6 38604 100015a7 ctype 34 API calls 38602->38604 38603->38612 38609 100082c2 38604->38609 38605 10008292 38605->38601 38605->38602 38606 10008358 38607 100015a7 ctype 34 API calls 38606->38607 38610 10008399 38607->38610 38608 100040e5 30 API calls 38608->38609 38609->38606 38609->38608 38611 100015a7 ctype 34 API calls 38610->38611 38611->38612 38612->38448 38613->38461 38677 100055b0 38614->38677 38617 100015ec ctype 34 API calls 38618 10005501 38617->38618 38623 10005524 38618->38623 38686 100034b0 30 API calls 38618->38686 38620 1000558b 38621 100055ab 38620->38621 38624 100040e5 30 API calls 38620->38624 38621->38452 38622 100034b0 30 API calls 38622->38623 38623->38620 38623->38622 38625 100040e5 30 API calls 38623->38625 38624->38620 38625->38623 38627 10001c8f __EH_prolog 38626->38627 38687 10001bb2 38627->38687 38629 10001cb6 38629->38486 38631 10003dca 38630->38631 38633 10003df9 38631->38633 38700 100189b4 RaiseException 38631->38700 38633->38469 38633->38470 38635 100015ec ctype 34 API calls 38634->38635 38636 10003691 38635->38636 38637 100015ec ctype 34 API calls 38636->38637 38638 1000369c 38637->38638 38640 100036cf 38638->38640 38641 100040e5 30 API calls 38638->38641 38639 10003706 38643 10003731 38639->38643 38701 1000224f 38639->38701 38640->38639 38642 100040e5 30 API calls 38640->38642 38641->38638 38642->38640 38643->38507 38705 10019cb8 38645->38705 38648 10017593 38648->38507 38649 10017598 GetLastError 38650 100175a2 38649->38650 38650->38507 38651->38461 38652->38473 38653->38486 38654->38486 38655->38486 38656->38472 38657->38472 38658->38501 38659->38524 38660->38514 38661->38495 38662->38517 38663->38546 38664->38530 38665->38547 38666->38572 38667->38578 38668->38482 38788 10001615 38669->38788 38672->38533 38673->38545 38674->38556 38675->38600 38676->38605 38678 100015ec ctype 34 API calls 38677->38678 38679 100055b8 38678->38679 38680 100015ec ctype 34 API calls 38679->38680 38681 100055c0 38680->38681 38682 100015ec ctype 34 API calls 38681->38682 38683 100055c8 38682->38683 38684 100015ec ctype 34 API calls 38683->38684 38685 100054f9 38684->38685 38685->38617 38686->38618 38692 10001bb7 __EH_prolog 38687->38692 38688 10001075 30 API calls 38689 10001c48 38688->38689 38690 10001c5a 38689->38690 38693 10001f31 38689->38693 38690->38629 38692->38688 38692->38690 38694 10001f3b __EH_prolog 38693->38694 38695 10012a20 VirtualAlloc 38694->38695 38696 10001fd1 38695->38696 38697 10001fed 38696->38697 38699 100189b4 RaiseException 38696->38699 38697->38690 38699->38697 38700->38633 38702 10002259 38701->38702 38703 10002f54 101 API calls 38702->38703 38704 10002288 38703->38704 38704->38643 38715 1001c480 38705->38715 38707 10019cc8 38708 10019d0b 38707->38708 38710 10019cd6 CreateThread 38707->38710 38709 100189ee ctype 29 API calls 38708->38709 38711 10019d11 38709->38711 38712 10019d03 GetLastError 38710->38712 38713 10017589 38710->38713 38733 10019d23 TlsGetValue 38710->38733 38711->38713 38726 1001c3fb 35 API calls 38711->38726 38712->38708 38713->38648 38713->38649 38717 1001c4b5 ctype 38715->38717 38716 1001c56d HeapAlloc 38716->38717 38717->38716 38720 1001c59b 38717->38720 38725 1001c52f 38717->38725 38727 1001a13a 29 API calls ctype 38717->38727 38728 1001a865 5 API calls ctype 38717->38728 38729 1001c519 LeaveCriticalSection ctype 38717->38729 38720->38707 38725->38716 38725->38717 38730 1001a13a 29 API calls ctype 38725->38730 38731 1001b308 6 API calls ctype 38725->38731 38732 1001c5a2 LeaveCriticalSection ctype 38725->38732 38726->38713 38727->38717 38728->38717 38729->38717 38730->38725 38731->38725 38732->38725 38734 10019d70 TlsSetValue 38733->38734 38735 10019d5b 38733->38735 38738 10019d87 38734->38738 38739 10019d8f GetCurrentThreadId 38734->38739 38753 1001c098 38735->38753 38775 1001a072 7 API calls ctype 38738->38775 38741 10019da0 38739->38741 38745 10019de9 38741->38745 38742 10019d8e 38742->38739 38746 10019df2 38745->38746 38776 1001c031 GetLastError TlsGetValue 38746->38776 38748 10019dfa 38749 10019e07 38748->38749 38787 1001a072 7 API calls ctype 38748->38787 38751 1001c098 31 API calls 38749->38751 38752 10019e0e ExitThread 38751->38752 38754 1001c137 38753->38754 38755 1001c0a6 38753->38755 38754->38734 38756 1001c0bc 38755->38756 38757 1001c0af TlsGetValue 38755->38757 38759 1001c0c9 38756->38759 38760 100189ee ctype 29 API calls 38756->38760 38757->38756 38758 1001c128 TlsSetValue 38757->38758 38758->38754 38761 1001c0d7 38759->38761 38762 100189ee ctype 29 API calls 38759->38762 38760->38759 38763 1001c0e5 38761->38763 38765 100189ee ctype 29 API calls 38761->38765 38762->38761 38764 1001c0f3 38763->38764 38766 100189ee ctype 29 API calls 38763->38766 38767 100189ee ctype 29 API calls 38764->38767 38768 1001c101 38764->38768 38765->38763 38766->38764 38767->38768 38769 100189ee ctype 29 API calls 38768->38769 38771 1001c10f 38768->38771 38769->38771 38770 1001c120 38772 100189ee ctype 29 API calls 38770->38772 38771->38770 38773 100189ee ctype 29 API calls 38771->38773 38774 1001c127 38772->38774 38773->38770 38774->38758 38775->38742 38777 1001c04d 38776->38777 38778 1001c08c SetLastError 38776->38778 38779 1001c480 30 API calls 38777->38779 38778->38748 38780 1001c056 38779->38780 38781 1001c084 38780->38781 38782 1001c05e TlsSetValue 38780->38782 38783 1001a072 ctype 7 API calls 38781->38783 38782->38781 38784 1001c06f 38782->38784 38785 1001c08b 38783->38785 38786 1001c075 GetCurrentThreadId 38784->38786 38785->38778 38786->38778 38787->38749 38789 1000163c 38788->38789 38790 1000161d 38788->38790 38789->38485 38791 1000163d 30 API calls 38790->38791 38791->38789 38792->38366 38793->38366 38794->38366 38795->38394 38796->38397 38797->38394 38799 10006b39 38798->38799 38800 10006b4a 38798->38800 38799->38800 38804 10006b51 38799->38804 38800->37797 38803 1000109b ctype 29 API calls 38803->38800 38805 10006b5b __EH_prolog 38804->38805 38806 100015a7 ctype 34 API calls 38805->38806 38807 10006b74 38806->38807 38812 10006b9e 38807->38812 38810 10006b44 38810->38803 38813 10006ba8 __EH_prolog 38812->38813 38814 100015a7 ctype 34 API calls 38813->38814 38815 10006bc1 38814->38815 38816 100015a7 ctype 34 API calls 38815->38816 38817 10006bd0 38816->38817 38818 100015a7 ctype 34 API calls 38817->38818 38819 10006bdf 38818->38819 38820 100015a7 ctype 34 API calls 38819->38820 38821 10006bee 38820->38821 38822 100015a7 ctype 34 API calls 38821->38822 38823 10006bfd 38822->38823 38830 10006c15 38823->38830 38826 693c18e0 38827 693c18ef 38826->38827 38828 693c18f8 38826->38828 38866 693c1950 38827->38866 38828->38810 38831 10006c1f __EH_prolog 38830->38831 38832 100015a7 ctype 34 API calls 38831->38832 38833 10006c3a 38832->38833 38834 100015a7 ctype 34 API calls 38833->38834 38835 10006c4f 38834->38835 38836 100015a7 ctype 34 API calls 38835->38836 38837 10006c5a 38836->38837 38838 100015a7 ctype 34 API calls 38837->38838 38839 10006c6f 38838->38839 38840 100015a7 ctype 34 API calls 38839->38840 38841 10006c7a 38840->38841 38842 100015a7 ctype 34 API calls 38841->38842 38843 10006c8f 38842->38843 38844 100015a7 ctype 34 API calls 38843->38844 38845 10006c9a 38844->38845 38846 100015a7 ctype 34 API calls 38845->38846 38847 10006cac 38846->38847 38848 100015a7 ctype 34 API calls 38847->38848 38849 10006cb7 38848->38849 38850 100015ec ctype 34 API calls 38849->38850 38851 10006cce 38850->38851 38852 100015a7 ctype 34 API calls 38851->38852 38853 10006cd9 38852->38853 38854 100015a7 ctype 34 API calls 38853->38854 38855 10006ce5 38854->38855 38856 100015ec ctype 34 API calls 38855->38856 38857 10006cfc 38856->38857 38858 100015a7 ctype 34 API calls 38857->38858 38859 10006d07 38858->38859 38860 100015a7 ctype 34 API calls 38859->38860 38861 10006d13 38860->38861 38862 100015a7 ctype 34 API calls 38861->38862 38863 10006d1f 38862->38863 38864 100015a7 ctype 34 API calls 38863->38864 38865 10006b80 38864->38865 38865->38810 38865->38826 38867 693c1976 38866->38867 38868 693c196b FindCloseChangeNotification 38866->38868 38869 693c1989 38867->38869 38871 693e5ff4 67 API calls 7 library calls 38867->38871 38868->38867 38869->38828 38871->38869 38873 693d547d 38872->38873 38874 693d5478 38872->38874 38876 693d5509 38873->38876 38893 693d59c0 68 API calls 3 library calls 38873->38893 38892 693ced10 68 API calls 2 library calls 38874->38892 38876->37385 38878 693d54a9 38879 693d54c0 38878->38879 38894 693e5bd8 6 API calls _strcpy_s 38878->38894 38882 693d54cd 38879->38882 38895 693e5bd8 6 API calls _strcpy_s 38879->38895 38882->38876 38896 693e5ff4 67 API calls 7 library calls 38882->38896 38884->37385 38885->37385 38886->37385 38887->37385 38888->37359 38889->37363 38890->37357 38891->37356 38892->38873 38893->38878 38894->38879 38895->38882 38896->38876 38897 10005761 38898 1000577f 38897->38898 38899 1000576e 38897->38899 38899->38898 38903 100057a0 38899->38903 38902 1000109b ctype 29 API calls 38902->38898 38904 100057aa __EH_prolog 38903->38904 38905 100015ec ctype 34 API calls 38904->38905 38906 100057ce 38905->38906 38907 100015a7 ctype 34 API calls 38906->38907 38908 100057d9 38907->38908 38909 100015ec ctype 34 API calls 38908->38909 38910 100057f0 38909->38910 38911 100015a7 ctype 34 API calls 38910->38911 38912 100057fb 38911->38912 38915 100033a2 34 API calls 2 library calls 38912->38915 38914 10005779 38914->38902 38915->38914 38916 10019fd5 38917 10019fe8 38916->38917 38920 10019ff1 38916->38920 38925 1001a019 38917->38925 38955 100032c6 GetVersionExA 38917->38955 38920->38917 38920->38925 38926 10019efc 38920->38926 38921 1001a025 38922 1001a039 38921->38922 38923 10019efc 105 API calls 38921->38923 38921->38925 38924 10019efc 105 API calls 38922->38924 38922->38925 38923->38922 38924->38925 38927 10019f91 38926->38927 38928 10019f09 GetVersion 38926->38928 38930 10019fc3 38927->38930 38931 10019f97 38927->38931 38956 1001a3c4 HeapCreate 38928->38956 38933 10019f5c 38930->38933 38934 1001c098 31 API calls 38930->38934 38931->38933 38935 10019fb2 38931->38935 38986 1001c22d 32 API calls 38931->38986 38932 10019f1b 38932->38933 38974 1001bfac 37 API calls 38932->38974 38933->38917 38934->38933 38968 1001c8f1 30 API calls ctype 38935->38968 38939 10019f53 38941 10019f60 GetCommandLineA 38939->38941 38942 10019f57 38939->38942 38940 10019fb7 38969 1001c000 38940->38969 38982 1001cc4b 37 API calls ctype 38941->38982 38975 1001a421 38942->38975 38947 10019f70 38983 1001c735 34 API calls ctype 38947->38983 38948 1001a421 6 API calls 38948->38933 38950 10019f7a 38984 1001c9fe 49 API calls ctype 38950->38984 38952 10019f7f 38985 1001c945 48 API calls ctype 38952->38985 38954 10019f84 38954->38933 38955->38921 38957 1001a3e4 38956->38957 38958 1001a41a 38956->38958 38987 1001a27c 57 API calls 38957->38987 38958->38932 38960 1001a3e9 38961 1001a400 38960->38961 38962 1001a3f3 38960->38962 38964 1001a41d 38961->38964 38989 1001b010 5 API calls ctype 38961->38989 38988 1001a4c9 HeapAlloc 38962->38988 38964->38932 38965 1001a3fd 38965->38964 38967 1001a40e HeapDestroy 38965->38967 38967->38958 38968->38940 38990 1001a0ce 38969->38990 38971 1001c005 38972 10019fbc 38971->38972 38973 1001c00f TlsFree 38971->38973 38972->38948 38973->38972 38974->38939 38976 1001a493 38975->38976 38977 1001a42d 38975->38977 38979 1001a4ba HeapDestroy 38976->38979 38981 1001a4a6 VirtualFree 38976->38981 38978 1001a47f HeapFree 38977->38978 38980 1001a44d VirtualFree VirtualFree HeapFree 38977->38980 38978->38979 38979->38933 38980->38978 38980->38980 38981->38976 38982->38947 38983->38950 38984->38952 38985->38954 38986->38935 38987->38960 38988->38965 38989->38965 38991 1001a0db 38990->38991 38992 1001a117 DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection 38991->38992 38993 1001a101 DeleteCriticalSection 38991->38993 38992->38971 38994 100189ee ctype 29 API calls 38993->38994 38994->38991 38995 693e658b 38996 693e659b 38995->38996 38997 693e6596 38995->38997 39001 693e6495 38996->39001 39009 693ea8ed GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 38997->39009 39000 693e65a9 39002 693e64a1 ___BuildCatchObjectHelper 39001->39002 39006 693e653e ___BuildCatchObjectHelper 39002->39006 39007 693e64ee ___DllMainCRTStartup 39002->39007 39010 693e6360 39002->39010 39004 693e651e 39005 693e6360 __CRT_INIT@12 156 API calls 39004->39005 39004->39006 39005->39006 39006->39000 39007->39004 39007->39006 39008 693e6360 __CRT_INIT@12 156 API calls 39007->39008 39008->39004 39009->38996 39011 693e636f 39010->39011 39012 693e63eb 39010->39012 39059 693e93e1 HeapCreate 39011->39059 39014 693e6422 39012->39014 39022 693e63f1 39012->39022 39015 693e6427 39014->39015 39016 693e6480 39014->39016 39074 693e70ea 8 API calls __decode_pointer 39015->39074 39020 693e637a 39016->39020 39079 693e7404 79 API calls 2 library calls 39016->39079 39019 693e6381 39061 693e7472 78 API calls 8 library calls 39019->39061 39020->39007 39021 693e640c 39021->39020 39071 693e7ee0 68 API calls ___crtGetEnvironmentStringsA 39021->39071 39022->39020 39022->39021 39070 693e7a46 67 API calls _doexit 39022->39070 39023 693e642c 39075 693e7653 67 API calls __calloc_impl 39023->39075 39028 693e6386 __RTC_Initialize 39031 693e638a 39028->39031 39038 693e6396 GetCommandLineA 39028->39038 39030 693e6438 39030->39020 39076 693e706f 6 API calls __crt_waiting_on_module_handle 39030->39076 39062 693e9411 VirtualFree HeapFree HeapFree HeapDestroy 39031->39062 39032 693e6416 39072 693e711e 70 API calls 2 library calls 39032->39072 39036 693e638f 39036->39020 39037 693e641b 39073 693e9411 VirtualFree HeapFree HeapFree HeapDestroy 39037->39073 39063 693ea76a 76 API calls 2 library calls 39038->39063 39039 693e6456 39045 693e645d 39039->39045 39046 693e6474 39039->39046 39042 693e63a6 39064 693e7c8c 72 API calls 3 library calls 39042->39064 39044 693e63b0 39047 693e63b4 39044->39047 39066 693ea6af 112 API calls 3 library calls 39044->39066 39077 693e715b 67 API calls 5 library calls 39045->39077 39078 693e5ff4 67 API calls 7 library calls 39046->39078 39065 693e711e 70 API calls 2 library calls 39047->39065 39052 693e6464 GetCurrentThreadId 39052->39020 39053 693e63c0 39054 693e63d4 39053->39054 39067 693ea437 111 API calls 6 library calls 39053->39067 39054->39036 39069 693e7ee0 68 API calls ___crtGetEnvironmentStringsA 39054->39069 39057 693e63c9 39057->39054 39068 693e787f 74 API calls 5 library calls 39057->39068 39060 693e6375 39059->39060 39060->39019 39060->39020 39061->39028 39062->39036 39063->39042 39064->39044 39065->39031 39066->39053 39067->39057 39068->39054 39069->39047 39070->39021 39071->39032 39072->39037 39073->39020 39074->39023 39075->39030 39076->39039 39077->39052 39078->39036 39079->39020 39080 10002175 39081 10002182 39080->39081 39085 10002193 39080->39085 39081->39085 39086 1000219a 39081->39086 39084 1000109b ctype 29 API calls 39084->39085 39087 100021a4 __EH_prolog 39086->39087 39090 10012a40 39087->39090 39091 1000218d 39090->39091 39092 10012a44 VirtualFree 39090->39092 39091->39084 39092->39091 39093 1000331c 39095 10003336 39093->39095 39094 10003370 39095->39094 39097 100030fd 39095->39097 39098 10003107 __EH_prolog 39097->39098 39099 10003147 39098->39099 39101 1000ab8d 39098->39101 39099->39094 39102 1000ab97 __EH_prolog 39101->39102 39103 10001075 30 API calls 39102->39103 39104 1000aba2 39103->39104 39105 1000abb6 39104->39105 39107 10006a20 39104->39107 39105->39099 39108 10006a2a __EH_prolog 39107->39108 39111 10001b41 GetSystemInfo 39108->39111 39110 10006a94 39110->39105 39111->39110 39112 693e28b0 39113 693e28bd 39112->39113 39117 693e28f6 39112->39117 39113->39117 39118 693e2bf0 39113->39118 39119 693e2c0a 39118->39119 39120 693e2bf9 FreeLibrary 39118->39120 39121 693e28f1 39119->39121 39122 693e2c13 DeleteFileW 39119->39122 39120->39119 39123 693e2a30 39121->39123 39122->39121 39124 693e2a94 39123->39124 39125 693e2b5b 39124->39125 39135 693e2aac _memset 39124->39135 39141 693e2c40 70 API calls ___crtGetEnvironmentStringsA 39125->39141 39127 693e2b65 39128 693e2b76 FindResourceW 39127->39128 39130 693e2b54 39127->39130 39129 693e2b88 39128->39129 39128->39130 39142 693e2980 7 API calls 39129->39142 39132 693e51c7 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 39130->39132 39134 693e2bdd 39132->39134 39133 693e2b94 39133->39130 39136 693e2ba6 LoadLibraryW 39133->39136 39134->39117 39137 693e2b13 FindFirstFileW 39135->39137 39136->39130 39138 693e2b2d 39137->39138 39139 693e2b72 39137->39139 39140 693e2b3b LoadLibraryW FindClose 39138->39140 39139->39128 39140->39130 39141->39127 39142->39133 39143 693e3ef0 39153 693e3f2d 39143->39153 39144 693e5f2a _malloc 67 API calls 39145 693e4333 39144->39145 39147 693e434d 39145->39147 39161 693e663b RaiseException 39145->39161 39146 693e40d3 39149 693e1230 68 API calls 39147->39149 39150 693e435a 39149->39150 39151 693d82b0 277 API calls 39150->39151 39152 693e437e 39151->39152 39162 693e1a40 68 API calls 39152->39162 39153->39144 39153->39146 39155 693e439e 39155->39146 39156 693e43d5 39155->39156 39163 693e5bd8 6 API calls _strcpy_s 39155->39163 39159 693e43e0 39156->39159 39164 693e5bd8 6 API calls _strcpy_s 39156->39164 39159->39146 39165 693e5bd8 6 API calls _strcpy_s 39159->39165 39161->39147 39162->39155 39163->39156 39164->39159 39165->39146
                                    APIs
                                      • Part of subcall function 693D07D0: CharUpperW.USER32(?,00000000,?,693CFCF3,?,693CFE6C,?,00000000,?,00000010,ADDB68B1,?,00000000,00000000), ref: 693D07F7
                                      • Part of subcall function 693D07D0: CharUpperW.USER32(?,?,693CFE6C,?,00000000,?,00000010,ADDB68B1,?,00000000,00000000), ref: 693D0804
                                    • _memset.LIBCMT ref: 693CB3D4
                                    • VariantClear.OLEAUT32(?), ref: 693CBEEE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CharUpper$ClearVariant_memset
                                    • String ID: !$001$R$Unknown error$a$exe$hT?i$hT?i$iso$r$rar$udf
                                    • API String ID: 2702283269-3315987462
                                    • Opcode ID: 0a10e59b28ad346079bc88471a5cea936f18fc0fe1a332dfcc60a45b6f91bbd3
                                    • Instruction ID: 2ee14429d69bd8035e6274362ef5517d876bf75e089957c22e70151dc6a8ab7a
                                    • Opcode Fuzzy Hash: 0a10e59b28ad346079bc88471a5cea936f18fc0fe1a332dfcc60a45b6f91bbd3
                                    • Instruction Fuzzy Hash: B9C24B75901668CBCB24CF68CD80BDAB7B5BF49304F1085D9E949AB350DB31AE85CF92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1059 693c8ab0-693c8b3b 1060 693c8b3d-693c8b40 1059->1060 1061 693c8b42-693c8b45 1059->1061 1062 693c8b48-693c8b52 1060->1062 1061->1062 1063 693c8b58-693c8baf call 693e514c 1062->1063 1064 693c8cab-693c8cba call 693e5f2a 1062->1064 1069 693c8c1c-693c8c24 1063->1069 1070 693c8bb1-693c8bde call 693d2470 1063->1070 1071 693c8cbc-693c8cca call 693e663b 1064->1071 1072 693c8cfd-693c8d25 call 693c8400 1064->1072 1073 693c8c4d-693c8ca2 call 693e51d6 1069->1073 1074 693c8c26-693c8c2e 1069->1074 1083 693c8be3-693c8bf6 1070->1083 1078 693c8ccf-693c8ce1 call 693e663b 1071->1078 1087 693c8d2f-693c8d80 1072->1087 1088 693c8d27-693c8d2c 1072->1088 1073->1063 1096 693c8ca8 1073->1096 1079 693c8c37-693c8c3a 1074->1079 1080 693c8c30-693c8c35 1074->1080 1092 693c8ce6-693c8cf8 call 693e663b 1078->1092 1085 693c8c41-693c8c48 call 693d0880 1079->1085 1086 693c8c3c 1079->1086 1080->1085 1090 693c8bff-693c8c03 1083->1090 1091 693c8bf8-693c8bf9 FindClose 1083->1091 1085->1073 1086->1085 1094 693c8de4-693c8dee 1087->1094 1095 693c8d82-693c8d9d 1087->1095 1088->1087 1090->1078 1097 693c8c09-693c8c16 1090->1097 1091->1090 1092->1072 1099 693c8df4-693c8e4e call 693e514c 1094->1099 1100 693c9562-693c95fb call 693e51d6 1094->1100 1095->1094 1105 693c8d9f-693c8ddf call 693e51d6 1095->1105 1096->1064 1097->1069 1097->1092 1106 693c8e67-693c8e85 call 693d2470 1099->1106 1107 693c8e50-693c8e65 1099->1107 1119 693c95ff-693c9617 1100->1119 1105->1119 1112 693c8e8a-693c8e9d 1106->1112 1108 693c8ec3-693c8ede 1107->1108 1126 693c9618-693c966a call 693e51d6 * 2 1108->1126 1127 693c8ee4-693c8f8d call 693c9f10 1108->1127 1117 693c8e9f-693c8ea0 FindClose 1112->1117 1118 693c8ea6-693c8eaa 1112->1118 1117->1118 1121 693c9969-693c9980 call 693e663b 1118->1121 1122 693c8eb0-693c8ebd 1118->1122 1122->1108 1122->1121 1126->1119 1135 693c90ff-693c912d call 693ccae0 1127->1135 1136 693c8f93-693c8f98 1127->1136 1144 693c966c-693c9709 call 693e51d6 call 693c82a0 call 693e51d6 * 2 1135->1144 1145 693c9133-693c9158 1135->1145 1136->1135 1139 693c8f9e-693c8faa 1136->1139 1142 693c8fac 1139->1142 1143 693c8fc1-693c8fc9 1139->1143 1147 693c8fb0-693c8fb2 1142->1147 1143->1135 1148 693c8fcf-693c8ff9 call 693c1640 call 693d7240 1143->1148 1144->1119 1162 693c970e-693c9761 call 693e51d6 call 693c82a0 1145->1162 1163 693c915e-693c9160 1145->1163 1147->1135 1150 693c8fb8-693c8fbf 1147->1150 1160 693c8fff-693c900f call 693d0790 1148->1160 1161 693c90e6-693c90fc call 693e51d6 1148->1161 1150->1143 1150->1147 1160->1161 1176 693c9015-693c9058 call 693c1660 call 693c1460 call 693e51d6 1160->1176 1161->1135 1199 693c9762-693c97a8 call 693e51d6 * 2 1162->1199 1167 693c91cb-693c91d0 1163->1167 1168 693c9162-693c91c6 call 693e51d6 call 693c82a0 call 693e51d6 1163->1168 1172 693c92a8 1167->1172 1173 693c91d6-693c91e3 1167->1173 1221 693c9549-693c9559 1168->1221 1177 693c92af 1172->1177 1173->1177 1178 693c91e9 1173->1178 1176->1161 1224 693c905e-693c906c 1176->1224 1183 693c92ea-693c931a call 693e514c 1177->1183 1184 693c92b1-693c92e4 1177->1184 1182 693c91f0-693c9206 call 693c9ae0 1178->1182 1203 693c920c-693c9210 1182->1203 1204 693c9296-693c92a2 1182->1204 1205 693c931c-693c9322 1183->1205 1206 693c9344-693c9375 1183->1206 1184->1162 1184->1183 1199->1119 1203->1204 1213 693c9216-693c9251 1203->1213 1204->1172 1204->1182 1207 693c9324-693c9335 1205->1207 1208 693c9337-693c9341 call 693e51d6 1205->1208 1222 693c97ad-693c980e call 693e51d6 * 2 call 693c82a0 1206->1222 1223 693c937b-693c9382 1206->1223 1207->1207 1207->1208 1208->1206 1239 693c925b-693c9284 call 693e55f0 1213->1239 1240 693c9253-693c9259 1213->1240 1221->1099 1229 693c955f 1221->1229 1222->1199 1227 693c939c-693c93ab 1223->1227 1228 693c9384-693c9396 1223->1228 1231 693c907d-693c9085 1224->1231 1232 693c906e-693c9072 1224->1232 1236 693c93ad 1227->1236 1237 693c93e9-693c93f9 1227->1237 1228->1222 1228->1227 1229->1100 1231->1161 1235 693c9087-693c90b6 call 693c1640 call 693d7240 call 693e51d6 1231->1235 1232->1161 1233 693c9074-693c907b 1232->1233 1233->1231 1233->1232 1235->1161 1276 693c90b8-693c90cc call 693d07d0 1235->1276 1246 693c93b0-693c93bd 1236->1246 1242 693c940b 1237->1242 1243 693c93fb-693c9402 1237->1243 1247 693c9288-693c9292 1239->1247 1240->1239 1240->1247 1251 693c940d-693c9459 call 693c8670 1242->1251 1243->1242 1250 693c9404-693c9409 1243->1250 1253 693c93bf-693c93cf 1246->1253 1254 693c93e0-693c93e7 1246->1254 1247->1204 1250->1251 1264 693c945e-693c9465 1251->1264 1253->1222 1265 693c93d5-693c93dc 1253->1265 1254->1237 1254->1246 1268 693c946b-693c9470 1264->1268 1269 693c9813-693c98b9 call 693e51d6 * 2 call 693c82a0 call 693e51d6 * 2 1264->1269 1265->1254 1273 693c949e-693c94a5 1268->1273 1274 693c9472-693c949c 1268->1274 1269->1119 1277 693c94ac-693c94d6 1273->1277 1274->1277 1276->1161 1288 693c90ce-693c90e1 call 693c9d00 * 2 1276->1288 1279 693c94dc-693c9544 call 693e51d6 * 2 call 693c82a0 call 693e51d6 1277->1279 1280 693c98be-693c9964 call 693e51d6 * 2 call 693c82a0 call 693e51d6 * 2 1277->1280 1279->1221 1280->1119 1288->1161
                                    APIs
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 693C8BF9
                                    • _malloc.LIBCMT ref: 693C8CB0
                                    • __CxxThrowException@8.LIBCMT ref: 693C8CCA
                                    • __CxxThrowException@8.LIBCMT ref: 693C8CE1
                                    • __CxxThrowException@8.LIBCMT ref: 693C8CF8
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 693C8EA0
                                    • __CxxThrowException@8.LIBCMT ref: 693C997B
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$CloseFind$ExceptionRaise_malloc
                                    • String ID: 001$@S?i$rar$R?i
                                    • API String ID: 231924613-643945057
                                    • Opcode ID: eaebe1e435c5ad156bb8dd008c446cb468d1459e802e0b09dbcc2fd00064c8f0
                                    • Instruction ID: 4a3e806acb7cedf9a7859fde9355b0ce0f0738bf135bad64393686fb18f84716
                                    • Opcode Fuzzy Hash: eaebe1e435c5ad156bb8dd008c446cb468d1459e802e0b09dbcc2fd00064c8f0
                                    • Instruction Fuzzy Hash: 829224B5508781DFC724CF68C980A9BBBE5BF89308F508A2EE5D987351D731E905CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1318 693d4c00-693d4c4c 1319 693d52a9-693d52c0 1318->1319 1320 693d4c52-693d4c66 1318->1320 1321 693d4c6c-693d4ccd call 693e514c call 693d2470 1320->1321 1322 693d4d12-693d4db3 call 693e514c 1320->1322 1332 693d4cd2-693d4cdd 1321->1332 1327 693d4db5-693d4dbb 1322->1327 1328 693d4de0-693d4e22 1322->1328 1330 693d4dbd 1327->1330 1331 693d4dd3-693d4ddd call 693e51d6 1327->1331 1341 693d4ec8-693d4ef5 call 693ccae0 1328->1341 1342 693d4e28-693d4e3d 1328->1342 1333 693d4dc0-693d4dd1 1330->1333 1331->1328 1335 693d4cdf-693d4ce0 FindClose 1332->1335 1336 693d4ce6-693d4cea 1332->1336 1333->1331 1333->1333 1335->1336 1339 693d4cf0-693d4cfc 1336->1339 1340 693d4fc3-693d4fe4 call 693e51d6 1336->1340 1339->1340 1345 693d4d02-693d4d0f call 693e51d6 1339->1345 1353 693d5296-693d52a3 1340->1353 1355 693d4efb-693d4efe 1341->1355 1356 693d52c1-693d52c6 1341->1356 1346 693d4e3f-693d4e60 call 693e514c 1342->1346 1347 693d4ea5-693d4eab 1342->1347 1345->1322 1363 693d4e90-693d4ea1 1346->1363 1364 693d4e62-693d4e68 1346->1364 1349 693d4eb0-693d4ebf 1347->1349 1349->1349 1354 693d4ec1-693d4ec4 1349->1354 1353->1319 1353->1320 1354->1341 1361 693d4f66-693d4fab call 693d5440 1355->1361 1362 693d4f00-693d4f0b 1355->1362 1359 693d52c8-693d52d2 1356->1359 1360 693d5327-693d5363 call 693e51d6 call 693c82a0 1356->1360 1366 693d5315-693d5322 call 693e663b 1359->1366 1367 693d52d4-693d52d7 1359->1367 1395 693d5364-693d539d call 693e51d6 call 693c82a0 1361->1395 1396 693d4fb1-693d4fbb 1361->1396 1362->1361 1368 693d4f0d-693d4f29 call 693c9ae0 1362->1368 1363->1347 1369 693d4e6a 1364->1369 1370 693d4e83-693d4e8d call 693e51d6 1364->1370 1366->1360 1374 693d52d9-693d52e6 call 693e663b 1367->1374 1375 693d52eb-693d52ef 1367->1375 1386 693d4f2b-693d4f2f 1368->1386 1387 693d4f54-693d4f64 1368->1387 1371 693d4e70-693d4e81 1369->1371 1370->1363 1371->1370 1371->1371 1374->1375 1382 693d52f1-693d52fe call 693e663b 1375->1382 1383 693d5303-693d5310 call 693e663b 1375->1383 1382->1383 1383->1366 1386->1387 1392 693d4f31-693d4f50 1386->1392 1387->1361 1387->1368 1392->1387 1398 693d5271-693d528e call 693e51d6 call 693c82a0 1396->1398 1399 693d4fc1 1396->1399 1410 693d5293 1398->1410 1400 693d4ff4-693d5041 call 693e514c call 693cabe0 1399->1400 1413 693d504f-693d5051 1400->1413 1414 693d5043-693d5049 1400->1414 1410->1353 1416 693d539e-693d53e4 call 693e51d6 * 2 call 693c82a0 1413->1416 1417 693d5057-693d506f call 693cab10 1413->1417 1414->1413 1415 693d5262-693d526f call 693e51d6 1414->1415 1415->1398 1425 693d53e5-693d542b call 693e51d6 * 2 call 693c82a0 1417->1425 1426 693d5075-693d5079 1417->1426 1429 693d507b-693d508d call 693e51d6 1426->1429 1430 693d5092-693d50a9 call 693de6e0 1426->1430 1439 693d524c-693d525a 1429->1439 1441 693d50ab-693d50b0 1430->1441 1442 693d50b2-693d50c4 call 693e51d6 1430->1442 1446 693d4ff0 1439->1446 1447 693d5260 1439->1447 1441->1442 1444 693d50c9-693d50df call 693d4a10 1441->1444 1442->1439 1452 693d50e9-693d5103 call 693d4a10 1444->1452 1453 693d50e1-693d50e5 1444->1453 1446->1400 1447->1398 1456 693d510f-693d51cf call 693d4ac0 call 693d4b60 * 2 1452->1456 1457 693d5105-693d510b 1452->1457 1453->1452 1464 693d51d6-693d51de 1456->1464 1465 693d51d1 call 693c1680 1456->1465 1457->1456 1467 693d51e0-693d51ef 1464->1467 1465->1464 1467->1467 1468 693d51f1-693d5248 call 693e3910 call 693e6308 call 693e51d6 call 693d5560 call 693e51d6 1467->1468 1468->1439
                                    APIs
                                      • Part of subcall function 693D2470: FindClose.KERNEL32(?,ADDB68B1,693F0658,00000000), ref: 693D24C4
                                      • Part of subcall function 693D2470: FindFirstFileW.KERNEL32(693F50B8,?,ADDB68B1,693F0658,00000000), ref: 693D24DE
                                      • Part of subcall function 693D2470: FindFirstFileW.KERNEL32(?,?), ref: 693D253A
                                    • FindClose.KERNEL32(FFFFFFFF,?,?,?,?,?,?,?,?,?,?), ref: 693D4CE0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID: (_?i$R?i
                                    • API String ID: 2295610775-2198602348
                                    • Opcode ID: ee679da534b2fa2bcd1afe0f4e7f60a6aca5936e4c1d86a8dafe0e76f4146fcd
                                    • Instruction ID: d534dc09d6f1afc120ac9cb66bf03e208add06ae7326aae65757913c89f09818
                                    • Opcode Fuzzy Hash: ee679da534b2fa2bcd1afe0f4e7f60a6aca5936e4c1d86a8dafe0e76f4146fcd
                                    • Instruction Fuzzy Hash: 323248B65083809FD720CF68C490A9BB7E4FFC9314F148A2EE5D997390D771A949CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 693E2B0E
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 693E2B20
                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 693E2B3C
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 693E2B48
                                    • FindResourceW.KERNEL32(693C0000,00000068,RC_DATA), ref: 693E2B7E
                                    • LoadLibraryW.KERNEL32(?,?), ref: 693E2BA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Find$LibraryLoad$CloseFileFirstResource_memset
                                    • String ID: 7z.dll$RC_DATA
                                    • API String ID: 597928718-3209790242
                                    • Opcode ID: 86a6db81dcd022d9af2e67bd4d1c0d4799c02fd8ddde75badfea6387cbe3235e
                                    • Instruction ID: 43a41a99193889795c017e77a63d11e97c459a1c681804c3d6b07939d975770e
                                    • Opcode Fuzzy Hash: 86a6db81dcd022d9af2e67bd4d1c0d4799c02fd8ddde75badfea6387cbe3235e
                                    • Instruction Fuzzy Hash: 9341C27A5083519BCB00DF64D984B5FB7ECBB89748F004A1AF99693280DB35D809CBA3
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(FFFFFFFF,?), ref: 693D37C4
                                    • GetLastError.KERNEL32(?), ref: 693D37D1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CloseErrorFindLast
                                    • String ID:
                                    • API String ID: 754982922-0
                                    • Opcode ID: 8f3cb833901af1eb4e3008481284ce95b9671556a34f9439b87ae534798fa123
                                    • Instruction ID: 9bec47c6d84ff4c3ed8b77fdf416ffeb8579a0616e884609c8317c01b1a4e02f
                                    • Opcode Fuzzy Hash: 8f3cb833901af1eb4e3008481284ce95b9671556a34f9439b87ae534798fa123
                                    • Instruction Fuzzy Hash: AD8280766083419FD724CF24C890B9BB7E5BF89318F10891DE99997390D771EC49CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(?,ADDB68B1,693F0658,00000000), ref: 693D24C4
                                    • FindFirstFileW.KERNEL32(693F50B8,?,ADDB68B1,693F0658,00000000), ref: 693D24DE
                                    • FindFirstFileW.KERNEL32(?,?), ref: 693D253A
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Find$FileFirst$Close
                                    • String ID:
                                    • API String ID: 2810966245-0
                                    • Opcode ID: be7b9e5b561b75e2e33498ac232bd03b546d7e90b6fdad07b3f3aef548a9d04d
                                    • Instruction ID: fdd83d092855fc4a6872a476f851cbdfb08a906ffb4e9d19289f6a46c6faae27
                                    • Opcode Fuzzy Hash: be7b9e5b561b75e2e33498ac232bd03b546d7e90b6fdad07b3f3aef548a9d04d
                                    • Instruction Fuzzy Hash: C73152765087429FCB10DF24D955B5BB7E8FF49364F104B19E8A5D3280E731A90ACB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetSystemInfo.KERNEL32(?), ref: 10001B4B
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: InfoSystem
                                    • String ID:
                                    • API String ID: 31276548-0
                                    • Opcode ID: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                                    • Instruction ID: d3e97598432a4a316c69c7b199a975740681d618dafaa63f0622d860b7c48d59
                                    • Opcode Fuzzy Hash: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                                    • Instruction Fuzzy Hash: A9C09B7490431D97DB00E7E5D9C9D8EB7FCB608204F500451E555F3141E670F94587A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 693d82b0-693d830c call 693cf940 3 693d830e-693d8324 call 693e663b 0->3 4 693d8329-693d8378 call 693c4dd0 call 693d7df0 call 693cfb40 call 693c3be0 0->4 3->4 14 693d837a-693d8390 call 693e663b 4->14 15 693d8395-693d83bb call 693c42e0 call 693e5f2a 4->15 14->15 21 693d83bd-693d83cb call 693e663b 15->21 22 693d83d0-693d83e2 call 693d8eb0 15->22 21->22 26 693d83ec-693d83fe call 693d6cc0 22->26 27 693d83e4-693d83e9 22->27 30 693d841b-693d8424 26->30 31 693d8400-693d8416 call 693e663b 26->31 27->26 33 693d842f 30->33 34 693d8426-693d842d 30->34 31->30 35 693d8433-693d8436 33->35 34->33 34->35 36 693d846d-693d849a call 693d72f0 35->36 37 693d8438-693d843c 35->37 45 693d849c-693d84b2 call 693e663b 36->45 46 693d84b7-693d84bb 36->46 38 693d843e-693d8441 37->38 39 693d8452-693d8468 call 693e663b 37->39 38->39 41 693d8443-693d8450 call 693c26c0 38->41 39->36 41->36 41->39 45->46 49 693d8834-693d8847 call 693d09e0 46->49 50 693d84c1-693d84c8 46->50 57 693d8849-693d8851 call 693d8110 49->57 58 693d8853 49->58 51 693d84ce-693d84db call 693c26c0 50->51 52 693d8c70-693d8caf call 693d4c00 50->52 64 693d8819-693d882f call 693e663b 51->64 65 693d84e1-693d84e8 51->65 60 693d8cb4-693d8cbc 52->60 66 693d8855-693d885e 57->66 58->66 61 693d8cbe 60->61 62 693d8d19-693d8d1e 60->62 67 693d8cfe-693d8d14 call 693e663b 61->67 68 693d8cc0-693d8cc5 61->68 74 693d8d65-693d8dd3 call 693e663b * 4 62->74 75 693d8d20-693d8d23 62->75 64->49 70 693d84ea-693d84f0 65->70 71 693d8502-693d8538 call 693d49e0 call 693ee5ce 65->71 72 693d8868-693d892e call 693c1460 call 693d49e0 call 693c1460 call 693d7bc0 66->72 73 693d8860-693d8865 66->73 67->62 77 693d8ce9-693d8cf9 call 693e663b 68->77 78 693d8cc7-693d8ccc 68->78 70->71 80 693d84f2-693d84fd call 693c7e60 70->80 113 693d853a-693d854d call 693d93a0 71->113 114 693d8553-693d855a 71->114 147 693d893f 72->147 148 693d8930-693d893d 72->148 73->72 83 693d8d2a-693d8d3c call 693c9990 75->83 84 693d8d25-693d8d28 75->84 77->67 78->75 85 693d8cce-693d8ce4 call 693e663b 78->85 80->71 91 693d8d42-693d8d44 83->91 84->83 84->91 85->77 93 693d8d4a-693d8d60 call 693e663b 91->93 94 693d8b32-693d8b47 call 693c9990 91->94 93->74 107 693d8b49-693d8b4e 94->107 108 693d8b51-693d8b94 call 693cfc00 call 693d8de0 call 693c4c80 94->108 107->108 113->114 115 693d855c-693d8567 114->115 116 693d8569 114->116 115->116 123 693d856d-693d85ac call 693c1460 call 693d81d0 115->123 116->123 139 693d85ae-693d85b9 123->139 140 693d85bb 123->140 139->140 142 693d85bf-693d85c1 139->142 140->142 144 693d85d0 142->144 145 693d85c3-693d85ce 142->145 146 693d85d4-693d866f call 693c1460 call 693d7d70 call 693da7b0 144->146 145->144 145->146 175 693d868c-693d86bf call 693db9c0 146->175 176 693d8671-693d8687 call 693e663b 146->176 149 693d8949-693d89c6 call 693c1460 call 693d0880 147->149 148->147 148->149 159 693d89c8 149->159 160 693d89eb-693d8a39 call 693c1400 call 693c8ab0 149->160 162 693d89d0-693d89e9 call 693c5290 159->162 171 693d8a3e-693d8a46 160->171 162->160 173 693d8a48 171->173 174 693d8aa3-693d8aa8 171->174 180 693d8a88-693d8a9e call 693e663b 173->180 181 693d8a4a-693d8a4f 173->181 178 693d8aae-693d8ab5 174->178 179 693d8c55-693d8c6b call 693e663b 174->179 190 693d86c6-693d86cb 175->190 191 693d86c1 175->191 176->175 185 693d8ab7-693d8ab9 178->185 186 693d8ac0-693d8ac6 178->186 179->52 180->174 188 693d8a6d-693d8a83 call 693e663b 181->188 189 693d8a51-693d8a56 181->189 185->186 193 693d8abb 185->193 194 693d8acc-693d8ad2 186->194 195 693d8b95-693d8b97 186->195 188->180 189->178 196 693d8a58-693d8a68 call 693e663b 189->196 198 693d86cd 190->198 199 693d8728-693d872d 190->199 191->190 193->186 194->195 202 693d8ad8-693d8ada 194->202 200 693d8b99-693d8baf call 693e663b 195->200 201 693d8bb4-693d8be5 call 693e51d6 call 693d8f00 call 693e51d6 195->201 196->188 203 693d870d-693d8723 call 693e663b 198->203 204 693d86cf-693d86d4 198->204 209 693d87fe-693d8814 call 693e663b 199->209 210 693d8733-693d8735 199->210 200->201 239 693d8bef-693d8c04 call 693c9990 201->239 240 693d8be7-693d8bec 201->240 207 693d8adc-693d8af2 call 693e663b 202->207 208 693d8af7-693d8b28 call 693e51d6 call 693d8f00 call 693e51d6 202->208 203->199 211 693d86d6-693d86db 204->211 212 693d86f2-693d8708 call 693e663b 204->212 207->208 208->94 242 693d8b2a-693d8b2f 208->242 209->64 218 693d8737-693d874d call 693e663b 210->218 219 693d8752-693d8759 210->219 211->210 224 693d86dd-693d86ed call 693e663b 211->224 212->203 218->219 222 693d875f 219->222 223 693d875b-693d875d 219->223 228 693d8764-693d87fd call 693e51d6 * 3 call 693d8270 call 693e51d6 call 693c9990 call 693cfc00 call 693d8de0 call 693c4c80 222->228 223->222 223->228 224->212 246 693d8c0e-693d8c54 call 693cfc00 call 693d8de0 call 693c4c80 239->246 247 693d8c06-693d8c09 239->247 240->239 242->94 247->246
                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693D84B2
                                    • __CxxThrowException@8.LIBCMT ref: 693D8687
                                    • __CxxThrowException@8.LIBCMT ref: 693D86ED
                                    • __CxxThrowException@8.LIBCMT ref: 693D8708
                                    • __CxxThrowException@8.LIBCMT ref: 693D8723
                                    • __CxxThrowException@8.LIBCMT ref: 693D874D
                                    • __CxxThrowException@8.LIBCMT ref: 693D882F
                                    • __CxxThrowException@8.LIBCMT ref: 693D8A68
                                    • __CxxThrowException@8.LIBCMT ref: 693D8A83
                                    • __CxxThrowException@8.LIBCMT ref: 693D8A9E
                                    • __CxxThrowException@8.LIBCMT ref: 693D8AF2
                                    • __CxxThrowException@8.LIBCMT ref: 693D8324
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693D8390
                                    • _malloc.LIBCMT ref: 693D83B1
                                    • __CxxThrowException@8.LIBCMT ref: 693D83CB
                                    • __CxxThrowException@8.LIBCMT ref: 693D8416
                                    • __CxxThrowException@8.LIBCMT ref: 693D8468
                                    • __CxxThrowException@8.LIBCMT ref: 693D8CE4
                                    • __CxxThrowException@8.LIBCMT ref: 693D8CF9
                                    • __CxxThrowException@8.LIBCMT ref: 693D8D14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise_malloc
                                    • String ID: (_?i$7zCon.sfx
                                    • API String ID: 1305767944-2890817312
                                    • Opcode ID: d4a946df5d6f502544d6a19dad300cfe23f01463650b5f2aa03fd2ba8a9a201e
                                    • Instruction ID: 8ae995cadbc4ae6c221060e45029c59f68a634ff09948560cd67741d138dcf75
                                    • Opcode Fuzzy Hash: d4a946df5d6f502544d6a19dad300cfe23f01463650b5f2aa03fd2ba8a9a201e
                                    • Instruction Fuzzy Hash: 1D62BF76D00258DFDF21CBA4C990BDEB7B8AF48308F1495D9D189A7240DB71AB89CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 1000485E
                                      • Part of subcall function 100081EF: __EH_prolog.LIBCMT ref: 100081F4
                                      • Part of subcall function 10017690: InitializeCriticalSection.KERNEL32 ref: 100176BE
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10004A99
                                    • SysFreeString.OLEAUT32(?), ref: 10004D73
                                    • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004E67
                                    • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004ED2
                                    • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004F2E
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10005080
                                    • DeleteCriticalSection.KERNEL32(?), ref: 100050D7
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10005131
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1000519C
                                    • SysFreeString.OLEAUT32(?), ref: 100051C5
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10005201
                                    • SysFreeString.OLEAUT32(?), ref: 10005238
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10005274
                                    • DeleteCriticalSection.KERNEL32(?), ref: 100052EC
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1000537C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Delete$FreeString$H_prolog$Initialize
                                    • String ID: *
                                    • API String ID: 3004459923-163128923
                                    • Opcode ID: 8d515e06e490fc0e037fbab827e854e363c9577b9e0b0373954554861fc9b88c
                                    • Instruction ID: ecb8a8915c69c7c96d6c908040f4422d87eeaffb21051c4ea884642e96cadca4
                                    • Opcode Fuzzy Hash: 8d515e06e490fc0e037fbab827e854e363c9577b9e0b0373954554861fc9b88c
                                    • Instruction Fuzzy Hash: C3926B74900289DFEF04CFA4C884ADDBBB5FF19344F21849CE446AB256CB71AA89CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1479 693c42e0-693c4319 1480 693c431b-693c4320 call 693c2670 1479->1480 1481 693c4325-693c433c call 693c26e0 1479->1481 1480->1481 1485 693c433e-693c4343 call 693c2670 1481->1485 1486 693c4348-693c436a 1481->1486 1485->1486 1488 693c436c-693c4378 1486->1488 1489 693c437e-693c4387 1486->1489 1488->1489 1490 693c4389-693c4392 1489->1490 1491 693c43a4 1489->1491 1492 693c439d-693c43a2 1490->1492 1493 693c4394-693c4397 1490->1493 1494 693c43a9-693c43e1 call 693c3cf0 * 2 1491->1494 1492->1494 1493->1491 1495 693c4399-693c439b 1493->1495 1500 693c4402-693c440c 1494->1500 1501 693c43e3-693c43ff call 693c2d80 1494->1501 1495->1494 1503 693c440e-693c4425 call 693c2d80 1500->1503 1504 693c4428-693c443b 1500->1504 1501->1500 1503->1504 1505 693c443d-693c4443 1504->1505 1506 693c444e 1504->1506 1505->1506 1509 693c4445-693c444c 1505->1509 1510 693c4453-693c445c 1506->1510 1509->1506 1509->1510 1512 693c452b-693c4533 1510->1512 1513 693c4462 1510->1513 1514 693c4466-693c446e 1512->1514 1515 693c4539 1512->1515 1513->1514 1516 693c453e-693c4543 1514->1516 1517 693c4474 1514->1517 1515->1516 1518 693c4479-693c44ba call 693c2940 1516->1518 1519 693c4549-693c454d 1516->1519 1517->1518 1526 693c44bc-693c44cf call 693c1460 1518->1526 1527 693c44d3-693c44e9 1518->1527 1521 693c454f-693c4554 call 693c2670 1519->1521 1522 693c4559-693c4573 call 693c1460 1519->1522 1521->1522 1522->1518 1529 693c4579-693c457e call 693c2670 1522->1529 1526->1527 1531 693c44eb-693c4500 call 693c1460 1527->1531 1532 693c4504-693c4509 1527->1532 1539 693c4583-693c45ad 1529->1539 1531->1532 1535 693c450f-693c4513 1532->1535 1536 693c4738-693c473d 1532->1536 1540 693c4515-693c451f 1535->1540 1541 693c4521-693c4526 call 693c2670 1535->1541 1542 693c474d-693c4779 call 693c3750 call 693c39a0 1536->1542 1543 693c473f-693c4742 1536->1543 1544 693c45af-693c45c8 call 693c2d80 1539->1544 1545 693c45cb-693c45d5 1539->1545 1540->1539 1540->1541 1541->1512 1570 693c477b 1542->1570 1571 693c4782-693c4794 1542->1571 1543->1542 1546 693c4744-693c4747 1543->1546 1544->1545 1551 693c45f4-693c45f9 1545->1551 1552 693c45d7-693c45f1 call 693c2d80 1545->1552 1546->1542 1550 693c48a6-693c48a9 1546->1550 1557 693c48af-693c48dd 1550->1557 1558 693c4a62-693c4a65 1550->1558 1559 693c460d-693c4621 call 693c3250 call 693ded50 1551->1559 1560 693c45fb-693c4608 call 693de950 1551->1560 1552->1551 1564 693c48df-693c48f7 call 693c3e30 1557->1564 1565 693c4903-693c4915 1557->1565 1558->1480 1561 693c4a6b-693c4a86 call 693ded50 1558->1561 1588 693c466f-693c467b call 693c3e70 1559->1588 1589 693c4623-693c466d call 693c1420 call 693c4d10 * 2 call 693e51d6 1559->1589 1560->1559 1564->1565 1586 693c48f9-693c48fe call 693c2670 1564->1586 1565->1561 1568 693c491b 1565->1568 1575 693c4920-693c494e call 693c1420 CharUpperW 1568->1575 1570->1571 1577 693c47b4-693c47c5 1571->1577 1578 693c4796-693c479b 1571->1578 1575->1480 1596 693c4954-693c495b 1575->1596 1582 693c4819 1577->1582 1583 693c47c7-693c47e9 call 693c1460 1577->1583 1584 693c479d-693c47a1 1578->1584 1585 693c47a7-693c47ab 1578->1585 1592 693c481d-693c4838 1582->1592 1583->1582 1606 693c47eb-693c47fd 1583->1606 1587 693c47ad 1584->1587 1593 693c47a3-693c47a5 1584->1593 1585->1577 1585->1587 1586->1565 1587->1577 1607 693c4680-693c4683 1588->1607 1618 693c4686-693c468b 1589->1618 1599 693c483a-693c4841 1592->1599 1600 693c487b-693c487d 1592->1600 1593->1577 1593->1585 1604 693c495d-693c4967 1596->1604 1605 693c49a6-693c49aa 1596->1605 1608 693c485a-693c485c 1599->1608 1609 693c4843-693c4855 call 693e663b 1599->1609 1602 693c487f-693c4893 call 693c1460 1600->1602 1603 693c4898-693c48a1 call 693c3250 1600->1603 1602->1603 1603->1561 1614 693c496e-693c4981 call 693c3e30 1604->1614 1615 693c4969 1604->1615 1605->1480 1617 693c49b0-693c49b8 1605->1617 1606->1592 1616 693c47ff-693c4817 call 693c4b20 1606->1616 1607->1618 1608->1600 1610 693c485e-693c4862 1608->1610 1609->1608 1610->1600 1620 693c4864-693c4876 call 693e663b 1610->1620 1614->1480 1644 693c4987-693c498e 1614->1644 1615->1614 1616->1592 1625 693c49ed-693c49f1 1617->1625 1626 693c49ba-693c49c4 1617->1626 1627 693c4721-693c4733 call 693c5110 1618->1627 1628 693c4691-693c46a2 call 693c39a0 1618->1628 1620->1600 1625->1480 1635 693c49f7-693c49fc 1625->1635 1629 693c49cb-693c49d3 1626->1629 1630 693c49c6 1626->1630 1627->1561 1646 693c46a4-693c46a8 1628->1646 1647 693c46c7-693c46d1 1628->1647 1639 693c4a34-693c4a5a call 693e51d6 1629->1639 1640 693c49d5-693c49e5 call 693c3e30 1629->1640 1630->1629 1635->1639 1643 693c49fe-693c4a31 call 693c1640 call 693c1460 call 693e51d6 1635->1643 1639->1575 1659 693c4a60 1639->1659 1640->1480 1661 693c49eb 1640->1661 1643->1639 1644->1480 1651 693c4994-693c49a1 1644->1651 1646->1647 1653 693c46aa-693c46ae 1646->1653 1655 693c46ef-693c4700 1647->1655 1656 693c46d3-693c46ec call 693c1460 call 693d2cb0 1647->1656 1651->1639 1653->1647 1660 693c46b0-693c46c2 call 693e663b 1653->1660 1664 693c4714-693c4718 1655->1664 1665 693c4702-693c4712 1655->1665 1656->1655 1659->1561 1660->1647 1661->1639 1664->1627 1669 693c471a 1664->1669 1665->1627 1669->1627
                                    APIs
                                      • Part of subcall function 693C2670: __CxxThrowException@8.LIBCMT ref: 693C2688
                                      • Part of subcall function 693C4D10: _malloc.LIBCMT ref: 693C4D3A
                                      • Part of subcall function 693C4D10: __CxxThrowException@8.LIBCMT ref: 693C4D54
                                    • __CxxThrowException@8.LIBCMT ref: 693C46C2
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693C4855
                                    • __CxxThrowException@8.LIBCMT ref: 693C4876
                                    • CharUpperW.USER32(?), ref: 693C4943
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$CharExceptionRaiseUpper_malloc
                                    • String ID: (_?i$Cannot use absolute pathnames for this command$Incorrect command line$lP?i
                                    • API String ID: 2609558216-2253862469
                                    • Opcode ID: 232f81f4f9b09cee3a7c2a639e1f4c82d5c24dd8ef97f5531f1dca61bc3c45ef
                                    • Instruction ID: db0959dcb9ba6a22e2e8a30af3e34b88df72e2cc5f9c5b5fa2926b9109909a77
                                    • Opcode Fuzzy Hash: 232f81f4f9b09cee3a7c2a639e1f4c82d5c24dd8ef97f5531f1dca61bc3c45ef
                                    • Instruction Fuzzy Hash: 82228D75508B80DBD711CF24C588B9ABBE5BF85308F04899DE4D94B292C772ED49CBA3
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1674 693d6530-693d658b GetProcAddress 1675 693d658d-693d659c GetProcAddress 1674->1675 1676 693d65a2-693d65b5 GetProcAddress 1674->1676 1675->1676 1677 693d68f9 1675->1677 1678 693d65c5-693d65c8 1676->1678 1679 693d65b7-693d65bf 1676->1679 1680 693d68fb-693d6916 call 693e51c7 1677->1680 1681 693d65ca 1678->1681 1682 693d65d1-693d65dc 1678->1682 1679->1678 1679->1680 1681->1682 1682->1677 1685 693d65e2-693d661e call 693e514c 1682->1685 1689 693d664d-693d66b2 call 693d60f0 1685->1689 1690 693d6620-693d6625 1685->1690 1698 693d6919-693d692b call 693d6970 1689->1698 1699 693d66b8-693d66d3 1689->1699 1691 693d6627 1690->1691 1692 693d6641-693d664a call 693e51d6 1690->1692 1694 693d6630-693d663f 1691->1694 1692->1689 1694->1692 1694->1694 1698->1680 1700 693d66d5-693d66e1 1699->1700 1701 693d66e3-693d66ea 1699->1701 1704 693d66ef-693d66f1 1700->1704 1701->1704 1706 693d6713-693d671b 1704->1706 1707 693d66f3-693d670e call 693d2e40 call 693d6970 1704->1707 1709 693d673d-693d67d3 call 693d2e40 call 693c1680 * 2 call 693d60f0 1706->1709 1710 693d671d-693d6738 call 693d2e40 call 693d6970 1706->1710 1721 693d68e9-693d68f3 1707->1721 1727 693d692d-693d696c call 693e51d6 * 2 call 693d2e40 call 693d6970 1709->1727 1728 693d67d9-693d67f6 call 693d60f0 1709->1728 1710->1721 1721->1677 1721->1685 1727->1680 1728->1727 1734 693d67fc-693d682a call 693d6280 call 693d6030 1728->1734 1744 693d682c-693d683d call 693d6030 1734->1744 1745 693d6840-693d6842 1734->1745 1744->1745 1746 693d6844-693d6850 1745->1746 1747 693d6852-693d6859 1745->1747 1751 693d685d-693d685f 1746->1751 1747->1751 1752 693d689c-693d68a9 call 693d7860 1751->1752 1753 693d6861-693d6869 1751->1753 1756 693d68ae-693d68e7 call 693e51d6 * 2 call 693d2e40 call 693d6970 1752->1756 1753->1752 1754 693d686b-693d6899 SysStringByteLen call 693cce00 call 693e55f0 1753->1754 1754->1752 1756->1721
                                    APIs
                                    • GetProcAddress.KERNEL32(693D6AD8,GetHandlerProperty2), ref: 693D6584
                                    • GetProcAddress.KERNEL32(?,GetHandlerProperty), ref: 693D6595
                                    • GetProcAddress.KERNEL32(?,GetNumberOfFormats), ref: 693D65B1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID: GetHandlerProperty$GetHandlerProperty2$GetNumberOfFormats$hT?i
                                    • API String ID: 190572456-2050740644
                                    • Opcode ID: e4baad617c6baad553e3eab7576c7664fd706ff8c098de52344417bd71716d51
                                    • Instruction ID: 467a57f28c5f3d225d592ed8508ab3f7902193986800a05a9ed7f8320b11027e
                                    • Opcode Fuzzy Hash: e4baad617c6baad553e3eab7576c7664fd706ff8c098de52344417bd71716d51
                                    • Instruction Fuzzy Hash: 09D15DB6D00218DFDB14DFA4CD90B9EB7B9BF48308F1081AED569A7241DB319A49CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2100 693e3ef0-693e3fb6 call 693e4b70 call 693c4a90 call 693c5bf0 call 693e51d6 * 2 call 693e4c50 call 693c7630 call 693c15c0 call 693e51d6 * 2 2121 693e3fb8-693e3fbd 2100->2121 2122 693e3fc3-693e3fc8 2100->2122 2121->2122 2123 693e4072-693e4076 2121->2123 2124 693e3fce-693e3fd3 2122->2124 2125 693e4185-693e418a 2122->2125 2130 693e4078-693e407c 2123->2130 2131 693e40d3-693e40e1 call 693e51d6 2123->2131 2126 693e3fd9-693e4065 call 693e4b70 call 693e4c50 call 693c7630 call 693c7ee0 call 693c5bf0 call 693c15c0 call 693e51d6 * 4 2124->2126 2127 693e40e6-693e40eb 2124->2127 2128 693e42cb-693e42d0 2125->2128 2129 693e4190-693e4195 2125->2129 2270 693e417d-693e4182 call 693e51d6 2126->2270 2127->2125 2132 693e40f1-693e417c call 693e4b70 call 693e4c50 call 693c7630 call 693c7ee0 call 693c5bf0 call 693c15c0 call 693e51d6 * 4 2127->2132 2135 693e432c-693e4338 call 693e5f2a 2128->2135 2136 693e42d2-693e42d4 2128->2136 2137 693e422c-693e4231 2129->2137 2138 693e419b-693e4227 call 693e4b70 call 693e4c50 call 693c7630 call 693c7ee0 call 693c5bf0 call 693c15c0 call 693e51d6 * 4 2129->2138 2130->2131 2133 693e407e-693e40cc call 693e4b70 call 693c7630 call 693c15c0 call 693e51d6 * 2 2130->2133 2155 693e4400-693e4414 2131->2155 2132->2270 2222 693e40ce 2133->2222 2223 693e4070 2133->2223 2159 693e434d-693e4379 call 693e1230 call 693d82b0 2135->2159 2160 693e433a-693e4348 call 693e663b 2135->2160 2145 693e42d7-693e42e0 2136->2145 2137->2128 2140 693e4237-693e42c2 call 693e4b70 call 693e4c50 call 693c7630 call 693c7ee0 call 693c5bf0 call 693c15c0 call 693e51d6 * 4 2137->2140 2274 693e42c3-693e42c8 call 693e51d6 2138->2274 2140->2274 2145->2145 2153 693e42e2-693e42e6 2145->2153 2153->2135 2162 693e42e8-693e4329 call 693e4b70 call 693c7630 call 693c15c0 call 693e51d6 * 2 2153->2162 2186 693e437e-693e43c9 call 693e1a40 2159->2186 2160->2159 2162->2135 2207 693e43cb-693e43ce 2186->2207 2208 693e43f4-693e43fd call 693e51d6 2186->2208 2215 693e43d5-693e43d9 2207->2215 2216 693e43d0 call 693e5bd8 2207->2216 2208->2155 2229 693e43db call 693e5bd8 2215->2229 2230 693e4417-693e4419 2215->2230 2216->2215 2222->2122 2223->2123 2234 693e43e0-693e43e3 2229->2234 2230->2234 2243 693e43ea-693e43f2 2234->2243 2244 693e43e5 call 693e5bd8 2234->2244 2243->2208 2244->2243 2270->2125 2274->2128
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -i$ -p$ -x$!$7za L
                                    • API String ID: 0-2873427068
                                    • Opcode ID: 58cedc4ed1584cace0e0de16c1170bbb8dc3fb01be3349b644b7b6ed76986dab
                                    • Instruction ID: aa28366e58f671e8cb56f57da4f802d233f75d25efcf33b76e01476c5491aa4e
                                    • Opcode Fuzzy Hash: 58cedc4ed1584cace0e0de16c1170bbb8dc3fb01be3349b644b7b6ed76986dab
                                    • Instruction Fuzzy Hash: E8F1B476D00258EBCF04DBE4CD84BDEBBB8AF58308F10C55AE545BB201DB75AA04CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2278 693cc2d0-693cc30f 2279 693cc351-693cc35f call 693e5f2a 2278->2279 2280 693cc311-693cc31f call 693e5f2a 2278->2280 2285 693cc374-693cc3b3 call 693d2a70 2279->2285 2286 693cc361-693cc36f call 693e663b 2279->2286 2287 693cc334-693cc34c 2280->2287 2288 693cc321-693cc32f call 693e663b 2280->2288 2295 693cc3b8-693cc3ba 2285->2295 2286->2285 2294 693cc3d7-693cc3eb call 693cae70 2287->2294 2288->2287 2299 693cc3f0-693cc3f8 2294->2299 2297 693cc3bc-693cc3d3 GetLastError 2295->2297 2298 693cc3d5 2295->2298 2303 693cc415-693cc428 2297->2303 2298->2294 2300 693cc3fa-693cc3ff 2299->2300 2301 693cc402-693cc40b 2299->2301 2300->2301 2302 693cc40d-693cc412 2301->2302 2301->2303 2302->2303
                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693CC32F
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • _malloc.LIBCMT ref: 693CC313
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • _malloc.LIBCMT ref: 693CC353
                                    • __CxxThrowException@8.LIBCMT ref: 693CC36F
                                    • GetLastError.KERNEL32(693F4C28,80000000,00000001,00000003), ref: 693CC3BC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc$AllocateErrorExceptionHeapLastRaise
                                    • String ID: (L?i$(L?i
                                    • API String ID: 2571202727-2486559215
                                    • Opcode ID: 5dcd0ce43d1b9081668ddb9a0dcd2d5c539c36dfe7dd1b3e6b3b99c3f08df670
                                    • Instruction ID: f8a1443fea7b06e7d01f65e08c376912dad15e358a98c17c587d3d681980ef0c
                                    • Opcode Fuzzy Hash: 5dcd0ce43d1b9081668ddb9a0dcd2d5c539c36dfe7dd1b3e6b3b99c3f08df670
                                    • Instruction Fuzzy Hash: C741C375600605EFCB10CFA8C980B9BB7F8FF49310F108659E95597380D775AD06CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2305 1001a421-1001a42b 2306 1001a493-1001a496 2305->2306 2307 1001a42d-1001a43d 2305->2307 2310 1001a498-1001a49d 2306->2310 2311 1001a4ba-1001a4c8 HeapDestroy 2306->2311 2308 1001a47f-1001a491 HeapFree 2307->2308 2309 1001a43f-1001a44a 2307->2309 2308->2311 2312 1001a44d-1001a47d VirtualFree * 2 HeapFree 2309->2312 2313 1001a49f-1001a4a4 2310->2313 2312->2308 2312->2312 2314 1001a4b4-1001a4b8 2313->2314 2315 1001a4a6-1001a4ae VirtualFree 2313->2315 2314->2311 2314->2313 2315->2314
                                    APIs
                                    • VirtualFree.KERNEL32(?,00100000,00004000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A459
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A464
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A471
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A48D
                                    • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000,?,?,10019FC1,1001A015,?,?,?), ref: 1001A4AE
                                    • HeapDestroy.KERNELBASE(?,?,10019FC1,1001A015,?,?,?), ref: 1001A4C0
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Free$HeapVirtual$Destroy
                                    • String ID:
                                    • API String ID: 716807051-0
                                    • Opcode ID: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                                    • Instruction ID: 1c740d521b0f7e213dbb02f6402200852ca7cbed31c7f2444751ff5461a08e8a
                                    • Opcode Fuzzy Hash: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                                    • Instruction Fuzzy Hash: 5A110035240365BBE661EB10DCCAF05B7A6E785750F314026FA456A571C7B2BCA2CB14
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2316 693d69e0-693d6a0d 2317 693d6a0f-693d6a20 LoadLibraryExW 2316->2317 2318 693d6a3e-693d6a78 call 693d7750 2316->2318 2319 693d6a37-693d6a38 FreeLibrary 2317->2319 2320 693d6a22-693d6a34 2317->2320 2323 693d6a7a-693d6a81 2318->2323 2324 693d6af6-693d6b02 2318->2324 2319->2318 2325 693d6a97-693d6ab3 GetProcAddress 2323->2325 2326 693d6a83-693d6a8c FreeLibrary 2323->2326 2327 693d6b06-693d6b19 2324->2327 2329 693d6ae9-693d6af4 2325->2329 2330 693d6ab5-693d6aca call 693d5f50 2325->2330 2326->2325 2328 693d6a8e-693d6a91 2326->2328 2328->2325 2329->2324 2329->2327 2330->2329 2333 693d6acc-693d6ad3 call 693d6530 2330->2333 2335 693d6ad8-693d6add 2333->2335 2336 693d6adf-693d6ae5 2335->2336 2337 693d6ae7 2335->2337 2336->2329 2336->2337 2337->2329
                                    APIs
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,ADDB68B1,693FFCC8,00000000), ref: 693D6A18
                                    • FreeLibrary.KERNEL32(00000000), ref: 693D6A38
                                    • FreeLibrary.KERNEL32(00000000,ADDB68B1,693FFCC8,00000000), ref: 693D6A84
                                    • GetProcAddress.KERNEL32(?,CreateObject), ref: 693D6AA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Library$Free$AddressLoadProc
                                    • String ID: CreateObject
                                    • API String ID: 1386263645-166191583
                                    • Opcode ID: 15ddb94665670d0e33da9a0f426d552a9ebfdd5ef47514fc3deb04ab4a9db890
                                    • Instruction ID: 5d429fcb7a630746419634b3562b96ae4dfea9cf4f1db761450eeb534ae5ef7b
                                    • Opcode Fuzzy Hash: 15ddb94665670d0e33da9a0f426d552a9ebfdd5ef47514fc3deb04ab4a9db890
                                    • Instruction Fuzzy Hash: AA417BB6A00606AFEB00CF65D994AAEBBF9FF49314F10C51AE8658B380D735E904CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693C4042
                                      • Part of subcall function 693C4D10: _malloc.LIBCMT ref: 693C4D3A
                                      • Part of subcall function 693C4D10: __CxxThrowException@8.LIBCMT ref: 693C4D54
                                    • __CxxThrowException@8.LIBCMT ref: 693C41B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID: P?i$P?i
                                    • API String ID: 175252994-3409997002
                                    • Opcode ID: 4518a332558de117574d6144e8aaeb87c6bbc4d2acd32809348e557fbea8a0a7
                                    • Instruction ID: c4c31a2d07fc559326e0311241e0cebc1d1f812231d5ff0ff4dc025a6d5dc0c8
                                    • Opcode Fuzzy Hash: 4518a332558de117574d6144e8aaeb87c6bbc4d2acd32809348e557fbea8a0a7
                                    • Instruction Fuzzy Hash: 8DB115B5C01269DFDB10CF99D984ADEFBB4BF08304F6081AEE559A7240D7346A45CF92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3037 693c8670-693c86c9 3038 693c86cf-693c86df 3037->3038 3039 693c8857-693c8881 3037->3039 3047 693c8706-693c870b 3038->3047 3048 693c86e1-693c8701 3038->3048 3040 693c888f-693c8892 3039->3040 3041 693c8883-693c888d call 693c1680 3039->3041 3043 693c8895-693c88a4 3040->3043 3041->3040 3043->3043 3046 693c88a6-693c8904 call 693c4a90 call 693ca5c0 call 693c99d0 call 693e51d6 * 2 3043->3046 3084 693c8906-693c890a call 693d1420 3046->3084 3085 693c8931-693c897c call 693c5e10 call 693cd1b0 3046->3085 3050 693c87d0-693c87d3 3047->3050 3051 693c8711-693c8757 call 693e514c call 693cabe0 3047->3051 3057 693c8a91-693c8a96 call 693e51d6 3048->3057 3050->3039 3052 693c87d9-693c881e call 693e51d6 3050->3052 3066 693c875d-693c8773 call 693cab10 3051->3066 3067 693c881f-693c8852 call 693e51d6 * 2 3051->3067 3068 693c8a98-693c8aac 3057->3068 3066->3067 3079 693c8779-693c8799 call 693de6e0 3066->3079 3067->3068 3090 693c879b-693c879e 3079->3090 3091 693c87a0-693c87a7 3079->3091 3093 693c890f-693c8914 3084->3093 3105 693c897e-693c89be call 693e51d6 call 693c4c80 call 693e51d6 3085->3105 3106 693c89c3-693c89c6 3085->3106 3090->3091 3095 693c87a9-693c87b8 call 693c9d00 3090->3095 3096 693c87b9-693c87c7 call 693e51d6 3091->3096 3093->3085 3097 693c8916-693c892c GetLastError call 693e663b 3093->3097 3095->3096 3096->3051 3107 693c87cd 3096->3107 3097->3085 3105->3068 3108 693c89c8-693c89cb 3106->3108 3109 693c89d4 3106->3109 3107->3050 3108->3109 3111 693c89cd-693c89d2 3108->3111 3112 693c89d6-693c89df 3109->3112 3111->3112 3114 693c8a3c-693c8a47 3112->3114 3115 693c89e1-693c8a0c 3112->3115 3139 693c8a48 call 10005aa5 3114->3139 3140 693c8a48 call 100061aa 3114->3140 3126 693c8a2e-693c8a3a call 693d2e40 3115->3126 3127 693c8a0e-693c8a16 3115->3127 3118 693c8a4a 3121 693c8a4c-693c8a90 call 693e51d6 call 693c4c80 3118->3121 3121->3057 3126->3121 3130 693c8a1e-693c8a2b call 693d2f70 3127->3130 3131 693c8a18-693c8a1c 3127->3131 3130->3126 3131->3126 3131->3130 3139->3118 3140->3118
                                    APIs
                                    • GetLastError.KERNEL32(?,?,00000000,?,00000000), ref: 693C8916
                                    • __CxxThrowException@8.LIBCMT ref: 693C892C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorException@8LastThrow
                                    • String ID: <H
                                    • API String ID: 1006195485-4022674625
                                    • Opcode ID: c00963d173594dc7d2da73c783877dc777e795abbcc7be01a901234fdbd829af
                                    • Instruction ID: 330355751ef78a6906accae899ec01afa4ca2dc1f9aa98d07a90351c5a9ce8f9
                                    • Opcode Fuzzy Hash: c00963d173594dc7d2da73c783877dc777e795abbcc7be01a901234fdbd829af
                                    • Instruction Fuzzy Hash: 39E180B6D00649EFCF04DFE8C980AEEBBB5BF49314F148159E555AB240D731AE05CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • _malloc.LIBCMT ref: 693CCB18
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693CCB30
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                      • Part of subcall function 693CA910: __CxxThrowException@8.LIBCMT ref: 693CA992
                                    • GetLastError.KERNEL32(?,00000000,00000000), ref: 693CCBD3
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateErrorExceptionHeapLastRaise_malloc
                                    • String ID:
                                    • API String ID: 214124409-0
                                    • Opcode ID: cd68e20f4a797f1de1a03d13063a82d25d3116a47205fb62bdfafd7a7543d451
                                    • Instruction ID: d08f5e904b4ec0c9a87cdfe7d6c05452c75ab727f8c37e11442c0812644aa230
                                    • Opcode Fuzzy Hash: cd68e20f4a797f1de1a03d13063a82d25d3116a47205fb62bdfafd7a7543d451
                                    • Instruction Fuzzy Hash: C6A171B5D00218EFCF04DFA8D980ADEB7B4BF48318F10862AE955A7341D735AE15CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(?,ADDB68B1,?,00000000,?,?,00000000,?,?,?,00000000,693F0C38,000000FF), ref: 693D2A9F
                                    • CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,ADDB68B1,?,00000000,?,?,00000000), ref: 693D2ACC
                                    • CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 693D2B2B
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CreateFile$CloseHandle
                                    • String ID:
                                    • API String ID: 1443461169-0
                                    • Opcode ID: 50b686eaebd77a21e45d61da4d08e198798e4f83824f27da218b61588355d666
                                    • Instruction ID: 9d3211112f931a096434e07b454db42649eb667416f7ee6c14e49ebd301899b9
                                    • Opcode Fuzzy Hash: 50b686eaebd77a21e45d61da4d08e198798e4f83824f27da218b61588355d666
                                    • Instruction Fuzzy Hash: 4331B17690021AAFDB00CF54DD45BAFBBB8FB05760F10831AF825972C0D771AA15CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000,ADDB68B1,?,?,?,?,?,00000000), ref: 693D136E
                                    • GetLastError.KERNEL32 ref: 693D138C
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 693D13D7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$ErrorLast
                                    • String ID:
                                    • API String ID: 2485089472-0
                                    • Opcode ID: e8077f90fc74ebddbd4e98acc75e8c68ab6e46de128c9124725880f7e37a44c1
                                    • Instruction ID: 9594ef36aca2bd297efcb66984796429b2f39cbd04865b14c770513819b36d62
                                    • Opcode Fuzzy Hash: e8077f90fc74ebddbd4e98acc75e8c68ab6e46de128c9124725880f7e37a44c1
                                    • Instruction Fuzzy Hash: 3721DE77E04214ABDF00CF99E8057AFBBB8FB45665F10016BED19A3680DB366909C7D2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNEL32(?,?,?,?), ref: 693C1AEC
                                    • GetLastError.KERNEL32 ref: 693C1B01
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastPointer
                                    • String ID:
                                    • API String ID: 2976181284-0
                                    • Opcode ID: 95613dc544146c35a539308c68f71874bab09f39969bd8c52cdaa2cacfc7b6e0
                                    • Instruction ID: ab76f904b6599a5bde68980179617ae2edc22a31685865fb3bfc07e0e31f469d
                                    • Opcode Fuzzy Hash: 95613dc544146c35a539308c68f71874bab09f39969bd8c52cdaa2cacfc7b6e0
                                    • Instruction Fuzzy Hash: 3811D67770550A8F8700CEACE9419AAB7D8EB85361F10826EFD19C7250E733D815ABF2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693D08A5
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693D08CD
                                    • __CxxThrowException@8.LIBCMT ref: 693D08F7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID:
                                    • API String ID: 3476068407-0
                                    • Opcode ID: e28f33f81907103d816e2e164a2ca9581120d8d07ef2090519af7fab6257251d
                                    • Instruction ID: a40a02d1708d97d14dc6a4f25f1f995c128f5c9f383f57e458464fa6f9dd4d5a
                                    • Opcode Fuzzy Hash: e28f33f81907103d816e2e164a2ca9581120d8d07ef2090519af7fab6257251d
                                    • Instruction Fuzzy Hash: 6D110ABA700B049FD718DFA5CAA0C1FB3E9AB98704B50CD2DD54AD3211E771FA094761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 1000280A
                                    • EnterCriticalSection.KERNEL32(00000000,?,?,?,10002894,?,?,?,?,?), ref: 1000281B
                                    • LeaveCriticalSection.KERNEL32(00000000,?,?,?,10002894,?,?,?,?,?), ref: 1000284F
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterH_prologLeave
                                    • String ID:
                                    • API String ID: 367238759-0
                                    • Opcode ID: 31ba921f93e0922ecbc56fece5b0bbad6d7110b5eb9d49f18265bee903e4b92a
                                    • Instruction ID: a3f251eb98acb8aeedd518acfd2e06878d0524bbd79d22e0378b99734f5e22aa
                                    • Opcode Fuzzy Hash: 31ba921f93e0922ecbc56fece5b0bbad6d7110b5eb9d49f18265bee903e4b92a
                                    • Instruction Fuzzy Hash: D401467AA00214AFDB11CF94C848B9ABBB9FF48711F10841AFD01A7221C7B4A9119B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-3916222277
                                    • Opcode ID: 87f4fbd9ed9835f185afa277318771e429ef2e1cba041ba48d785ab7c3d46741
                                    • Instruction ID: dc996c4eb68a87c8f199726ed84f9ce0c47e74a02a5fa25993d790b30f922306
                                    • Opcode Fuzzy Hash: 87f4fbd9ed9835f185afa277318771e429ef2e1cba041ba48d785ab7c3d46741
                                    • Instruction Fuzzy Hash: B4515275E002069FEB14DFA8C881ABEB7F5FF88380F548529E545E7245DB70AE41CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(?), ref: 693C196C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID: (L?i
                                    • API String ID: 2591292051-1374871465
                                    • Opcode ID: 049115ba798545fa869dc34521b8a3189e599eb1b8e522b34301aeb23645707b
                                    • Instruction ID: 4704eb1c6e863d64835894bdd42f76ca9133ebfe9a8e94cd90dea75bf0e09b12
                                    • Opcode Fuzzy Hash: 049115ba798545fa869dc34521b8a3189e599eb1b8e522b34301aeb23645707b
                                    • Instruction Fuzzy Hash: 73E02076100B1097D7105FA89808B4BBBCCAF01370B10C719E5B9C72E0D371D841C7D5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFileAttributesW.KERNEL32(00000000,00000000,ADDB68B1,?,00000000,?,?,00000000,?,ADDB68B1,00000000), ref: 693D108F
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 693D10ED
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 2b2745979fcf8d9df037d664ae98c81743a83334ba613f289eba3bbd868ab0a7
                                    • Instruction ID: dd41c29e139ffe1eb828c0035a6edddf994be8c8faeae81126e1046f308039de
                                    • Opcode Fuzzy Hash: 2b2745979fcf8d9df037d664ae98c81743a83334ba613f289eba3bbd868ab0a7
                                    • Instruction Fuzzy Hash: 4321A477E042489BDF00CF94E805B9EFBB8FB45665F10416BE919D3340EB36AA09C7A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693D788A
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693D78A4
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: 4a49c3075339b278ba8c4388c5982281fcdb52592b654ce74b34df49895f3743
                                    • Instruction ID: 41426ae97bf6ab0f835479dfa5d70f10080d9aebbd99de4147c794fc9144563f
                                    • Opcode Fuzzy Hash: 4a49c3075339b278ba8c4388c5982281fcdb52592b654ce74b34df49895f3743
                                    • Instruction Fuzzy Hash: 6B11E1B6904605EFCB14CF54C891B9AB7E9FB45314F00862EE86AC7790E731AE08CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00019D23,00000000,?,?), ref: 10019CF9
                                    • GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocCreateErrorHeapLastThread
                                    • String ID:
                                    • API String ID: 3580101977-0
                                    • Opcode ID: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                                    • Instruction ID: 578384fe474d0b562f95e97df9c8fae57dcf2a9e42d60c7228f8a9f52e2ea293
                                    • Opcode Fuzzy Hash: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                                    • Instruction Fuzzy Hash: 77F028372043156BDB21DF65EC05DAF3BA5DF446B0B104029FA18CA190CB31D8918B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 693C1C4C
                                    • GetLastError.KERNEL32 ref: 693C1C75
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID:
                                    • API String ID: 442123175-0
                                    • Opcode ID: bb479ca81f7d9cb661439c9bab038d4b5fb49eac8366c4434cfe852117d54e9c
                                    • Instruction ID: 9f16cc2073039e93fccb4e7c31bd6723ccb0ef38cde12f35cfc8575153067216
                                    • Opcode Fuzzy Hash: bb479ca81f7d9cb661439c9bab038d4b5fb49eac8366c4434cfe852117d54e9c
                                    • Instruction Fuzzy Hash: 4501867620070ADFD710CE98D880BAB37ECBF44711F00882AF916CB580D7BAEC509BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 693C19EB
                                    • GetLastError.KERNEL32 ref: 693C1A0C
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastRead
                                    • String ID:
                                    • API String ID: 1948546556-0
                                    • Opcode ID: 8f1db5aa0deb25e97a66421c0f8fbe72b6425320c053dbb51227dd0c6f644d1a
                                    • Instruction ID: 233188f0ca5506b6e2d7070db063f64b73720af7efe3718939ee9d1ec7181422
                                    • Opcode Fuzzy Hash: 8f1db5aa0deb25e97a66421c0f8fbe72b6425320c053dbb51227dd0c6f644d1a
                                    • Instruction Fuzzy Hash: 2AF0627635024ADBDB04CE94E854B6B33ADBB84310F10C42AF95ACB280D776DC60EB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,10019F1B,00000001), ref: 1001A3D5
                                      • Part of subcall function 1001A27C: GetVersionExA.KERNEL32 ref: 1001A29B
                                    • HeapDestroy.KERNEL32 ref: 1001A414
                                      • Part of subcall function 1001A4C9: HeapAlloc.KERNEL32(00000000,00000140,1001A3FD,000003F8), ref: 1001A4D6
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Heap$AllocCreateDestroyVersion
                                    • String ID:
                                    • API String ID: 2507506473-0
                                    • Opcode ID: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                                    • Instruction ID: f49a4552e00520ddd5bd994c2c6f56530b3037705a70c7491d35245aff95e9ec
                                    • Opcode Fuzzy Hash: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                                    • Instruction Fuzzy Hash: 80F09274611302ABFF14EB309D8AB5935D1DB86791F308436F905CD0A6EBF0D8D2A611
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(00000002,693DB356,?,?,?,?,?,?,693F5380,?), ref: 693C1BE9
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,693F5380,?), ref: 693C1BFD
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ChangeCloseErrorFindLastNotification
                                    • String ID:
                                    • API String ID: 1687624791-0
                                    • Opcode ID: 9759c95fae820225bb5e32df27929e151102e6d3f7f90273e70bc790e1d2d78c
                                    • Instruction ID: 0230724b50066546036386cb1fbfd2ae87cc24598c2e9fd89de53d3e6d9ac649
                                    • Opcode Fuzzy Hash: 9759c95fae820225bb5e32df27929e151102e6d3f7f90273e70bc790e1d2d78c
                                    • Instruction Fuzzy Hash: 52E01279350E039ADB104AB9CC4432675D87B017727A0CB28E076C54E0EB2EC8419A05
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693D09E8
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693D0A02
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID:
                                    • API String ID: 2732643326-0
                                    • Opcode ID: c77945cb92c53e5413daf3fdac7118d55abecd3125a5130a1d2e4ff911e2f915
                                    • Instruction ID: 1667a62ee21d282963dc059522fe69dd85dfcf5966e8bf8e959a1ef91d5e8190
                                    • Opcode Fuzzy Hash: c77945cb92c53e5413daf3fdac7118d55abecd3125a5130a1d2e4ff911e2f915
                                    • Instruction Fuzzy Hash: D5D0A795C5D30C738E04C7A5AD0199E77EC8D55308F404195FC4D83101FA22E61E42A6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 418329258124bf81065b2b4d57c61a1207f38c192b65861c8e98dbda376bc648
                                    • Instruction ID: 24b6dd137383e7686c229cdd86bb12439a3ed7e02ed9f8727553bb3e51178dae
                                    • Opcode Fuzzy Hash: 418329258124bf81065b2b4d57c61a1207f38c192b65861c8e98dbda376bc648
                                    • Instruction Fuzzy Hash: 37427F74904249DFEB00CFA4C984BDDBBF5EF09384F244099E849AB386DB75AE45CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10009829
                                      • Part of subcall function 1000940A: __EH_prolog.LIBCMT ref: 1000940F
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 20f936d777ea9103e340114ca1ee5d19f73f9782134bda5456cca3b6a12e0127
                                    • Instruction ID: 7486e4567ea8ddc6047f59b84a49b8006f4fb568e8041e622ffbf8bfe16b7337
                                    • Opcode Fuzzy Hash: 20f936d777ea9103e340114ca1ee5d19f73f9782134bda5456cca3b6a12e0127
                                    • Instruction Fuzzy Hash: FE326A74904249DFEB14CFA4C880BDEBBB5FF45384F50806EE44AA7296DB70AA85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 1fdb5b8ec1110f418a073286f027cb5b8f34d3fd1367757d92b8a8bddb269a89
                                    • Instruction ID: 16904ee073535d8266284e3ab4d1ee50d97a619b8a40ccf019ff2181d9a9fe66
                                    • Opcode Fuzzy Hash: 1fdb5b8ec1110f418a073286f027cb5b8f34d3fd1367757d92b8a8bddb269a89
                                    • Instruction Fuzzy Hash: 4DC17F74A0024ADFEB14CFA8C884BDEBBF1FF49380F204629E445A7245DB75AE81CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFileTime.KERNEL32(?,00000000,00000000,00000000,ADDB68B1,?,?,?,?,?,693F0300,000000FF), ref: 693C7438
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: FileTime
                                    • String ID:
                                    • API String ID: 1425588814-0
                                    • Opcode ID: 46481ee16b7bcde7346aee33bff39b732d0a7c617b4315124aa91c87749b6402
                                    • Instruction ID: 0d09fdddd2a5b1abc9c1530260066f76ef6138721b49d5b8df5f19a84d4b9f64
                                    • Opcode Fuzzy Hash: 46481ee16b7bcde7346aee33bff39b732d0a7c617b4315124aa91c87749b6402
                                    • Instruction Fuzzy Hash: 81515FB6A04A82FFD708CF75C480B9AFBA4FB49314F00865AD86A87601D732BC54DB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10008DE2
                                      • Part of subcall function 1000A51C: __EH_prolog.LIBCMT ref: 1000A521
                                      • Part of subcall function 1000809D: __EH_prolog.LIBCMT ref: 100080A2
                                      • Part of subcall function 10008A65: __EH_prolog.LIBCMT ref: 10008A6A
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 0f2ef54e4d54980d6866c9ca524e59761326e1e766cc54546d6848b3260f56d2
                                    • Instruction ID: 0609df34ebabf0a4a76e2918ca157b4269ad3ae51d55b8a1eb59a52bcf34417c
                                    • Opcode Fuzzy Hash: 0f2ef54e4d54980d6866c9ca524e59761326e1e766cc54546d6848b3260f56d2
                                    • Instruction Fuzzy Hash: DF51B274D00159DBEF14DFA4C885AEEBBB2FF44390F108159E8556B286CB71AF41CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10007912
                                      • Part of subcall function 1000A496: __EH_prolog.LIBCMT ref: 1000A49B
                                      • Part of subcall function 10007AD6: __EH_prolog.LIBCMT ref: 10007ADB
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 6bb2def5445f3f3c03a7c343a9c0ad1c6318bdf414d74d1a9ec3108368a0102b
                                    • Instruction ID: b40d17a970ea470072cc094887da7a6dca03317504114bf01e9f4a1a4d97d151
                                    • Opcode Fuzzy Hash: 6bb2def5445f3f3c03a7c343a9c0ad1c6318bdf414d74d1a9ec3108368a0102b
                                    • Instruction Fuzzy Hash: 71516D34900249DFEB11CFA4C954AEDBBB4FF95344F244099E845A7246DB74AF01DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: ef6ed3350f196110724b134d7ae58aa8eb2fad54a812ca61983dfb10647da9bd
                                    • Instruction ID: 1deedfb3ed3693e114189d5c8674f5dba158b51214873baba276ba9a2bcc193c
                                    • Opcode Fuzzy Hash: ef6ed3350f196110724b134d7ae58aa8eb2fad54a812ca61983dfb10647da9bd
                                    • Instruction Fuzzy Hash: 73419F74900246CFDB24CF58C88496ABBF2FF48358B2546ADD0999B351C731ED46CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 02f82e7474b5bf284dc11ca32c5ed9bea93bcca5a0ad974320cd45ec439b4ff6
                                    • Instruction ID: 59f6696383dde50044605197c7a13ccbc641f9314ce92faebeca66c50bce22a2
                                    • Opcode Fuzzy Hash: 02f82e7474b5bf284dc11ca32c5ed9bea93bcca5a0ad974320cd45ec439b4ff6
                                    • Instruction Fuzzy Hash: 47219F7198468ADBFB24CF60D9808EEB7B6EB412D0B21852DE49267648D730FE41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,?,?,?), ref: 1001899F
                                      • Part of subcall function 1001A13A: InitializeCriticalSection.KERNEL32(00000000,?,?,?,10018A6D,00000009,?,?,?), ref: 1001A177
                                      • Part of subcall function 1001A13A: EnterCriticalSection.KERNEL32(?,?,?,10018A6D,00000009,?,?,?), ref: 1001A192
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalSection$AllocateEnterHeapInitialize
                                    • String ID:
                                    • API String ID: 1616793339-0
                                    • Opcode ID: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                                    • Instruction ID: bde266228d008e092059639ff97bb6b14f601e90ad82446575358dbeed7d10ff
                                    • Opcode Fuzzy Hash: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                                    • Instruction Fuzzy Hash: C5219032A00255BAEB10DB68DC42BADB7A4FB01764F284215F924EF1C0C774EBC18B52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 693D25A0: FindClose.KERNEL32(FFFFFFFF,?,ADDB68B1,?,00000000,693F50B8,?,693F0438,000000FF,?,693D265E), ref: 693D25EA
                                    • __CxxThrowException@8.LIBCMT ref: 693CA992
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CloseExceptionException@8FindRaiseThrow
                                    • String ID:
                                    • API String ID: 2665002293-0
                                    • Opcode ID: 22d134c5d8dddc09ebea1216c3453f13984afe4331ae3d62bb9d68558ab28a1c
                                    • Instruction ID: 16d3b6196e6ec23fd29948970a7d226cc532dd764e00fcb34bc9120a5190feb6
                                    • Opcode Fuzzy Hash: 22d134c5d8dddc09ebea1216c3453f13984afe4331ae3d62bb9d68558ab28a1c
                                    • Instruction Fuzzy Hash: 2D1193B6500704ABCB10CF69D880E9BF7F8FF55314F00861EE99683350DB35A9098B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: ebc697b0815d610cf069836f75e5a55b253691f45cf9441c62c129786d474608
                                    • Instruction ID: c4781e215bb38ec63fc671d50aeec44c86b20336711f2647e792547350c1aef8
                                    • Opcode Fuzzy Hash: ebc697b0815d610cf069836f75e5a55b253691f45cf9441c62c129786d474608
                                    • Instruction Fuzzy Hash: 3911E232A4124A9FFB14CF64C9808EEB3F2EB403D0B21813DE052A7648D730FE428B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(693C890F,ADDB68B1,?,?,00000000), ref: 693D1528
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID:
                                    • API String ID: 1452528299-0
                                    • Opcode ID: 732e40941995936e9eec27052e0b4ed31215810a2485f1650754dc25e55912cd
                                    • Instruction ID: e088418d582c9095daa41640fc002e258bddb2fc19e848114a51bf5d2c30b467
                                    • Opcode Fuzzy Hash: 732e40941995936e9eec27052e0b4ed31215810a2485f1650754dc25e55912cd
                                    • Instruction Fuzzy Hash: C9B1C577E00219DBCF08CFE8D991AEEB7B5FF44344F14816AD845A7250E736A909CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: b051d9f97361328a0859d23c7aef542bc19b666e6010b629010daeab35dc1547
                                    • Instruction ID: 1a273919c2d2e3c34155be655625f51d11ef425e7a56d82b9c8decfb09a307f8
                                    • Opcode Fuzzy Hash: b051d9f97361328a0859d23c7aef542bc19b666e6010b629010daeab35dc1547
                                    • Instruction Fuzzy Hash: 4011CE71A44155ABE722CF29CC05B9F37A9EF0A7E4F008119F805DB265DB31DD01C790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 100039CD
                                      • Part of subcall function 10003600: __EH_prolog.LIBCMT ref: 10003605
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 257c9c1ad85ce65f22fa997ad81c770c6af4072d1a7d7a18d6b680d099e47f4b
                                    • Instruction ID: a8771e25a5af01616f041783a1a562797f3037f43c5b4569f99eca130688d05b
                                    • Opcode Fuzzy Hash: 257c9c1ad85ce65f22fa997ad81c770c6af4072d1a7d7a18d6b680d099e47f4b
                                    • Instruction Fuzzy Hash: 44118274E01795DAEB09DBA8C9153EEFBEADF95300F54414D9057A7282CBF42B04C7A2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10006A25
                                      • Part of subcall function 10001B41: GetSystemInfo.KERNEL32(?), ref: 10001B4B
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prologInfoSystem
                                    • String ID:
                                    • API String ID: 3096475795-0
                                    • Opcode ID: 52262b521e3cf9d1fda4bec855af299aea3512d706ab6bf0f58a7f0b292b1210
                                    • Instruction ID: 655e083bcbb9f064a1fc17e82f19a2947c3b56c2b4f5fa8eba001858af0e0911
                                    • Opcode Fuzzy Hash: 52262b521e3cf9d1fda4bec855af299aea3512d706ab6bf0f58a7f0b292b1210
                                    • Instruction Fuzzy Hash: 8701A2B0901B949FD320CF59D48469AFBE5FB09300F90886EE4AA9B612C7B8A6448F50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 693D2470: FindClose.KERNEL32(?,ADDB68B1,693F0658,00000000), ref: 693D24C4
                                      • Part of subcall function 693D2470: FindFirstFileW.KERNEL32(693F50B8,?,ADDB68B1,693F0658,00000000), ref: 693D24DE
                                      • Part of subcall function 693D2470: FindFirstFileW.KERNEL32(?,?), ref: 693D253A
                                    • FindClose.KERNEL32(FFFFFFFF,?,ADDB68B1,?,00000000,693F50B8,?,693F0438,000000FF,?,693D265E), ref: 693D25EA
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: c1db16749b3c24ed1869a874ec2ef5607ee7375092b6562a602b1bbb3f177a94
                                    • Instruction ID: 2b13f9e4b6e08654a0730ecdcc4e848cb9bc30242b728a7b8555081c3f6f331d
                                    • Opcode Fuzzy Hash: c1db16749b3c24ed1869a874ec2ef5607ee7375092b6562a602b1bbb3f177a94
                                    • Instruction Fuzzy Hash: 20F0F9B6944649AFC700CF98D844BAEB7BCFB06724F50472AF831936C0D73569098A64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10001C8F
                                      • Part of subcall function 10001BB2: __EH_prolog.LIBCMT ref: 10001BB7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 45d6ff788914fcc1d4c4362c08418d30e3fc6f4cbe7bfcd3fb78a9b9f7420235
                                    • Instruction ID: 5875ca03f24213d4aa71392faa60c1249694dc7a06dd944ad61b31c616a183da
                                    • Opcode Fuzzy Hash: 45d6ff788914fcc1d4c4362c08418d30e3fc6f4cbe7bfcd3fb78a9b9f7420235
                                    • Instruction Fuzzy Hash: 3AF03432A00219ABEB05CF98CC01BEEB7B9EB44365F108659B821E7290C775EE00CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10001C8F
                                      • Part of subcall function 10001BB2: __EH_prolog.LIBCMT ref: 10001BB7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: a6999b822fc1317c87866c67a3b2559ab8b1b0de13d547d74b0740a9a50685af
                                    • Instruction ID: a1ce7e251bf4dddfe6d8e665bceb41a424ebb3d89783d3dba666d18c8877da87
                                    • Opcode Fuzzy Hash: a6999b822fc1317c87866c67a3b2559ab8b1b0de13d547d74b0740a9a50685af
                                    • Instruction Fuzzy Hash: 43F0F876A00219EBEB15CF94CC05BEEB7B9FB44365F108659B825E7290C775AA10CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 1000A521
                                      • Part of subcall function 1000A6CF: __EH_prolog.LIBCMT ref: 1000A6D4
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 1d350eab279bd1dbb4d5681b811c8a6e671b98ab2be674e428506e08396ece6a
                                    • Instruction ID: aa797ba4b590ef7c1940b9b2a0b5883bf8ddeea9a52a955fbfb363e5e3090a9b
                                    • Opcode Fuzzy Hash: 1d350eab279bd1dbb4d5681b811c8a6e671b98ab2be674e428506e08396ece6a
                                    • Instruction Fuzzy Hash: 72E09275A00514AFEB08DBA88C066AE76E5EB48250F00862EA012E62D0DFB06A808754
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 10006B56
                                      • Part of subcall function 10006B9E: __EH_prolog.LIBCMT ref: 10006BA3
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: c2b4014cf6554101de5823dbb260c55468e89f1724bea5b528826ce213b76a0a
                                    • Instruction ID: 8d9a37c6723f40ac26746b696ab844ca15524eaf609cb6dee056dacbd79d311a
                                    • Opcode Fuzzy Hash: c2b4014cf6554101de5823dbb260c55468e89f1724bea5b528826ce213b76a0a
                                    • Instruction Fuzzy Hash: 8BF08C71C01A60DBD724CF54C8057DEB7B4EF08310F10464EA8A6A7281CBB0BA40CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 1000A49B
                                      • Part of subcall function 1000A0CE: __EH_prolog.LIBCMT ref: 1000A0D3
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 49073b19b42d1aece4de8f7d12bddb7de673f44c594ea106af3184a1002e2511
                                    • Instruction ID: 889d54ac72d292b4943fb779c3a4a2c7d1dd2e9b7142568b78a9c6437da24382
                                    • Opcode Fuzzy Hash: 49073b19b42d1aece4de8f7d12bddb7de673f44c594ea106af3184a1002e2511
                                    • Instruction Fuzzy Hash: 12E08C36900148FBDF02CF84C805FEF7B75EB452A0F00851AF40415051C3BAAA50DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExitThread
                                    • String ID:
                                    • API String ID: 2158977761-0
                                    • Opcode ID: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                                    • Instruction ID: 587474e3f6e270900c506b7264c4806e64e6eaefbf2122b89b9aa41b5ebd9e7a
                                    • Opcode Fuzzy Hash: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                                    • Instruction Fuzzy Hash: D6E08C3694052AABEB12E7A0CC46A9E37A0EF08380F040010F8005E062DB70FED24692
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,?,693E6375,00000001,?,?,?,693E64EE,?,?,?,693F7F18,0000000C,693E65A9), ref: 693E93F6
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CreateHeap
                                    • String ID:
                                    • API String ID: 10892065-0
                                    • Opcode ID: 857b88342d5d9fc04a4ed5948582af9c9b39775bce7da672a267a3adabcaba2e
                                    • Instruction ID: 989a8bd63ac9e957fe9cb8030eaee9fc31f95612a14472f0c01fa60f2d5a2500
                                    • Opcode Fuzzy Hash: 857b88342d5d9fc04a4ed5948582af9c9b39775bce7da672a267a3adabcaba2e
                                    • Instruction Fuzzy Hash: 85D05E325943885BDB00AEB4AD09B263BDCA786395F008436F82CC6144E670C540D601
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 1000AB92
                                      • Part of subcall function 10006A20: __EH_prolog.LIBCMT ref: 10006A25
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID:
                                    • API String ID: 3519838083-0
                                    • Opcode ID: 50b908e3d647e52a03bcd4fae9ea66269edd5c88d27c4c7adeab43c7193a34f8
                                    • Instruction ID: f583651af7419ed68212601d7f78bfec3ebd47bcdcb2918c529af6d70d782719
                                    • Opcode Fuzzy Hash: 50b908e3d647e52a03bcd4fae9ea66269edd5c88d27c4c7adeab43c7193a34f8
                                    • Instruction Fuzzy Hash: 1AD05E75F14141AFEB08DBB4981636D76E2EB48280F10856DA012E66C1DFB0BA80C625
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExitThread
                                    • String ID:
                                    • API String ID: 2158977761-0
                                    • Opcode ID: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                                    • Instruction ID: 55bdce0fba70f3b5ff24939f3ea0e7f6c7887ef7bde984f872fb15fca6cc6046
                                    • Opcode Fuzzy Hash: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                                    • Instruction Fuzzy Hash: 4FD05E31540626ABE213E770DC86A5E2394DF05790B110115F8408D062DF70FEC24192
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32(00000000,?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A102
                                      • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32(?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A11D
                                      • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A125
                                      • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A12D
                                      • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A135
                                    • TlsFree.KERNEL32(FFFFFFFF,10019FBC,1001A015,?,?,?), ref: 1001C010
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalDeleteSection$Free
                                    • String ID:
                                    • API String ID: 1584690612-0
                                    • Opcode ID: 3aaa27bac5001039f89fed55244ff3c97aaca533f641e9855337a23d41bd91ec
                                    • Instruction ID: 546efeec3206eed097d6fb3f9723a3f69e2227c44c0d9f166d3baed5ab6dace6
                                    • Opcode Fuzzy Hash: 3aaa27bac5001039f89fed55244ff3c97aaca533f641e9855337a23d41bd91ec
                                    • Instruction Fuzzy Hash: 97C04C74501715CAF511D7388CCA9083695F7493707F41744F1BAC60F5D774D8C38A00
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 10019CB8: CreateThread.KERNEL32(00000000,00000000,Function_00019D23,00000000,?,?), ref: 10019CF9
                                      • Part of subcall function 10019CB8: GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                                    • GetLastError.KERNEL32 ref: 10017598
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorLast$CreateThread
                                    • String ID:
                                    • API String ID: 665435222-0
                                    • Opcode ID: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                                    • Instruction ID: 5da84cd6a30c0b06f2c1d8553272c344b363e72c39abfbd7409f2c23709d4e44
                                    • Opcode Fuzzy Hash: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                                    • Instruction Fuzzy Hash: 2EE0ECB2254252AEF304DB648C46FA776E9EB94B81F50442DBA49CA180E6B0D944C7B5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,10001E62,?,?,1000B459,?), ref: 10012A31
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                                    • Instruction ID: 499c3da3a26d341c9e988975342de67c6826636d0b386d7712dafe969d9ecfde
                                    • Opcode Fuzzy Hash: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                                    • Instruction Fuzzy Hash: 18B012F07B238176FE6E87204C5BF662451A740BC7F601098F301DC0C4E7E094409015
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,10001E7E,?,10001E58,?,?,1000B459,?), ref: 10012A4C
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                                    • Instruction ID: 32e2f69f7c2909d2d391187de9ef312e1eea697864ad2fb4147c7fa98b3e1f25
                                    • Opcode Fuzzy Hash: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                                    • Instruction Fuzzy Hash: 96B012B034230023FD78C3110D45B1611506B00741E60405C73016C4C08570E4018504
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2603832442.000000000045D000.00000020.00000001.01000000.0000000E.sdmp, Offset: 0045D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_45d000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3617e82bd60fd03c4f87f95ed51040e3e5dadaeb0a3bebd0a62139b9ab93b5fc
                                    • Instruction ID: 9da881a1668667c5f5e61f0e74ea972f87722d8f5ad42a96f98ef7bce5f6fe0a
                                    • Opcode Fuzzy Hash: 3617e82bd60fd03c4f87f95ed51040e3e5dadaeb0a3bebd0a62139b9ab93b5fc
                                    • Instruction Fuzzy Hash: B301C4B17442046BCB12EB98DC42FAB3798EB09315F108116FE04D7292DA7DD8858BBD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2603832442.000000000045D000.00000020.00000001.01000000.0000000E.sdmp, Offset: 0045D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_45d000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b760d498d9366e2b8c008b5068de0d1edf9298eee5e882ad9278cafc15f1fbe1
                                    • Instruction ID: 9eb0517791e028c6019ed048d3cd8418304ffda763c1f22c3199e77c15fb86ab
                                    • Opcode Fuzzy Hash: b760d498d9366e2b8c008b5068de0d1edf9298eee5e882ad9278cafc15f1fbe1
                                    • Instruction Fuzzy Hash: 9BC0026160663466562535A92CC5CEF01488D462AEB24136BBD209A293DAAD4DC542EE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693DE9AF
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrow
                                    • String ID: (<i$ (<i$Empty file path$xS?i
                                    • API String ID: 3976011213-2125799869
                                    • Opcode ID: 259c57b57fc6da0a8bb1bce478b4ce47e390d06e4f294f7dbf8e9f89bea3fcaf
                                    • Instruction ID: ee761c9a88879ca39b1083d2bd6f1f19a814e61061bf353c4d6b3de7ea348a70
                                    • Opcode Fuzzy Hash: 259c57b57fc6da0a8bb1bce478b4ce47e390d06e4f294f7dbf8e9f89bea3fcaf
                                    • Instruction Fuzzy Hash: 3EC1A076D002599FDF14CFA8C990AEEFBB5BF48304F148059E946A7340D771AA09CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 693E6B91
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 693E6BA6
                                    • UnhandledExceptionFilter.KERNEL32(693F3328), ref: 693E6BB1
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 693E6BCD
                                    • TerminateProcess.KERNEL32(00000000), ref: 693E6BD4
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: d78f9ca32e8eb0491adacfb9c676f4516c6e009423ae66a92845cdc1c48abdb1
                                    • Instruction ID: 71123aa76522c754fa329609d821048d6de7029e033a0b1c6933823fa7cac1d3
                                    • Opcode Fuzzy Hash: d78f9ca32e8eb0491adacfb9c676f4516c6e009423ae66a92845cdc1c48abdb1
                                    • Instruction Fuzzy Hash: E021CFB9800285DFDF00DF69F589A883BBCFB0A359F50801AED2987391E7B55985EF05
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693CD3E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: @]<i$pT?i
                                    • API String ID: 2005118841-4009442558
                                    • Opcode ID: c666e11c7af08b7377e59d557c77c08e4af332b1df1b72ebfd645aba3989cc77
                                    • Instruction ID: 9b529066aa839e6dd2dd612b95c10bd933d0df8ae42ea3b4587327d7d4e3a02c
                                    • Opcode Fuzzy Hash: c666e11c7af08b7377e59d557c77c08e4af332b1df1b72ebfd645aba3989cc77
                                    • Instruction Fuzzy Hash: 90D16BB5D00649DBCB00DFA8C9806AEF7B5FF48314F24812AE529EB250D771AD46CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • OpenFileMappingW.KERNEL32(00000004,00000000,?,00000002), ref: 693C2BB4
                                    • GetLastError.KERNEL32 ref: 693C2BC3
                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 693C2BDF
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 693C2C88
                                    • CloseHandle.KERNEL32(?), ref: 693C2C96
                                    • OpenEventW.KERNEL32(00000002,00000000,?), ref: 693C2CA8
                                    • GetLastError.KERNEL32 ref: 693C2CBD
                                    • SetEvent.KERNEL32(00000000), ref: 693C2CC4
                                    • GetLastError.KERNEL32 ref: 693C2CCE
                                    • CloseHandle.KERNEL32(00000000), ref: 693C2CD5
                                    • GetLastError.KERNEL32 ref: 693C2CDF
                                      • Part of subcall function 693C2670: __CxxThrowException@8.LIBCMT ref: 693C2688
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorLast$File$CloseEventHandleOpenView$Exception@8MappingThrowUnmap
                                    • String ID: Can not open mapping$Incorrect command line$Incorrect mapping data$MapViewOfFile error$data error
                                    • API String ID: 682782048-464465891
                                    • Opcode ID: e742f10465325c89fb5b50e1305491af1e0cd0723891fe45f3a856dcac39665c
                                    • Instruction ID: 9229be1d13146a54b7269e96607e4d9b2bba6b3d22db9e5e1e6e9d00e34b05c2
                                    • Opcode Fuzzy Hash: e742f10465325c89fb5b50e1305491af1e0cd0723891fe45f3a856dcac39665c
                                    • Instruction Fuzzy Hash: 0F61077AA00A09DBDF00DFA8CE44B9EB7B8EF05755F109025E955A7240DB71ED02C7A3
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,693F7F58,0000000C,693E7296,00000000,00000000,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B), ref: 693E716D
                                    • __crt_waiting_on_module_handle.LIBCMT ref: 693E7178
                                      • Part of subcall function 693E7790: Sleep.KERNEL32(000003E8,?,?,693E70BE,KERNEL32.DLL,?,693E94A4,?,693E5FE3,693CFA7E,?,?,693C4D3F,0000000C,ADDB68B1,?), ref: 693E779C
                                      • Part of subcall function 693E7790: GetModuleHandleW.KERNEL32(693CFA7E,?,693E70BE,KERNEL32.DLL,?,693E94A4,?,693E5FE3,693CFA7E,?,?,693C4D3F,0000000C,ADDB68B1,?,?), ref: 693E77A5
                                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 693E71A1
                                    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 693E71B1
                                    • __lock.LIBCMT ref: 693E71D3
                                    • InterlockedIncrement.KERNEL32(02C08302), ref: 693E71E0
                                    • __lock.LIBCMT ref: 693E71F4
                                    • ___addlocaleref.LIBCMT ref: 693E7212
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$9?i
                                    • API String ID: 1028249917-3254198565
                                    • Opcode ID: c19f077451b6a52c57bcbc80020ca01b52e5eed162c0351c09d6cda292549657
                                    • Instruction ID: 47f328d30ee7b926e788b301b2100f6cffde5657f21e235ea4d155cec17de751
                                    • Opcode Fuzzy Hash: c19f077451b6a52c57bcbc80020ca01b52e5eed162c0351c09d6cda292549657
                                    • Instruction Fuzzy Hash: FE11AC75805712EAD720DF79D904B5EBBF4AF01318F10841BE4AA97390CB34AA41CF66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 693E1230: _malloc.LIBCMT ref: 693E1258
                                      • Part of subcall function 693E1230: __CxxThrowException@8.LIBCMT ref: 693E1272
                                    • __CxxThrowException@8.LIBCMT ref: 693E0704
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8324
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8390
                                      • Part of subcall function 693D82B0: _malloc.LIBCMT ref: 693D83B1
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D83CB
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8416
                                      • Part of subcall function 693E5FF4: __lock.LIBCMT ref: 693E6012
                                      • Part of subcall function 693E5FF4: ___sbh_find_block.LIBCMT ref: 693E601D
                                      • Part of subcall function 693E5FF4: ___sbh_free_block.LIBCMT ref: 693E602C
                                      • Part of subcall function 693E5FF4: HeapFree.KERNEL32(00000000,693CFA7E,693F7EB0,0000000C,693E81B5,00000000,693F8028,0000000C,693E81EF,693CFA7E,?,?,693EC6AB,00000004,693F82E8,0000000C), ref: 693E605C
                                      • Part of subcall function 693E5FF4: GetLastError.KERNEL32(?,693EC6AB,00000004,693F82E8,0000000C,693E7669,693CFA7E,?,00000000,00000000,00000000,?,693E726D,00000001,00000214), ref: 693E606D
                                    • __CxxThrowException@8.LIBCMT ref: 693E0A37
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc$ErrorExceptionFreeHeapLastRaise___sbh_find_block___sbh_free_block__lock
                                    • String ID: -mhe$ -sfx$ -ssw$ -w$7za
                                    • API String ID: 1499254937-429077366
                                    • Opcode ID: a94745bcd1d71786a224671c755d4f892479beea0b411f1b1c8486ad1e1b6042
                                    • Instruction ID: 2b119ba8c2dac7105cf54b1ae7f323f08dc0b712679b657592ab897203937741
                                    • Opcode Fuzzy Hash: a94745bcd1d71786a224671c755d4f892479beea0b411f1b1c8486ad1e1b6042
                                    • Instruction Fuzzy Hash: 2EC1A57A800258DBDF04DBE4CD84BDEB7B8BF14308F14C559D945AB241D7B5EA08DBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,1001CEDA,?,Microsoft Visual C++ Runtime Library,00012010,?,10021594,?,100215E4,?,?,?,Runtime Error!Program: ), ref: 1001D856
                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 1001D86E
                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 1001D87F
                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1001D88C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                    • API String ID: 2238633743-4044615076
                                    • Opcode ID: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                                    • Instruction ID: 0f002242f215f962b8815e3b350398d74b100aa23eb915cf8c40db05b23b1dbb
                                    • Opcode Fuzzy Hash: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                                    • Instruction Fuzzy Hash: A9014431604221AFE750FFF59CC4AAA7BE9EB59194721043BF604C6121DF35C8829B70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LCMapStringW.KERNEL32(00000000,00000100,10021660,00000001,00000000,00000000,7591E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DD7F
                                    • LCMapStringA.KERNEL32(00000000,00000100,1002165C,00000001,00000000,00000000,?,?,1001DA1F,?), ref: 1001DD9B
                                    • LCMapStringA.KERNEL32(?,?,00000000,00000001,00000000,00000003,7591E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DDE4
                                    • MultiByteToWideChar.KERNEL32(?,1002CE51,00000000,00000001,00000000,00000000,7591E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DE1C
                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,?,00000000), ref: 1001DE74
                                    • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 1001DE8A
                                    • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 1001DEBD
                                    • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 1001DF25
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: String$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 352835431-0
                                    • Opcode ID: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                                    • Instruction ID: 295e34877b95ddc79519c14bcd414cd7068b9c5c0158a783dd3936514e77c558
                                    • Opcode Fuzzy Hash: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                                    • Instruction Fuzzy Hash: FB517B31400259ABDF22EF94CD85ADE3FF9FB59751F20411AF910A9160C732DDA1EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: hU?i$x?i$|U?i
                                    • API String ID: 0-1316874357
                                    • Opcode ID: c6713d8c6242fd90092abb596fdf53ac66abdb48ada9093032d4977e45ca1be6
                                    • Instruction ID: a857408b41d00ac16f8615cbc5a318ee33579bc47c0f228a69d21353eb051386
                                    • Opcode Fuzzy Hash: c6713d8c6242fd90092abb596fdf53ac66abdb48ada9093032d4977e45ca1be6
                                    • Instruction Fuzzy Hash: BAC192B6D04619DFCB04CF98D980ADEB7B5FF49314F20811AE865AB350D731AE45CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 1001CE23
                                    • GetStdHandle.KERNEL32(000000F4,10021594,00000000,?,00000000,?), ref: 1001CEF9
                                    • WriteFile.KERNEL32(00000000), ref: 1001CF00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: File$HandleModuleNameWrite
                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                    • API String ID: 3784150691-4022980321
                                    • Opcode ID: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                                    • Instruction ID: d8c9acc08caec27d87d178c777f48a963db8df66c36a8e0edad6fccd900c7ff8
                                    • Opcode Fuzzy Hash: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                                    • Instruction Fuzzy Hash: 4131C476A0022CAFEB11EAA0CD85FDE77BDFB45344F6001A6F945DA041E770EAC5CA61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CC66
                                    • GetEnvironmentStrings.KERNEL32(?,?,?,?,10019F70), ref: 1001CC7A
                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CCA6
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,10019F70), ref: 1001CCDE
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,10019F70), ref: 1001CD00
                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,10019F70), ref: 1001CD19
                                    • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CD2C
                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 1001CD6A
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                    • String ID:
                                    • API String ID: 1823725401-0
                                    • Opcode ID: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                                    • Instruction ID: 10dabb665d0db05ed410ab17b42963db07fe2840a9ab64d8aea903b972c4df90
                                    • Opcode Fuzzy Hash: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                                    • Instruction Fuzzy Hash: 7331A6B25043AE5FE311EBB8ACC5D2A7ADDEB4A1D4B220639F545CB111EA31DCC187A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693E060F
                                    • __CxxThrowException@8.LIBCMT ref: 693E0329
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693E0624
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID: -an$(_?i$7za
                                    • API String ID: 3476068407-2629992683
                                    • Opcode ID: 176022262642c5f531b30cffff8be3a74791d22a2f37e141bcf4db74a2fc3c4c
                                    • Instruction ID: ea03c4df7125faf42306d127e7a8b414cdbf93121d9a3ae2e531e5299129e242
                                    • Opcode Fuzzy Hash: 176022262642c5f531b30cffff8be3a74791d22a2f37e141bcf4db74a2fc3c4c
                                    • Instruction Fuzzy Hash: 28B1847A804148EBDF01DFE8D980BCEBBB4AF14308F148055E945BB241DB75FA49DBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693E0C28
                                    • __CxxThrowException@8.LIBCMT ref: 693E0C42
                                    • __CxxThrowException@8.LIBCMT ref: 693E0D3F
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693E0D54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise_malloc
                                    • String ID: -an$7za l
                                    • API String ID: 1305767944-193614407
                                    • Opcode ID: b2303362d5a156d81d5ad0f21fef9538af2f6f42c8e570c874220d124a4e19a2
                                    • Instruction ID: d6fae1674fcf4dc0bba2fcda3e6ccd8d2fdfb0eae3abb47b8f5a158b318fab96
                                    • Opcode Fuzzy Hash: b2303362d5a156d81d5ad0f21fef9538af2f6f42c8e570c874220d124a4e19a2
                                    • Instruction Fuzzy Hash: B7919379904258DFCF00DFA8C990BDEBBB8AF54308F148059E845AB241DB71BA49DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadResource.KERNEL32(693C0000,00000000,693C0000,?,?,693E2B94,?), ref: 693E2993
                                    • SizeofResource.KERNEL32(693C0000,00000000), ref: 693E29A1
                                    • LockResource.KERNEL32(00000000), ref: 693E29AE
                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 693E29CF
                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 693E29E5
                                    • CloseHandle.KERNEL32(00000000), ref: 693E29FA
                                    • DeleteFileW.KERNEL32(00000000), ref: 693E2A0A
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: FileResource$CloseCreateDeleteHandleLoadLockSizeofWrite
                                    • String ID:
                                    • API String ID: 406028064-0
                                    • Opcode ID: 79b3bc89fdafc4139dc2ef8e42e74b023f1c06f721a085d9c1dcb33a9d5f0447
                                    • Instruction ID: 7f28cd7e9831e298e89e51c21c8b06715b882a1970015cf37f9ada6d5a828701
                                    • Opcode Fuzzy Hash: 79b3bc89fdafc4139dc2ef8e42e74b023f1c06f721a085d9c1dcb33a9d5f0447
                                    • Instruction Fuzzy Hash: EF113F727412567BD71086689C48F9FB77CEB46661F004167FD52E7280DA72C802C372
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindMITargetTypeInstance.LIBCMT ref: 693EE624
                                      • Part of subcall function 693EE370: PMDtoOffset.LIBCMT ref: 693EE400
                                    • FindVITargetTypeInstance.LIBCMT ref: 693EE62B
                                    • PMDtoOffset.LIBCMT ref: 693EE63B
                                    • std::bad_exception::bad_exception.LIBCMT ref: 693EE661
                                    • __CxxThrowException@8.LIBCMT ref: 693EE66F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: FindInstanceOffsetTargetType$Exception@8Throwstd::bad_exception::bad_exception
                                    • String ID: Bad dynamic_cast!
                                    • API String ID: 3308565544-2956939130
                                    • Opcode ID: e43620099b3c62e339e99c451cd1d6892d5e3f7770b938860446d58edb62978e
                                    • Instruction ID: 1f7caef90b007762827d28c4c21d992d92995f43d3824d5e1d75f0754e07e4c4
                                    • Opcode Fuzzy Hash: e43620099b3c62e339e99c451cd1d6892d5e3f7770b938860446d58edb62978e
                                    • Instruction Fuzzy Hash: E311E236A003249FCF20DFB8C941ABE77B4AF48355F04805BE451E7290EB35D9028BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693DF621
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: -aoa$ -aos$ -aot$ -aou$ -r0
                                    • API String ID: 2005118841-2704224164
                                    • Opcode ID: 68687feb07c0fb4748d2fd8931b35ea2dc57088b0a1a24220ccfeac5fcbe0b86
                                    • Instruction ID: fecadbf1d2396a4828027156a9b278384d4edf5a8671a72f9899e1fdc18df063
                                    • Opcode Fuzzy Hash: 68687feb07c0fb4748d2fd8931b35ea2dc57088b0a1a24220ccfeac5fcbe0b86
                                    • Instruction Fuzzy Hash: D9F0622972A81CA38510DA9DBC4456D73AC874595AF40C5C6F80DCB700CB67CE1613CB
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 693D2A70: CloseHandle.KERNEL32(?,ADDB68B1,?,00000000,?,?,00000000,?,?,?,00000000,693F0C38,000000FF), ref: 693D2A9F
                                      • Part of subcall function 693D2A70: CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,ADDB68B1,?,00000000,?,?,00000000), ref: 693D2ACC
                                      • Part of subcall function 693D2A70: CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 693D2B2B
                                    • GetFileSize.KERNEL32(FFFFFFFF,?,00000004,80000000,00000001,00000003,ADDB68B1,?,?,00000000,?,?,?,00000000,693F0C38,000000FF), ref: 693D04A7
                                    • GetLastError.KERNEL32(?,?,?,00000000,693F0C38,000000FF), ref: 693D04B4
                                    • CloseHandle.KERNEL32(FFFFFFFF,00000004,80000000,00000001,00000003,ADDB68B1,?,?,00000000,?,?,?,00000000,693F0C38,000000FF), ref: 693D051D
                                    • CloseHandle.KERNEL32(FFFFFFFF,?,00000000,00000000,00000001,?,?,?,00000000,693F0C38,000000FF), ref: 693D053D
                                    • CloseHandle.KERNEL32(FFFFFFFF,FFFFFFFF,00000000,?,00000000,00000000,00000001,?,?,?,00000000,693F0C38,000000FF), ref: 693D056C
                                      • Part of subcall function 693D0A20: MultiByteToWideChar.KERNEL32(00000002,00000000,?,?,?,?,ADDB68B1,00000000), ref: 693D0AA7
                                      • Part of subcall function 693D0A20: __CxxThrowException@8.LIBCMT ref: 693D0AC1
                                    • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,00000000,00000001,?,?,?,00000000), ref: 693D06D8
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CloseHandle$File$Create$ByteCharErrorException@8LastMultiSizeThrowWide
                                    • String ID:
                                    • API String ID: 1518168698-0
                                    • Opcode ID: 554376a4ca2a370d9014f6b2b19b0099b4ef92bd9e27baed809f549d952b5803
                                    • Instruction ID: cdd2f719187987d4a0f9102410d3651e673c1483ff45a2bcaacdfff6f1e079f7
                                    • Opcode Fuzzy Hash: 554376a4ca2a370d9014f6b2b19b0099b4ef92bd9e27baed809f549d952b5803
                                    • Instruction Fuzzy Hash: 9E81A177E042189BCF00DFA4D854BDEB7B5FF45764F10861AE861B7280EB359909CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw_malloc
                                    • String ID: -ir-!$ -p$ -r$7za A
                                    • API String ID: 3476970888-2239425251
                                    • Opcode ID: f8582a60ada3ef5e069dc8fb12d302d0d1b88554d7bde553b33b351ae2c3cf92
                                    • Instruction ID: 123be1072cbd94503464d8d9c1b1b709162ad6112b26be2767bf40f18af84f5f
                                    • Opcode Fuzzy Hash: f8582a60ada3ef5e069dc8fb12d302d0d1b88554d7bde553b33b351ae2c3cf92
                                    • Instruction Fuzzy Hash: 7502B37AD00268DBDF10DBE4C984BDEB7B4BF54308F14C19AE885A7241D771AE45CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStringTypeW.KERNEL32(00000001,10021660,00000001,?,7591E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001DFCB
                                    • GetStringTypeA.KERNEL32(00000000,00000001,1002165C,00000001,?,?,?,1001DA1F,?), ref: 1001DFE5
                                    • GetStringTypeA.KERNEL32(?,?,?,00000000,00000002,7591E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E019
                                    • MultiByteToWideChar.KERNEL32(?,1002CE51,?,00000000,00000000,00000000,7591E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E051
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1001E0A7
                                    • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1001E0B9
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: StringType$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 3852931651-0
                                    • Opcode ID: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                                    • Instruction ID: 73f36e6d74bf66f6ce57e3c8a420cabe8a1af6d8c6052cc8844ff2d98f481940
                                    • Opcode Fuzzy Hash: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                                    • Instruction Fuzzy Hash: 0041577250029AAFDB21DF94CC85EDE7BBAEB09790F20052AFA119A150C735DDD1CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CreateFrameInfo.LIBCMT ref: 693EAD0B
                                      • Part of subcall function 693E6968: __getptd.LIBCMT ref: 693E6976
                                      • Part of subcall function 693E6968: __getptd.LIBCMT ref: 693E6984
                                    • __getptd.LIBCMT ref: 693EAD15
                                      • Part of subcall function 693E72BB: __getptd_noexit.LIBCMT ref: 693E72BE
                                      • Part of subcall function 693E72BB: __amsg_exit.LIBCMT ref: 693E72CB
                                    • __getptd.LIBCMT ref: 693EAD23
                                    • __getptd.LIBCMT ref: 693EAD31
                                    • __getptd.LIBCMT ref: 693EAD3C
                                    • _CallCatchBlock2.LIBCMT ref: 693EAD62
                                      • Part of subcall function 693E6A0D: __CallSettingFrame@12.LIBCMT ref: 693E6A59
                                      • Part of subcall function 693EAE09: __getptd.LIBCMT ref: 693EAE18
                                      • Part of subcall function 693EAE09: __getptd.LIBCMT ref: 693EAE26
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                    • String ID:
                                    • API String ID: 1602911419-0
                                    • Opcode ID: 40114be305c3dcef8f1d0d8a4d72c4f6fe60507dae14a67093f0363fb11f4e65
                                    • Instruction ID: 7bab680d6445fbe3639d6349ce7c5a2e44fe9092fdcfa99206b4be9d1271e69d
                                    • Opcode Fuzzy Hash: 40114be305c3dcef8f1d0d8a4d72c4f6fe60507dae14a67093f0363fb11f4e65
                                    • Instruction Fuzzy Hash: 0211D4B5C01619DFDF00DFA4C988BAE7BB0FF08318F10D06AE855A7251DB399A119F61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693E109D
                                      • Part of subcall function 693DF640: __CxxThrowException@8.LIBCMT ref: 693DF66A
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8324
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8390
                                      • Part of subcall function 693D82B0: _malloc.LIBCMT ref: 693D83B1
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D83CB
                                      • Part of subcall function 693D82B0: __CxxThrowException@8.LIBCMT ref: 693D8416
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$_malloc
                                    • String ID: -mhe$ -w$7za d$D_?i
                                    • API String ID: 175252994-525280907
                                    • Opcode ID: 0083bf4cd0c477303198b0034ce986c3877027400fa00398c28c72e52eedff5b
                                    • Instruction ID: 173ffa5ce5cc66985b33682885e105e3be902b5e3bc88388da45634fa2ac6d99
                                    • Opcode Fuzzy Hash: 0083bf4cd0c477303198b0034ce986c3877027400fa00398c28c72e52eedff5b
                                    • Instruction Fuzzy Hash: 1D918379D00248EBDF00DBE4C984BCEBBB8AF14308F188559D945A7241DB75BE49DBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetVersionExA.KERNEL32 ref: 1001A29B
                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 1001A2D0
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1001A330
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                    • API String ID: 1385375860-4131005785
                                    • Opcode ID: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                                    • Instruction ID: ff41b7170f7c9f9639ed0085cf635e38180a7bd29c628196ad01e98acd5c5e28
                                    • Opcode Fuzzy Hash: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                                    • Instruction Fuzzy Hash: DB310575C412986EEB61D6745C81BDD37E9DB17344F2400EAF195DE042E631DFC99B20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693CEF8A
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693CEFA4
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • std::exception::exception.LIBCMT ref: 693CEFC3
                                    • __CxxThrowException@8.LIBCMT ref: 693CEFD8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID: d2?i
                                    • API String ID: 1974103008-3730799990
                                    • Opcode ID: e1b63aa0a915d56413ee7215cd83b82bb73a6adaea6df786c936cd2b57d77b5f
                                    • Instruction ID: 3e4475a4df150d4a9a4ce788f64a353f3e0d9200bc646a0b90fa849ac9342ed8
                                    • Opcode Fuzzy Hash: e1b63aa0a915d56413ee7215cd83b82bb73a6adaea6df786c936cd2b57d77b5f
                                    • Instruction Fuzzy Hash: BDF0F6B4D153086ADB0CDFF4D941BEFB7399BD4304F40C2AAD44291144EB749B1A8262
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693D59D3
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693D59ED
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • std::exception::exception.LIBCMT ref: 693D5A0C
                                    • __CxxThrowException@8.LIBCMT ref: 693D5A21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID: d2?i
                                    • API String ID: 1974103008-3730799990
                                    • Opcode ID: d7837d5f39c070667468016df3f1c14b8658c7cd9ba243b6821a0e358423bff2
                                    • Instruction ID: d292dabe333f5508c1e35d478b73fcf864fa470377cc74fae75b81ba7c320b69
                                    • Opcode Fuzzy Hash: d7837d5f39c070667468016df3f1c14b8658c7cd9ba243b6821a0e358423bff2
                                    • Instruction Fuzzy Hash: 2CF02BB9C1421965DF08DAF48951BEFB7399F90318F00425AD442E2084EB70971E8362
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693CF320
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693CF33A
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • std::exception::exception.LIBCMT ref: 693CF359
                                    • __CxxThrowException@8.LIBCMT ref: 693CF36E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                    • String ID: d2?i
                                    • API String ID: 1974103008-3730799990
                                    • Opcode ID: bbae07c298acc67504434c0dea658b16e1bb7bbabc5ceef8b2ef92e14b99eeb4
                                    • Instruction ID: 6c8b6c74aea3738548f316cc3bce58e5dce5b7f831e7595f9a1de9093477b526
                                    • Opcode Fuzzy Hash: bbae07c298acc67504434c0dea658b16e1bb7bbabc5ceef8b2ef92e14b99eeb4
                                    • Instruction Fuzzy Hash: E7F024B4814208BACF0CDFB4D901A9E77689F80344F40C21AEC5A86084FB70E7498692
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 693EAA4C
                                      • Part of subcall function 693E72BB: __getptd_noexit.LIBCMT ref: 693E72BE
                                      • Part of subcall function 693E72BB: __amsg_exit.LIBCMT ref: 693E72CB
                                    • __getptd.LIBCMT ref: 693EAA5D
                                    • __getptd.LIBCMT ref: 693EAA6B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: MOC$csm
                                    • API String ID: 803148776-1389381023
                                    • Opcode ID: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                    • Instruction ID: d5e5eb02659a1573a59cbeb40e1fc624dcd58494d35ef094f7f09c89ff94df09
                                    • Opcode Fuzzy Hash: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                    • Instruction Fuzzy Hash: 60E08C3A5102248FC700DB64C149B6A33B4FF4A329F5650A3F48DCB223C736E8449AA3
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStartupInfoA.KERNEL32(?), ref: 1001C793
                                    • GetFileType.KERNEL32(00000480), ref: 1001C83E
                                    • GetStdHandle.KERNEL32(-000000F6), ref: 1001C8A1
                                    • GetFileType.KERNEL32(00000000), ref: 1001C8AF
                                    • SetHandleCount.KERNEL32 ref: 1001C8E6
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: FileHandleType$CountInfoStartup
                                    • String ID:
                                    • API String ID: 1710529072-0
                                    • Opcode ID: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                                    • Instruction ID: 9e0b50c6418c78b4ce1b27a1f486aee3850f1a3a2b75f6582e04b96d90fbb996
                                    • Opcode Fuzzy Hash: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                                    • Instruction Fuzzy Hash: 0C51243190436A8FE710DB68C8C4F697BE0EB05768F354669D5A29F2E2DB30DC86CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CharUpperW.USER32 ref: 100010C1
                                    • GetLastError.KERNEL32 ref: 100010CD
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000004,00000000,00000000), ref: 100010E8
                                    • CharUpperA.USER32(?), ref: 10001101
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000001), ref: 10001114
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Char$ByteMultiUpperWide$ErrorLast
                                    • String ID:
                                    • API String ID: 3939315453-0
                                    • Opcode ID: 8383e40484a713360037c6af6127c53484664dbcfb1822a6f6cfd995dd4f40d0
                                    • Instruction ID: 5dd45f2d0006c2546d84b721a00360ca66f9a592c23ae8bd0920251664c2bfef
                                    • Opcode Fuzzy Hash: 8383e40484a713360037c6af6127c53484664dbcfb1822a6f6cfd995dd4f40d0
                                    • Instruction Fuzzy Hash: 210156B68002697BFB15EBE09CC9EDFB6ADEB082D4F110551FA42D3101E2B45D448770
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 693EC0D2
                                      • Part of subcall function 693E72BB: __getptd_noexit.LIBCMT ref: 693E72BE
                                      • Part of subcall function 693E72BB: __amsg_exit.LIBCMT ref: 693E72CB
                                    • __amsg_exit.LIBCMT ref: 693EC0F2
                                    • __lock.LIBCMT ref: 693EC102
                                    • InterlockedDecrement.KERNEL32(?), ref: 693EC11F
                                    • InterlockedIncrement.KERNEL32(02841668), ref: 693EC14A
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                    • String ID:
                                    • API String ID: 4271482742-0
                                    • Opcode ID: 9e048b1bffcbfa95da6d8b7ba6f6909ea17b7ab1088057240623648bb554157f
                                    • Instruction ID: 9b40f2794f83ba8dc586a5b72fd083e3175e6dcf3ea182153c42e080f80583a5
                                    • Opcode Fuzzy Hash: 9e048b1bffcbfa95da6d8b7ba6f6909ea17b7ab1088057240623648bb554157f
                                    • Instruction Fuzzy Hash: 6101B13A906B31EBDF11DF69944974E7B64BF05714F11810BE870A7780CB35A941DBD2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __lock.LIBCMT ref: 693E6012
                                      • Part of subcall function 693E81D4: __mtinitlocknum.LIBCMT ref: 693E81EA
                                      • Part of subcall function 693E81D4: __amsg_exit.LIBCMT ref: 693E81F6
                                      • Part of subcall function 693E81D4: EnterCriticalSection.KERNEL32(?,?,?,693EC6AB,00000004,693F82E8,0000000C,693E7669,693CFA7E,?,00000000,00000000,00000000,?,693E726D,00000001), ref: 693E81FE
                                    • ___sbh_find_block.LIBCMT ref: 693E601D
                                    • ___sbh_free_block.LIBCMT ref: 693E602C
                                    • HeapFree.KERNEL32(00000000,693CFA7E,693F7EB0,0000000C,693E81B5,00000000,693F8028,0000000C,693E81EF,693CFA7E,?,?,693EC6AB,00000004,693F82E8,0000000C), ref: 693E605C
                                    • GetLastError.KERNEL32(?,693EC6AB,00000004,693F82E8,0000000C,693E7669,693CFA7E,?,00000000,00000000,00000000,?,693E726D,00000001,00000214), ref: 693E606D
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 2714421763-0
                                    • Opcode ID: e35fb1c6db763ea907c76f2d58dc3b4e30384664422d3c1e3ba5e2350317ec72
                                    • Instruction ID: 9150373a7f425c3008a9a94fed17bc5807c7fa31c09ceed7cf03c0a5b347169c
                                    • Opcode Fuzzy Hash: e35fb1c6db763ea907c76f2d58dc3b4e30384664422d3c1e3ba5e2350317ec72
                                    • Instruction Fuzzy Hash: F2016275C09271EADF24AB70A909B4E3B78AF0136CF10900BF651A71C8CB359D41CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(00000103,7FFFFFFF,1001C473,1001D0D7,00000000,?,?,00000000,00000001), ref: 1001C033
                                    • TlsGetValue.KERNEL32 ref: 1001C041
                                    • SetLastError.KERNEL32(00000000), ref: 1001C08D
                                      • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                                    • TlsSetValue.KERNEL32(00000000), ref: 1001C065
                                    • GetCurrentThreadId.KERNEL32 ref: 1001C076
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorLastValue$AllocCurrentHeapThread
                                    • String ID:
                                    • API String ID: 2020098873-0
                                    • Opcode ID: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                                    • Instruction ID: c7b26c2ea065f329baa6dbda2ade13875997561f4633f5fb0c8b07fada39eb07
                                    • Opcode Fuzzy Hash: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                                    • Instruction Fuzzy Hash: 0DF0BB35901331DBF2329B749C89F1A3AA6EF097B1F214318F6559E1A1CB30D8C29690
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DeleteCriticalSection.KERNEL32(00000000,?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A102
                                      • Part of subcall function 100189EE: HeapFree.KERNEL32(00000000,?,?,?,?), ref: 10018AC2
                                    • DeleteCriticalSection.KERNEL32(?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A11D
                                    • DeleteCriticalSection.KERNEL32 ref: 1001A125
                                    • DeleteCriticalSection.KERNEL32 ref: 1001A12D
                                    • DeleteCriticalSection.KERNEL32 ref: 1001A135
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalDeleteSection$FreeHeap
                                    • String ID:
                                    • API String ID: 447823528-0
                                    • Opcode ID: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                                    • Instruction ID: 436f94670acdd869086ea8be0b95e1bb75b4415bd69928cd2107d9a27a45b4f1
                                    • Opcode Fuzzy Hash: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                                    • Instruction Fuzzy Hash: 1AF0F4268002647AEA65F719AD8C8A97BD5DB822B27920476EC53B7030CD778CC29DA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693C2893
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • __CxxThrowException@8.LIBCMT ref: 693C28BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID: 0M?i$Cannot find listfile
                                    • API String ID: 3476068407-3943224005
                                    • Opcode ID: d4dc591ef7906f1af690d4db40ca940b3639722b7a83afad5eab75f7be279c7c
                                    • Instruction ID: edf0f09fbe79c5aa9bb745ebdb90ba69109aad8449a61bf4ab93677669d39fdc
                                    • Opcode Fuzzy Hash: d4dc591ef7906f1af690d4db40ca940b3639722b7a83afad5eab75f7be279c7c
                                    • Instruction Fuzzy Hash: EC3193B6D00659DBCB00CF99CA80AEFF7B8FF48314F404669E954B3240D7359E068BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: __fileno
                                    • String ID: (_?i
                                    • API String ID: 1873356214-1335018112
                                    • Opcode ID: 2ebba008676c8217ba144919bb1023ce987bceaca526756807f1979d7a22d7d8
                                    • Instruction ID: 5d5160dc7d1b955b6fc69bd6db3a6f9c6f52807e553093bee95eb2860b350505
                                    • Opcode Fuzzy Hash: 2ebba008676c8217ba144919bb1023ce987bceaca526756807f1979d7a22d7d8
                                    • Instruction Fuzzy Hash: 8031B6B6509781AFD711CB748540B8AFBA9AF15304F44C6AED498C7702D736FC04C761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcAddress.KERNEL32(00000000,GetMethodProperty), ref: 693D5F83
                                    • GetProcAddress.KERNEL32(00000000,GetNumberOfMethods), ref: 693D5F9F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID: GetMethodProperty$GetNumberOfMethods
                                    • API String ID: 190572456-2134343882
                                    • Opcode ID: 677bdfb5272b5c1d3e1aa9add10a4ab5444b1c12884f62d72d7d89df1de27a05
                                    • Instruction ID: 635b170bc4dc9b41cda1042d8a454d00f8722761884d204919336a80c8e42cee
                                    • Opcode Fuzzy Hash: 677bdfb5272b5c1d3e1aa9add10a4ab5444b1c12884f62d72d7d89df1de27a05
                                    • Instruction Fuzzy Hash: EB214176E01319EBCB00DF95E9909DEB7B9FF48348F508016E914E7205E735E90ACBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(80000001,Software\7-zip,00000000,00020019,693EFD48,ADDB68B1,00000000,?,80000001,00000000,693EFD48,000000FF,?,693D5DBD,?,693FFCC8), ref: 693D5C1D
                                      • Part of subcall function 693D2FE0: RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,693D5DBD,?,?,693D5C37,?,693D5DBD,?,693FFCC8,00000000,00000000), ref: 693D300E
                                      • Part of subcall function 693D2FE0: RegQueryValueExW.ADVAPI32(693D5DBD,Path,00000000,693D5DBD,?,693D5DBD,?,693D5DBD,?,693FFCC8,00000000,00000000), ref: 693D304E
                                    • RegCloseKey.ADVAPI32(?,?,693D5DBD,?,693FFCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 693D5C47
                                    • RegCloseKey.ADVAPI32(?,?,693D5DBD,?,693FFCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 693D5C65
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CloseQueryValue$Open
                                    • String ID: Software\7-zip
                                    • API String ID: 4082589901-3321436535
                                    • Opcode ID: 6cf9be113ab7f0b5aac21a1fc23fc707ef5a990e7c43422fcb8106a6526085ae
                                    • Instruction ID: 40467a467721a9a2449f46b3460104112934ca35675dde2c93b23bf055633528
                                    • Opcode Fuzzy Hash: 6cf9be113ab7f0b5aac21a1fc23fc707ef5a990e7c43422fcb8106a6526085ae
                                    • Instruction Fuzzy Hash: D5115E77905A68ABCB118F549D44AAFBB6CFB06B61F00066BF826A7200D7356A0987D4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693DC8C2
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • GetLastError.KERNEL32(00000000,00000000), ref: 693DC8C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorExceptionException@8LastRaiseThrow
                                    • String ID: 7-Zip cannot load Mapi32.dll$R?i
                                    • API String ID: 2060628206-2163279805
                                    • Opcode ID: 09aad982076fe30f060c26c5edc5da4200e3e0561f94c9e83ea2186d14f3a101
                                    • Instruction ID: e2fa7c279872785863b012398fbf0073464856b859970fd655840c2d2a91efe9
                                    • Opcode Fuzzy Hash: 09aad982076fe30f060c26c5edc5da4200e3e0561f94c9e83ea2186d14f3a101
                                    • Instruction Fuzzy Hash: 4311C4B6904248DEEB00DBE4DD10BDDB7B8EF44318F54819DE54897280DB315E08CB63
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 693EB0A3
                                      • Part of subcall function 693EAFFE: ___BuildCatchObjectHelper.LIBCMT ref: 693EB034
                                    • _UnwindNestedFrames.LIBCMT ref: 693EB0BA
                                    • ___FrameUnwindToState.LIBCMT ref: 693EB0C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                    • String ID: csm
                                    • API String ID: 2163707966-1018135373
                                    • Opcode ID: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                    • Instruction ID: 9e44c00258741e6dbb967860d161eee518635818ca6ccc7e6fca1e6dd41b487e
                                    • Opcode Fuzzy Hash: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                    • Instruction Fuzzy Hash: 6701E875001629BBDF129F52CC45EAB7E7AFF04358F008012BD6859120DB32A9A1DBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693DF66A
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrow
                                    • String ID: -r$ -r-$ -r0
                                    • API String ID: 3976011213-1696425382
                                    • Opcode ID: d1a3301042a2281550448d1ed68e0d5324d625354135fd7d29b102a6487ad7bb
                                    • Instruction ID: 34af3b0f010c743a1f5833391b462ba8bbbb5bc04f31c58ccb6e2c28a3898b57
                                    • Opcode Fuzzy Hash: d1a3301042a2281550448d1ed68e0d5324d625354135fd7d29b102a6487ad7bb
                                    • Instruction Fuzzy Hash: 4CF0ED2A725018A7C601CAADAE58B6D77ACD701508F808A86F808D7B60C763CE1653CB
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                                    • Instruction ID: c5e9eab5286596022c0fc86455b854ac72cbfdbbf2fd81343e62aa3bf37372db
                                    • Opcode Fuzzy Hash: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                                    • Instruction Fuzzy Hash: 7791C371D01664AADB11EB68CC81ADE7AF9EF497A0F600226F854BE191D731DDC0CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapAlloc.KERNEL32(00000000,00002020,10025958,10025958,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B031
                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B055
                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B06F
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?), ref: 1001B130
                                    • HeapFree.KERNEL32(00000000,00000000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?,?), ref: 1001B147
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocVirtual$FreeHeap
                                    • String ID:
                                    • API String ID: 714016831-0
                                    • Opcode ID: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                                    • Instruction ID: 9791cdc1e8676e8be9240cb2db72b85fdf48b460ca22e9baef45e6ba91bfb517
                                    • Opcode Fuzzy Hash: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                                    • Instruction Fuzzy Hash: F4312670500B56EBE332CF24CCC5B2677E0EB447A5FA14529F5669B290E771E8C5CB48
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 693ECEDC
                                    • __isleadbyte_l.LIBCMT ref: 693ECF10
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 693ECF41
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 693ECFAF
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: afd74c55adffca7ec0a42438ee145cdd80725569d508fe02718b3202153441f3
                                    • Instruction ID: 572450f4a8f7737d1716f5495525f0a6923ed7c0baedbf86094c82777ebe4f49
                                    • Opcode Fuzzy Hash: afd74c55adffca7ec0a42438ee145cdd80725569d508fe02718b3202153441f3
                                    • Instruction Fuzzy Hash: 6E31E131A142A6EFDF00CF68C890AAE7FB5FF02312F0185AAF0619B190D332D951DB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000003,00000000,00000003,02000000,00000000,ADDB68B1,00000000,?,?,00000000,00000000,00000000), ref: 693D0FAE
                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 693D100C
                                    • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?), ref: 693D1033
                                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 693D103F
                                      • Part of subcall function 693D28A0: GetCurrentDirectoryW.KERNEL32(00000105,?,ADDB68B1,FFFFFFFF,?,00000004), ref: 693D2994
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: File$Create$CloseCurrentDirectoryHandleTime
                                    • String ID:
                                    • API String ID: 2622452211-0
                                    • Opcode ID: db49f28b8c466ff1f390269f27af0620e2ffbc6096606d7dc1a89189bcf1e436
                                    • Instruction ID: ed24938fd1429053cb8cdf0115f7d428f19ba27e74df1988a06b4e2afb458934
                                    • Opcode Fuzzy Hash: db49f28b8c466ff1f390269f27af0620e2ffbc6096606d7dc1a89189bcf1e436
                                    • Instruction Fuzzy Hash: E521B572600244BBEB10DF54DC85FAFB7BCFB45764F104229FA25A72C0C7756E0986A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CharUpper$ErrorH_prologLast
                                    • String ID:
                                    • API String ID: 826227211-0
                                    • Opcode ID: ff1246a03657b54eff9156cf09a95992e04e2b4fa534e0be7897412a772be6bf
                                    • Instruction ID: 99cf40d06858b6207db1331b5053b1e25ae539a9e8e767eb293be6f8fe8ea0fc
                                    • Opcode Fuzzy Hash: ff1246a03657b54eff9156cf09a95992e04e2b4fa534e0be7897412a772be6bf
                                    • Instruction Fuzzy Hash: 8A11043590025BDFEB05EFA0D8919EEB7F4FF09384F200424F542A2269EB705E41CB80
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(693FFC98,ADDB68B1,?,?,?,693EFB68,000000FF), ref: 693DD4F2
                                    • LeaveCriticalSection.KERNEL32(693FFC98,?,?,?,693EFB68,000000FF), ref: 693DD50A
                                    • LeaveCriticalSection.KERNEL32(693FFC98,?,?,?,?,693EFB68,000000FF), ref: 693DD547
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID: [Content]
                                    • API String ID: 2978645861-3799411330
                                    • Opcode ID: f68f90644bec362e43be2ea0e82d4643a8d6ec898e463bc51fedf4894a5200cf
                                    • Instruction ID: 34856b0a21a5985bb54b2ad72da8a865775a6d50fdb2af4c625c052bc5a48fb8
                                    • Opcode Fuzzy Hash: f68f90644bec362e43be2ea0e82d4643a8d6ec898e463bc51fedf4894a5200cf
                                    • Instruction Fuzzy Hash: BE01007B804158AFC720DF58D804B9DBBE8FB0A320F80826BEC22D3A80D7756904DB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6,?,00100000,?,00000000), ref: 693C1A4E
                                    • ReadFile.KERNEL32(00000000), ref: 693C1A55
                                    • GetLastError.KERNEL32 ref: 693C1A72
                                    • GetLastError.KERNEL32 ref: 693C1A80
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ErrorLast$FileHandleRead
                                    • String ID:
                                    • API String ID: 2244327787-0
                                    • Opcode ID: 5c7fa2b848bd419f51fe6f08a30046d2fc12ff96788bd0739fd35cdecdf4e9b8
                                    • Instruction ID: c5170d1a000258557d237adc0c3269a4e46a04c1caccc4470a48937cec9df3b2
                                    • Opcode Fuzzy Hash: 5c7fa2b848bd419f51fe6f08a30046d2fc12ff96788bd0739fd35cdecdf4e9b8
                                    • Instruction Fuzzy Hash: A501D13730020A9BDB00CAD4AD00BBB33ACAB453A0F10843BF916C6280D636DC50A7A3
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 693EBE36
                                      • Part of subcall function 693E72BB: __getptd_noexit.LIBCMT ref: 693E72BE
                                      • Part of subcall function 693E72BB: __amsg_exit.LIBCMT ref: 693E72CB
                                    • __getptd.LIBCMT ref: 693EBE4D
                                    • __amsg_exit.LIBCMT ref: 693EBE5B
                                    • __lock.LIBCMT ref: 693EBE6B
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                    • String ID:
                                    • API String ID: 3521780317-0
                                    • Opcode ID: 5e64ff8b42928f0ab59ff00719809af82cfc0d5fd2729725d4bec00406d1b12d
                                    • Instruction ID: ff1c87719be34a70e1abf806dbf937548f5aa5f3dc1c8520a92dfae0638b91fc
                                    • Opcode Fuzzy Hash: 5e64ff8b42928f0ab59ff00719809af82cfc0d5fd2729725d4bec00406d1b12d
                                    • Instruction Fuzzy Hash: 20F0903A900B248ADB62DBA6940474D73B0AF44718F00A55BE5A29F3D1CB306901CB93
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693E1C93
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrow
                                    • String ID: map/set<T> too long$|2?i
                                    • API String ID: 3976011213-3375660019
                                    • Opcode ID: bb9ed7f1f541b7eeef70bff2ca7ac1a97161f8a0ef13af645da5cf9753c7559f
                                    • Instruction ID: d085334b6192de077709c137e9e3a1ad2399a58dd9cd3ab88b3ba4562a815883
                                    • Opcode Fuzzy Hash: bb9ed7f1f541b7eeef70bff2ca7ac1a97161f8a0ef13af645da5cf9753c7559f
                                    • Instruction Fuzzy Hash: 61A175B6945A62DFC704CF58C280415FBB6BF8A714329C29EE8595B754C732F882CBD0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID: $
                                    • API String ID: 3519838083-227171996
                                    • Opcode ID: 312c2aec7e709d08ccb2c85a8bc715850654904397243e69b9c15c2e37b53766
                                    • Instruction ID: 9585d42676a0d41e953fe7fe136552d86f024f2135ab78c93d006785aed77b76
                                    • Opcode Fuzzy Hash: 312c2aec7e709d08ccb2c85a8bc715850654904397243e69b9c15c2e37b53766
                                    • Instruction Fuzzy Hash: D471583090060ACFEB20CF94C881AAEB7B1FF88394F50456DD596A7255DB30BB86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693DFD8E
                                    • __CxxThrowException@8.LIBCMT ref: 693DFDA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: -u
                                    • API String ID: 2005118841-3343466670
                                    • Opcode ID: 91bc56d79f65bb0e206816b31c0aeb8b48cd3401f96411259f8ead0f9e4fd974
                                    • Instruction ID: 501ffbeefb03629785dc898d7d41df1fec94dbd954d4c083bfd66850c30b5512
                                    • Opcode Fuzzy Hash: 91bc56d79f65bb0e206816b31c0aeb8b48cd3401f96411259f8ead0f9e4fd974
                                    • Instruction Fuzzy Hash: 8041A37BD24248EBCB01CF98C990ADEB7F8FF55344F90C516E854E7200D7709A59ABA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Info
                                    • String ID: $
                                    • API String ID: 1807457897-3032137957
                                    • Opcode ID: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                                    • Instruction ID: 27a1dab1f5f815cb8d427bf576b62c8b4ec6ff9cec70f847aa7466e11b016868
                                    • Opcode Fuzzy Hash: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                                    • Instruction Fuzzy Hash: 2B41483140436C1AEB11FA64CD85FEA7F9ADB01744F1006F7D585CF092D271C989DBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CharUpperW.USER32(00000000,ADDB68B1,00000002,00000000,00000000,693C43B8,0000001B,000000FF,(_?i,00000002), ref: 693C3D92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CharUpper
                                    • String ID: Incorrect command line$\?i
                                    • API String ID: 9403516-1708279139
                                    • Opcode ID: fb5cfb84717aaf6e80508fbd915dee7e9f78dff80e37ed9d9c056a9fbb30726d
                                    • Instruction ID: be6d2bf9ea209a7317cf732acb55e3825ad7abc83359ad8be5cf1a37684dd16f
                                    • Opcode Fuzzy Hash: fb5cfb84717aaf6e80508fbd915dee7e9f78dff80e37ed9d9c056a9fbb30726d
                                    • Instruction Fuzzy Hash: 8C411FB6E04505CFCB10EF98D880AAAF7B4FB48320F10826AED5997340D735AD41C7D2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693C84F6
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693C8510
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID: ,S?i
                                    • API String ID: 2732643326-3387600051
                                    • Opcode ID: c7495501cc9542a68a1195200eec69f1f28bfae89585dd5d1e07624835d37481
                                    • Instruction ID: 321aaa0870804abd7287761d41c37866d0a842e70ea35aca8d69a514ccd6be1a
                                    • Opcode Fuzzy Hash: c7495501cc9542a68a1195200eec69f1f28bfae89585dd5d1e07624835d37481
                                    • Instruction Fuzzy Hash: 535110B5A05B86EEC710CF6AC58078AFBE4BF19304F908A6ED4ADC7A00D371B555CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: Exception@8Throwwsprintf
                                    • String ID: -v
                                    • API String ID: 2898814609-1581256980
                                    • Opcode ID: 9ca287fe7320cbed8a39bbe8cdf1992bbd82a2107fecf1c48a5d64794791ad36
                                    • Instruction ID: d70290d55bfcd23b2a08c1c7955eb236ca6a6a46ac640ca9bafff37e220ec22c
                                    • Opcode Fuzzy Hash: 9ca287fe7320cbed8a39bbe8cdf1992bbd82a2107fecf1c48a5d64794791ad36
                                    • Instruction Fuzzy Hash: 53317576D00658DFCB10CFE9C984A9EFBF8FF48304F50852AE555EB241E7759A088B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,0000005F,00000000,ADDB68B1,00000000), ref: 693D0B62
                                    • __CxxThrowException@8.LIBCMT ref: 693D0B88
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ByteCharExceptionException@8MultiRaiseThrowWide
                                    • String ID: _
                                    • API String ID: 3144726602-701932520
                                    • Opcode ID: 1fcb2ba39f950a52531fbae1d92af5fc8e54e8685f5eb367414c4355bbed1e4e
                                    • Instruction ID: 03915baab234e65d5523ccef777e866698b6eb213f9c18823b6c6c56643af22b
                                    • Opcode Fuzzy Hash: 1fcb2ba39f950a52531fbae1d92af5fc8e54e8685f5eb367414c4355bbed1e4e
                                    • Instruction Fuzzy Hash: 46219F76904249EFCB00CF59C980B9AFBF8FF89718F10855AE9149B241D771AA04CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,693D5DBD,?,?,693D5C37,?,693D5DBD,?,693FFCC8,00000000,00000000), ref: 693D300E
                                    • RegQueryValueExW.ADVAPI32(693D5DBD,Path,00000000,693D5DBD,?,693D5DBD,?,693D5DBD,?,693FFCC8,00000000,00000000), ref: 693D304E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID: Path
                                    • API String ID: 3660427363-2875597873
                                    • Opcode ID: a063a3ca3e043080130bd933c084f5228d11d249c876a019dea0466dc033788b
                                    • Instruction ID: 550c23c164ed5f6df105db1aed76fb5d14db13efc685f14fdfae1816f973aa9a
                                    • Opcode Fuzzy Hash: a063a3ca3e043080130bd933c084f5228d11d249c876a019dea0466dc033788b
                                    • Instruction Fuzzy Hash: 75118FB2A04204AFEB14DFA8C9D08AEF7B9FF48744B20846EE556D3210E7719D448B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693C231A
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693C2336
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID: dL?i
                                    • API String ID: 2732643326-2150643756
                                    • Opcode ID: 1597c69a135f52f4462ce390d3880b40ca6bd703324c3ccef10ce01a2d4949f8
                                    • Instruction ID: d9fdc81984bbfceb5edefb5b1492c61a59b3e8f76de122cf77b61d9d366e8680
                                    • Opcode Fuzzy Hash: 1597c69a135f52f4462ce390d3880b40ca6bd703324c3ccef10ce01a2d4949f8
                                    • Instruction Fuzzy Hash: 2D218EB5900608AFC720CF5DC980A9AFBFCFF49724F50C62EE55993740D731AA068BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 693C54AD
                                      • Part of subcall function 693E5F2A: __FF_MSGBANNER.LIBCMT ref: 693E5F4D
                                      • Part of subcall function 693E5F2A: __NMSG_WRITE.LIBCMT ref: 693E5F54
                                      • Part of subcall function 693E5F2A: RtlAllocateHeap.NTDLL(00000000,693CFA6F,?,00000000,?,?,693C4D3F,0000000C,ADDB68B1,?,?,00000000,?,?,693EEF9B,000000FF), ref: 693E5FA1
                                    • __CxxThrowException@8.LIBCMT ref: 693C54C7
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                    • String ID: 7<i
                                    • API String ID: 2732643326-1306940000
                                    • Opcode ID: 54967f7d07fe7d14a3ee1e1b71f0c667173f905a23f2e762e9c64df16a4bb4eb
                                    • Instruction ID: 66fe4c108f609e8a6fcb4d89919aff9f6219f1e622142e6f459fb00db624e9fd
                                    • Opcode Fuzzy Hash: 54967f7d07fe7d14a3ee1e1b71f0c667173f905a23f2e762e9c64df16a4bb4eb
                                    • Instruction Fuzzy Hash: 6611B1B6608605EFD714CF58C881B5BB7E9EB45314F00862EE8A6C7790EB31BD048B51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693CED86
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                      • Part of subcall function 693CEDB0: std::exception::exception.LIBCMT ref: 693CEDDE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrowstd::exception::exception
                                    • String ID: vector<T> too long$|2?i
                                    • API String ID: 4171481480-1040430243
                                    • Opcode ID: 5626959f8588037332b96785e10eeb039dee0877b4138e8c47c415d184065db7
                                    • Instruction ID: 07155f1301c450ab3725aa3a48d233170b1e9ff7c3caf70d598d23e5347c44e7
                                    • Opcode Fuzzy Hash: 5626959f8588037332b96785e10eeb039dee0877b4138e8c47c415d184065db7
                                    • Instruction Fuzzy Hash: EA018875008344ABC710DF58D845B9BBBE8AB58754F404A1DF59497280DB74E908CB97
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 693E69BB: __getptd.LIBCMT ref: 693E69C1
                                      • Part of subcall function 693E69BB: __getptd.LIBCMT ref: 693E69D1
                                    • __getptd.LIBCMT ref: 693EAE18
                                      • Part of subcall function 693E72BB: __getptd_noexit.LIBCMT ref: 693E72BE
                                      • Part of subcall function 693E72BB: __amsg_exit.LIBCMT ref: 693E72CB
                                    • __getptd.LIBCMT ref: 693EAE26
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: csm
                                    • API String ID: 803148776-1018135373
                                    • Opcode ID: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                    • Instruction ID: a0c935812de75a24702fc9feebdd97aa971417fc7bdf146218cd18764558b27b
                                    • Opcode Fuzzy Hash: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                    • Instruction Fuzzy Hash: D90169388016258FCF24CFE0D584AADB7B6BF40326F20942FF481E66A0CB329585CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __CxxThrowException@8.LIBCMT ref: 693EE66F
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    • std::bad_exception::bad_exception.LIBCMT ref: 693EE697
                                    Strings
                                    • Access violation - no RTTI data!, xrefs: 693EE68F
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8RaiseThrowstd::bad_exception::bad_exception
                                    • String ID: Access violation - no RTTI data!
                                    • API String ID: 1843230569-2158758863
                                    • Opcode ID: 6134674dbe7f68f5d95339eb06ec781566df2855b35a4e9ac02091508fc1df84
                                    • Instruction ID: bc4bf70cba7116c8e72a27c5bbccd0d10e4b56153f1219a4e7d1b642d2db0699
                                    • Opcode Fuzzy Hash: 6134674dbe7f68f5d95339eb06ec781566df2855b35a4e9ac02091508fc1df84
                                    • Instruction Fuzzy Hash: C2E0C77AA20208DFCF00CBA8C880EEE73B4AB0930AF000006E402F3250D730E942CF20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 693E5196
                                    • __CxxThrowException@8.LIBCMT ref: 693E51C1
                                      • Part of subcall function 693E663B: RaiseException.KERNEL32(?,693E0629,ADDB68B1,?,?,693E0629,?,693F8388,ADDB68B1), ref: 693E667D
                                    Strings
                                    • invalid string position, xrefs: 693E519B
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2608510217.00000000693C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 693C0000, based on PE: true
                                    • Associated: 0000000A.00000002.2608455573.00000000693C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608669852.00000000693F3000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608905305.00000000693FD000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069403000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    • Associated: 0000000A.00000002.2609027014.0000000069428000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_693c0000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: ExceptionException@8H_prolog3RaiseThrow
                                    • String ID: invalid string position
                                    • API String ID: 1961742612-1799206989
                                    • Opcode ID: cfe676490c5b935d23056b963c7953046e46bf1d73958c272cbd9352749d828e
                                    • Instruction ID: 7acf173d742e0978ec43f72c07d88c0584b521323f97423b3ca6bb15a87594c7
                                    • Opcode Fuzzy Hash: cfe676490c5b935d23056b963c7953046e46bf1d73958c272cbd9352749d828e
                                    • Instruction Fuzzy Hash: 70D0627585012C9BDB04DBD4CD44FDD77786B54358F449416D245A6040DB646E058665
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapReAlloc.KERNEL32(00000000,?,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001AB96
                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001ABCA
                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 1001ABE4
                                    • HeapFree.KERNEL32(00000000,?), ref: 1001ABFB
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: AllocHeap$FreeVirtual
                                    • String ID:
                                    • API String ID: 3499195154-0
                                    • Opcode ID: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                                    • Instruction ID: 484c1ce75c38baac158856a15f7ab205fd40ab6127819ea80900b3ceb95b3c03
                                    • Opcode Fuzzy Hash: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                                    • Instruction Fuzzy Hash: E8112570240321AFE721EF19CCC6A167BF6FB86764B61491AF552C69B1D3729CA2CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • InitializeCriticalSection.KERNEL32(?,1001BFB2,?,10019F53), ref: 1001A0B2
                                    • InitializeCriticalSection.KERNEL32 ref: 1001A0BA
                                    • InitializeCriticalSection.KERNEL32 ref: 1001A0C2
                                    • InitializeCriticalSection.KERNEL32 ref: 1001A0CA
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.2607831949.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000A.00000002.2607740002.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608143447.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608265704.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608324416.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 0000000A.00000002.2608397098.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_10000000_TechkonDriver64Bit.jbxd
                                    Similarity
                                    • API ID: CriticalInitializeSection
                                    • String ID:
                                    • API String ID: 32694325-0
                                    • Opcode ID: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                                    • Instruction ID: bb73eb11f573fb0f18e311b5dd9e76b2e5dde51fe535fe889abf8312516ef5db
                                    • Opcode Fuzzy Hash: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                                    • Instruction Fuzzy Hash: BEC00231801138AFFA556B55DC848493FA6EB042723210063E10561030CEB31C93DFE8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.2208938740.00007FF7081D1000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF7081D0000, based on PE: true
                                    • Associated: 00000010.00000002.2208853468.00007FF7081D0000.00000002.00000001.01000000.00000012.sdmpDownload File
                                    • Associated: 00000010.00000002.2209008753.00007FF708251000.00000004.00000001.01000000.00000012.sdmpDownload File
                                    • Associated: 00000010.00000002.2209058956.00007FF708253000.00000002.00000001.01000000.00000012.sdmpDownload File
                                    • Associated: 00000010.00000002.2209058956.00007FF708268000.00000002.00000001.01000000.00000012.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_7ff7081d0000_x64DPInst.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                    • String ID:
                                    • API String ID: 1445889803-0
                                    • Opcode ID: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
                                    • Instruction ID: 6abba7574129f2c7a9054b09840ed3b7b13763aa607902ab1358a97ebd7aa35d
                                    • Opcode Fuzzy Hash: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
                                    • Instruction Fuzzy Hash: D7013022658B0692EB509B21FC50365F360FF45BA0F846634EE5E47794CF3CD9958324
                                    Uniqueness

                                    Uniqueness Score: -1.00%